_xDeJesus Profile Banner
Terrance DeJesus Profile
Terrance DeJesus

@_xDeJesus

Followers
802
Following
4K
Media
145
Statuses
3K

☁️ Cloud & Identity Security | Hunting threats & safeguarding the cloud | #cybersecurity #threathunting #cloudsecurity | {opinions are my own}

United States
Joined May 2014
Don't wanna be here? Send us removal request.
@Mandiant
Mandiant (part of Google Cloud)
2 days
Attention malware analysts 💻 Our latest blog post delves into Time Travel Debugging (TTD). We introduce the basics of WinDbg and TTD to help you start incorporating TTD into your analysis. 📄: https://t.co/07y5dniRy9
0
64
225
@_xDeJesus
Terrance DeJesus
15 hours
Identity is THE challenge.
0
0
0
@cybersecmeg
meg west
3 days
i just hit my 2 year anniversary working at @CrowdStrike yesterday and these are some of the top things i’ve learned (in no specific order): 1. a vast majority of attacks nowadays are identity-based (malware-less); have a solid IAM strategy and constantly re-evaluate.
21
90
915
@elasticseclabs
Elastic Security Labs
3 days
#ElasticSecurityLabs uncovers #RONINGLOADER, a multi-stage loader utilizing signed drivers, PPL abuse, CI Policies, and other evasion techniques to deliver #DragonBreath's gh0st RAT variant. Check it out at https://t.co/Df8JLO6w4d
0
56
192
@merill
Merill Fernando
5 days
👋 Folks, I'm super excited to announce the launch of the Microsoft Zero Trust Assessment! I've been working on this project for the past year at Microsoft with an extended team including our security researchers, product feature teams and docs Here's what it does 🧵👇
35
161
782
@MsftSecIntel
Microsoft Threat Intelligence
6 days
The November 2025 security updates are available:
@msftsecresponse
Microsoft Security Response Center
6 days
Security updates for November 2025 are now available! Details are here: https://t.co/WW89TcgFXA #PatchTuesday #SecurityUpdateGuide
2
21
55
@ellishlomo
Elli Shlomo (IR) 🏴‍☠️
6 days
A web interface designed to parse and analyze Entra ID logs for investigations, detections, etc. Built for security teams who need quick insights into sign-ins, audit, and anomalies without touching the raw JSON. Explore it here https://t.co/jgHb5BiIz1 https://t.co/RmfLigFDJn
0
2
9
@Unit42_Intel
Unit 42
6 days
Security alert-themed #phishing activity: emails appear to be sent from the recipient's own domain. These emails ask recipients to release blocked messages, but they lead to fake webmail login pages prefilled with the recipient's email address. Details at https://t.co/OYXKyMLgVK
1
22
82
@Mandiant
Mandiant (part of Google Cloud)
11 days
One compromised Microsoft Entra ID or Azure account can lead to a full tenant takeover. Our new framework ranks roles by risk and adds strong MFA + secure admin workstations to protect the most critical accounts. Read the whitepaper: https://t.co/9NMapg6mVj
8
104
480
@CyberDefenders
CyberDefenders®™
10 days
If you’re threat hunting in Windows, these Event IDs are your goldmine. 💎 From failed logons to PowerShell abuse & privilege escalation, knowing which logs matter most can slice your investigation time in half. ⚡ 📌 Pro tip: Correlate multiple Event IDs; attackers never leave
6
43
281
@stianstrysse
Stian A. Strysse
12 days
Excellent summary of Sign-in Frequency in Entra ID. Keep usage to specific apps, Identity Protection CAPs, Authentication Context and privileged users. At least try out the various scenarios yourself first, it’s a good experience to actually test instead of just assume things.
@NathanMcNulty
Nathan McNulty
12 days
Sign-In Frequency (SIF) is a commonly misunderstood control, one many orgs use to inflict unnecessary suffering on their employees 😩 It probably doesn't work the way you think it does and is often used in less than ideal ways... So let's look at how it works and when to use it
0
6
53
@fabian_bader
Fabian Bader
13 days
Hello my new friends EntraIdSignInEvents and EntraIdSpnSignInEvents. Finally AADSignInEventsBeta and AADSpnSignInEventsBeta can move out of beta and get the name change they deserve. #MDE #EntraID #XDR
1
15
77
@ShitSecure
S3cur3Th1sSh1t
14 days
Another Nim C2-Framework developed by @virtualloc. Can't believe you actually wrote the whole client in Nim as well 😂 Nice one! https://t.co/2rPGuqzbqr Including a Blog for parts of it: https://t.co/YvVxQpEjFG
5
76
276
@PreludeResearch
Prelude Research
18 days
New research from @jdu2600: a clean loader-lock escape using the PEB's PostProcessInitRoutine. Read the analysis and PoC code 📃
Tweet card summary image
preludesecurity.com
Use PEB's PostProcessInitRoutine to run code after DLL init but outside the loader lock, enabling simple reliable early execution on process startup.
2
36
93
@msftsecresponse
Microsoft Security Response Center
19 days
Microsoft has addressed CVE-2025-55315, a vulnerability related to HTTP request handling. This update strengthens security and helps reduce risks such as privilege escalation or SSRF. To stay protected, apply the latest patch, review your request handling logic, and confirm proxy
1
47
133
@CISACyber
CISA Cyber
24 days
CVE-2025-59287 is being actively exploited. Update Windows Server Update Services now to reduce risk of a threat actor achieving remote code execution with system privileges. See our Alert for details ➡️ https://t.co/t5xpDWjSWS #Cybersecurity
23
180
469
@merill
Merill Fernando
24 days
@_dirkjan found one of the most severe vulnerabilities ever discovered in Microsoft Entra ID. One that could have compromised every tenant in the cloud. In this episode, we unpack the story, the stress, and the mindset behind responsible disclosure. 🔥 We dive deep into his
4
43
157
@Cloud_Breach
CloudBreach
26 days
🛠️🧰 NoPrompt by @NotSoSecure - #Azure CAP testing tool 🔎 Checks for password-only access to Microsoft Entra ID / Azure AD (MFA gaps) 🌐 Simulates OAuth2 & web logins across multiple device user-agents 🧩 Tests Microsoft Graph, AAD Graph, and Service Management APIs ⚖️
0
4
8
@_xDeJesus
Terrance DeJesus
27 days
Had a blast meeting everyone and running a workshop. Thanks again!
@cloudvillage_dc
Cloud Village
27 days
🎬 Missed Day 1 of Cloud Village Labs at @defcon 33? ☁️ Good news the sessions are now LIVE on YouTube! 🧠💻 Catch the demos, automation hacks & hands-on sessions that kicked off Labs in style. 🙌 Kudos to all our amazing Day 1 speakers Adelia Ibragimova, @p4ck3t0, @Alevsk,
0
0
0
@MsftSecIntel
Microsoft Threat Intelligence
28 days
Azure Blob Storage is a high-value target for threat actors due to its critical role in storing and managing massive amounts of unstructured data at scale across diverse workloads: https://t.co/7nPiFiodwQ. Threat actors are actively seeking opportunities to compromise
Tweet card summary image
microsoft.com
Azure Blob Storage is a high-value target for threat actors due to its critical role in storing and managing massive amounts of unstructured data at scale across diverse workloads and is increasingly...
1
22
71