affirmedsystems Profile Banner
AffirmedSystems Profile
AffirmedSystems

@affirmedsystems

Followers
28K
Following
15K
Media
616
Statuses
13K

CLOUD ASSURE™ from Affirmed Systems is the low latency real-time aware platform to manage public and private clouds. #CloudAssure #LowLatency #NeutralCloud

New York, NY
Joined August 2010
Don't wanna be here? Send us removal request.
@PaloAltoNtwks
Palo Alto Networks
3 days
What does the next decade of security look like? 🌐 Find out tomorrow on X. @Shirastweet hosts live interviews with Elad Koren and our leadership team to discuss our latest innovations and what is next in cybersecurity 🛡️ ▶️ Tomorrow, Secured | March 24 | 10am PT
1
5
7
@PaloAltoNtwks
Palo Alto Networks
3 days
Introducing a new standard of security for the AI Enterprise. From the first secure agentic browser to automated network trust, we’re securing autonomous work. 🟧 Prisma AIRS 3.0 🟧 New Innovations in Prisma SASE 🟧 Next-Generation Trust Security See what's new.
1
7
13
@AdityaMBAsymbi
Aditya Chordia, CISSP, CIPP/E, CISA
4 days
The Stryker breach just got worse. After the initial compromise - attributed to Iranian-linked group Handala Hack - attackers used legitimate Microsoft Intune admin credentials to issue remote-wipe commands across corporate devices globally. They didn't deploy malware. They
Tweet card summary image
cyberinfos.in
Cybersecurity weekly report covering zero-day exploits, ransomware trends, supply chain attacks, and major breaches across industries.
11
29
128
@PaloAltoNtwks
Palo Alto Networks
8 days
You do not want to miss an exclusive first look at the breakthroughs defining the next decade of cybersecurity. Join us next week for Tomorrow Secured, live on X, to unpack Palo Alto Networks latest innovation roadmap. 📆 March 24 | 10am PT
0
1
5
@alitajran
ALI TAJRAN
8 days
Microsoft introduces Backup and Recovery for Microsoft Entra ID! Entra Backup and Recovery solution enables you to quickly recover from malicious attacks or accidental changes by reverting your core tenant objects to any previous state within the last 5 days. With automated
14
138
616
@CyberRacheal
Cyber_Racheal
12 days
An attacker floods a switch with many fake MAC addresses, causing it to act like a hub and forward traffic to all ports. 
What is this attack called? A. MAC Spoofing 
B. MAC Flooding 
C. ARP Poisoning 
D. VLAN Hopping
31
15
158
@jeremybanon
Jeremy Banon
11 days
@affirmedsystems Incidents can be very unforgiving
0
1
1
@cyber_razz
Abdulkadir | Cybersecurity
12 days
I watched a network engineer troubleshoot a slow API. He opened Wireshark. He clicked the capture interface. He clicked the red stop button after 30 seconds. He scrolled through thousands of packets, looking for the HTTP conversation. He was squinting. I asked if he enjoyed the
8
18
204
@hack_ademy
Hackademy
12 days
After gaining access to a system, attackers often begin by identifying which users are currently logged in. Active sessions represent authenticated identities that the system already trusts. If a privileged account is active, the attacker may be able to interact with that session
@SecurityTrybe
Security Trybe
12 days
Passwords are only one part of authentication. Once a user successfully logs in, most systems create a session that proves the user has already authenticated. That session can remain valid for minutes or hours depending on the system configuration. As long as the session exists,
3
142
872
If one of your Global Admins got popped, you should assume compromise of all M365 services and the data within it, all Azure services and the data within it, all on-prem services and the data within it. Its highly likely they can also pivot to SaaS and other 3rd party clouds
3
6
55
@affirmedsystems
AffirmedSystems
11 days
Looks like Iran retired the Stryker CISO too. oof.
0
0
2
@NathanMcNulty
Nathan McNulty
12 days
"Executives had personal phones wiped because corporate MDM was installed on their private devices!!" Wiping devices is honestly the least concerning thing a TA could have done with that level of access... TAs don't honor the "we won't look at you stuff, pinky swear" IT policy
@jeremybanon
Jeremy Banon
15 days
Kim calls out a detail in the attack on Stryker attack that will get lost in medical/national security headlines. Executives had personal phones wiped because corporate MDM was installed on their private devices!! Without proper personal backups, personal assets are potentially
5
8
78
@DennisF
Dennis
12 days
The rumors of backdoored encryption systems are as old as encryption systems. Cliff Stoll throwing shade at @NSAGov in 1989.
8
13
49
@BertJanCyber
Bert-Jan 🛡️
12 days
The Stryker Intune Remote Wipe incidents highlight that detection & response capabilities should extend beyond the attack vectors often published. The destruction of services should be detected if it exceeds a certain threshold within a sliding window. More in 🧵
7
28
213
@NathanMcNulty
Nathan McNulty
13 days
Doing some napkin math, I estimate just under 3 hours (fully optimized) to wipe 200K devices via Intune API If an attacker were unaware of API limits being per app, that bumps to ~5.5 hours under ideal conditions What happens if all admin devices are wiped first? 🤔 😳 🥺 😭
11
24
176
@sahill_og
Sahil
14 days
Linus Torvalds created Linux at 21 without Claude or any other AI. - He didn't have a co-founder. - No VC funding. No office. - No team. - Just a personal project he posted to a mailing list: "I'm doing a free OS." 33 years later, it runs 97% of the world's servers,
609
4K
27K
@gabbytech01
Gabriel Odusanya | Cybersecurity
15 days
Rule 5: “High volume of DNS queries to newly registered domains” Trigger: Living-off-the-land C2 or data exfil. Action: Block domain at firewall + investigate source. These 5 rules are simple but effective. Which rule are you most proud of tuning this week? Drop it below 👇
1
3
30