security.didici.cc

@SecurityWeek

Google Introduces New Capabilities for Cloud Armor Web Security Service https://t.co/z6MSgOOIEr

1 hour ago
@SecurityWeek

Chinese Hackers Target Building Management Systems https://t.co/KHZBE3U0C7

2 hours ago
@SecurityWeek

New Database Catalogs Cloud Vulnerabilities, Security Issues https://t.co/sQjel6USna

3 hours ago
@SecurityWeek

Chinese Threat Actor Targets Rare Earth Mining Companies in North America, Australia https://t.co/fJhPdIcCOr

3 hours ago
@SecurityWeek

LockBit 3.0 Ransomware Emerges With Bug Bounty Program https://t.co/mlm8v1xKVF

4 hours ago
@DarkReading

Facebook Business Pages Targeted via Chatbot in Data-Harvesting Campaign https://t.co/dqe2eDa6nb by @wirelesswench

8 hours ago
@DrInfoSec

UK decides AI still cannot patent inventions https://t.co/3<br/>4KFVaNu9T [for now]

9 hours ago
@DarkReading

https://t.co/y08dlE3rxR by Yaniv Sazman with @F5Networks

11 hours ago
@SecurityWeek

Cyolo Banks $60M Series B for ZTNA Technology https://t.co/DojzranDuD

11 hours ago
@elinormills

Ruth Umoh at Fortune on the Need for Service Journalism, Live Events and Community Building:… https://t.co/bVirgGzHkx

12 hours ago
@SecurityWeek

Google Introduces New Capabilities for Cloud Armor Web Security Service https://t.co/z6MSgOx7MT

13 hours ago
@DarkReading

Colonial Pipeline showed people firsthand how a cyber threat could stop gas from coming out of the pump. It doesn't… https://t.co/bswTK3G3qQ

13 hours ago
@DarkReading

Last call! Get those captions in for June's Edge Toon -- the winning entry gets a $25 Amazon gift card https://t.co/jYqiwhKLg0

13 hours ago
@SecurityWeek

CISA Says 'PwnKit' Linux Vulnerability Exploited in Attacks https://t.co/JDZBJUNHVf

13 hours ago
@DarkReading

Send us your most creative, wittiest, punniest captions for our June cartoon contest. Our panel of experts will rew… https://t.co/VqIPidZTDq

13 hours ago
@DarkReading

Low-code/no-code platforms gives enterprise the ability to move fast, but it can also break things — namely, the en… https://t.co/jQzRHqSfLg

14 hours ago
@SecurityWeek

Chinese Threat Actor Targets Rare Earth Mining Companies in North America, Australia https://t.co/fJhPdIued1

16 hours ago
@DarkReading

What will end up being in the EU AI Act? How will it impact organizations outside of Europe? Lots of questions as E… https://t.co/ND6TXx2ROm

16 hours ago
@DarkReading

The success of the PayOrGrief rebrand demonstrates just how easily a group can obscure itself from the sight of too… https://t.co/H9FMHqGMkD

16 hours ago
@SecurityWeek

New Database Catalogs Cloud Vulnerabilities, Security Issues https://t.co/sQjel6USna

17 hours ago
@trailofbits

Learn all about the Trail of Bits Hiring Process - how it works, what to expect in the interviews, and how we onboa… https://t.co/WleYU6354S

17 hours ago
@schneierblog

When Security Locks You Out of Everything https://t.co/qCyKjBe10u

17 hours ago
@SecurityWeek

Benchmarking to Advance Your Journey - https://t.co/EEpmAqSKld

18 hours ago
@SecurityWeek

Chinese Hackers Target Building Management Systems https://t.co/KHZBE3U0C7

18 hours ago
@DarkReading

Using Threat Modeling to Improve Enterprise Cyber Defenses | At this June 28 webinar learn how to conduct a… https://t.co/4GcOxpH78v

18 hours ago
@elinormills

"If Trump is prosecuted as the leader of an attempted coup, a coup that may have included some of those who voted f… https://t.co/M7vt23zdup

19 hours ago
@SecurityWeek

LockBit 3.0 Ransomware Emerges With Bug Bounty Program https://t.co/mlm8v1Pmkf

19 hours ago
@FSecure

Gaming culture involves massive amounts of money and personal details, which makes it an attractive target for cybe… https://t.co/yZKPmr8o0T

20 hours ago
@SecurityWeek

NIST Releases New macOS Security Guidance for Organizations https://t.co/iS0nQXzZWw

