tomasv Profile
tomasv

@tomasv

Followers
84
Following
4
Statuses
358

Bellevue, WA
Joined December 2008
Don't wanna be here? Send us removal request.
@tomasv
tomasv
4 months
@SpaceX @Starlink @TMobile @FCC @SpaceX and @TMobile Thank you! Where can we find list of compatible devices?
0
0
0
@tomasv
tomasv
4 months
@SpaceX @TMobile @FCC @Starlink Thank you, this is amazing to see. Is there a list of compatible devices posted somewhere on a web?
1
0
0
@tomasv
tomasv
3 years
@dividendology Not sure how to contact you, but I think some of your videos around intrinsic value have a major error in the formula. DM me and I can send you a screenshot.
0
0
0
@tomasv
tomasv
4 years
Another great step towards enabling Confidential Compute (data protection in use) everywhere. This time for SQL logs
0
0
0
@tomasv
tomasv
4 years
RT @TheHackersNews: Cybercriminals are distributing RAT and password-stealing #malware filelessly using #Microsoft Build Engine, an open-so…
0
41
0
@tomasv
tomasv
4 years
Me like it!
0
0
0
@tomasv
tomasv
4 years
Wanna make 30 large? Find and report a bug...
@msftsecresponse
Security Response
4 years
We’re excited to announce bounty awards for Teams desktop client security research under the new Microsoft Applications Bounty Program with awards up to $30,000. Check out our blog for more details:
0
0
0
@tomasv
tomasv
4 years
Great opportunity to try running VMware in a Cloud for free @VMware @VMwarevSphere
0
0
0
@tomasv
tomasv
4 years
@ApkUnpacker @egeblc Already removed 🙄
0
0
0
@tomasv
tomasv
4 years
Many interesting sessions on Confidential compute at Ignite. Don't miss your chance to hear from @erinchapple @markrussinovich, @inside_r3, @IntellectEU, and @KPMG One of the best:
1
4
4
@tomasv
tomasv
4 years
Combine a remote execution vulnerability and vmware esxi ransomware and you get a recepy for disaster! @VMware
0
0
1
@tomasv
tomasv
4 years
Another tool for your adversary arsenal
@TheHackersNews
The Hacker News
4 years
Microsoft open-sources CodeQL queries used to hunt for Solorigate activity
Tweet media one
0
0
0
@tomasv
tomasv
4 years
Congratulation to the team on releasing another important way for making Azure more secure @markrussinovich @blouns
0
0
1
@tomasv
tomasv
4 years
Great work and definitely a huge help/accelerator for yoru Confidential Compute efforts
@brendandburns
brendandburns
4 years
Interested in how to enable confidential computing (and confidential containers) for your existing workloads? Please checkout the Mystikos (awesome name btw) project from @deislabs Super cool stuff, and really just the beginning!
0
0
1
@tomasv
tomasv
4 years
Patch your VMware vCenter servers. Massive scanning campaigns for the Remote Execution under way
0
0
0
@tomasv
tomasv
4 years
Very valuable lessons and learnings! Proud of my colleagues and peers who spent 100s of hours investigating and WE will protect our customers, data and platforms.
@msftsecurity
Microsoft Security
4 years
We’ve closed our internal investigation of #Solorigate and have concluded that no Microsoft systems or customer data was used in this attack. Read up on our next steps and guidance towards creating a more secure future:
0
0
0
@tomasv
tomasv
4 years
RT @TheHackersNews: SecretScanner: A new open-source tool to automatically detect secrets—like passwords, keys, and tokens that are left in…
0
404
0
@tomasv
tomasv
4 years
@CalDigit Except my TS3 plus with M1 wakes up my monitor every 60 secs when it's in sleep :-(
1
0
0
@tomasv
tomasv
4 years
Attacker use morse code (likely for the first time) to hide payload in an email! @seanfsez @RobTiffany @markrussinovich
0
0
1
@tomasv
tomasv
4 years
Microsoft is now the largest security vendor in the world by revenue. Thanks to everyone on my team and around. #PROUD
0
0
0