@mdecrevoisier Profile picture

Michel de CREVOISIER

@mdecrevoisier

Senior Security Analyst / Threat detection lead

Similar User
Elastic Security Labs photo

@elasticseclabs

Craig Rowland - Agentless Linux Security photo

@CraigHRowland

Olaf Hartong photo

@olafhartong

John Hubbard photo

@SecHubb

Tony Lambert photo

@ForensicITGuy

Wietze photo

@Wietze

SOC Prime photo

@SOC_Prime

Threat Insight photo

@threatinsight

Mehmet Ergene photo

@Cyb3rMonk

ap photo

@decoder_it

rootsecdev photo

@rootsecdev

ɯɹoʇsuoı photo

@ionstorm

Kelsey photo

@k3dg3

Vadim Khrykov photo

@BlackMatter23

Nathan McNulty photo

@NathanMcNulty

Michel de CREVOISIER Reposted

So what happens if you buy us-east-1.com? Answer: You get DNS traffic from misconfigured services And emails from likely AWS test environments dev.to/aws-builders/i…

Tweet Image 1
Tweet Image 2

Michel de CREVOISIER Reposted

Chinese hackers exploit Fortinet VPN zero-day to steal credentials - @billtoulas bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/…


Michel de CREVOISIER Reposted

Cybersecurity Flaws in US Drinking Water Systems Put 26 Million at Risk hackread.com/cybersecurity-…


Michel de CREVOISIER Reposted

Automate on-premises Windows Server from the cloud using Azure Arc thomasmaurer.ch/2024/04/automa…

Tweet Image 1

Michel de CREVOISIER Reposted

Two-Step Phishing Technique Leveraging Microsoft Visio Files Exposed by Researchers securityonline.info/two-step-phish…


Michel de CREVOISIER Reposted

My friend Arnim created a Top 50 vendor list from @CISAgov’s KEV list with filter on CVE-202* 148 Microsoft 63 Apple 50 Google ** 25 Cisco** ** 21 Ivanti** 20 Apache 19 VMware 12 Oracle 12 Adobe 11 Samsung 11 Android ** 10…

I’d love to see @CISAgov publish a ‘Top 10 Vendors’ list for releasing products with serious, frequently exploited vulnerabilities (CVSS > 8.5). It’d be a data-driven ‘wall of shame’ based on their exploited vulnerability reports. If they won’t do it, I might. And if a vendor…



Michel de CREVOISIER Reposted

🇩🇪 Vodafone Germany - eSIM Panel Access Leak Access to Vodafone Germany's eSIM management panel has been leaked and is circulating on the dark web. This exposure could allow unauthorized parties to manipulate eSIM configurations, posing risks of fraud, data theft, and…

Tweet Image 1

Michel de CREVOISIER Reposted

🛡️ New Blog: UAL = Unaligned Activity Logs In this blog, four different Unified Audit Log acquisition methods are compared. The key finding is: - None of the acquisition methods get 100% coverage Many more findings are included in the blog! 🔗 kqlquery.com/posts/ual/


Michel de CREVOISIER Reposted

Process injection isn't just for Windows. 👀 Akamai researcher @oridavid123 provides a deep dive into Linux process injection techniques in our most recent publication. Read to uncover some new tricks and protections for your organization. 🔐 akamai.com/blog/security-…

Tweet Image 1

Michel de CREVOISIER Reposted
Tweet Image 1

aUtHenTiCaTed RCE Citrix?



Michel de CREVOISIER Reposted

Don't fall into the trap of misattributing threat actors by pivoting on Parking IPs. Props to Qianxin for spotting this.

Tweet Image 1

Michel de CREVOISIER Reposted

🔥 Excited to announce HEARTH (Hunting Exchange And Research Threat Hub)! Hey thrunters! A new open-source home to: - Share hunt ideas - Learn from others - Level up together Built by hunters, for hunters 🎯 threathuntingcommunity.com #threathunting #thrunting #infosec #HEARTH


Michel de CREVOISIER Reposted

Microsoft blames Windows Server 2025 automatic upgrades on 3rd-party tools - @serghei bleepingcomputer.com/news/microsoft…">bleepingcomputer.com/news/microsoft… bleepingcomputer.com/news/microsoft…">bleepingcomputer.com/news/microsoft…


Michel de CREVOISIER Reposted

How can attackers escalate privileges in #Microsoft Entra ID? The #Mandiant Red Team reveals tactics and defenses in this latest blog post. See how attackers exploit Intune-managed PAWs to elevate privileges in #EntraIDbit.ly/3YZECzw

Tweet Image 1

Michel de CREVOISIER Reposted

Collection of commands that will help automate the configuration of the Defender for Endpoint settings github.com/nathanmcnulty/… #MicrosoftDefender #Security #MicrosoftSecurity #Cybersecurity #DefenderXDR #MicrosoftThreatIntelligence


Michel de CREVOISIER Reposted

GitHub - cisagov/decider: A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework. github.com/cisagov/decider


Michel de CREVOISIER Reposted

Amazon confirms employee data breach after vendor hack - @serghei bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/…


Loading...

Something went wrong.


Something went wrong.