Discover and read the best of Twitter Threads about #cybersecurity

Most recents (24)

📍SEIZE THE INITIATIVE AND MAINTAIN MOMENTUM. Present volume one of the #MuellerReport. Focus on election security. Do the open hearings all Mondays, Wednesdays, and Fridays. Hold a weekly press conference. Subpoena witnesses for specific dates at the outset.
📍DO THE OPEN HEARINGS ALL MONDAYS, WEDNESDAYS, AND FRIDAYS. Use witnesses who do respond, expert, specialists, expert panels. Besides three hearings a week hold a weekly press conference on Mondays, to resume highlights from the previous week, and preview the coming week.
Read 15 tweets
Playing with #DigitalFire:

1/7: In martial arts, one of the best moves is to take an attacker's weapon and turn it back on them. In 2016, that's just what #Beijing did – in #cyberspace:
nyti.ms/2Ylm3E3
2/7: After #American operatives used a particular bit of code to attack #Chinese computer systems, Chinese hackers took it, repurposed it, and used it to attack a bunch of US allies.
3/7: The Chinese simply seem to have spotted a #US #cyberintrusion and snatched the code, often developed at huge expense to #American taxpayers.
Read 7 tweets
Threat Hunting In #CyberSecurity : Waiting for an alert can be too dangerous.
Threat hunting means to proactively search for malware or attackers that are hiding in your network — and may have been there for some time.
Most time, the goals of these malware or attackers can be to quietly siphoning off data, patiently listening in for confidential information, or working their way through the network looking for credentials powerful enough to steal key information.
Read 19 tweets
I understand more clearly why HRC was calling for an INDEPENDENT COMMISSION into #TrumpRussiaCollusion
#VoteBlue2020
Davis : The shocking fact that Mueller never would have accused Trump of a crime - The Hill apple.news/A8Mu7XAfOQAaGG…
#IndependentCommission
“Unlike Mueller, the commission could be given the important assignment of educating the public about what happened in 2016 and resolving whatever questions Mueller leaves unaddressed in his still-secret report.”
politico.com/magazine/story…
Read 12 tweets
🔴 #Software is eating the world, and it’s only the beginning

#ArtificialIntelligence #AI #MachineLearning #ML #FutureOfWork #Robots #Technology #Disruption

1/2
🔴 #Software is eating the world, and it’s only the beginning

#ArtificialIntelligence #AI #MachineLearning #ML #FutureOfWork #Robots #Technology #Disruption

2/2
Emerson, Lake & Palmer - From The Beginning (Live)

Read 11 tweets
Equifax and FICO are getting into bed together. ‘This should keep everyone up at night’ 🤯 Los Angeles Times #DataBreach #DataAggregators #Privacy #CyberSecurity latimes.com/business/lazar…
“Call it Big Data on steroids,” answered Jeff Chester, executive director of the Center for Digital Democracy, an advocacy group. “They’re unleashing a very powerful, unaccountable, potentially harmful technology to help other companies make decisions about us.” 👁
And remember, it’s your personal information. These companies are selling it to banks for their own gain, without your permission.

“This should keep everyone up at night,” Chester told me. “This is a huge consolidation of information that gobbles up everything you do.” 🚨
Read 14 tweets
With the 2020 elections coming on strong already, I think it is important to talk about keeping yourself safe from "hacking".
When you think of hacking, most envision someone using a computer & complex code to break into your computer.
#CyberSecurity
/1
#Hacking can take many forms, many can be done done over the phone or through email messages. These scams are known as #Phishing.
Example: A phone call where someone asks you for information that are common security questions:

Your first car
Mother's maiden name
Birth City
/2
They might pretend to be from your bank, your email or internet service provider, or your mortgage lender. They might pose as someone looking to verify your identity because of "unusual activity". This can come many ways, e.g. via a phone call, text message or email.
/3
Read 13 tweets
I presented a Learning Lab at #RSAC 2019 on "#MentalHealth in #Cybersecurity: Preventing Burnout, Building Resilience" 🛡🧠💪. @RSAConference @MosconeCenter. Here are the slides:
Read 38 tweets
Q 3/5/2019 Pompeo's tweet holding notes
Sometimes reading between the lines provides..
"Meet IG"
3/5 Huber interview re:
They range from domestic terrorism to court-authorized wiretaps of criminal organizations to child pedophiles

#QAnon @POTUS @GenFlynn #WWG1GWA @SecPompeo
PROOF = EVIDENCE? #NoCollusion
Listen to the clip again re: proof & evidence.
Define 'brainwashing'.
The TRUTH is RIGHT IN FRONT OF YOU.
Think for yourself!
👇

#QAnon @POTUS @GenFlynn #WWG1GWA
Security Stepped Up Across NYC After 3 Small Bombs Found Near London Transit Hubs
Coincidence post stringers dropped last night?
[-48]
Watch the news.
#QAnon @POTUS @GenFlynn #WWG1GWA
Read 9 tweets
ثريد لأفضل ٢٣ آداة أمنية مجانية والتي ستجعل عملك اليومي الأمني ​​أكثر سهولة..

