Nate Hess's Avatar

Nate Hess

@nateahess.bsky.social

Information Security Analyst | Identity • Cloud Security | Dad https://nateahess.medium.com/ https://github.com/nateahess

40 Followers  |  83 Following  |  28 Posts  |  Joined: 04.01.2025  |  1.9986

Latest posts by nateahess.bsky.social on Bluesky

Post image

Incredible talks so far at the Hybrid Identity Protection Conference. Glad I’m getting the chance to attend. #hipconf

07.10.2025 23:39 — 👍 0    🔁 0    💬 0    📌 0
Post image

Shoutout to @trustedsec.com for the free shirt! 🤙 love it!

21.08.2025 17:48 — 👍 2    🔁 0    💬 1    📌 0

Same! We always guess which one we’re going to get and see who wins.

21.08.2025 00:52 — 👍 2    🔁 0    💬 1    📌 0
Preview
Salty 2FA: Undetected PhaaS from Storm-1575 Hitting US and EU Industries  - ANY.RUN's Cybersecurity Blog Dive deeper into malware analysis of a PhaaS framework discovered by ANY.RUN's experts: Salty2FA, targeting industries in the USA and EU.

any.run/cybersecurit...

20.08.2025 07:37 — 👍 0    🔁 0    💬 0    📌 0

I drove to Orlando a few days ago from about the same distance and listened to my son sing that the whole way anyways, …so yes, definitely.

06.08.2025 01:45 — 👍 1    🔁 0    💬 0    📌 0

Well this isn’t going as expected #f1

02.08.2025 13:01 — 👍 0    🔁 0    💬 0    📌 0
Post image

Time to see how this weekend goes. #f1

01.08.2025 14:10 — 👍 1    🔁 0    💬 0    📌 1

Hackers

31.07.2025 19:24 — 👍 1    🔁 0    💬 0    📌 0
Preview
17K+ SharePoint Servers Exposed to Internet - 840 Servers Vulnerable to 0-Day Attacks A massive exposure of Microsoft SharePoint servers to internet-based attacks has been identified, with over 17,000 servers exposed and 840 specifically vulnerable to the critical zero-day vulnerability CVE-2025-53770, according to new findings from Shadowserver Foundation.

17K+ SharePoint Servers Exposed to Internet – 840 Servers Vulnerable to 0-Day Attacks

31.07.2025 15:48 — 👍 0    🔁 1    💬 0    📌 0
Preview
Flaw in Gemini CLI AI coding assistant allowed stealthy code execution A vulnerability in Google's Gemini CLI allowed attackers to silently execute malicious commands and exfiltrate data from developers' computers using allowlisted programs.

A vulnerability in Google's Gemini CLI allowed attackers to silently execute malicious commands and exfiltrate data from developers' computers using allowlisted programs.

28.07.2025 15:41 — 👍 11    🔁 5    💬 0    📌 1
Preview
PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse Hackers bypass FIDO keys using spoofed portals and QR codes, exposing MFA weaknesses and risking user accounts.

thehackernews.com/2025/07/pois...

24.07.2025 14:33 — 👍 0    🔁 0    💬 0    📌 0

Mandating that orgs declare to Gov they paid a ransom isn’t the silver bullet some paint it as. Loopholes will be found or worse it will make paying potentially more socially acceptable. Governments are avoiding tackling the hard issues imo - one of those is more transparency in the crypto space.

22.07.2025 08:39 — 👍 24    🔁 1    💬 2    📌 0
Preview
Analysis PuTTY-setup.exe (MD5: BB50383EAC05377D7FEAE5B9C3024550) Malicious activity - Interactive analysis ANY.RUN Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

Always check your sources. The recently registered putty[.]network drops a botnet/c2.

app.any.run/tasks/8d1d72...

18.07.2025 20:06 — 👍 0    🔁 0    💬 0    📌 0
Preview
AI Creates Realistic Honeypots for Cybersecurity Trapping cybercriminals in artificial intelligence–enhanced honeypots can improve higher education institutions’ security posture.

AI Creates Realistic Honeypots for Cybersecurity | EdTech Magazine edtechmagazine.com/higher/artic...

12.07.2025 10:38 — 👍 1    🔁 1    💬 0    📌 0
Post image

Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...

