In the Last 7 days there's been 20 influencers like SCMagazine and snlyngaas, discussing topics such as #cybersecurity, #ransomwareand #infosec.



Trends


Top hashtags

Top influencers

  SCMagazine
  snlyngaas
  CFR_org
  morphisec
  threatintel
  DanielMiessler
  ISC2
  StephaneNappo
  hackerfantastic

Top sources

source img scmagazine.com
source img cfr.org
source img cyberscoop.com
source img darkreading.com
source img forbes.com
source img ic3.gov
source img itsecurityguru.org
source img zdnet.com
source img beth.technology

News

Supply chain weak security link for 92 percent of U.S. companies

On Sep 24, 2020
@SCMagazine shared
New research from BlueVoyant found that 92% of U.S. organizations suffered a breach in the past 12 months as a result of weakness in their supply chain. @BlueVoyant https://t.co/eO8gQOcnZm
Open

The devastating Target breach – the result of an earlier attack on the retail giant’s HVAC vendor – wasn’t an anomaly. New research from BlueVoyant found

www.scmagazine.com
On Sep 24, 2020
@SCMagazine shared
New research from BlueVoyant found that 92% of U.S. organizations suffered a breach in the past 12 months as a result of weakness in their supply chain. @BlueVoyant https://t.co/eO8gQOcnZm
Open

Supply chain weak security link for 92 percent of U.S. companies

Supply chain weak security link for 92 percent of U.S. companies

The devastating Target breach – the result of an earlier attack on the retail giant’s HVAC vendor – wasn’t an anomaly. New research from BlueVoyant found


On Sep 28, 2020
@ISC2 shared
Remote working is here to stay, introducing new security risks and challenges for businesses. How can you help secure access to corporate data? Read the blog: https://t.co/MBRoDu1ijc
Open

Remote Working Underscores the Need for Qualified Cybersecurity Professionals

Remote Working Underscores the Need for Qualified Cybersecurity Professionals

Remote working is here to stay The COVID-19 pandemic has brought many changes to our lives: social distancing, face masks, and WFH (work from home). Based on health scientists’ advice to ...

On Sep 29, 2020
@CFR_org shared
Under the Trump administration's Clean Network Program, Chinese cloud service providers will come under greater scrutiny, writes @NewAmerica's Michael Garcia. https://t.co/VQvYamagRT
Open

The Future of “Clean Cloud”

The Future of “Clean Cloud”

Under the Trump administration's Clean Network Program, Chinese cloud service providers will come under greater scrutiny.

On Sep 28, 2020
@GlasswingVC shared
[email protected] CTO Salvatore Stolfo weighs in: Cybersecurity Conundrum: Who's Responsible for Securing IoT Networks? - https://t.co/io9K4hy23C via @technewsworld https://t.co/8rJRYJCmmx
Open

Cybersecurity Conundrum: Who's Responsible for Securing IoT Networks?

Cybersecurity Conundrum: Who's Responsible for Securing IoT Networks?

Surely spurred by the work-from-home necessities of 2020, people have connected a multitude of non-business devices to their corporate networks, making it progressively difficult to ...

On Sep 30, 2020
@PogoWasRight shared
RT @fanCRTCProfling: Two Telus Health data breaches. CC: @PogoWasRight Two Telus Health medical service providers pay ransom after 60K client files accessed https://t.co/6yOIXyCjtW #CRTC
Open

Two Telus Health medical service providers pay ransom after 60K client files accessed

Two Telus Health medical service providers pay ransom after 60K client files accessed

TORONTO - The Medisys Health Group and its affiliate Copeman Healthcare say they payed an unspecified ransom to retrieve personal information for abou...

On Sep 29, 2020
@morphisec shared
When it comes to #patching not all industries operate the same. Check out the article from @ZDNet to see how different #markets go about patch management. https://t.co/j01R2ilo0D
Open

Healthcare lags behind in critical vulnerability management, banks hold their ground

Healthcare lags behind in critical vulnerability management, banks hold their ground

New research sheds light on which industries are performing well when it comes to patching high-risk bugs.

