C.J. May
lawndoc.cjmay.info
C.J. May
@lawndoc.cjmay.info
Pinned
Copying over my pinned tweet, hopefully it helps people here too. It's a flow chart that shows how MS Defender decides whether to block or allow a file.
Reposted by C.J. May
BREAKING.

From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.
April 15, 2025 at 5:23 PM
Happy friggin Tuesday
April 8, 2025 at 4:54 PM
Reposted by C.J. May
God forbid there be any more than three companies involved in cloud technologies. This is a win for Wiz, and a loss for its users.

www.theverge.com/goo...
Google acquires cybersecurity firm Wiz for $32 billion
It’ll be Google’s most expensive deal to date if it goes ahead.
www.theverge.com
March 18, 2025 at 1:19 PM
I've been adding muted words on this account to reduce the politics on my timeline (I have another account and news for that).

What words am I missing?
February 7, 2025 at 11:53 PM
Just saw an Elastic blog about detecting PANIX techniques, and wanted to give a big s/o to the tool.

github.com/Aegrah/PANIX
GitHub - Aegrah/PANIX: Customizable Linux Persistence Tool for Security Research and Detection Engineering.
Customizable Linux Persistence Tool for Security Research and Detection Engineering. - Aegrah/PANIX
github.com
February 4, 2025 at 4:22 PM
There are way too many acronyms and buzzwords in the identity security space...

I'm writing an article for a client that I could literally title:
"PKI, APIs, JWTs, and SSH: The IAM challenges of Zero Trust ILM for NHIs"
February 1, 2025 at 5:42 AM
Reposted by C.J. May
#100DaysOfKQL

Day 24 - LOLDRIVERS Malicious Driver Observed or Loaded

Featuring the awesome LOLDrivers project from @magicswordio

Anything they release is amazing and worth integrating in your detection/threat hunting rules, check them out!

github.com/SecurityAura...
github.com
January 25, 2025 at 3:23 AM
If you work at an organization where tighter security ALWAYS means more profit (security vendor, consultant, cyber education, standards research), understand that this is not the case for most companies.
January 3, 2025 at 11:26 PM
The Chats - Identity Theft
YouTube video by The Chats
youtu.be
December 9, 2024 at 5:31 AM
How do we feel about MS claim that Windows 11 is "Secure by default" lol
query.prod.cms.rt.microsoft.com/cms/api/am/b...
November 19, 2024 at 4:00 PM
Look mom I'm famous 😅
November 13, 2024 at 7:11 PM
"It's 2030, and you sigh as you triage yet another alert for copilot.exe spawning powershell IEX(IWR...

Those prompt injection attacks are hard to plug all the holes on. Who knew summarizing web content could be so dangerous? Well, it wasn't. Not until we gave AI a mouse and keyboard." (1/2)
November 11, 2024 at 8:10 PM
Reposted by C.J. May
Just found out about this. Super neat feature!
If you own a domain, you can change your bsky handle to point to it by adding just a single DNS TXT record.

I changed mine to @mrgretzky.breakdev.org 🔥
November 2, 2024 at 11:48 AM
Copying over my pinned tweet, hopefully it helps people here too. It's a flow chart that shows how MS Defender decides whether to block or allow a file.
November 1, 2024 at 5:29 PM
Gotta get my first BlueSky post out there, so here's a shameless plug for my most recent open source project.

Follow for more self-promotion, infosec opinions, and occasionally some helpful content.

github.com/lawndoc/Resp...
GitHub - lawndoc/Respotter: Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.
Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment. - lawndoc/Respotter
github.com
November 1, 2024 at 5:26 PM