mig 🇺🇦
mig 🇺🇦
@miguelaya.bsky.social
infosec / fuck putin / fuck trump / fuck musk
Reposted by mig 🇺🇦
When I was younger, I naively believed that if the genocides of the past had occurred in our age of developed social media, the world would have stopped them sooner.

​And then Ukraine was attacked in this very age of developed social media: an era where everyone has their own "version of truth";
November 1, 2025 at 9:24 PM
Reposted by mig 🇺🇦
Intune now has dedicated security recommendations docs just like Entra 🔥

The Entra security docs are extremely popular, and I love seeing other teams publishing this kind of guidance

Thanks to my collegaue (Josh Gatewood) for pointing this out!

learn.microsoft.com/en-us/intune...
October 10, 2025 at 4:49 AM
The drones in the nordics are a good example of hybrid warfare from russia.

In a DDoS attack a force multiplier is used: send a little traffic somewhere, get it to respond manyfold.

Drones are a cheap way to cause NATO countries to divest attention and resources from helping Ukraine.
October 2, 2025 at 3:34 AM
hey @bsky.app can you fix the app so you can select text
September 30, 2025 at 5:56 AM
Good stuff!
-Academics pull off novel 5G downgrade attack
-Ransomware hits car recyclers across North America
-VPN apps share the same hardcoded password
-Bangladesh spent $190 million on surveillance tools
-Workday discloses breach

Podcast: risky.biz/RBNEWS466/
Newsletter: news.risky.biz/risky-bullet...
August 18, 2025 at 10:31 AM
This NTLM relay article node has edges to plenty of great article nodes
specterops.io/blog/2025/07...
Escaping the Confines of Port 445 - SpecterOps
NTLM relay attacks targeting SMB restrict lateral movement options to those that solely require port 445/TCP. Learn at least one method of overcoming this restriction to enable additional lateral move...
specterops.io
July 29, 2025 at 8:26 AM
Reposted by mig 🇺🇦
SensePost | No egress, no shell, no problem
Leaders in Information Security
sensepost.com
June 27, 2025 at 7:56 AM
Reposted by mig 🇺🇦
How attackers move between AD domains via trusts depends on trust type & config. We're replacing TrustedBy edge in BloodHound with new trust edges for better attack path mapping.

Check out @jonas-bk.bsky.social's blog post to learn more. ghst.ly/4lj9C5T
Good Fences Make Good Neighbors: New AD Trusts Attack Paths in BloodHound - SpecterOps
The ability of an attacker controlling one domain to compromise another through an Active Directory (AD) trust depends on the trust type and configuration. To better map these relationships and make i...
ghst.ly
June 25, 2025 at 11:30 PM