Cybersecurity Essentials News

We only publish the most trusted cybersecurity news and links, curated by the top experts, enthusiasts and thought leaders. With The Essentials Cybersecurity Master Topic and 9 in-depth sub-topics, you'll never again miss anything or anyone that matters in the world of cybersecurity.

Monthly report: January 2020

This month, The Essentials Report, has curated & analyzed the content published by 318 influencers like Bob Carver ✭ and Rob Lewis, discussing hashtags such as #CyberSecurity , #ransomware and #phishing.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in January 2020

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Best articles in January 2020

@EdgeIotAi shared
On Jan 6, 2020
RT @TheMaryJesse: This #Tech you'll see more of in 2020 in every industry. #AI #Blockchain #IIoT #IoT #EdgeComputing @Computerworld #technology https://t.co/em1r44D4ga
Open

Top 3 enterprise tech trends to watch in 2020

Look for blockchain to mature, artificial intelligence and machine learning to improve cybersecurity, and edge computing to see higher adoption rates. Those are some of the insights gleaned from experts who took part in a recent IDG TECH(talk) Twitter chat.

@EdgeIotAi shared
On Jan 6, 2020
RT @TheMaryJesse: This #Tech you'll see more of in 2020 in every industry. #AI #Blockchain #IIoT #IoT #EdgeComputing @Computerworld #technology https://t.co/em1r44D4ga
Open
Top 3 enterprise tech trends to watch in 2020

Top 3 enterprise tech trends to watch in 2020

Look for blockchain to mature, artificial intelligence and machine learning to improve cybersecurity, and edge computing to see higher adoption rates. Those are some of the insights gleaned ...

@Infosec_Tourist shared
On Jan 8, 2020
RT @ZDNet: Disk-wiping malware, phishing and espionage: How Iran's cyber attack capabilities stack up https://t.co/LfO0OFpY8n
Open

Disk-wiping malware, phishing and espionage: How Iran's cyber attack capabilities stack up

US warns that cyberattacks could be part of Iran's plans as tensions rise. This is what Iran's current offensive cyber capabilities look like.

@Infosec_Tourist shared
On Jan 8, 2020
RT @ZDNet: Disk-wiping malware, phishing and espionage: How Iran's cyber attack capabilities stack up https://t.co/LfO0OFpY8n
Open
Disk-wiping malware, phishing and espionage: How Iran's cyber attack capabilities stack up

Disk-wiping malware, phishing and espionage: How Iran's cyber attack capabilities stack up

US warns that cyberattacks could be part of Iran's plans as tensions rise. This is what Iran's current offensive cyber capabilities look like.

@cybersecboardrm shared
On Jan 11, 2020
Ransomware — time for the government to act | TheHill #ransomware #CyberSecurity #government https://t.co/yCQqH9NBgq
Open

Ransomware — time for the government to act

Our collective inaction leaves victim companies and individuals at the mercy of global crooks who steal billions every year.

@cybersecboardrm shared
On Jan 11, 2020
Ransomware — time for the government to act | TheHill #ransomware #CyberSecurity #government https://t.co/yCQqH9NBgq
Open
Ransomware — time for the government to act

Ransomware — time for the government to act

Our collective inaction leaves victim companies and individuals at the mercy of global crooks who steal billions every year.

@CybersecuritySF shared
On Jan 11, 2020
Herman is no cyber fraudster. Interning at a high-tech manufacturer in Charlotte, NC, during his freshman year at @virginia_tech, he was put in charge of the #phishing project to promote cybersecurity mindfulness at the company. https://t.co/C8F3qMjXuJ via @AugFreePress
Open

New option in business information technology seeks to meet need for cyber talent

Nick Herman once led a global corporate campaign to trick people into clicking on a fictitious link.

@CybersecuritySF shared
On Jan 11, 2020
Herman is no cyber fraudster. Interning at a high-tech manufacturer in Charlotte, NC, during his freshman year at @virginia_tech, he was put in charge of the #phishing project to promote cybersecurity mindfulness at the company. https://t.co/C8F3qMjXuJ via @AugFreePress
Open
New option in business information technology seeks to meet need for cyber talent

New option in business information technology seeks to meet need for cyber talent

Nick Herman once led a global corporate campaign to trick people into clicking on a fictitious link.