#الامن_السيبراني
#cybersecurity
#أمن_المعلومات
Maltego

آداة تحليل جنائي مصممه لتقديم صوره واضحه للتهديدات التي تستهدف بيئة المستخدم.
وسوف تظهر مدى تعقيد وشدة نقاط الفشل الواحدة وكذلك علاقات الثقة الموجودة في نطاق البنية التحتية للمرء. وهي تسحب المعلومات المنشورة عبر الإنترنت.
OWASP Zed Attack Proxy (ZAP)

يعتبر Zed Attack Proxy (ZAP) أداة اختبار الاختراق سهلة الاستخدام والتي تعثر على نقاط الضعف في تطبيقات الويب. ويوفر مسح آلي ومجموعة من الأدوات لأولئك الذين يرغبون في العثور على نقاط الضعف يدويا.
Read 25 tweets
Now reading the the #TopolReview report - Preparing the healthcare workforce to deliver the digital future. It's an illuminating read topol.hee.nhs.uk #DigitalHealth
It's clear that a lot of effort has gone into the #TopolReview - it paints a glorious vision of what healthcare would look like over the next 20 years (for both staff and patients) - enabled by technology such as #genomics, #AI and #robotics
For me the #Topolreview has too narrow a focus. It's been commissioned by healthcare, yet we know that with an aging population, many people with long term conditions have to rely upon #socialcare as well. We need joined up thinking, imho.
Read 34 tweets
Some really important journalism can be produced by local news outlets in preparation for a Super Bowl.

For the run-up to #SuperBowlLIII , this story breaks some very interesting new ground.

A thread:
Iranian hackers wrecked the city of Atlanta's stripper database.

No, we are not making this up.

on-ajc.com/2HJtBwZ #cybersecurity #hacking #SuperBowl
The database recording licenses issued by the city of Atlanta to adult entertainment performers was, according to the city, permanently lost in the 2018 cyberattack on city government. on-ajc.com/2HJtBwZ #cybersecurity #ransomware #hacking
Read 8 tweets
Second cache of 9/11 docs released by The Dark Overlord hackers rt.com/usa/448416-hac…#september11 #DarkOverlord #TheDarkOverlord #ITsec #ITsecurity #IsraelDid911
According to @Forbes, the cybercrime group known as #TheDarkOverlord has acquired 18,000 documents, many of which are related to the 9/11 events, and are demanding #bitcoin ransom in return for the data. #DarkOverlord
forbes.com/sites/thomasbr…
Read 24 tweets
#Thread!

THE JOURNEY OF #AfricaTweetChat

1. ATC, @AfricaTweetChat, was launched on 1st February 2018 by @janetmachuka_ & the co-founder, @barryonyango as a platform to bring African individual brands and start-ups to one #digitalmarketing learning space.
2. The second chat was led by @Ugaman01 on 8th February on "How can #Startups leverage on #socialmedia to cost effective #marketing." The chat was successful drawing in a new audience from Uganda. #AfricaTweetChat
3. Name: @Komana_MN from Zambia. She is a charming heart and as pretty as she is, she is a Digital Marketing specialist and founder of @IdeaBizDM. She handled the topic: "Why Building a #brand needs #Content."

#AfricaCareerChat
Read 41 tweets
#China 🇨🇳
Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information justice.gov/opa/pr/two-chi…
#China 🇨🇳 ⚖️🇺🇸 #CyberSecurity
Deputy Attorney General Rod J. Rosenstein Announces Charges Against Chinese Hackers justice.gov/opa/speech/dep…
Read 4 tweets
To the #G20Summit in Argentina this week: live up to your responsibilities; put people and their rights first! #G20openletter for a positive, forward-looking digital agenda.

#access #privacy #freedomofspeech #cybersecurity #competition — read more at g20openletter.org
#Privacy & data protection rights: We urge the G20 to adopt, apply and enforce a comprehensive approach to privacy that protects all users’ privacy and personal data, whether citizens or not. People must be given more control and agency over their data.

#G20openletter
#Freedomofexpression: We urge the G20 to promote freedom of expression online by adopting positions and policies that are consistent with maintaining an open internet for everyone.

#G20openletter
Read 5 tweets
0/ Lots of #CryptoNews as always! Below is a look into some of the eye-catching happenings in the #crypto and #blockchain space over the past 24 hours or so...
1/ 📝 @Ethfinex's #0x-powered #EthfinexTrustless hybrid DEX listed @MakerDAO [ $MKR / $DAI ], @SpankChain [ $SPANK ], @AttentionToken [ $BAT ], @AI_Autonio [ $NIO ] and @AugurProject [ $REP ].