On Sep 27, 2020
@StephaneNappo shared
#infosec #Career misconceptions and challenges, early warning signs of #ransomware. #CyberSecurity #CISO https://t.co/d1KvjyI7r6
Open

Week in review: Infosec career misconceptions and challenges, early warning signs of ransomware

Week in review: Infosec career misconceptions and challenges, early warning signs of ransomware

Here's an overview of some of last week's most interesting news and articles: CISA orders federal agencies to implement Zerologon fix If you had any

On Sep 26, 2020
@hackerfantastic shared
I did an interview with @dradisfw @dradispro about my background and the Hands-On Hacking book from @myhackerhouse & @Jennifer_Arcuri :-) You can even win a copy of our book by filling in your email at the end of the article! Happy Hacking! https://t.co/5iOgtLSyGH
Open

Interview with Matthew Hickey

Interview with Matthew Hickey

Matthew is a professional hacker with over 20 years experience providing security services to a global client base.

On Sep 28, 2020
@SCMagazine shared
The company CHSPSC, which was breached in 2014, reached a settlement earlier this year with the Dept. of HHS over HIPAA violations. Details of the agreement, revealed last week, show how the long-term impact can be costly. @SolveCyberRisk @digitalshadows https://t.co/iqseTykJkK
Open

What one company’s deal with the feds tells us about the long tail of data breaches

What one company’s deal with the feds tells us about the long tail of data breaches

A recently published corrective action plan between HHS and CHSPSC over a 2014 hack underscores how long companies must deal with the fallout of a harmful breach.

On Sep 30, 2020
@morphisec shared
The recent leap towards #cloudcomputing has fast-forwarded #digital transformation for organizations. What there hasn’t been, however, is a corresponding improvement in the ability of organizations to #secure the #cloud. Learn more here: https://t.co/ojLdS50l3i
Open

Cloud Workload Security Needs a Proactive Approach to Processes and Technology

Cloud Workload Security Needs a Proactive Approach to Processes and Technology

The recent leap towards cloud computing has fast-forwarded digital transformation for countless organizations. What there hasn’t been, however, is a corresponding improvement in the ability ...

Browse topics

Get updates live! Follow us on

Choose your newsletters

On Sep 24, 2020
@morphisec shared
As #telehealth options grow in popularity, new data collected from healthcare vendors has found a 30% increase in #cybersecurity findings per domain. https://t.co/Xxieo0ZsEs https://t.co/HtVs2f6ozn
Open

Accelerated Telehealth Use During COVID-19 Raises Security Risk

Accelerated Telehealth Use During COVID-19 Raises Security Risk

Out of the most-used telehealth vendors throughout the pandemic, there was a 30 percent increase of cybersecurity findings per domain, a recent report found.

On Sep 30, 2020
@PogoWasRight shared
#SunCrypt #ransomware pledges not to attack medical entities going forward..... they say they are going after cybersecurity firms. https://t.co/bHF2ZfK4eO
Open

SunCrypt ransomware group swears off medical entities, sets sights on cybersecurity firms

SunCrypt ransomware group swears off medical entities, sets sights on cybersecurity firms

When the SunCrypt ransomware group opened a leak site where they listed victims who had not paid their ransom demands, they attracted public attention and...

On Sep 30, 2020
@SCMagazine shared
As tech platforms like #Magento reach their end of life, hackers are watching and waiting. @whitehatsec @nVisium @CrypsisGroup @NNT_SecureOps @AppOmniSecurity @TenableSecurity https://t.co/tWYvfzVTjt
Open

As tech reaches end of life, hackers are watching

As tech reaches end of life, hackers are watching

A recent rash of cyberattacks against web commerce sites relying on Adobe's Magento 1 platform underscores the criticality of having a strategy in place for securing technology no longer ...

