SwiftSolves Profile Banner
Nathan Swift Profile
Nathan Swift

@SwiftSolves

Followers
667
Following
14K
Media
467
Statuses
4K

Somewhere between last GenX and first Millennial. Living in the Azure Cloud.

Charlotte NC
Joined May 2011
Don't wanna be here? Send us removal request.
@SwiftSolves
Nathan Swift
6 years
So there is this thing, it is called the theory of planned behavior. You start to predict an individual's intentions to engage in a behavior at a specific time and place. I don't know if you've been looking at your phones or looking at your screens but be careful with your info.
2
0
6
@NathanMcNulty
Nathan McNulty
1 day
Mailbox auditing has always been a pain... :( There is a reason my scripts get ALL mailboxes and iterate through them to force enable auditing and all records instead of trusting attributes Don't wait until IR to found out you're hosed, follow my guide: https://t.co/NKtQGQKeRm
Tweet card summary image
nathanmcnulty.com
This post provides everything you need to ensure Advanced Auditing is fully configured and auditing everything we possibly can for both existing and new users. I recently shared guidance for this via...
@ITguySoCal
Joe Stocker
2 days
Exchange Online Mailbox Audit Logs "On" might not mean "On".... https://t.co/QOqMtpbW2w
2
23
131
@cyb3rops
Florian Roth ⚡️
14 days
We’ve been digging through the #React RCE mess for two days now, trying to get at least some visibility into what’s going on out there. None of this is easy to detect, and most signals vanish in memory before you can even look at them. My teammate @_swachchhanda_ put together a
6
53
288
@rodtrent
Speaker 25
21 days
From Hours to Seconds: Meet the Grok-Powered Automated IR Playbook Generator https://t.co/jKo0DwUN61 #AI #ResponsibleAI
2
41
203
@NetworkDefense
Applied Network Defense
22 days
It’s here — AND’s biggest (and only!) sale of the year! For a limited time, every course is 25% off with code ALLYALL. Level up your skills and sharpen your defenses. Visit https://t.co/JJOAtJrBBO
0
3
4
@chrissanders88
Chris Sanders 🔎 🧠
22 days
LIFTOFF! All my courses on https://t.co/Va1R6MlZZV are 25% off until Tuesday, 12/2, at midnight ET 🚀 This is the only sitewide sale we do all year, and the cheapest you'll see these courses. This event is for all y'all, so to get the discount, use code ALLYALL at checkout.
1
3
7
@cyb3rops
Florian Roth ⚡️
23 days
I seem to have developed a new hobby: building decoy hack tools. Binaries that look suspicious, act like the real thing, and then… do absolutely nothing. Just released NoCat, a Netcat impersonator for detection tests and pipelines. https://t.co/E5AKsh7uaR
9
44
288
@reprise_99
Matt Zorich
23 days
If you are building SIEM & SOC functionality from scratch and assuming you have all the required logs - what are the first 5 detection rules you create?
32
58
371
@vxunderground
vx-underground
24 days
It is time for our first giveaway. We're giving away a Librem 14 from Purism. It's a fancy expensive $1,400+- laptop. Requirements: - Follow @ddd1ms on Xitter - Comment below Librem is a pro-privacy laptop that unironically comes with a fuckin' kill switches for mic,
2K
342
3K
@NathanMcNulty
Nathan McNulty
28 days
Olaf is amazing :) For those who might want to use this in PowerShell, I created a little gist to get the tokens to talk to the MTP APIs https://t.co/zgYhczQ1os Some API endpoints don't allow this anymore, not sure why 🤷‍♂️ I'll show how to find the URLs in the next post ;)
@olafhartong
Olaf Hartong
30 days
#MDE custom collection is finally in public preview! It's a centrally managed solution to improve visibility and detection opportunities. We're releasing a management tool and rule repository in YAML format to share new rules with the community. https://t.co/kxit8fFjhU
1
16
117
@JohnLaTwC
John Lambert
29 days
ICYMI, "Next year, Windows updates for Windows 11 and Windows Server 2025 will bring Sysmon functionality natively to Windows." via Mark Russinovich ✅Same rich functionality, including support for custom configuration files ✅No separate download or manual deployment ✅Automated
Tweet card summary image
techcommunity.microsoft.com
Learn how to eliminate manual deployment and reduce operational risk with Sysmon functionality in Windows.     
1
4
34
@BowTiedBroke
BowTiedBroke
1 month
In the Sandhills of NC, bees produce PURPLE honey. It’s the only place in the entire world where this happens. For my new followers…your Entomology lesson for the day.
454
2K
19K
@cyb3rops
Florian Roth ⚡️
1 month
CyberSec Trends Q4/25🔮 ⬆️NPM/PyPi/VSCode supply chain attacks ⬆️Rust/Go hack tools/malware ↗️EDR Blinding ↗️Abuse of legit RMM tools ↗️Token persistence/cloud API abuse ↗️Malicious LNK files ↗️.NET Single File Host ↗️ClickFix & FileFix ↗️Phishing w/ Job Ads
@cyb3rops
Florian Roth ⚡️
11 months
CyberSec Trends Q1/25🔮 ⬆️Lumma Stealer ↗️EDR killers (vulnerable drivers) ↗️Abuse of legit remote access tools ↗️0days in Fortinet & Ivanti ↗️Token persistence/cloud API abuse ⬆️Sliver implants ⬆️Fake CAPTCHA pages ⬆️Malvertising
7
61
261
@techspence
spencer
1 month
Regular reminder… this hardening series by Jerry Devore is super awesome. There’s no way you won’t learn things by reading these. Part 1 - Disabling NTLMv1 Part 2 - Removing SMBv1 Part 3 - Enforcing LDAP Signing Part 4 - Enforcing AES for Kerberos Part 5 - Enforcing LDAP
Tweet card summary image
techcommunity.microsoft.com
9
335
2K
@reprise_99
Matt Zorich
1 month
If you are curious about what kind of questions I ask when interviewing for my team, I thought I would share some examples. I usually cover everything identity, whether that is on premises Active Directory, Entra, OAuth and everything in between. In general, I try to ask
8
20
185
@brankopetric00
Branko
2 months
A penetration tester got root access to our Kubernetes cluster in 15 minutes. Here's what they exploited. The attack chain: - Found exposed Kubernetes dashboard (our bad) - Dashboard had view-only service account (we thought this was safe) - Service account could list secrets
72
352
3K
@dogwoodblooms
Cassie Clark
2 months
The Tail of the Dragon is an 11 mile stretch of Highway 129. It begins near Robbinsville, NC and ends Tabcat Creek Bridge in Tennessee. It’s famous for its switchbacks without guardrails and sought out by sports car and motorcycle enthusiasts. ✌🏼
@AmeliaMerica76
Amelia America
2 months
Good morning from North Carolina! 📍Tail of the Dragon
117
133
1K
@davepl1968
Dave W Plummer
2 months
Why the Web was Down Today - Explained by a Retired Microsoft Engineer...
40
183
1K
@Cyb3rMonk
Mehmet Ergene
2 months
I wish there were a PowerShell module like Pandas. It could make a huge impact in DFIR and other areas.
4
2
25
@nickvangilder
Nick VanGilder
2 months
10/17/2025: Every week I share a curated list of red team-specific jobs (or similar/adjacent) that caught my attention or were shared with me by others in the community. My goal is to help job hunters in the offensive security space find a red team-specific role. 🏛 Company +
0
9
37