Steve
banner
itstevebrown.bsky.social
Steve
@itstevebrown.bsky.social
J'suis un gars old school et le fun... passionné de musique, d'actualité, des sciences, des technologies et de l'informatique ;)
Reposted by Steve
My new favorite kind of meme is "here are detailed instructions on how to turn off AI". 🔨
November 19, 2025 at 3:00 PM
Gloria discovering the snow for the very first time ☃️
November 11, 2025 at 12:53 AM
Reposted by Steve
November 8, 2025 at 10:16 PM
Happy #caturday everyone 🐈‍⬛

-Gloria
November 8, 2025 at 7:54 PM
Keep getting throttled by #Microsoft with my little 5mb/s.
everything okay #Azure? :)
November 5, 2025 at 9:44 PM
Reposted by Steve
YOU GOTTA DO SOMETHING ✊🏾

m.youtube.com/watch?v=iX6L...
PUBLIC ENEMY "The Hits Just Keep On Comin" OFFICIAL MUSIC VIDEO
YouTube video by Channel ZERO
m.youtube.com
October 29, 2025 at 11:13 PM
ha ha ha, the #Canadian #ICE are much more #NICEr.
www.youtube.com/watch?v=S1yY...

(sorry neighbors)
When the ICE agent is Canadian… | This Hour Has 22 Minutes
YouTube video by 22 Minutes
www.youtube.com
October 23, 2025 at 6:02 PM
Gloria :-)
October 19, 2025 at 11:44 AM
Gloria
October 19, 2025 at 11:43 AM
Reposted by Steve
The culture of working in tech these days is being constantly worried about being overworked or unemployed.

Take care of yourselves. We are replaceable cogs to our employers but irreplaceable to our family and friends.
September 5, 2025 at 3:57 AM
Reposted by Steve
We love community tools for #MSIntune. Here's a latest one created by our friend and respected #ITpro, @sandyzeng.com, called IntuneDiff. Use it to compare Security Baselines and Settings Catalog policies.
intunediff.com
August 27, 2025 at 7:15 PM
Reposted by Steve
I'm hiring! AI Dev Tools Advocate focused on VS Code & Copilot.

jobs.careers.microsoft.com/global/en/jo...

Do you:
💖 #vscode & #GitHubCopilot
🎉 Enjoying teaching & tech talks & presenting
📹 Creating videos, blogs, & live streaming
💬Engaging with dev communities
👨‍💻 Using the latest AI tools
Search Jobs | Microsoft Careers
jobs.careers.microsoft.com
August 21, 2025 at 9:28 PM
Good morning cats of Blue sky.
- Gloria
August 2, 2025 at 2:07 PM
Reposted by Steve
Apple patches multiple vulnerabilities in iOS and iPadOS. Update now! #cybersecurity #hacking #news #infosec #security #technology #privacy www.malwarebytes.com...
July 30, 2025 at 10:57 PM
Reposted by Steve
New “ToolShell” Exploit Chain Attacking SharePoint Servers to Gain Complete Control
New “ToolShell” Exploit Chain Attacking SharePoint Servers to Gain Complete Control
cybersecuritynews.com
July 28, 2025 at 10:43 AM
Reposted by Steve
Ozzy Osbourne has passed away at the age of 76.
July 22, 2025 at 6:08 PM
Hello pros, quick question about #PowerBI with Private Endpoints.... Is the #MicrosoftFabric sku "F64" absolutely mandatory to be able to setup/manage private endpoints to connect with other services behind VNet and such?
thank you!
July 21, 2025 at 5:27 PM
Gloria wishes happy Caterday to all the cat lovers and their furry friends!!
July 19, 2025 at 1:10 PM
Gloria thinking she can easily follow her friend squirrel up the trees! 😂

It's a lot harder than anticipated. 😂
July 19, 2025 at 1:03 PM
Reposted by Steve
[BLOG POST] Create deployment ring groups for Microsoft Intune

A short blog post on creating deployment ring groups for usage with Microsoft Intune.