On Sep 28, 2020
@tonymorbin shared
CISOs have been thrust into a pivotal role with responsibility and expectations placed on technical leaders to keep their companies safe, and cybersec an integral part of the company budget to maintain operations. #cybersecurity https://t.co/AajK82tjr2
Open

The changing role of the CISO in uncertain times

The changing role of the CISO in uncertain times

COVID-19 has dramatically altered the world of cybersecurity and gravened the threat poised to companies that are increasingly shifting assets online, beyond th

On Sep 25, 2020
@SCMagazine shared
#Instagram flaw shows importance of managing third-party apps, images @CheckPointSW @synopsys @TheMediaTrust @TripwireInc https://t.co/pFrjvBqx83
Open

Instagram flaw shows importance of managing third-party apps, images

Instagram flaw shows importance of managing third-party apps, images

A remote code execution (RCE) flaw found in Instagram that lets bad actors potentially take over a victim’s phone by sending a malicious image shines a

On Sep 30, 2020
@rafaybaloch shared
RT @SRM_Sherazi: This is not the first time K-Electric had come under a cyber attack, and yet their indifference towards cyber security continues. Information Security Researcher and Cybersecurity expert, @rafaybaloch sheds more light on this matter... https://t.co/F0BdSzgH2e
Open

8.5 GBs of K-Electric data Dumped Online After It Failed to Pay $7 Million in Ransom

8.5 GBs of K-Electric data Dumped Online After It Failed to Pay $7 Million in Ransom

Hackers make good on their promise to leak classified data as KE refuses to pay ransom

On Sep 30, 2020
@SCMagazine shared
New report suggests the bug bounty business is recession-proof. @Hacker0x01 @thezdi @LutaSecurity https://t.co/2wrabzynEc
Open

New report suggests the bug bounty business is recession-proof

New report suggests the bug bounty business is recession-proof

A new HackerOne report suggests the bug bounty business ie recession-proof, as evidenced by an increase in hacker sign-ups, disclosures and payouts in 2020.

On Sep 29, 2020
@SCMagazine shared
‘Insensitive’ phishing test stirs debate over ethics of security training. #phish #phishing @Mimecast @KnowBe4 @greathorn @SANSInstitute https://t.co/oeOq8xkYyV
Open

‘Insensitive’ phishing test stirs debate over ethics of security training

‘Insensitive’ phishing test stirs debate over ethics of security training

A phishing simulation test that promised Tribune Publishing employees bonuses as a lure has sparked a debate over the ethics of security awareness testing.

On Sep 26, 2020
@threatintel shared
Instagram RCE bug could let hackers turn phones into spying tools https://t.co/abX4jBxgAG
Open

Critical Instagram Flaw Could Let Attackers Spy on Victims

Critical Instagram Flaw Could Let Attackers Spy on Victims

A now-patched remote code execution vulnerability could be exploited with a specially sized image file, researchers report.

On Oct 1, 2020
@CISAgov shared
This week, we hosted a tabletop exercise with federal, state, and local partners. The exercise simulated a chemical attack and vehicle borne improvised explosive device at National Harbor, MD. Grateful for the collaboration! Learn more: https://t.co/PgGFnduxoL.
Open

National Harbor 2020 Exercise Tests Interagency Recovery and Response

National Harbor 2020 Exercise Tests Interagency Recovery and Response

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) joined with public and private-sector partners to conduct an interagency Tabletop Exercise (TTX) called “National ...

On Sep 24, 2020
@threatintel shared
FBI, CISA warn of election results disinformation campaigns https://t.co/BgJUScTDz8
Open

Foreign Actors and Cybercriminals Likely to Spread Disinformation Regarding 2020 Election Results

Foreign Actors and Cybercriminals Likely to Spread Disinformation Regarding 2020 Election Results

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are issuing this announcement to raise awareness of the potential threat posed by ...