Jussi Metso's Avatar

Jussi Metso

@jussimetso.com

*Microsoft Security MVP *Azure & M365 & AI Security *Blogger @ jussimetso.com *Co-founder of https://www.meetup.com/microsoft-security-user-group-finland/

179
Followers
118
Following
81
Posts
12.11.2024
Joined
Posts Following

Latest posts by Jussi Metso @jussimetso.com

Chinese have capabilities....."three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extracted Claude's capabilities to improve their own models."
thehackernews.com/2026/02/anth...

24.02.2026 12:56 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
PayPal Data Breach Exposes SSNs and Business PII of Customers for Over Six Months PayPal has issued a formal data breach notification disclosing that a coding error in its PayPal Working Capital (PPWC) loan application exposed the personally identifiable information (PII) of an und...

PayPayl Data breach cybersecuritynews.com/paypal-data-...

22.02.2026 20:47 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Book review of The Azure Cloud Native Architecture Mapbook – 2nd Edition This book is for cloud architects, engineers, and technical decision-makers who design, build, or govern solutions on Azure.

New #bookreview www.jussimetso.com/index.php/20...

09.12.2025 13:45 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Security Update Guide - Microsoft Security Response Center

The patch tuesday msft.it/6018SZEg0

14.10.2025 17:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Hackers Use DFIR Tool 'Velociraptor' to Attack VMware ESXi and Windows Servers with Ransomware Security researchers at Cisco Talos have confirmed that ransomware operators are actively exploiting Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in their attacks.

cybersecuritynews.com/dfir-tool-ve...

10.10.2025 02:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Major gaming platforms hit by disruptions: unprecedented DDoS suspected Steam, Riot, and other major platforms are experiencing widespread service disruptions, likely due to massive DDoS attacks linked to the Aisuru botnet.

Couple of days ago I noticed that Steam does not work. I thought it might be DDOS and it was. share.google/LTKsVzkZxi2N...

09.10.2025 04:55 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks Oracle releases an emergency fix for CVE-2025-61882 after Cl0p exploits critical EBS flaw.

thehackernews.com/2025/10/orac...

06.10.2025 23:56 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
New EDR-Freeze tool uses Windows WER to suspend security software A new method and proof-of-concept tool called EDR-Freeze demonstrates that evading security solutions is possible from user mode with Microsoft's Windows Error Reporting (WER)Β system.

www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.blee...

01.10.2025 21:47 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Checkout this Meetup with Microsoft Security User Group Finland: meetu.ps/e/PrJsH/11qZ...

25.09.2025 13:00 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants Microsoft patched CVE-2025-55241 July 17, 2025; CVSS 10.0 Entra ID bug via legacy Graph enabled cross-tenant impersonation risking tenant compromise.

Fixed thehackernews.com/2025/09/micr...

24.09.2025 09:51 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Malware automated remediation in Defender for Storage Defender for Storage now supports different ways to handle malicious files. Now you can select the remediation option that fits your scenario. Built-in remediation capabilities Automated workflows …

New blog about automated malware remediation from storage account blobs www.jussimetso.com/index.php/20...

17.09.2025 21:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Hackers Abuse Microsoft Teams to Gain Remote Access on Windows With PowerShell-based Malware Cybercriminals are increasingly weaponizing Microsoft Teams, exploiting the platform's trusted role in corporate communications to deploy malware and seize control of victim systems.

cybersecuritynews.com/microsoft-te...

28.08.2025 20:11 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
What is Microsoft Sentinel data lake β€œa cloud-native security data platform that centralizes logs and telemetry from across your environment into a scalable, cost-efficient data lake”

My Microsoft Sentinel data lake blog is out now www.jussimetso.com/index.php/20...

25.08.2025 18:22 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

My first renewal πŸ”₯πŸ”₯πŸ”₯

10.07.2025 18:21 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Modernizing your on-prem SIEM with Microsoft Sentinel – part 2 So you want to migrate your on-prem SIEM to Microsoft Sentinel?What kind of tasks you have thought so far? Some planning maybe?Here are some task what I have in my mind. These are just tasks, no ne…

The sequel with task lists for modernizing on-prem SIEM to Sentinel www.jussimetso.com/index.php/20...

04.07.2025 12:52 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Modernizing your on-prem SIEM with Microsoft Sentinel – part 1 Are you wondering to transfer your classic on-prem SIEM to fancy and modernized cloud SIEM. Read my suggestions of the advances of Microsoft Sentinel

How to modernize your on-prem siem to Microsoft Sentinel aka Cloud Siem www.jussimetso.com/index.php/20...

26.06.2025 23:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Defender for Cloud – Part 11: Data and AI Security The Data and AI security overview section displays your cloud data and AI estate for each cloud. It includes all data and AI resources, categorized into storage assets, managed databases, hosted da…

Last blog post in my Defender for Cloud series so far. The end has come.

