Greg Kutzbach, CISSP (@dasgrog) 's Twitter Profile
Greg Kutzbach, CISSP

@dasgrog

Business risk.. all day.

ID: 1948044967

linkhttp://www.exacyber.ai calendar_today08-10-2013 22:11:16

14,14K Tweet

1,1K Followers

3,3K Following

Nathan McNulty (@nathanmcnulty) 's Twitter Profile Photo

Intune now has dedicated security recommendations docs just like Entra 🔥 The Entra security docs are extremely popular, and I love seeing other teams publishing this kind of guidance Thanks to my collegaue (Josh Gatewood) for pointing this out! learn.microsoft.com/en-us/intune/i…

Intune now has dedicated security recommendations docs just like Entra 🔥

The Entra security docs are extremely popular, and I love seeing other teams publishing this kind of guidance

Thanks to my collegaue (<a href="/JoshuaGatewood/">Josh Gatewood</a>) for pointing this out!

learn.microsoft.com/en-us/intune/i…
insecurity matters (@tjcmorgan) 's Twitter Profile Photo

DMARC adoption for top 1000 domains 27% no dmarc record 15% p=none 17% p=quarantine 41% p=reject 58% enabled You can do it! #DMARC #MailSecurity

TrustedSec (@trustedsec) 's Twitter Profile Photo

Your Web Application Firewall (WAF) sees EVERYTHING 👁️ In our new blog, nyxgeek demonstrates how an attacker with access to #Azure Front Door’s WAF and Log Analytics can potentially skim credentials from a site behind the WAF. Read it now! trustedsec.com/blog/skimming-…

Tanya Janca | Shehackspurple (@shehackspurple) 's Twitter Profile Photo

Join me Nov 12, online, for the Harness DevSecOps Summit! I will be at the end of the day, doing a fireside chat with Adam Arellano, about securing AI as part of the SDLC. :-D Register here for free: twp.ai/ImrwMj

Join me Nov 12, online, for the Harness DevSecOps Summit! I will be at the end of the day, doing a fireside chat with Adam Arellano, about securing AI as part of the SDLC. :-D 

Register here for free: twp.ai/ImrwMj
Mattias Wåhlén 🇪🇺🇺🇦🇨🇦 (@wahlenpmattias) 's Twitter Profile Photo

vx-underground Fun fact. This is why some information sites still label RATs used in ransomware attacks, like TrickBot or Ursnif, as ”Banking trojans” That’s what they originally was used for. Changing bank info on payrolls.

mRr3b00t (@uk_daniel_card) 's Twitter Profile Photo

Imagine you backup your firewall with it's all it's secrets (which are highly sensitive) to a provider and the provider get's compromised? Well that's what appears to have occurred with SonicWall! They seem to have been pwn3d and then threat actors have decrypted the credentials

Imagine you backup your firewall with it's all it's secrets (which are highly sensitive) to a provider and the provider get's compromised? Well that's what appears to have occurred with SonicWall!

They seem to have been pwn3d and then threat actors have decrypted the credentials
mRr3b00t (@uk_daniel_card) 's Twitter Profile Photo

I wanted to check for people the state of how Unifi backups are protected.... because we don't want to be a victim of the 'SonicWall' effect (where they haven't protected the files and baddies have stolen then and apparently compromised a load of orgs!) so the Unifi backup

I wanted to check for people the state of how Unifi backups are protected....

because we don't want to be a victim of the 'SonicWall' effect (where they haven't protected the files and baddies have stolen then and apparently compromised a load of orgs!)

so the Unifi backup
Forgework (@forgework_) 's Twitter Profile Photo

Just gifted my 75 year old dad his 16 inch laptop from Framework Couple quotes from him: “I’ve never gotten a gift this nice ever” “This is the best computer I’ve ever touched” Needless to say he loves it. Thanks so much Framework! It’s been a birthday success!

Just gifted my 75 year old dad his 16 inch laptop from <a href="/FrameworkPuter/">Framework</a> 

Couple quotes from him:
“I’ve never gotten a gift this nice ever”
“This is the best computer I’ve ever touched” 

Needless to say he loves it. Thanks so much Framework! It’s been a birthday success!
Betsy Langowski (@superbetsy) 's Twitter Profile Photo

I’m looking through my Macintosh user guide (the booklet that accompanied my 1984 Macintosh) for the first time in a while, and I’m a little obsessed with this graphic explaining scrolling.

I’m looking through my Macintosh user guide (the booklet that accompanied my 1984 Macintosh) for the first time in a while, and I’m a little obsessed with this graphic explaining scrolling.