Ann Johnson

1.9K Followers
374 Following
431 Posts
Mom to 3 rescue dogs and one amazing human. Cyber person @ Microsoft. Podcast host @afternooncybertea. Respectable baker & cook. Love my garden. Impatient w guitar & piano competence. Regularly disappointed NFL, NHL, & MLB fan. Opinions are mine - blah, blah, blah. www.afternooncybertea.com
23 years ago I was driving my baby to the hospital for a cardiology check up. The Score (670) interrupted their program to announce a plane had hit the World Trade Center. We moved to NJ shortly after, and my child attended school with children who had lost a parent. May their memory be a blessing. #neverforget
Windows Security best practices for integrating and managing security tools | Microsoft Security Blog

We examine the recent CrowdStrike outage and provide a technical overview of the root cause.

Microsoft Security Blog

https://www.blackhat.com/html/press/2024-07-24.html

Sherrod De Grippo and I are sharing a stage. Join us for some real cyber. It’s guaranteed to be fun.

Wednesday, August 7 at 12:15 – From the Office of the CISO: Smarter, Faster, Stronger Security in the Age of AI

Black Hat

Black Hat

The blog has been updated

https://techcommunity.microsoft.com/t5/intune-customer-success/new-recovery-tool-to-help-with-crowdstrike-issue-impacting/ba-p/4196959

As a follow-up to the CrowdStrike Falcon agent issue impacting Windows clients and servers, we have released a USB tool to help IT Admins expedite the repair process.

New Recovery Tool to help with CrowdStrike issue impacting Windows endpoints

Steps for how to access and use the new recovery tool Microsoft created - updated on July 21 to provide two recovery options to expedite the repair process..

TECHCOMMUNITY.MICROSOFT.COM
Helping our customers through the CrowdStrike outage - The Official Microsoft Blog

On July 18, CrowdStrike, an independent cybersecurity company, released a software update that began impacting IT systems globally. Although this was not a Microsoft incident, given it impacts our ecosystem, we want to provide an update on the steps we’ve taken with CrowdStrike and others to remediate and support our customers.  Since this event began,...

The Official Microsoft Blog

Nothing to see here, folks, move along, move along…

“we are in the process of the second American Revolution, which will remain bloodless if the left allows it to be”

https://www.mediamatters.org/project-2025/heritage-foundation-president-celebrates-supreme-court-immunity-decision-we-are

Heritage Foundation president celebrates Supreme Court immunity decision: "We are in the process of the second American Revolution"

Media Matters for America

Hats off to Recorded Future for this research, which shows how you can catch people accessing CSAM using botnet/infostealer logs. Kind of a no-brainer for law enforcement.

https://www.recordedfuture.com/caught-in-the-net-using-infostealer-logs-to-unmask-csam-consumers

Caught in the Net: Using Infostealer Logs to Unmask CSAM Consumers | Recorded Future

Discover how Recorded Future uses infostealer logs to identify CSAM consumers and trends. Learn key findings and mitigation strategies.

Someone tried to phish re a text to ? a transaction on my card. They used an unkown # to text me - then called from a number that showed up as the legit number. I ignored it and called the real number. Spoofing the real phone number is growing common. Never accept inbounds. Call the known number
Happy Fathers Day!