1 day ago
@SecurityWeek

House Passes #ICS Cybersecurity Training Bill https://t.co/e8cfLPD7wn

1 day ago
@SecurityWeek

Cerby Emerges From Stealth With Security Platform for Unmanageable Apps https://t.co/o7eGI39<br/>k8Q

1 day ago
@SecurityWeek

FTC Takes Action Against CafePress Over Massive Data Breach, Cover-Up https://t.co/JISz2YbYNj

1 day ago
@SecurityWeek

Netsec Goggle Customizes Brave Search Results to Show Only Cybersecurity Websites https://t.co/LGu9VBHcuZ

1 day ago
@SecurityWeek

[Update] Cyberattack Forces Iran Steel Company to Halt Production - https://t.co/U7YTFa1eEg < Updated with commentary from @juanandres_gs

1 day ago
@DarkReading

A Decision Maker's Guide | Get advice on how an enterprise can outsource a wide variety… https://t.co/0mp780wEut

1 day ago
@SecurityWeek

Lithuania Says Hit by Cyberattack, Russia 'Probably' to Blame - https://t.co/g3JCR4khuS

1 day ago
@DarkReading

It's a Race to Secure the Software Supply Chain — Have You Already Stumbled? https://t.co/nswGM6dget by Kayla Underkoffler with @Hacker0x01

1 day ago
@SecurityWeek

Industrial Control Systems Cybersecurity Training Act Passed by House of Representatives - https://t.co/Af5fiLsylR

1 day ago
@DarkReading

"The biggest threats to our software supply chains are malicious, purposeful attacks on open source. That is a much… https://t.co/Cw9KMvf2IL

1 day ago
@elinormills

Katie Moussouris always gives great interviews. In this Q&A we talked about on facing sexism as a CEO, how she's ta… https://t.co/RqhUWulqTn

1 day ago
@DarkReading

"If your last line of defense is hoping that somebody won't click a link or open an attachment, then you've done so… https://t.co/BhymjBFY4o

1 day ago
@SecurityWeek

NIST Releases New macOS Security Guidance for Organizations https://t.co/iS0nQXzZWw

1 day ago
@FSecure

Find out 5 ways how account takeover happens: https://t.co/4HqUZ1H1VE
#accounttakeover

1 day ago
@DarkReading

"Deploy technology that gives visibility into the network, train people to recognize attacks, and maintain good bac… https://t.co/oZCCednx3K

1 day ago
@DarkReading

It's a Race to Secure the Software Supply Chain — Have You Already Stumbled? https://t.co/nswGM6dget by Kayla Under… https://t.co/gGRwQTYawn

1 day ago
@SecurityWeek

House Passes #ICS Cybersecurity Training Bill https://t.co/e8cfLPD7wn

1 day ago
@DarkReading

More ransomware attackers are abusing legitimate administrator tools and services to blend in their malicious activ… https://t.co/bLEn5nFKBd

1 day ago
@DarkReading

Academic researchers are doing some really cool things with AI. Here are some projects using their @C3_AI Digital T… https://t.co/yWA2LwhVYK

1 day ago
@SecurityWeek

Cerby Emerges From Stealth With Security Platform for Unmanageable Apps https://t.co/o7eGI39<br/>k8Q

1 day ago
@schneierblog

2022 Workshop on Economics and Information Security (WEIS) https://t.co/UiACnyBQHr

1 day ago
@SecurityWeek

FTC Takes Action Against CafePress Over Massive Data Breach, Cover-Up https://t.co/JISz2YbYNj

1 day ago
@SecurityWeek

Iran’s Khuzestan Steel Company halts production after cyberattack - https://t.co/U7YTFa1MtO

1 day ago
@SecurityWeek

Netsec Goggle Customizes Brave Search Results to Show Only Cybersecurity Websites https://t.co/LGu9VBYNTz

1 day ago
@SecurityWeek

Black Basta Ransomware Becomes Major Threat in Two Months - https://t.co/wIXUHvSlqW

1 day ago
@SecurityWeek

Cyberattack Forces Iran Steel Company to Halt Production - https://t.co/U7YTFa1eEg

1 day ago
@FSecure

2 days left to enter! Win an iPad and subscription to F-Secure ID PROTECTION

2 days ago
@elinormills

Store worker yelled at Rudy Giuliani “What’s up, scumbag?” & "You’re going to kill women" & smacked him on the back… https://t.co/xFt9CGm7T0

2 days ago
@elinormills

Denying women abortion rights leads to more women raising children alone & more families living in… https://t.co/71emXTSPOS

