0x534c Profile Banner
Steven Lim Profile
Steven Lim

@0x534c

Followers
4K
Following
263
Media
308
Statuses
450

#Cybersecurity #Sentinel #DefenderXDR #KQL #KQLWizard

Singapore
Joined May 2009
Don't wanna be here? Send us removal request.
@0x534c
Steven Lim
2 months
๐Ÿ“ฃ ๐—”๐—ป๐—ป๐—ผ๐˜‚๐—ป๐—ฐ๐—ฒ๐—บ๐—ฒ๐—ป๐˜ ๐—ณ๐—ฟ๐—ผ๐—บ ๐—ž๐—ค๐—Ÿ๐—ช๐—ถ๐˜‡๐—ฎ๐—ฟ๐—ฑ To all the new followersโ€”welcome aboard! ๐Ÿš€ Iโ€™ve published 385 KQL detection codes on https://t.co/1idETEWkcC, all under my profile: ๐—ž๐—ค๐—Ÿ๐—ช๐—ถ๐˜‡๐—ฎ๐—ฟ๐—ฑ. ๐Ÿ” Use invite code Slim2025 to join the community and follow me for
4
13
88
@0x534c
Steven Lim
5 hours
๐ŸŽฃ TOAD attacks via Entra guest invites are on the rise. Wiz has observed active phishing attempts โ€” hereโ€™s the KQL to surface them in your environment. https://t.co/aZyRH8nfDX #CyberSecurity #Phishing #EntraGuestInvites #KQL
0
3
25
@0x534c
Steven Lim
18 hours
๐Ÿšจ Phishing Alert: TOAD Attacks via Entra Guest Invites ๐Ÿ“ฌHere's a Exchange Online Transport Rule to filter those phishing invite emails. https://t.co/aZyRH8mHOp #Cybersecurity #EXO #TransportRule #PhishingEntraGuestInvites
4
17
91
@0x534c
Steven Lim
3 days
DefenderXDR One-Click Scan for MastaStealer Campaign https://t.co/3g3LBw7qGL
0
1
6
@0x534c
Steven Lim
3 days
๐Ÿšจ ๐— ๐—ฎ๐˜€๐˜๐—ฎ๐—ฆ๐˜๐—ฒ๐—ฎ๐—น๐—ฒ๐—ฟ ๐—”๐—น๐—ฒ๐—ฟ๐˜ A newly identified malware campaign is exploiting ๐—ช๐—ถ๐—ป๐—ฑ๐—ผ๐˜„๐˜€ ๐—Ÿ๐—ก๐—ž ๐˜€๐—ต๐—ผ๐—ฟ๐˜๐—ฐ๐˜‚๐˜ ๐—ณ๐—ถ๐—น๐—ฒ๐˜€ for initial access. Once triggered, it executes ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ๐—ฆ๐—ต๐—ฒ๐—น๐—น ๐—ฐ๐—ผ๐—บ๐—บ๐—ฎ๐—ป๐—ฑ๐˜€ to disable security protections and establish a C2
3
30
168
@0x534c
Steven Lim
4 days
Just watched John Hammondโ€™s breakdown of CVE-2025-33053, where he demonstrated how a simple Windows shortcut (.lnk) could be weaponized for remote code execution. Inspired by his analysis, I revisited and rewrote my earlier detection logicโ€”now it catches his proof-of-concept too
6
49
320
@0x534c
Steven Lim
4 days
Sentinel analysts do take note of this standardized account entity naming in incidents and alerts update. Update your KQL queries and automation logic to follow the new precedence-aware pattern by 13 Dec 2025.๐Ÿซก https://t.co/xiuwbArbgW #Cybersecurity #MicrosoftSentinel
1
3
43
@0x534c
Steven Lim
5 days
๐Ÿš€ ๐—ก๐—ฒ๐˜„ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ 365 Security teams can now trigger key email remediation actionsโ€”๐—ฆ๐˜‚๐—ฏ๐—บ๐—ถ๐˜ ๐˜๐—ผ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜, ๐—”๐—ฑ๐—ฑ ๐˜๐—ผ ๐—ฎ๐—น๐—น๐—ผ๐˜„/๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐—น๐—ถ๐˜€๐˜, and ๐—œ๐—ป๐—ถ๐˜๐—ถ๐—ฎ๐˜๐—ฒ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ฒ๐—ฑ
2
21
128
@0x534c
Steven Lim
5 days
Detect "Microsoft Teams - Chat with anyone with email address" Part II Added more precision in the KQL detection ... ๐Ÿšจ 99.9% your user click on a Teams Email Invite Chat from external domain #Cybersecurity #Phishing #TeamsChat
1
26
164
@0x534c
Steven Lim
6 days