#MVPBuzz #Windows #MsIntune

inthecloud247.com/create-deplo...
Create deployment ring groups for Microsoft Intune | Peter Klapwijk - In The Cloud 24-7
Create ring deployment groups for usage with Microsoft Intune
inthecloud247.com
June 30, 2025 at 8:12 AM
Hi Gloria 👋
June 21, 2025 at 8:20 PM
Time to change and secure your passwords, then setup passwordless, or at the very least MFA
Massive 16 Billion Passwords From Apple, Facebook, Google and More Leaked From 320 Million Computers
Massive 16 Billion Passwords From Apple, Facebook, Google and More Leaked From 320 Million Computers
A new report has uncovered a staggering 16 billion login credentials from major platforms, including Apple , Facebook , Google , GitHub , Telegram , and government services.  The massive leak, discovered through 30 separate datasets, represents an unprecedented threat to global cybersecurity and digital privacy. The exposed datasets vary dramatically in size, with the smallest containing over 16 million records and the largest housing more than 3.5 billion credentials.  On average, each dataset contained approximately 550 million records, creating what researchers describe as “a blueprint for mass exploitation.”  The data structure follows a consistent pattern typical of infostealer malware, consisting of URL, username, and password combinations, often accompanied by authentication tokens, session cookies, and metadata. Most datasets were temporarily accessible through unsecured Elasticsearch instances and object storage configurations before being secured, Cybernews stated. Leaked From 320 million computers But Not a New One! Regarding this report, Alon Gal, CTO at Hudson Rock said to Cyber Security News that an average infected computer has around 50 sets of credentials. Given that there are 16 billion credentials, this would suggest that 320 million computers have been infected by infostealers. However, this claim is simply not true, regardless of how one might interpret the numbers. “The leak is likely the result of a combination of legacy Infostealer credentials, data from older database leaks, and fabricated entries, similar to the ALIEN TXTBASE leak. For instance, the leaked information could include actual lines with slight variations in passwords or logins that can be used for brute-force attacks,” he added. Some datasets were named generically as “logins” or “credentials,” while others bore specific geographical or service-related identifiers, including one with over 455 million records linked to Russian Federation origins and another containing 60 million Telegram-related credentials. The exposed data creates significant opportunities for credential stuffing attacks, account takeover schemes, and business email compromise ( BEC ) operations.  It appears that the breaches in question are not recent developments; rather, they have been available on the dark web for an extended period as parts. These compilations have been aggregated and subsequently exposed on the internet. Cybercriminals can leverage these massive datasets to execute phishing campaigns with unprecedented precision, using legitimate login credentials to bypass basic security measures.  The presence of authentication tokens and session cookies in many records amplifies the threat, potentially enabling immediate access to active user sessions without requiring password verification. The structured nature of the data makes it particularly valuable for ransomware intrusions and identity theft operations.  With success rates of less than one percent still potentially affecting millions of users, the scale of this exposure represents a fundamental shift in the cyberthreat landscape.  Organizations lacking robust multi-factor authentication (MFA) implementations and comprehensive credential hygiene practices face a higher risk of compromise. It is recommended to implement strong password policies, rotate credentials frequently, and conduct comprehensive system scans for infostealer malware.  Users should enable multi-factor authentication (MFA) across all accounts and monitor for suspicious activity indicators. Organizations must prioritize endpoint detection and response (EDR) solutions to identify and neutralize infostealer infections before credentials can be harvested. This breach highlights the crucial importance of proactive cybersecurity measures in an era where credential theft has become increasingly industrialized.  As new massive datasets continue emerging every few weeks, the cybersecurity community faces an ongoing challenge to protect against increasingly sophisticated and large-scale credential harvesting operations. How to Protect Yourself Lock Down Your Devices : Infostealers sneak in through outdated software or weak devices. Use tools like Microsoft Defender or CrowdStrike to spot and stop shady activity, like keylogging or stealing passwords. Keep all your systems, apps, and firmware updated with the latest patches to plug security holes. Also, set up application whitelisting to block unauthorized programs and turn off Office macros unless you really need them. Beef Up Logins : Infostealers love stealing passwords to dig deeper into your systems. Make multi-factor authentication (MFA) a must for all accounts, especially important ones like admin or VPN access. Use strong, unique passwords with a password manager and limit who can access sensitive stuff. If a leak happens, reset passwords, kill active sessions, and watch for weird login attempts using tools like Splunk. Watch Your Network : Infostealers send stolen data over the internet. Use firewalls, intrusion detection, and data loss prevention (DLP) tools like Symantec to catch and block unauthorized transfers. DNS filtering and network segmentation can stop malware from phoning home or spreading. Stay Ready to Respond : Spot threats fast with SIEM and behavior analytics. If hit, investigate with tools like Volatility, isolate infected devices, and restore from clean backups. Have a NIST-aligned response plan and test it regularly. Are you from SOC/DFIR Teams! - Interact with malware in the sandbox and find related IOCs. -  Request 14-day free trial The post Massive 16 Billion Passwords From Apple, Facebook, Google and More Leaked From 320 Million Computers appeared first on Cyber Security News .
cybersecuritynews.com
June 20, 2025 at 12:45 PM
Gloria is visiting the country sights with us on this beautiful #caterday.
Enjoy your weekend friends!
June 14, 2025 at 2:25 PM
On this #Caterday, say hello to Gloria, my new owner, and future Diva!
May 24, 2025 at 11:23 AM
Reposted by Steve
Alberta Treaty Chiefs speak out on Bill 54, brought forth by Premiere Danielle Smith and her conservative government which would open the pathway for Alberta to separate from Canada. The Chiefs say nope.
May 7, 2025 at 12:13 PM