2 days ago
@elinormills

Washington Post investigation finds at least 178 cases from 2019 to 2021 in which calls for help resulted in law en… https://t.co/V2dAJ4rO68

2 days ago
@DarkReading

While MFA is necessary, it is ultimately only a perimeter defense. No matter how tightly sealed the perimeter of a… https://t.co/XZWnWNENK5

2 days ago
@DarkReading

Many security professionals consider themselves musicians. How many musicians think of what they do as cybersecurit… https://t.co/uFRNtbu4F0

2 days ago
@DarkReading

Using Threat Modeling to Improve Enterprise Cyber Defenses | At this June 28 webinar learn how to conduct a… https://t.co/lxcJhHZmnK

2 days ago
@DarkReading

Hey, Batter Batter! Baseball season is well underway, so step up to the plate with your best c… https://t.co/26hYGX6z00

2 days ago
@DarkReading

More ransomware attackers are abusing legitimate administrator tools and services to blend in their malicious activ… https://t.co/SCBE3hrFt5

2 days ago
@SecurityWeek

Codesys Patches 11 Flaws Likely Affecting Controllers From Several #ICS Vendors https://t.co/VsE7CbRl7u

2 days ago
@SecurityWeek

Researchers Say It Took Oracle 6 Months to Patch 'Mega' Vulnerability Affecting Many Systems https://t.co/oz3A4MrXRC

2 days ago
@elinormills

"It’s mind-boggling to me that fathers are able to look their daughters in the eye and go about their daily lives w… https://t.co/GT6b0JcnCW

3 days ago
@DarkReading

What will end up being in the EU AI Act? How will it impact organizations outside of Europe? Lots of questions as E… https://t.co/C2KC6Kl5qu

3 days ago
@DarkReading

Threat actors are using software and developer infrastructure, platforms, and providers as valuable entry points in… https://t.co/Qo3F81p86a

3 days ago
@DarkReading

"There's no real perimeter anymore — not in the traditional sense — and that means that things can get in through a… https://t.co/LC8oTUr5vb

3 days ago
@DarkReading

A Decision Maker's Guide | Get advice on how an enterprise can outsource a wide variety… https://t.co/FR9m0PrfX9

3 days ago
@trailofbits

Thanks, @eg0sum ! That's very kind of you to say! We are glad you liked it and thanks for helping to spread the wor… https://t.co/oaRCu7Smcd

3 days ago
@SecurityWeek

Hadrian Raises $11 Million for Offensive Security Platform https://t.co/6axSOLu9YZ

3 days ago
@SecurityWeek

US Agencies Warn Organizations of Log4Shell Attacks Against VMware Products https://t.co/hEG<br/>IPaWvDC

3 days ago
@SecurityWeek

US, UK, New Zealand Issue PowerShell Security Guidance https://t.co/NqUI1WpoBo

3 days ago
@SecurityWeek

It Took Oracle 6 Months to Patch 'Mega' Vulnerability Affecting Many Systems https://t.co/oz3A4MrXRC

4 days ago
@DarkReading

It's no secret that the military provides training that are useful in the private sector. What are those military s… https://t.co/6H8I78SbmN

4 days ago
@DrInfoSec

Toyota recalls electric cars over concerns about loose wheels https://t.co/QK4vF<br/>Qapir [ah, wheels, you know those t… https://t.co/P0sDneXJlb

4 days ago
@DarkReading

More ransomware attackers are abusing legitimate administrator tools and services to blend in their malicious activ… https://t.co/jXArDJFq0R

4 days ago
@DrInfoSec

BBC: Japanese man loses USB stick with entire city's personal details https://t.co/mWQR<br/>ICcAUX [ouch]

4 days ago
@trailofbits

4 days ago
@DarkReading

Using Threat Modeling to Improve Enterprise Cyber Defenses | At this June 28 webinar learn how to conduct a… https://t.co/Q0PW8sJM8f

4 days ago
@DarkReading

"Deploy technology that gives visibility into the network, train people to recognize attacks, and maintain good bac… https://t.co/t07ZCnoft9

4 days ago
@SecurityWeek

It Took Oracle 6 Months to Patch 'Mega' Vulnerability Affecting Many Systems https://t.co/oz3A4Man04

4 days ago
@SecurityWeek

Ransomware Actor Caught Exploiting Mitel VOIP Zero-Day - https://t.co/T4izrL0Nga #0day (CVE-2022-29499)

4 days ago