26.06.2025 08:10 — 👍 0    🔁 1    💬 0    📌 0
Preview
Attackers Unleash TeamFiltration: Account Takeover Campaign (UNK_SneakyStrike) Leverages Popular Pentesting Tool | Proofpoint US Key takeaways  Proofpoint threat researchers have recently uncovered an active account takeover (ATO) campaign, tracked as UNK_SneakyStrike, using the TeamFiltration pentesting

www.proofpoint.com/us/blog/thre...

26.06.2025 08:23 — 👍 0    🔁 0    💬 0    📌 0
Preview
16 billion passwords for Google, Apple, Facebook leaked in massive data dump, report says It's one of the largest ever compilations of compromised passwords, Cybernews reports.

More than 16 billion login credentials for Google, Facebook, Apple and other platforms have been exposed in one of the largest databases of cybersecurity breaches of all time, according to a Cybernews report.
www.axios.com/2025/06/20/d...

21.06.2025 06:07 — 👍 0    🔁 2    💬 0    📌 0
Post image Post image Post image

#CanadianGP 🇨🇦 Moments!!

#formula1 #f12025

VIA: [F1]

21.06.2025 03:50 — 👍 1    🔁 1    💬 0    📌 0
Post image

Yelp was way ahead of Apple on this new design language.  #liquidglass

18.06.2025 21:28 — 👍 0    🔁 0    💬 0    📌 0
Preview
Microsoft, CrowdStrike, other cyber firms collaborate on threat actor taxonomy After years of confusion, leading threat-intelligence companies will streamline how they name threat groups.

www.cybersecuritydive.com/news/microso...

03.06.2025 04:40 — 👍 0    🔁 0    💬 0    📌 0

Excitement in my 30’s is opening the dishwasher and realizing it hasn’t been ran yet, so I can add to it without emptying it first.

01.06.2025 02:06 — 👍 0    🔁 0    💬 0    📌 0

If your article starts with something like “in today’s fast growing technological landscape” then I’m skipping it.

27.05.2025 02:13 — 👍 0    🔁 0    💬 0    📌 0
Chart showing the Top dual-use tools observed in all incidents by frequency for the year 2024.

Chart showing the Top dual-use tools observed in all incidents by frequency for the year 2024.

Security Firm @SophosXOps published another report, this one on incidents at small and medium-sized businesses by @thepacketrat and Anna Szalay. One of the things I always look for in these reports are easy #cybersecurity wins -- and this report has a bunch […]

[Original post on infosec.exchange]

17.04.2025 01:08 — 👍 7    🔁 12    💬 2    📌 0

It’s not snow unless it sticks

07.04.2025 16:50 — 👍 13    🔁 2    💬 1    📌 0

His AI posts sound like paid scaremongering ads.

17.02.2025 19:18 — 👍 0    🔁 0    💬 0    📌 0

This also has my vote. Feels like this graphic conveys a HomePod/hub device with a display.

16.02.2025 03:45 — 👍 1    🔁 0    💬 0    📌 0

I’m learning that a cybersecurity Masters degree is just the daily research I do for my job, but now I’m putting it in APA format and expanding it to 10-15 pages.

15.02.2025 20:56 — 👍 2    🔁 0    💬 0    📌 0

Beyond this, they provide services like attack surface management and penetration testing for smaller critical infrastructure orgs that might not be able to afford enterprise level solutions. They’re way too important to be making cuts.

11.02.2025 15:20 — 👍 1    🔁 0    💬 1    📌 0
Preview
Stop saving your email login info in your password manager! — PCWorld Memorize your email password separately to avoid account lockouts. Senior Editor, PCWorld | Feb 5, 2025 8:00 am PST Bitwarden is a beloved password manager for good reason—it’s feature-rich and its pa...

Interesting take. Should probably say “don’t use your email as your 2FA method” instead.

apple.news/APSL1kjBETSW...

11.02.2025 14:24 — 👍 0    🔁 0    💬 0    📌 0
Preview
Don't Overlook These 6 Critical Okta Security Configurations

Don't Overlook These 6 Critical Okta Security Configurations

10.02.2025 13:02 — 👍 2    🔁 2    💬 0    📌 0

@nateahess is following 20 prominent accounts