@GossiTheDog yes, but do those max settings Look pretty? ;)
Notices by Tanawts (enigma@infosec.exchange)
-
Embed this notice
Tanawts (enigma@infosec.exchange)'s status on Sunday, 15-Sep-2024 23:34:36 JST Tanawts -
Embed this notice
Tanawts (enigma@infosec.exchange)'s status on Saturday, 07-Sep-2024 17:22:00 JST Tanawts Endeavor to be the prism in the windchime
Wield what is taken for granted and considered mundane in life
Create music from the air, and fracture the light into rainbows of brilliance that dance to the tune
Help others hear the melody, to see the beauty, and remember that the greatest thing you'll ever learn is just to love and be loved in return
-
Embed this notice
Tanawts (enigma@infosec.exchange)'s status on Saturday, 03-Feb-2024 03:19:06 JST Tanawts There is a reoccurring Tactic, Technique, and Procedure (TTP) that threat actors have been demonstrating as highly effective.
It was most notably used by Lapsus$ and you can see the behavior Copy+Pasted in the majority of recent attacks:Opportunistic Compromise of an account -> Pour over generally unrestricted internal docs/wikis/repos -> obtain design details -> use discovered unremeditated creds for informed lateral movement/follow up attacks with more specific deeper objectives/targets.
-
Embed this notice
Tanawts (enigma@infosec.exchange)'s status on Saturday, 03-Feb-2024 03:19:04 JST Tanawts Big Takeaway for Engineering Teams & Business Leadership is -- You can no longer rely on the false sense of security-through-obscurity of your internal designs; attackers are deliberately targeting these for surgical strikes and it is no longer sensible to believe "the bad guys don't know how to attack our complex private internal systems/services because they don't understand how its put together"; in reality they may very well understand it better than your own employees.
-
Embed this notice
Tanawts (enigma@infosec.exchange)'s status on Wednesday, 31-Jan-2024 00:31:43 JST Tanawts @GossiTheDog Remember when folks were bummed when Naughty Dog said: We made this really cool Online Multiplayer Last of Us game... but we've made a company decision NOT to be a Live Games company and instead focus on our Core Experience? Hat's off to them for recognizing the challenge and sticking to convictions.
Oooof Rocksteady has been demonstrating the big pitfalls of trying to go from a rich stand-alone game dev model to having to staff and Support Live Online Services
:|
-
Embed this notice
Tanawts (enigma@infosec.exchange)'s status on Tuesday, 30-Jan-2024 08:56:01 JST Tanawts @GossiTheDog Of course my friend!
https://telegra.ph/How-to-Receive-Microsoft-Breach-Notifications-10-21
-
Embed this notice
Tanawts (enigma@infosec.exchange)'s status on Thursday, 25-Jan-2024 09:04:44 JST Tanawts @GossiTheDog just wait for all the fun once the psyops and cyberops start flying in full swing leading up to the election
-
Embed this notice
Tanawts (enigma@infosec.exchange)'s status on Monday, 22-Jan-2024 04:15:48 JST Tanawts @GossiTheDog @alex -- I don't think this was from: Spraying M365 Mailbox accounts... Reading between those lines, "Non-Prod-Test-Tenant Account" That sounds a whole lot more like a 'Service Account/Machine Account" used for a Proof of concept tool/service; automation accounts aren't going to have MFA.
There are a great many different services/tools that are granted delegated access to various different things, email being accessed sounds to me that perhaps it was an automation service meant to trigger actions based on access to mail content/interaction.
-
Embed this notice
Tanawts (enigma@infosec.exchange)'s status on Friday, 08-Sep-2023 11:55:43 JST Tanawts InfoSec family, I see you and I love you