digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

812
active users

#sharepoint

5 posts4 participants1 post today

At the scale of Microsoft cloud, these are the same thing. Yet you'll hear more about "3 million agents" than "1% of users".

With 300M active #SharePoint Online users, all it takes is 1 out of 100 users to click one button go generate 3 million SharePoint Agents. Which is what #Microsoft reported to be the annual agent count in their FY25 reports.

More thoughts on how these numbers are designed to support the #Copilot marketing narrative: perspectives.plus/p/numbers-de

Out now! 👉 Our latest #GraylogLabs post on the exploitation of the SharePoint RCE. CVE-2025-53770 and CVE-2025-53771 are critical remote code execution vulnerabilities (CVSS base score 9.8) impacting #Microsoft #SharePoint. In this blog, we simulate the exploitation of this SharePoint RCE vulnerability and analyze the resulting telemetry inside #Graylog. 📊

Read an overview on this attack, follow along as we emulate the adversary SharePoint RCE, explain the requirements to detect this exploit, review indicators, and more. Plus, learn about actionable threat hunting and detection strategies.👇

graylog.org/post/adversary-tra #SharePointRCE #CVE #cybersecurity #CVE202553770 #CVE202553771

Top 9 medication techniques for managing #Microsoft #SharePoint & #Intune

Subscribe now to learn the mystical mind methods that can allow you too to use Microsoft Intune to manage mobile devices without bursting blood vessels

Advanced practitioners may be eligible for our "How To Get Staff To Use SharePoint Without The Threat Of Corporal Punishment" course

We can help sharpen focus and attention, connect to your body plus develop acceptance of difficult emotions... and Microsoft Copilot

Replied to Zach 🇮🇱 🇺🇸

@demiguru
Okay. But *I* AM NOT connecting the #Epstein FBI #SharePoint file exposure to that story. I appreciate you pointing out some possible false connections.
I'm looking ahead to how lists that we know DO exist, might end up in hands of groups OTHER than the FBI & DOJ.

Who might have them & how they might use them are all of interest to me.

Replied to Spocko

@spocko
The #conspiracy-like part is connecting the #Epstein FBI #SharePoint file exposure to the recent #Chinese #zeroday #exploit, potentially implying it was either:
exploited intentionally,
the result of deep systemic failure,
or even deliberate mishandling tied to a broader cover-up.
There’s currently no #credible evidence backing that link. Misconfiguration is a more parsimonious explanation for the older #FBI case. #conspiracytheorists #infosec

Replied to Zach 🇮🇱 🇺🇸

@demiguru
What part is the conspiracy theory?
It appears some #SharePoint servers were venerable over a specific time period. Including #FBI servers?
muellershewrote.com/p/the-epst
"Additionally, the internal SharePoint site the bureau ended up using to distribute the files toward the end did not have the usual restricted permissions. This left the Epstein and Maxwell files open to viewing by a much larger group of people than previously thought."
Bondi's incompetence is real. How can we use it?

The Breakdown · The Epstein Cover-Up at the FBIBy Allison Gill
Replied to Spocko

@spocko it’s #conspiracytheory. #Reuters reports #Microsoft is looking whether a leak from MAPP enabled #Chinese to exploit #SharePoint #vulnerabilities b4 fixes were fully in place.notifications went out on 6/24, 7/3, and 7/7; attack signs began on 7/7—the same day the final notification was issued. #TrendMicro called it the “likeliest scenario” that someone in the program weaponized that info. They pulled the trigger on the #exploit they had at hand bc time was running out.

Question for my #Infosec friends
@emptywheel talked about how FBI agents reviewing the #Epstein #Maxwell materials put together a list for #PamBondi & placed it on an internal #SharePoint server.
muellershewrote.com/p/the-epst
@briankrebs wrote about this #ZeroDay exploit 7-21-25 krebsonsecurity.com/2025/07/mi
Do you think a group has that info?
If so, what's the best way to use existence of that hacked list as POLITICAL leverage against DJT to get the full list out?
@nicolesandler youtube.com/live/thdaQyDzYFI?s