@Infosec_Tourist shared
On Jan 10, 2020
RT @DataGuardians_: Dixons Carphone has been fined £500,000 after tills in its shops were compromised by a cyber-attack that affected at least 14m people. Rogue software went undetected over a nine month period. #DataBreach #ICO #DataProtection #CyberAttack https://t.co/vsHBxXLSAG
Open

Dixons Carphone fined £500,000 for massive data breach

‘Systemic failures’ found in the retailer’s cybersecurity and management of customer data

@Infosec_Tourist shared
On Jan 10, 2020
RT @DataGuardians_: Dixons Carphone has been fined £500,000 after tills in its shops were compromised by a cyber-attack that affected at least 14m people. Rogue software went undetected over a nine month period. #DataBreach #ICO #DataProtection #CyberAttack https://t.co/vsHBxXLSAG
Open
Dixons Carphone fined £500,000 for massive data breach

Dixons Carphone fined £500,000 for massive data breach

‘Systemic failures’ found in the retailer’s cybersecurity and management of customer data

@CybersecuritySF shared
On Jan 29, 2020
This week! @IBMSecurity, #ransomware tips @Inc, latest @WEFCybersec, @CiscoSecurity, @KnowBe4 on #phishing, #Canada's cyber accelerator, auto dealers under #cyberattack @RSAConference & @WiCySorg 2020 https://t.co/Gn1Y9t8OIh Our sponsor @SmartBrief on #Cybersecurity
Open

Cybercrime Bytes: New Bezos Hack Opinion, Websites Get Defensive, WEF On ISP Security

Weekly news that keeps you on the cutting edge of cybersecurity

@CybersecuritySF shared
On Jan 29, 2020
This week! @IBMSecurity, #ransomware tips @Inc, latest @WEFCybersec, @CiscoSecurity, @KnowBe4 on #phishing, #Canada's cyber accelerator, auto dealers under #cyberattack @RSAConference & @WiCySorg 2020 https://t.co/Gn1Y9t8OIh Our sponsor @SmartBrief on #Cybersecurity
Open
@splunk shared
On Jan 24, 2020
Losing sleep over CVE-2020-0601? Splunker @drewchurch is setting the record straight about this critical Windows 10 CryptoAPI vulnerability and showing you how to detect exploitation attempts using wire and log data. (You can thank us later.) Check it out: https://t.co/mku9n0ll2B https://t.co/D43arNmIVV
Open

Detecting CVE-2020-0601 Exploitation Attempts With Wire & Log Data

Learn two simple techniques for detecting CVE-2020-0601 exploitation attempts using Splunk

@splunk shared
On Jan 24, 2020
Losing sleep over CVE-2020-0601? Splunker @drewchurch is setting the record straight about this critical Windows 10 CryptoAPI vulnerability and showing you how to detect exploitation attempts using wire and log data. (You can thank us later.) Check it out: https://t.co/mku9n0ll2B https://t.co/D43arNmIVV
Open
Detecting CVE-2020-0601 Exploitation Attempts With Wire & Log Data

Detecting CVE-2020-0601 Exploitation Attempts With Wire & Log Data

Learn two simple techniques for detecting CVE-2020-0601 exploitation attempts using Splunk

@kjhiggins shared
On Jan 24, 2020
"They actually weaponized AD by putting not Trickbot, but Ryuk, into the AD [roaming] login script. So anybody who logged into that AD server was immediately infected"-- @R1ngZer0 https://t.co/Tq2LDfaYja #AD #S4x20 #Ryuk
Open

Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says

Attackers 'weaponized' Active Directory to spread the ransomware.

@kjhiggins shared
On Jan 24, 2020
"They actually weaponized AD by putting not Trickbot, but Ryuk, into the AD [roaming] login script. So anybody who logged into that AD server was immediately infected"-- @R1ngZer0 https://t.co/Tq2LDfaYja #AD #S4x20 #Ryuk
Open
Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says

Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says

Attackers 'weaponized' Active Directory to spread the ransomware.

