Cybersecurity Essentials

Monthly report: January 2020

This month, The Essentials Report, has curated & analyzed the content published by 318 influencers like Bob Carver ✭ and Rob Lewis, discussing hashtags such as #CyberSecurity , #ransomware and #phishing.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in January 2020

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in January 2020

Top 3 enterprise tech trends to watch in 2020

On Jan 6, 2020
@EdgeIotAi shared
RT @TheMaryJesse: This #Tech you'll see more of in 2020 in every industry. #AI #Blockchain #IIoT #IoT #EdgeComputing @Computerworld #technology https://t.co/em1r44D4ga
Open

Look for blockchain to mature, artificial intelligence and machine learning to improve cybersecurity, and edge computing to see higher adoption rates. Those are some of the insights gleaned from experts who took part in a recent IDG TECH(talk) Twitter chat.

www.computerworld.com
On Jan 6, 2020
@EdgeIotAi shared
RT @TheMaryJesse: This #Tech you'll see more of in 2020 in every industry. #AI #Blockchain #IIoT #IoT #EdgeComputing @Computerworld #technology https://t.co/em1r44D4ga
Open

Top 3 enterprise tech trends to watch in 2020

Look for blockchain to mature, artificial intelligence and machine learning to improve cybersecurity, and edge computing to see higher adoption rates. Those are some of the insights gleaned ...

Disk-wiping malware, phishing and espionage: How Iran's cyber attack capabilities stack up

On Jan 8, 2020
@Infosec_Tourist shared
RT @ZDNet: Disk-wiping malware, phishing and espionage: How Iran's cyber attack capabilities stack up https://t.co/LfO0OFpY8n
Open

US warns that cyberattacks could be part of Iran's plans as tensions rise. This is what Iran's current offensive cyber capabilities look like.

www.zdnet.com
On Jan 8, 2020
@Infosec_Tourist shared
RT @ZDNet: Disk-wiping malware, phishing and espionage: How Iran's cyber attack capabilities stack up https://t.co/LfO0OFpY8n
Open

Disk-wiping malware, phishing and espionage: How Iran's cyber attack capabilities stack up

US warns that cyberattacks could be part of Iran's plans as tensions rise. This is what Iran's current offensive cyber capabilities look like.

Ransomware — time for the government to act

On Jan 11, 2020
@cybersecboardrm shared
Ransomware — time for the government to act | TheHill #ransomware #CyberSecurity #government https://t.co/yCQqH9NBgq
Open

Our collective inaction leaves victim companies and individuals at the mercy of global crooks who steal billions every year.

thehill.com
On Jan 11, 2020
@cybersecboardrm shared
Ransomware — time for the government to act | TheHill #ransomware #CyberSecurity #government https://t.co/yCQqH9NBgq
Open

Ransomware — time for the government to act

Our collective inaction leaves victim companies and individuals at the mercy of global crooks who steal billions every year.

New option in business information technology seeks to meet need for cyber talent

On Jan 11, 2020
@CybersecuritySF shared
Herman is no cyber fraudster. Interning at a high-tech manufacturer in Charlotte, NC, during his freshman year at @virginia_tech, he was put in charge of the #phishing project to promote cybersecurity mindfulness at the company. https://t.co/C8F3qMjXuJ via @AugFreePress
Open

Nick Herman once led a global corporate campaign to trick people into clicking on a fictitious link.

augustafreepress.com
On Jan 11, 2020
@CybersecuritySF shared
Herman is no cyber fraudster. Interning at a high-tech manufacturer in Charlotte, NC, during his freshman year at @virginia_tech, he was put in charge of the #phishing project to promote cybersecurity mindfulness at the company. https://t.co/C8F3qMjXuJ via @AugFreePress
Open

New option in business information technology seeks to meet need for cyber talent

Nick Herman once led a global corporate campaign to trick people into clicking on a fictitious link.