Detect "Microsoft Teams - Chat with anyone with email address" Suspicious Invite from external domain #Cybersecurity #Phishing #TeamsChat
8
40
235
@0x534c
Steven Lim
7 days
๐Ÿค– Copilot User Prompt Injection Attack (UPIA) Detection Microsoft 365 Copilot includes built-in protections that automatically detect and mitigate user prompt injection attacks (UPIA). When such activity is identified, Copilot either blocks malicious prompts or disregards
0
5
50
@0x534c
Steven Lim
8 days
๐Ÿ” KQL Audit: Defending Against Medusa & DragonForce Ransomware Prompted by Zensecโ€™s analysis of how attackers weaponized SimpleHelp RMM running as SYSTEM, I developed KQL logic to proactively audit systems vulnerable to this abuse vector. ๐Ÿ›ก๏ธ The goal: strengthen detection and
3
17
65
@0x534c
Steven Lim
9 days
Look like the new Microsoft Teams feature allowing chat with anyone via email is enabled on my tenant ๐Ÿคฆโ€โ™‚๏ธ #Cybersecurity #Teams #EmailChat
4
6
50
@0x534c
Steven Lim
9 days
Indicators (Preview) in Defender XDR Microsoft Defender XDRโ€™s threat analytics reports now include a dynamic indicators section that lists all known indicators of compromise (IOCs) tied to a threat. This section helps security teams with remediation and proactive threat hunting
0
14
92
@0x534c
Steven Lim
10 days
The new Microsoft Teams feature allowing chat with anyone via emailโ€”even non-Teams usersโ€”introduces several security risks, including an expanded attack surface for phishing and malware and increased potential for data leakage. To disable the feature, set the
10
79
416
@0x534c
Steven Lim
12 days
Analysis of Beast ransomware from MDE Perspective Beast ransomware evolved from the Monster ransomware strain. They emerged as a Ransomware-as-a-Service (RaaS) in February 2025, and officially launched their Tor-based data leak site in July. As of August 2025, they have publicly
0
11
62
@0x534c
Steven Lim
12 days
๐Ÿšจ Fresh from the oven ... ๐Ÿฅ Fellow MS defenders, MC1183015 just dropped a reminder to update Microsoft Sentinel analytic rules, automation, workbooks, and queries to use the new account entity naming precedence. #Cybersecurity #Sentinel #DefenderXDR
0
1
20
@0x534c
Steven Lim
12 days
Cracking the Beast๐Ÿ‘น: Detection Logic for a Modern RaaS Threat A proactive defense and early detection for BEAST Ransomware. Launched in early 2025 as a Ransomware-as-a-Service, Beast spreads via phishing and SMB port scanning, avoids execution in CIS countries, and employs
0
6
26
@0x534c
Steven Lim
13 days
I am sharing the KQL query to parse the 612 Cloudflare phishing domains by whichbuffer from EclecticIQ. You can use that check against your EmailUrlInfo (Email), CloudAppEvent(Teams) and DeviceNetworkEvents (Device) for CloudFlare related phishing activities. let
1
0
15
@0x534c
Steven Lim
14 days
๐Ÿ” Unmasking the Quiet Killer: Detecting SilentButDeadly in Action SilentButDeadly is a stealthy red team tool that abuses Windows Filtering Platform (WFP) to silently sever EDR/AV cloud connectivityโ€”crippling tools like SentinelOne and Defender without killing processes.
1
6
50