IAMERICAbooted Profile Banner
EZ Profile
EZ

@IAMERICAbooted

Followers
2K
Following
10K
Media
319
Statuses
6K

Yesterday is history. Tomorrow is a mystery. Cloud Solutions Engineer at Contoso. Hacktive Directory admin. Posts don't represent my employer(s).

Your Microsoft Cloud
Joined March 2025
Don't wanna be here? Send us removal request.
Here's a quick companion blog post I threw together if anyone is interested. These are not perfect solutions but there's some mitigations you can consider in this blog post to common M365 initial access vectors we discussed in Entra Chat: https://t.co/jFY6BgmBN0
Tweet card summary image
ericazelic.medium.com
I recently had the opportunity to sit down with Merill Fernando on the Entra Chat podcast and discuss some of the security challenges I seeโ€ฆ
@merill
Merill Fernando
26 days
๐Ÿ“– From Dispensing Pills to Dismantling Cyber Threats: One Woman's Epic Pivot In 2009, @IAMERICAbooted was ordering drugs with shared passwordsโ€”fast-forward to 2022, and she's pen-testing Azure tenants like a boss. This week on https://t.co/v0cFtrPykt, Erica recounts her DEFCON
6
17
85
I just logged into my test tenant to admin center and it didn't require MFA, but it did for Entra... WTF??????
5
0
11
ooh, my VPN was on and proxied through Cuba ๐Ÿ˜…
0
0
5
Wut?
1
0
5
Today I learned why people hire accountants. I thought I was going to owe a lot more in taxes. Now I'm all caught up and life can move on. W00t!
2
0
17
@IAMERICAbooted
EZ
11 hours
Whoa my gosh!!! So excited for this one!
@merill
Merill Fernando
18 hours
๐Ÿ‘‹ Folks, next week I'm recording an Entra Chat podcast with the one and only @_dirkjan ๐Ÿคฉ What do you want me to ask him? Post your question below, hit like on the questions so I know which ones are popular. ๐Ÿ‘
1
1
23
@PyroTek3
Sean Metcalf
2 days
If you don't already use Device Code Flow (and if you do, you know you do), block it using Conditional Access to protect against the latest phishing attacks: https://t.co/6DEK4neqPP If you do use it, you'll want to still use a Conditional Access policy to block it for most of
3
13
94
@EliWallic
Miguel Krone
2 days
@IAMERICAbooted Set up Center of excellence create Environments for Business and Use the default for Personal. Create policies to deny all connectors except approved ones and policies to delete old and unused stuff. Easy and quick to have basics in place.
0
1
1
Working in security is like putting together a jigsaw puzzle. Right now, Im in the sorting the pieces phase so I can figure out what pieces I'm missing that I need to get from other teams, before any of the pieces have come together.
1
1
13
SharePoint Online = shares for the cloud
2
0
16
Do you know what's great about big orgs? They have comms departments who are professional social engineers. All you have to do is provide screenshots and a sentence with each one. They do the rest โค๏ธ
4
0
27
please God, let me sleep
1
0
11
The weekend was not long enough lol
3
0
15
@NathanMcNulty
Nathan McNulty
6 days
Intune now has dedicated security recommendations docs just like Entra ๐Ÿ”ฅ The Entra security docs are extremely popular, and I love seeing other teams publishing this kind of guidance Thanks to my collegaue (@JoshuaGatewood) for pointing this out! https://t.co/FZZbXr6dCs
@NathanMcNulty
Nathan McNulty
8 months
If you work with Entra, you'll want to bookmark and monitor this page ๐Ÿ˜Ž Much of this is in Identity / Secure Score, but it's great to see security guidance cleanly laid out in one doc You might think this is well known stuff, I assure you it is not :( https://t.co/kTT4bUrFFG
4
69
336
I have a love hate relationship with Teams ๐Ÿ˜‚
5
0
18
ok I lied, these too :P
0
0
0
Never a day without a "WTF is this" moment in M365 ๐Ÿ˜‹ Which one wins?
4
1
37
@The_Cyber_News
Cyber Security News
4 days
โš ๏ธ Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication Read more: https://t.co/ohEQXHlMNB Critical flaws were uncovered in the network communication between Microsoft Defender for Endpoint (DFE) and its cloud services, allowing post-breach attackers to
3
170
458