Discover and read the best of Twitter Threads about #cybersecurity

Most recents (24)

1 of 8: On our journey to a #ZeroTrust #cybersecurity model, @Akamai is helping customers get there with us. How many of these 7 steps are you taking to adapt to a world of #ZeroTrust? (thread follows)
1. Provide users with application-only access, not network access—on a need-to-know basis, based on user identity, device posture, authentication and authorization
2. Eliminate the ever-growing list of holes punched in your firewall that expose your network infrastructure to the public internet. If malicious actors can’t find your network, they can’t attack it.
Read 8 tweets
#CPEC is the backbone of #Pakistan's Grand Strategy. Enemies are keen to foment trouble in #Balochistan to sabotage the project.
A hike in terror attacks has been witnessed in the past months in Balochistan especially in areas in proximity to #Gwadar which is part of #Sabotage.
Killings of #Hazara Shias in Balochistan helps the enemy kill two birds with a stone.
1. It causes trouble in Balochistan,
2. It decreses confidence of Shias in the state of #Pakistan and leads to anger and frustration in Gilgit Baltistan, The Critical province in #CPEC.
Read 9 tweets
For those who want to learn about #infosec 🔐 here is a #thread that includes all my #infographics.
An easy way to learn new things 📖Feel free to share with your community🌐

Follow @Guillaume_Lpl for more things about #CyberSecurity #startup #ITsecurity #security #technologies
Some good tools useful in Infosec

Follow @Guillaume_Lpl for more things about #infosec #cybersecurity
Some good tools useful for OSINT

Follow @Guillaume_Lpl for more things about #infosec #cybersecurity
Read 20 tweets
Thread updated of my infograhics : To make things more convenient and to help beginners in #infosec , I decided to regroup my #infographics with this tweet ! #Cybersecurity #Startups #IoT #ITsecurity #Security #tools
Some good tools useful in Infosec : by @Guillaume_Lpl #infosec #cybersecurity #Infographic
Some good tools for Mobile APP Security Testing : by @Guillaume_Lpl #infosec #cybersecurity #Infographic
Read 13 tweets
.@instagram thread: unique feature. After dealing w my son getting attacked through fake account, we started looking at past likes. Once you start removing past likes, Instagram will block you from being able to access "this feature" Overlooked #privacy #cybersecurity problem
If someone, say a celebrity with a blue check marked got attacked on Instagram, and tried to protect their privacy by deleting past likes on other people's posts, but instead got "temporarily suspended" what would the out cry be? My insta is private, not a blue check. So silence.
But. This seems an inherently poorly thought out UI/UX feature. It is clearly a feature, not a bug. Instagram wrote their algos to prevent people from securing their accounts by not allowing them to unlike past actions.
Seems to me this should be huge thing for privacy lawyers
Read 4 tweets
A cover up & targeted operation unaddressed since 2006. Simply put, instead of addressing it, they (now have evidence it's the #MetPolice Commissioner's office) keep trying to frame us

To read the full thread -
threadreaderapp.com/thread/1063084…

#DailyMail @metpoliceuk @10DowningStreet
It started with the #MetPolice being caught out falsifying paperwork. When caught out they tried to frame me for a crime I did not commit.

To read click ➡️

#Londonisopen #LoveLondon #VisitLondon #TheGuardian #TheTelegraph @MetCC @Metpoliceuk
After the #MetPolice cocked up their frame up, ex-#metropolitanpolice officers turned private #investigators Surelock International tried & suffered the same fate

To read ➡️

@surelock_ #Guardian #Investigator #worldnews #Telegraph #Times
Read 144 tweets
📍SEIZE THE INITIATIVE AND MAINTAIN MOMENTUM. Present volume one of the #MuellerReport. Focus on election security. Do the open hearings all Mondays, Wednesdays, and Fridays. Hold a weekly press conference. Subpoena witnesses for specific dates at the outset.
📍DO THE OPEN HEARINGS ALL MONDAYS, WEDNESDAYS, AND FRIDAYS. Use witnesses who do respond, expert, specialists, expert panels. Besides three hearings a week hold a weekly press conference on Mondays, to resume highlights from the previous week, and preview the coming week.
Read 15 tweets
Playing with #DigitalFire:

