@blueteamer Profile picture

Blueteamer

@blueteamer

Student of All Things

Joined August 2011
Similar User
strandjs - strandjs@bsky.social photo

@strandjs

Binary Defense photo

@Binary_Defense

Scott Sutherland photo

@_nullbind

The Haag™ photo

@M_haggis

Hacker Hurricane photo

@HackerHurricane

Dwight Hohnstein photo

@djhohnstein

Mark Baggett photo

@MarkBaggett

Lars Karlslund - also on @lkarlslund@bsky.social photo

@lkarlslund

Devon Kerr photo

@_devonkerr_

obscuresec.bsky.social photo

@obscuresec

sneakerhax photo

@sneakerhax

Philip Tsukerman photo

@PhilipTsukerman

Paul (DEFENDER) photo

@Threatzman

Jamie Shaw 🎅🎄 photo

@1nPr0c

Anton photo

@Antonlovesdnb

Blueteamer Reposted

Organisation admins can turn it off with gpo: Configuration\Policies\Administrative Templates\Microsoft Office 2016\Privacy\Trust Center. learn.microsoft.com/en-us/microsof… People should read this: learn.microsoft.com/en-us/microsof…


Good writeup

Extracting Plaintext Credentials from Palo Alto Global Protect - Shells.Systems shells.systems/extracting-pla…



Blueteamer Reposted

Coming in early 2025: Quick Machine Recovery. This feature will enable IT administrators to execute targeted fixes from Windows Update on PCs, even when machines are unable to boot, without needing physical access to the PC. This remote recovery will help with future #CrowdCry


Blueteamer Reposted

Chinese hackers exploit Fortinet VPN zero-day to steal credentials - @billtoulas bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/…


Not sure I agree 100%, but interesting and paper linked in comments

Did I stutter these last 3 years? Stop. Sending. Fake. Phishing. Emails. Thank you.

Tweet Image 1


Blueteamer Reposted

Did I stutter these last 3 years? Stop. Sending. Fake. Phishing. Emails. Thank you.

Tweet Image 1

Blueteamer Reposted

Have you read about all the Active Directory Certificate Services (AD CS) 🔐attack paths but never tried them out? @bradyjmcl has updated the ludus_adcs role to enable ESC1,2,3,4,5,6,7,8,9,11,13 and 15 attack paths in your lab! Easy 3 step guide here: docs.ludus.cloud/docs/environme…


Blueteamer Reposted

How did I miss this last month!?? CISA has released version 2.0 of Logging Made Easy. (If you'll recall, CISA took over developing it from UK's NCSC.) And if you don't know what Logging Made Easy is... well, it's in the name. 🙂 Intended for orgs with one-person IT staffs and up.

A year ago, @CISAgov launched Logging Made Easy (LME) to help small/medium orgs, gov’ts, and critical infrastructure detect cyber threats. Introducing LME 2.0—featuring advanced threat detection. #LoggingMadeEasy github.com/cisagov/LME

Tweet Image 1


Blueteamer Reposted

Microsoft Exchange adds warning to emails abusing spoofing flaw - @serghei bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/…


Blueteamer Reposted

🚨#Exchange #Server #Security Updates November 2024 released for Exchange 2016 / 2019 bit.ly/3ABssni

Tweet Image 1

Fix this @DocuSign

DocuSign's Envelopes API abused to send realistic fake invoices - @billtoulas bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/…



Blueteamer Reposted

Just published a new video 👇 Are you leaving your Microsoft Graph tokens unprotected?

Tweet Image 1

Blueteamer Reposted

Microsoft: Windows Server 2025 now generally available alongside System Center 2025 | Neowin neowin.net/news/microsoft…


Blueteamer Reposted

msft has flipped a switch and now every user in *your* org can get a trial license for m365 copilot "without an admin's help", by default this includes building their own custom agents (!) turn this off at admin -> self-service purchase -> Do not allow

Tweet Image 1

Blueteamer Reposted

It's all here... CIS Windows 11 Enterprise Benchmark v3.0.0

Tweet Image 1

Blueteamer Reposted

THURSDAY TRAINING REPOST! Shift gears to a proactive defense by embracing offensive tactics. Beat attackers to the finish line before they even start their engines w/ @hackandbackpack & @TimMedin Offense for Defense kernelcon.org/training#offen… April 1 - 2, 2025

Tweet Image 1

Blueteamer Reposted

Sophos detailed to me its 5-year cat-and-mouse game with Chinese hackers repeatedly exploiting its firewalls. The company resorted to installing spy "implants" on devices the hackers were testing on—tracing them to a university and contractor in Chengdu. wired.com/story/sophos-c…


Blueteamer Reposted

We have all heard about attackers leveraging firewall policies or WFP to block EDRs from communicating with their servers. Today I am releasing a @HuntressLabs blog talking about how to mitigate that tampering technique within EDR products: huntress.com/blog/silencing…


Loading...

Something went wrong.


Something went wrong.