Dixons Carphone fined £500,000 for massive data breach

On Jan 10, 2020
@Infosec_Tourist shared
RT @DataGuardians_: Dixons Carphone has been fined £500,000 after tills in its shops were compromised by a cyber-attack that affected at least 14m people. Rogue software went undetected over a nine month period. #DataBreach #ICO #DataProtection #CyberAttack https://t.co/vsHBxXLSAG
Open

‘Systemic failures’ found in the retailer’s cybersecurity and management of customer data

www.theguardian.com
On Jan 10, 2020
@Infosec_Tourist shared
RT @DataGuardians_: Dixons Carphone has been fined £500,000 after tills in its shops were compromised by a cyber-attack that affected at least 14m people. Rogue software went undetected over a nine month period. #DataBreach #ICO #DataProtection #CyberAttack https://t.co/vsHBxXLSAG
Open

Dixons Carphone fined £500,000 for massive data breach

‘Systemic failures’ found in the retailer’s cybersecurity and management of customer data

Cybercrime Bytes: New Bezos Hack Opinion, Websites Get Defensive, WEF On ISP Security

On Jan 29, 2020
@CybersecuritySF shared
This week! @IBMSecurity, #ransomware tips @Inc, latest @WEFCybersec, @CiscoSecurity, @KnowBe4 on #phishing, #Canada's cyber accelerator, auto dealers under #cyberattack @RSAConference & @WiCySorg 2020 https://t.co/Gn1Y9t8OIh Our sponsor @SmartBrief on #Cybersecurity
Open

Weekly news that keeps you on the cutting edge of cybersecurity

cybersecurityventures.com
On Jan 29, 2020
@CybersecuritySF shared
This week! @IBMSecurity, #ransomware tips @Inc, latest @WEFCybersec, @CiscoSecurity, @KnowBe4 on #phishing, #Canada's cyber accelerator, auto dealers under #cyberattack @RSAConference & @WiCySorg 2020 https://t.co/Gn1Y9t8OIh Our sponsor @SmartBrief on #Cybersecurity
Open

Detecting CVE-2020-0601 Exploitation Attempts With Wire & Log Data

On Jan 24, 2020
@splunk shared
Losing sleep over CVE-2020-0601? Splunker @drewchurch is setting the record straight about this critical Windows 10 CryptoAPI vulnerability and showing you how to detect exploitation attempts using wire and log data. (You can thank us later.) Check it out: https://t.co/mku9n0ll2B https://t.co/D43arNmIVV
Open

Learn two simple techniques for detecting CVE-2020-0601 exploitation attempts using Splunk

www.splunk.com
On Jan 24, 2020
@splunk shared
Losing sleep over CVE-2020-0601? Splunker @drewchurch is setting the record straight about this critical Windows 10 CryptoAPI vulnerability and showing you how to detect exploitation attempts using wire and log data. (You can thank us later.) Check it out: https://t.co/mku9n0ll2B https://t.co/D43arNmIVV
Open

Detecting CVE-2020-0601 Exploitation Attempts With Wire & Log Data

Learn two simple techniques for detecting CVE-2020-0601 exploitation attempts using Splunk

Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says

On Jan 24, 2020
@kjhiggins shared
"They actually weaponized AD by putting not Trickbot, but Ryuk, into the AD [roaming] login script. So anybody who logged into that AD server was immediately infected"-- @R1ngZer0 https://t.co/Tq2LDfaYja #AD #S4x20 #Ryuk
Open

Attackers 'weaponized' Active Directory to spread the ransomware.

www.darkreading.com
On Jan 24, 2020
@kjhiggins shared
"They actually weaponized AD by putting not Trickbot, but Ryuk, into the AD [roaming] login script. So anybody who logged into that AD server was immediately infected"-- @R1ngZer0 https://t.co/Tq2LDfaYja #AD #S4x20 #Ryuk
Open

Ryuk Ransomware Hit Multiple Oil & Gas Facilities, ICS Security Expert Says

Attackers 'weaponized' Active Directory to spread the ransomware.