Trade instantly vs. a highly liquid, centralized order book: trustless.ethfinex.com.
2/ 🔛 @GetGitcoin unveiled 'Kudos', an easy way to show appreciation and build relationships in open source.

Each Kudos is ltd. edition, sovereign to #Ethereum's #blockchain, with a custom art piece your collaborator can show off on their #Gitcoin profile (or #ERC721 wallet).
Read 25 tweets
(1) The Chinese spy chips found in hardware of Apple and Amazon should have been expected. There's a long history of cases like this. #cybersecurity #defense #security
(2) The Senate Armed Services Committee warned of this threat in May 2012, and found over 1 million counterfeit parts is US military systems — largely from China. theepochtimes.com/fake-electroni…
(3) It reported: “The investigation uncovered dozens of examples ... including on thermal weapons sights delivered to the Army, on mission computers for the Missile Defense Agency’s Terminal High Altitude Area Defense (THAAD) missile, and on a large number of military airplanes.”
Read 21 tweets
Introducing...

THE HUNT: A Cyber Attack in the Process Industry

#cybersecurity #thehunt

blog.f-secure.com/cyber-security…
In manufacturing...

• 86% of cyber attacks are targeted

• 66% feature hacking

• Only 34% involve malware
In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.

#cybersecurity #thehunt
Read 89 tweets
THREAD: This summer @DNI @SenDanCoats said that when it came to #cybersecurity, the lights were "blinking red." After reading @KimZetter's penetrating piece, it is more clear than ever that when it comes to #ElectionSecurity, America has turned off the alarm system. /1
Quite simply, despite an unprecented act of information warfare combining espionage, computational propoganda, computer hacking and exploitation of our election systems, our country has not taken sufficient action to reduce the risk of it happening again and again /2
I don't mean to disrespect my former @DHS colleagues, who repeatedly have said they have seen no signs of direct manipulation of election votes, but this quote from @KimZetter's piece is damning: "the truth is that no one has really looked for evidence" of election hacking. /3
Read 11 tweets
This could explain Javad Zarif's anxiety:
"It should be noted that on the Internet, especially Telegram, the enemy and especially the [#MEK], have gained complete control… The terminology of regime change is gaining complete control in social media networks." -Tehran Press #Iran
The mullahs have always been fearful of #MEK's connecting to citizens. Here is what @NYTimes wrote in 1996: "Gov officials said the number of banned sites was not available, but they include those with information distributed by opposition groups like the [MEK]..." #CyberSecurity
The @NYTimes continued: ''The brains of the young are very impressionable, so the Mujahedeen Khalq [#MEK] might be able to brainwash people to join them, or they might be able to influence an election,'' said a senior Gov official familiar w/ the Internet project. #CyberSecurity
Read 7 tweets
I imagine the #sonytruthers playing armchair #DFIR investigators will emerge from wherever they’ve been hiding in order to dispute the #DPRK #indictment. My advice: you were wrong in 2014-2015, and you’d still be wrong today. HT ⁦@JohnHultquistint.nyt.com/data/documenth…
Because #attribution is inherently political per @RidT and @BuchananBen, you need more than “hacking” knowledge to assess national policy. Experience w/ #cybersecurity clearly helps, but gov internals, intel agency processes, bureaucracy, trade, diplomacy, LE, are all important.
I think it’s slowly changing, but a failure of #cybersecurity has been to think “soft” areas are much easier than coding, so any leet hacker is inherently qualified to address political science, history, economics, and related topics by virtue of their ability to code in ASM.
Read 4 tweets
Türkiye ile ABD arasında yeni bir kriz yaşanabilir. Son raporlara göre Türkiye'de bulunan bazı 'hacker' (!) gruplarının ABD'ye yönelik siber saldırı yapacağı ve uzun zamandır hazırlık çalışması yaptıkları yazıyor. #CyberWar
Raporda Türkiye'deki hackerların ilk saldırı yapacağı yerler arasında ABD'deki bankalar ve Trump'ın grupları gösteriliyor. Peki ABD zarar görürse siber alanda sessiz mi kalır? Siber alanda olabilecekleri ve korunma yöntemlerini anlatıyorum. #CyberWar #CyberSecurity
PS 1*: Siber saldırı floodumuza başlamadan önce sizi bir konuda uyarmak istiyorum.

Twitter ve Facebook hesaplarınız Phishing (oltalama) yöntemi ile çalınıyor ve banka fake hesabı olarak kullanılıyor. Banka fake hesabı olarak kullanılması başınızı çok fazla ağrıtabilir.
Read 6 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!