@juliesmi Profile picture

Julie Smith

@juliesmi

Cyber professional

Similar User
Het Vikam photo

@mangekyo_sec

Drew Bauman photo

@DrewBauman

Mike photo

@MikeHanchos

ZakCheb photo

@ZakCh3b

Jahs_See photo

@Jahs_See

DanBreu ⚡️ photo

@dan_breu

ARUN SINGH photo

@arunnsec

Sourajyoti Bose photo

@BoseSourajyoti

Sean photo

@SMHWritesThings

Julie Smith Reposted

A vulnerability in macOS, identified as CVE-2021-30970 and fixed by Apple in December, could allow an attacker to bypass Transparency, Consent, and Control (TCC) and gain unauthorized access to protected data. Read our analysis via @yo_yo_yo_jbo: msft.it/6018ZWvnw


Julie Smith Reposted

Little Bobby Tables has changed his attack vector 😂 #log4j #Log4Shell #infosecurity #infosec

Tweet Image 1

Julie Smith Reposted

Want to know why threat actors are so interested in Microsoft Partners and Delegated Administrative Privileges (DAP)? Check my blog at o365blog.com/post/partners/ #AzureAD #blueteam #redteam #infosec #AADInternals

Tweet Image 1

Julie Smith Reposted

PoC exploit now out for Azure Active Directory brute forcing flaw. Microsoft maintains it's not a vulnerability but appears to be working on a solution. Includes additional commentary from @DrAzureAD @Secureworks 👇👇👇 arstechnica.com/information-te…


Julie Smith Reposted

Backdoor #Office365 and #Azure AD by stealing AD FS certificate/key pair. Golden SAML attack will allow an attacker to: > Bypass MFA to Azure / Office365 > Logon as any AD user regardless of password resets > Method is usually valid for a year inversecos.com/2021/09/backdo…

Tweet Image 1

Julie Smith Reposted

(1/x) M365 changes to be aware of 1) End-users can purchase PowerBI on their on personal credit cards to bypass IT 2) End-users can purchase Windows 365 Cloud PC VMs on their own personal credit cards to bypass IT 3) End-users can create security groups (even if you disabled it)


Julie Smith Reposted

Researchers have uncovered a new class of vulnerabilities affecting major managed DNS providers that could allow attackers to spy on massive amount of DNS traffic and exfiltrate sensitive information from corporate networks. Read: thehackernews.com/2021/08/bugs-i… #infosec #cybersecurity


Julie Smith Reposted

LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains securityaffairs.co/wordpress/1206…


Julie Smith Reposted

Microsoft Rushes Fix For PetitPotam Attack PoC packetstormsecurity.com/news/view/3250…


Julie Smith Reposted

Malicious Office365 apps are the ultimate insiders: They bypass 2FA, survive password resets, & give attackers launching point for more attacks. New research shows they're very effective at getting bad guys inside O365 organizations. krebsonsecurity.com/2021/05/malici…


Julie Smith Reposted

New version of #AADInternals out now, including remote dumping of #ADFS configuration database🔥 Read the blog at: o365blog.com/post/adfs/ Credits to @vesat, @doughsec, @BakedSec, @_dirkjan, @gentilkiwi, @MGrafnetter, and @Cyb3rWard0g for your help and previous work!

Tweet Image 1

Julie Smith Reposted

What a time to be alive... Install the Microsoft signed Hybrid Connection Manager on victim host, link it up with your Azure app, enjoy persistent access to the on-prem network from your Azure portal. Only needs https outbound to Azure and line of sight from victim to target host

Tweet Image 1
Tweet Image 2

Julie Smith Reposted

The #CryptoGathering #Sweepstakes 🚀 1 lucky person will receive $4500 in #BTC by the time this is over... ❤️/RT this post & follow @RealVision for a chance to #win. 🏆 will be announced 03/26 6pm ET here & at the event. rvtv.io/38ntphJ Terms👉 rvtv.io/3farOQl


Julie Smith Reposted

Attacks Spike Following The Disclosure Of CVE-2021-22986: F5 Networks BIG-IP iControl Remote Command Execution Vulnerability feedproxy.google.com/~r/Imperviews/…


Julie Smith Reposted

Microsoft observed a new family of human operated ransomware attack customers – detected as Ransom:Win32/DoejoCrypt.A. Human operated ransomware attacks are utilizing the Microsoft Exchange vulnerabilities to exploit customers. #DearCry @MsftSecIntel


Loading...

Something went wrong.


Something went wrong.