![Curt Wilson, human Profile](https://pbs.twimg.com/profile_images/1849154770918952961/_pm-66Te_x96.jpg)
Curt Wilson, human
@curtw
Followers
3K
Following
10K
Statuses
10K
Exploring systems security since 1985. Malware+{cybercrime/espionage} analysis, threat intelligence + full-spectrum tech security research. Personal account.
Earth
Joined August 2008
Related to the last post.
if you operate Sentinel, and are licensed for Entra P2 or M365 E5, you may have experienced a lack of visibility during token theft events. To reduce noise, Defender XDR auto remediates any incident when an MFA claim is present in the token. The system is not yet smart enough to differentiate between a stolen token and a valid MFA claim, so the work-around is to create a new analytic rule to raise an alert for any elevated user risk, by excluding events flagged as 'remediated.' The following KQL is designed for an analytic rule so that the analyst can see recent sign-ins that caused the user risk to elevate. Feedback and questions encouraged! let a=( AADRiskyUsers | where RiskLevel in ('medium','high') and RiskDetail !in('adminConfirmedUserCompromised','adminConfirmedSigninCompromised') | distinct tolower(UserPrincipalName)); SigninLogs | where tolower(UserPrincipalName) in (a) | where RiskLevelDuringSignIn != 'none' and RiskState != 'remediated'
0
0
0
New practical mitigations for AitM phishing activity.
NEW BLOG: AiTM/ MFA phishing attacks in combination with “new” Microsoft protections (2025 edition) After the successful 2023 and 2024 edition, created the blog based on the latest protections and innovations against AiTM attacks #MicrosoftSecurity
0
0
0
RT @TheHackersNews: 🔐 Russian cybercriminals are exploiting new 7-Zip vulnerability (CVE-2025-0411) to target Ukrainian organizations. Thi…
0
173
0
RT @binitamshah: Windows CLFS heap-based buffer overflow analysis (CVE-2024-49138) – Part 1 : credits @MrAle_98 htt…
0
29
0
RT @HackingDave: Smart phish via github - email comes from github - issue is created on repo that suspicious activity was detected and to c…
0
140
0
@REverseConf Looks like a stellar event. I’m unlikely to be able to come down due to timeline issues but I hope everything goes really well. I can feel the wave of brain power reaching backwards in time.
0
0
0
RT @ItsReallyNick: Security Advisory: Ivanti Connect Secure, Policy Secure & ZTA Gateways 1️⃣ CVE-2025-0282 CVSS 9.0 (Critical) ⚠️ Exploite…
0
66
0
RT @k8em0: One of the finest hackers & humans to ever hack the planet needs our help. @marcwrogers is lucky to be alive & we are luckier…
0
100
0