Topic this time is Data and AI Security Dashboard.

www.jussimetso.com/index.php/20...

27.05.2025 05:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Old but still valid.

27.05.2025 05:04 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Defender for Cloud – Part 10.5: CWP Advanced protection Advanced Threat Protection provides a new layer of security, which enables customers to detect and respond to potential threats as they occur by providing security alerts on anomalous activities.

New bl0g!

Defender for Cloud - Advanced protection is kind of LARGE area to cover but I tried.

Advanced Threat Protection provides a new layer of security, which enables customers to detect and respond to potential threats as they occur by providing security alerts on anomalous activities.

10.05.2025 14:49 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Defender for Cloud – Part 10: Cloud Workload protection (CWP) Cloud Workload Protection in Microsoft Defender for Cloud helps protect various cloud resources such as virtual machines, containers, databases, and applications from security threats, vulnerabilit…

Workload Protection in Microsoft Defender for Cloud refers to cloud-native security posture management (CSPM) and threat protection for workloads running in Azure, hybrid, and multi-cloud environments (including AWS, GCP, GitHub, Azure DevOps and others).

24.04.2025 13:35 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Defender for Cloud – Part 9: Regulatory compliance Microsoft Defender for Cloud provides Regulatory Compliance capabilities to help organizations assess and maintain compliance with industry standards, frameworks, and regulatory requirements. It co…

Blog: Regulatory compliance in Defender for Cloud. If you need to check how your Azure, AWS, GCP resources comply against industry standards you can use this feature. www.jussimetso.com/index.php/20...

13.03.2025 20:58 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

OpenAI's #Sora became available in Europe today. πŸ”₯ If you have #ChatGPT Plus or Pro subscription you can create your own videos with it. Naturally, I needed to test it by creating some bernese mountain dog videos! πŸ₯°

#openAI #aivideo #bernesemountaindog #ai #texttovideo

28.02.2025 13:29 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
New Linux Malware β€˜Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems Auto-Color Linux malware targets governments and universities, using stealth tactics and encryption to evade detection and maintain persistence.

"Once installed, Auto-color allows threat actors full remote access to compromised machines, making it very difficult to remove without specialized software," security researcher Alex Armstrong."

27.02.2025 07:01 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Worst. Episode. EVER.

22.02.2025 04:00 πŸ‘ 31282 πŸ” 8694 πŸ’¬ 856 πŸ“Œ 512
Preview
Defender for Cloud – Part 7: Cloud Security Explorer The Cloud Security Explorer allows you to run graph-based queries and proactively identify security risks in your cloud environment. You can query effective exposure to internet, permisisons, vulne…

The seventh part of my Microsoft Defender for Cloud EPIC blog series. Read and learn. :)
#microsoft #security #defenderforcloud #cloudsecurity #mvpbuzz

22.02.2025 20:34 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks Salt Typhoon exploited CVE-2018-0171 and stolen credentials to infiltrate U.S. telecom networks, persisting undetected for over three years.

"The use of this utility would help to obfuscate the original source, and ultimate destination, of the request and would also allow its operator to move through potentially otherwise non-publicly-reachable (or routable) devices or infrastructure," Cisco noted.

22.02.2025 18:34 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks PostgreSQL SQL injection flaw (CVE-2025-1094) exploited alongside BeyondTrust zero-day, enabling arbitrary code execution.

"An attacker who can generate a SQL injection via CVE-2025-1094 can then achieve arbitrary code execution (ACE) by leveraging the interactive tool's ability to run meta-commands"

15.02.2025 10:50 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Storm-2372 conducts device code phishing campaign | Microsoft Security Blog Microsoft Threat Intelligence Center discovered an active and successful device code phishing campaign by a threat actor we track as Storm-2372. Our ongoing investigation indicates that this campaign ...

In device code phishing, threat actors exploit the device code authentication flow to capture authentication tokens, which they then use to access target accounts, and further gain access to data and other services that the compromised account has access.

14.02.2025 02:37 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software Palo Alto Networks patches CVE-2025-0108, a PAN-OS flaw (CVSS 7.8) allowing authentication bypass. Update now.

The vulnerability, tracked as CVE-2025-0108, carries a CVSS score of 7.8 out of 10.0. The score, however, drops to 5.1 if access to the management interface is restricted to a jump box.

13.02.2025 12:36 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Critical Chrome Flaw Allows Attackers to Remotely Execute Code Google has released an urgent update for its Chrome browser to address a critical security vulnerability that could allow attackers to remotely execute malicious code on vulnerable systems.

Google has released an urgent update for its Chrome browser to address a critical security vulnerability that could allow attackers to remotely execute malicious code on vulnerable systems.

13.02.2025 11:06 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0