TimbMsft Profile Banner
timbMSFT Profile
timbMSFT

@TimbMsft

Followers
2K
Following
27
Media
48
Statuses
152

Partner Research Director, Microsoft Security Research

Cheltenham, United Kingdom
Joined April 2017
Don't wanna be here? Send us removal request.
@TimbMsft
timbMSFT
2 years
Trust underpins securing identity - trust in MFA devices, your admins, ... A critical area is your certificate server -- if you can't trust those certs then your entire environment is at risk. Read more at https://t.co/askR6gugvb & use #MDI to protect your ADCS servers
Tweet media one
0
6
16
@DrAzureAD
Dr. Nestori Syynimaa
2 years
Big news on the work front! Today is my last day at @Secureworks, and I’d like to thank you for the opportunity to work with such fantastic people to make the world safer! My journey continues in January with #Microsoft as a Principal Identity Security Researcher. I’ll be working
82
26
567
@TimbMsft
timbMSFT
2 years
Noteworthy to see this cybercrime threat group pivoting across cloud and on-premises environments #ThreatIntelligence #cloudsecurity #Identity
@sherrod_im
💻 Sherrod DeGrippo 🛸
2 years
In this episode of THE Microsoft Threat Intelligence podcast, we talk Octo Tempest (0ktapus, scattered spider, unc 3944). https://t.co/5nKwOIWcks
0
0
4
@TimbMsft
timbMSFT
2 years
... and a timely reminder that passwordless is now even easier - deploy policies to remove passwords from your users' Windows 11 experience https://t.co/apUA7pix9X
Tweet media one
0
0
0
@TimbMsft
timbMSFT
2 years
A key question in identity-related investigations is WHAT did that user or service principal do? So super happy to see 🔥 Microsoft Graph activity logs now in public preview 🔥 #dfir #EntraID #MicrosoftSentinel https://t.co/pJvFY9oo0O
Tweet media one
0
1
12
@TimbMsft
timbMSFT
2 years
Identity surfaces across the kill chain -- eg initial access in phishing; and (to devastating effect) lateral movement using compromised user creds as ransomware actors spread across a victim environment. Read about MDE user containment & disruption:
Tweet card summary image
microsoft.com
User containment is a unique and innovative defense mechanism that stops human-operated attacks by limiting ability to move laterally.
0
2
16
@MsftSecIntel
Microsoft Threat Intelligence
2 years
Your new favorite podcast is here! The Microsoft Threat Intelligence Podcast has behind-the-scenes tales about uncovering attacks, threat actors, malware, exploits, etc. from researchers & analysts. Hosted by @sherrod_im. First 3 episodes are live!
Tweet card summary image
thecyberwire.com
Hear directly from the Microsoft Threat Intelligence community as they navigate the evolving threat landscape, uncovering untold stories of APTs, malware, and other weird and cool tools and tactics...
1
43
148
@TimbMsft
timbMSFT
3 years
Read how NetworkProtection and #threatintel combine to proactively block c2 connections #MDE #Ransomware https://t.co/RhCccDx27Y
Tweet media one
0
1
1
@TimbMsft
timbMSFT
3 years
🌘Dark mode 🌒 process explorer - just in time for Halloween:)👻
0
0
1
@TimbMsft
timbMSFT
3 years
Read how Raspberry Robin malware fits into the wider cybercriminal ecosystem, & how turning on attack surface reduction rules, enabling tamper protection, and a range of #MDE alerts can help defend against these attacks. #Microsoft365Defender https://t.co/rwrh9dmSOj
0
0
2
@TimbMsft
timbMSFT
3 years
Now you can see that the same user being flagged for #AzureAD unfamiliar sign-in had just clicked a suspicious URL (#MDE #EDR) - all from within the #Microsoft365Defender portal :) https://t.co/y8rTRAqf0b
Tweet media one
0
0
3
@corelight_inc
Corelight
3 years
🧵We are excited to share that @Zeekurity is now a component of @Microsoft @Windows ! An incredible development that truly establishes Zeek as the de facto standard for #networkevidence: https://t.co/jM8b0AZ8d3 1/4
Tweet card summary image
corelight.com
Zeek, world’s leading open source network security monitoring platform, now deployed on more than one billion global endpoints via Microsoft Windows
5
130
346
@TimbMsft
timbMSFT
3 years
Microsoft Defender for Identity can monitor ADFS signals -- or put differently the crossover point between on-premises & cloud identity, repeatedly targeted by NOBELIUM to pivot from on-premises to cloud -- read how to use #MDI to detect such threats
Tweet card summary image
techcommunity.microsoft.com
Using a recent example of a hybrid identity attack, learn how to protect against them!  
0
2
6
@TimbMsft
timbMSFT
3 years
Expose hidden corners of your network through device discovery 🔥now augmented with signal from Microsoft Defender for Identity🔥 https://t.co/Y1BmPuFllp #MDE #MDI #MicrosoftDefender
0
0
3
@MsftSecIntel
Microsoft Threat Intelligence
3 years
Microsoft Detection and Response Team (DART) was engaged to lead the investigation on destructive cyberattacks launched against the Albanian government in mid-July. We assess that the attack was launched by an Iranian state-sponsored actor. Full report:
3
157
337
@TimbMsft
timbMSFT
3 years
"The cold, cruel war is raging wildly but I will sow seeds of peace again and again. Garden of hope I foresee and spring is always lovely." -- Bhuwan Thapaliya
@JohnLaTwC
John Lambert
3 years
I love the outdoor photography highlighted on Bing's homepage.
Tweet media one
0
0
4
@cglyer
Christopher Glyer
4 years
Here are the technical details from @MsftSecIntel on the destructive (faux-ransomware) malware targeting multiple organizations in Ukraine https://t.co/pQJiKgkEW5
Tweet card summary image
microsoft.com
Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine.
@JohnHultquist
John Hultquist
4 years
BREAKING: Ukrainian officials now linking defacement to Belarusian actor UNC1151/Ghostwriter. Some have tied the group to Russia as well and they could be a joint unit. They also claim there was a destructive component possibly linked to APT29! 11/x
1
19
84