1/7: In martial arts, one of the best moves is to take an attacker's weapon and turn it back on them. In 2016, that's just what #Beijing did – in #cyberspace:
nyti.ms/2Ylm3E3
2/7: After #American operatives used a particular bit of code to attack #Chinese computer systems, Chinese hackers took it, repurposed it, and used it to attack a bunch of US allies.
3/7: The Chinese simply seem to have spotted a #US #cyberintrusion and snatched the code, often developed at huge expense to #American taxpayers.
Read 7 tweets
Threat Hunting In #CyberSecurity : Waiting for an alert can be too dangerous.
Threat hunting means to proactively search for malware or attackers that are hiding in your network — and may have been there for some time.
Most time, the goals of these malware or attackers can be to quietly siphoning off data, patiently listening in for confidential information, or working their way through the network looking for credentials powerful enough to steal key information.
Read 19 tweets
I understand more clearly why HRC was calling for an INDEPENDENT COMMISSION into #TrumpRussiaCollusion
#VoteBlue2020
Davis : The shocking fact that Mueller never would have accused Trump of a crime - The Hill apple.news/A8Mu7XAfOQAaGG…
#IndependentCommission
“Unlike Mueller, the commission could be given the important assignment of educating the public about what happened in 2016 and resolving whatever questions Mueller leaves unaddressed in his still-secret report.”
politico.com/magazine/story…
Read 12 tweets
🔴 #Software is eating the world, and it’s only the beginning

#ArtificialIntelligence #AI #MachineLearning #ML #FutureOfWork #Robots #Technology #Disruption

1/2
🔴 #Software is eating the world, and it’s only the beginning

#ArtificialIntelligence #AI #MachineLearning #ML #FutureOfWork #Robots #Technology #Disruption

2/2
Emerson, Lake & Palmer - From The Beginning (Live)

Read 11 tweets
With the 2020 elections coming on strong already, I think it is important to talk about keeping yourself safe from "hacking".
When you think of hacking, most envision someone using a computer & complex code to break into your computer.
#CyberSecurity
/1
#Hacking can take many forms, many can be done done over the phone or through email messages. These scams are known as #Phishing.
Example: A phone call where someone asks you for information that are common security questions:

Your first car
Mother's maiden name
Birth City
/2
They might pretend to be from your bank, your email or internet service provider, or your mortgage lender. They might pose as someone looking to verify your identity because of "unusual activity". This can come many ways, e.g. via a phone call, text message or email.
/3
Read 13 tweets
I presented a Learning Lab at #RSAC 2019 on "#MentalHealth in #Cybersecurity: Preventing Burnout, Building Resilience" 🛡🧠💪. @RSAConference @MosconeCenter. Here are the slides:
Read 38 tweets
Q 3/5/2019 Pompeo's tweet holding notes
Sometimes reading between the lines provides..
"Meet IG"
3/5 Huber interview re:
They range from domestic terrorism to court-authorized wiretaps of criminal organizations to child pedophiles

#QAnon @POTUS @GenFlynn #WWG1GWA @SecPompeo
PROOF = EVIDENCE? #NoCollusion
Listen to the clip again re: proof & evidence.
Define 'brainwashing'.
The TRUTH is RIGHT IN FRONT OF YOU.
Think for yourself!
👇

#QAnon @POTUS @GenFlynn #WWG1GWA
Security Stepped Up Across NYC After 3 Small Bombs Found Near London Transit Hubs
Coincidence post stringers dropped last night?
[-48]
Watch the news.
#QAnon @POTUS @GenFlynn #WWG1GWA
Read 9 tweets
ثريد لأفضل ٢٣ آداة أمنية مجانية والتي ستجعل عملك اليومي الأمني ​​أكثر سهولة..

#الامن_السيبراني
#cybersecurity
#أمن_المعلومات
Maltego

آداة تحليل جنائي مصممه لتقديم صوره واضحه للتهديدات التي تستهدف بيئة المستخدم.
وسوف تظهر مدى تعقيد وشدة نقاط الفشل الواحدة وكذلك علاقات الثقة الموجودة في نطاق البنية التحتية للمرء. وهي تسحب المعلومات المنشورة عبر الإنترنت.
OWASP Zed Attack Proxy (ZAP)

يعتبر Zed Attack Proxy (ZAP) أداة اختبار الاختراق سهلة الاستخدام والتي تعثر على نقاط الضعف في تطبيقات الويب. ويوفر مسح آلي ومجموعة من الأدوات لأولئك الذين يرغبون في العثور على نقاط الضعف يدويا.
Read 25 tweets
Now reading the the #TopolReview report - Preparing the healthcare workforce to deliver the digital future. It's an illuminating read topol.hee.nhs.uk #DigitalHealth
It's clear that a lot of effort has gone into the #TopolReview - it paints a glorious vision of what healthcare would look like over the next 20 years (for both staff and patients) - enabled by technology such as #genomics, #AI and #robotics
For me the #Topolreview has too narrow a focus. It's been commissioned by healthcare, yet we know that with an aging population, many people with long term conditions have to rely upon #socialcare as well. We need joined up thinking, imho.
Read 34 tweets
Some really important journalism can be produced by local news outlets in preparation for a Super Bowl.