Top Influencers

Picture of @cybersecboardrm

Twitter Top10 #CyberSecurity #infosec #IoT #privacy #AI #ML #disrupt #blockchain #Industry40 #startups #Cloud #FutureOfWork #technology #Speaker RT != agree

Follow 45.1k Followers

Picture of @Infosec_Tourist

Transcending Infosec BS. KSE OS controls/trusted computing vs Insider Threat/espionage. Langsec,algebraic modelling, automated WAF attack denial,Red Team fails

Follow 1.9k Followers

Picture of @securityaffairs

Pierluigi Paganini, founder of Security Affairs and Cybaze SPA, ENISA ETL Group, Ethical Hacker, Researcher, Security Evangelist, Security Analyst.

Follow 28.8k Followers

Picture of @EdgeIotAi

The EDGE, where things happen... Follow us to keep up with the latest in Intelligent EDGE tech. Tweeting about EDGE #IoT & #AI

Follow 2.9k Followers

Picture of @teamcymru

We exist to enable organizations to identify and eradicate threats within their network by providing unique insight that saves and improves human lives

Follow 39.6k Followers

Picture of @StaySafeOnline

The National Cyber Security Alliance (NCSA) is a nonprofit that empowers people to use the Internet safely & securely. Co-founder of @STOPTHNKCONNECT campaign.

Follow 39.2k Followers

Picture of @attcyber

AT&T Cybersecurity’s Edge-to-Edge technologies provide phenomenal threat intelligence, collaborative defense and security without the seams.

Follow 80.2k Followers

Picture of @RSAConference

#RSAC: Helping you stay ahead of an ever-changing #security landscape.

Follow 43.1k Followers

Picture of @AghiathChbib

CEO-founder #CyberSecurity #Blockchain #AI #DigitalForensics #FinTech #Leadership

Follow 5.7k Followers

Picture of @CybersecuritySF

Founder & Editor-In-Chief @ Cybersecurity Ventures. Cybercrime Researcher, Publisher, Journalist. Track Cybersecurity Companies. Launching Cybercrime Magazine!

Follow 10.9k Followers

Picture of @EduardKovacs

Contributing Editor @SecurityWeek - I cover ICS security, data breaches, vulnerabilities, mobile security, cybercrime, malware, and industry news

Follow 13.1k Followers

Picture of @SecurityWeek

Internet and Enterprise Security News, Threats, Insights and Expert Analysis #SCADA #infosec Coverage

Follow 107.5k Followers

Picture of @whitehatsec

WhiteHat Security helps prevent website attacks by providing the most complete Web security solution for companies of any size.

Follow 35.1k Followers

Picture of @SwissCognitive

An "independent"​ network that shares, connects, and unlocks the potentials of #ArtificialIntelligence #AI #CognitiveComputing #ML #DL #NLP

Follow 126.0k Followers

Picture of @PatrickCMiller

Infrastructure & Industrial Security Advisor. Recovering regulator. Airport dweller. @ArcherSec Managing Partner. @Info_CCI US Coordinator. @EnergySec Founder.

Follow 6.7k Followers

Picture of @MITREattack

MITRE ATT&CK™ - A knowledge base for describing behavior of adversaries across their lifecycle (Replying/Following/Re-tweeting ≠ endorsement)

Follow 30.0k Followers

Picture of @CTIN_Global

Aggregating high-quality CTIN member sources with real-time posting on threats | ISAOs | CTI-TC | OSINT | Analytics | ThreatIntel | CyberSecurity | Malware

Follow 1.0k Followers

Picture of @IDGTechTalk

The #1 tech community. We report the hottest tech trends from leading experts & our community. Join us every other Thursday @ 12pm ET for the #IDGTECHtalk chat.

Follow 11.4k Followers

Picture of @archonsec

Microsoft Silver Partner, #Cloud, #PCI, #HIPAA, #SecurityasaService, #BigData, #Azure, #BCDR, #IoT, #Office365, #Compliance, #AI, #ML. Contact us 👇

Follow 6.5k Followers

Picture of @splunk

#Splunk turns data into doing with the #DataToEverything Platform, designed to investigate, monitor, analyze and act on data at any scale.

Follow 65.2k Followers