nate2x4 Profile Banner
nate Profile
nate

@nate2x4

Followers
263
Following
2K
Media
104
Statuses
705

Sysadmin turned CSIRT.

Ohio
Joined September 2013
Don't wanna be here? Send us removal request.
@nate2x4
nate
7 days
As expected, the Copilot version of chat sharing is also available for indexing on Google. Doesn't look like they were indexed very well, but they're all reachable. Have fun!
Tweet media one
0
0
1
@nate2x4
nate
12 days
Reposting for anyone that needs to use the scale to help leadership understand the #SharePoint vulnerability severity.
@nate2x4
nate
2 years
Tweet media one
0
0
1
@nate2x4
nate
20 days
@blueteamsec1
Blue Team News
20 days
Russian alcohol retailer WineLab closes stores after ransomware attack #Security
Tweet media one
0
0
0
@nate2x4
nate
24 days
Looks like #redlinestealer might be back in action. Been quiet since September when Operation Magnus disrupted it.
Tweet media one
0
0
0
@nate2x4
nate
26 days
All lame jokes aside, this is pretty cool stuff, and discouraging that it was so difficult to get it acknowledged.
0
0
3
@nate2x4
nate
26 days
New vuln just dropped. Have you checked your asset inventory for any vulnerable trains? If your asset management isn't very accurate, you may need to ask leadership if there are any trains on the books. You may be at risk and not even know it!.
@midwestneil
neils
27 days
Turns out you can just hack any train in the USA and take control over the brakes. This is CVE-2025-1727 and it took me 12 years to get this published. This vulnerability is still not patched. Here's the story:.
2
1
7
@nate2x4
nate
29 days
A WAF vulnerable to SQL injection? Oh the irony.
@the_yellow_fall
Gray Hats
30 days
Fortinet released a critical patch for FortiWeb (CVE-2025-25257, CVSS 9.6). This unauthenticated SQL injection flaw allows remote code execution; update immediately!. #FortiWeb #SQLInjection #Cybersecurity #WAF #Vulnerability.
0
0
0
@nate2x4
nate
1 month
Tabletop scenario - Your offboarding sucks and you just got pwned by the guy you didn't offboard properly.
@TheRecord_Media
The Record From Recorded Future News
1 month
A U.K. man is serving a seven-month jail term because he changed access credentials and did other damage to his employer's systems after he was suspended from the job
0
0
1
@nate2x4
nate
2 months
This.
@cerbersec
Cerbersec
2 months
Your average non-state APT doesn't use browser exploits for initial access. They don't give a shit about the kernel or the EDR, they don't deploy rootkits. They use phishing/breached creds w/ VPN, pwn your ADCS , then delete your backups and deploy ransomware, all loud as fuck.
0
0
1
@nate2x4
nate
2 months
Go see @CyberCoat speak at at Blue Team Con!.
@BlueTeamCon
Blue Team Con
2 months
🚨Blue Team Con 2025 Talk Alert🚨. Talk Title: Analysis without Paralysis: Mastering the Art of Investigation. Presented by: Terryn Valikodath . See abstract:
Tweet media one
0
0
2
@nate2x4
nate
2 months
RT @0xBoku: Physical Access Expert
0
10
0
@nate2x4
nate
2 months
Good breakdown by Invictus! TL;DR - no logs, no breach.
@InvictusIR
Invictus Incident Response
2 months
Allright let's do this, a thread on Laundry Bear aka Void Blizzard. This group compromised the Dutch National Police. Let's dive into thing from a cloud IR/forensics perspective 🧵.
0
0
3
@nate2x4
nate
2 months
Tweet media one
0
102
0
@nate2x4
nate
3 months
Breaking news: criminals aren't truthful.
@TheRecord_Media
The Record From Recorded Future News
3 months
Administrators were led to believe that hackers had deleted data on students and teachers after being paid a ransom — but that promise appears to have not been kept
0
0
0
@nate2x4
nate
4 months
Tabletop Exercise: Your security team just exposed sensitive data by using a public sandbox.
@anyrun_app
ANY.RUN
4 months
🚨 Important: False positive from MS Defender XDR has led to 1,700+ sensitive docs being shared publicly via #ANYRUN alone. A couple of hours ago we saw a sudden inflow of Adobe Acrobat Cloud links being uploaded to ANYRUN's sandbox. After research, we've discovered that
Tweet media one
0
0
1
@nate2x4
nate
5 months
Really good news for defenders from @kaspersky - no cyber attacks happening in the USA right now. Looks like attacks are targeting every other country. If you're a #blueteam-er, you should probably just take the day off.
Tweet media one
1
0
3
@nate2x4
nate
5 months
RT @onyphe: ❓Ever wanted to have an IP geolocation database with 2 locations, one physical for the device and one logical from whois data?….
geolocus.io
Provider of Attack Surface Discovery (ASD), Attack Surface Management (ASM) and CTI solutions. Scanning at Internet-scale since 2017 - contact at onyphe dot io
0
9
0
@nate2x4
nate
5 months
Good advice, but let's help them get there with the biggest AD management pro tip: put AD account passwords in the account description field. You'll never forget a service account password ever again!.
@techspence
spencer
5 months
If you want to be an Active Directory pentester….learn how to manage and secure an Active Directory environment. That’s 90% of what you need to know.
1
0
3
@nate2x4
nate
5 months
2 real 4 me.
@BushidoToken
Will
5 months
Average convos with DFIR folks. “the ransomware hit 100+ EXSi host servers, with almost 2k virtual machines taken offline. what a mess.”. “The ransomware hit a flat-ass network with all the servers in the same subnet… they could VPN in and RDP to all servers”
0
0
2
@nate2x4
nate
5 months
I'd do anything but reboot.
@jamieantisocial
J⩜⃝mie Williams
5 months
Tweet media one
1
0
1