Top Influencers

Picture of @cybersecboardrm

Twitter Top10 #CyberSecurity #infosec #IoT #privacy #AI #ML #disrupt #blockchain #Industry40 #startups #Cloud #FutureOfWork #technology #Speaker RT != agree

Follow 45.1k Followers

Picture of @Infosec_Tourist

Transcending Infosec BS. KSE OS controls/trusted computing vs Insider Threat/espionage. Langsec,algebraic modelling, automated WAF attack denial,Red Team fails

Follow 1.9k Followers

Picture of @securityaffairs

Pierluigi Paganini, founder of Security Affairs and Cybaze SPA, ENISA ETL Group, Ethical Hacker, Researcher, Security Evangelist, Security Analyst.

Follow 28.8k Followers

Picture of @EdgeIotAi

The EDGE, where things happen... Follow us to keep up with the latest in Intelligent EDGE tech. Tweeting about EDGE #IoT & #AI

Follow 2.9k Followers

Picture of @teamcymru

We exist to enable organizations to identify and eradicate threats within their network by providing unique insight that saves and improves human lives

Follow 39.6k Followers

Picture of @StaySafeOnline

The National Cyber Security Alliance (NCSA) is a nonprofit that empowers people to use the Internet safely & securely. Co-founder of @STOPTHNKCONNECT campaign.

Follow 39.2k Followers

Picture of @attcyber

AT&T Cybersecurity’s Edge-to-Edge technologies provide phenomenal threat intelligence, collaborative defense and security without the seams.

Follow 80.2k Followers

Picture of @RSAConference

#RSAC: Helping you stay ahead of an ever-changing #security landscape.

Follow 43.1k Followers

Picture of @AghiathChbib

CEO-founder #CyberSecurity #Blockchain #AI #DigitalForensics #FinTech #Leadership

Follow 5.7k Followers

Picture of @CybersecuritySF

Founder & Editor-In-Chief @ Cybersecurity Ventures. Cybercrime Researcher, Publisher, Journalist. Track Cybersecurity Companies. Launching Cybercrime Magazine!

Follow 10.9k Followers

Picture of @EduardKovacs

Contributing Editor @SecurityWeek - I cover ICS security, data breaches, vulnerabilities, mobile security, cybercrime, malware, and industry news

Follow 13.1k Followers

Picture of @SecurityWeek

Internet and Enterprise Security News, Threats, Insights and Expert Analysis #SCADA #infosec Coverage

Follow 107.5k Followers

Picture of @whitehatsec

WhiteHat Security helps prevent website attacks by providing the most complete Web security solution for companies of any size.

Follow 35.1k Followers

Picture of @SwissCognitive

An "independent"​ network that shares, connects, and unlocks the potentials of #ArtificialIntelligence #AI #CognitiveComputing #ML #DL #NLP

Follow 126.0k Followers

Picture of @PatrickCMiller

Infrastructure & Industrial Security Advisor. Recovering regulator. Airport dweller. @ArcherSec Managing Partner. @Info_CCI US Coordinator. @EnergySec Founder.

Follow 6.7k Followers

Picture of @MITREattack

MITRE ATT&CK™ - A knowledge base for describing behavior of adversaries across their lifecycle (Replying/Following/Re-tweeting ≠ endorsement)

Follow 30.0k Followers

Picture of @CTIN_Global

Aggregating high-quality CTIN member sources with real-time posting on threats | ISAOs | CTI-TC | OSINT | Analytics | ThreatIntel | CyberSecurity | Malware

Follow 1.0k Followers

Picture of @IDGTechTalk

The #1 tech community. We report the hottest tech trends from leading experts & our community. Join us every other Thursday @ 12pm ET for the #IDGTECHtalk chat.

Follow 11.4k Followers

Picture of @archonsec

Microsoft Silver Partner, #Cloud, #PCI, #HIPAA, #SecurityasaService, #BigData, #Azure, #BCDR, #IoT, #Office365, #Compliance, #AI, #ML. Contact us 👇

Follow 6.5k Followers

Picture of @splunk

#Splunk turns data into doing with the #DataToEverything Platform, designed to investigate, monitor, analyze and act on data at any scale.

Follow 65.2k Followers