For the run-up to #SuperBowlLIII , this story breaks some very interesting new ground.

A thread:
Iranian hackers wrecked the city of Atlanta's stripper database.

No, we are not making this up.

on-ajc.com/2HJtBwZ #cybersecurity #hacking #SuperBowl
The database recording licenses issued by the city of Atlanta to adult entertainment performers was, according to the city, permanently lost in the 2018 cyberattack on city government. on-ajc.com/2HJtBwZ #cybersecurity #ransomware #hacking
Read 8 tweets
Second cache of 9/11 docs released by The Dark Overlord hackers rt.com/usa/448416-hac…#september11 #DarkOverlord #TheDarkOverlord #ITsec #ITsecurity #IsraelDid911
According to @Forbes, the cybercrime group known as #TheDarkOverlord has acquired 18,000 documents, many of which are related to the 9/11 events, and are demanding #bitcoin ransom in return for the data. #DarkOverlord
forbes.com/sites/thomasbr…
Read 24 tweets
#Thread!

THE JOURNEY OF #AfricaTweetChat

1. ATC, @AfricaTweetChat, was launched on 1st February 2018 by @janetmachuka_ & the co-founder, @barryonyango as a platform to bring African individual brands and start-ups to one #digitalmarketing learning space.
2. The second chat was led by @Ugaman01 on 8th February on "How can #Startups leverage on #socialmedia to cost effective #marketing." The chat was successful drawing in a new audience from Uganda. #AfricaTweetChat
3. Name: @Komana_MN from Zambia. She is a charming heart and as pretty as she is, she is a Digital Marketing specialist and founder of @IdeaBizDM. She handled the topic: "Why Building a #brand needs #Content."

#AfricaCareerChat
Read 41 tweets
#China 🇨🇳
Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information justice.gov/opa/pr/two-chi…
#China 🇨🇳 ⚖️🇺🇸 #CyberSecurity
Deputy Attorney General Rod J. Rosenstein Announces Charges Against Chinese Hackers justice.gov/opa/speech/dep…
Read 4 tweets
To the #G20Summit in Argentina this week: live up to your responsibilities; put people and their rights first! #G20openletter for a positive, forward-looking digital agenda.

#access #privacy #freedomofspeech #cybersecurity #competition — read more at g20openletter.org
#Privacy & data protection rights: We urge the G20 to adopt, apply and enforce a comprehensive approach to privacy that protects all users’ privacy and personal data, whether citizens or not. People must be given more control and agency over their data.

#G20openletter
#Freedomofexpression: We urge the G20 to promote freedom of expression online by adopting positions and policies that are consistent with maintaining an open internet for everyone.

#G20openletter
Read 5 tweets
0/ Lots of #CryptoNews as always! Below is a look into some of the eye-catching happenings in the #crypto and #blockchain space over the past 24 hours or so...
1/ 📝 @Ethfinex's #0x-powered #EthfinexTrustless hybrid DEX listed @MakerDAO [ $MKR / $DAI ], @SpankChain [ $SPANK ], @AttentionToken [ $BAT ], @AI_Autonio [ $NIO ] and @AugurProject [ $REP ].

Trade instantly vs. a highly liquid, centralized order book: trustless.ethfinex.com.
2/ 🔛 @GetGitcoin unveiled 'Kudos', an easy way to show appreciation and build relationships in open source.

Each Kudos is ltd. edition, sovereign to #Ethereum's #blockchain, with a custom art piece your collaborator can show off on their #Gitcoin profile (or #ERC721 wallet).
Read 25 tweets
(1) The Chinese spy chips found in hardware of Apple and Amazon should have been expected. There's a long history of cases like this. #cybersecurity #defense #security
(2) The Senate Armed Services Committee warned of this threat in May 2012, and found over 1 million counterfeit parts is US military systems — largely from China. theepochtimes.com/fake-electroni…
(3) It reported: “The investigation uncovered dozens of examples ... including on thermal weapons sights delivered to the Army, on mission computers for the Missile Defense Agency’s Terminal High Altitude Area Defense (THAAD) missile, and on a large number of military airplanes.”
Read 21 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!