Cybersecurity Essentials

Monthly report: November 2019

This month, The Essentials Report, has curated & analyzed the content published by 288 influencers like 🇿🇦 Wynand Booysen 💻 改善 and Ratan Jyoti, discussing hashtags such as #CyberSecurity , #AI and #infosec.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in November 2019

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in November 2019

A “data incident” or “data breach”?

On Nov 9, 2019
@reach2ratan shared
Italian Bank UniCredit Suffers New Data Breach Impacting 3 Million Customers https://t.co/GxbRqo6xbo #CyberSecurity #Databreach #Hackers #infosec @reach2ratan #AI #ML #malware #cloud #cloudsecurity #Machinelearning #Fintech #Blockchain #Bigdata #Digital #ArtificialIntelligence https://t.co/XLfzjSmHwY
Open

UniCredit suffered a recent data breach which exposed PII of nearly 3 million customers. The bank said there is no stolen banking account information that enables hackers to make unauthorized transactions.

www.cpomagazine.com
On Nov 9, 2019
@reach2ratan shared
Italian Bank UniCredit Suffers New Data Breach Impacting 3 Million Customers https://t.co/GxbRqo6xbo #CyberSecurity #Databreach #Hackers #infosec @reach2ratan #AI #ML #malware #cloud #cloudsecurity #Machinelearning #Fintech #Blockchain #Bigdata #Digital #ArtificialIntelligence https://t.co/XLfzjSmHwY
Open

A “data incident” or “data breach”?

UniCredit suffered a recent data breach which exposed PII of nearly 3 million customers. The bank said there is no stolen banking account information that enables hackers to make ...

Feedback on the DHS ‘Cyber Essentials’ initiative

On Nov 8, 2019
@FireEye shared
[email protected] spoke with @POLITICOPro about the U.S. Cyber Command's latest #malware samples for today's @MorningCybersec. via @timstarks >> Read: https://t.co/21mYsHNTCF https://t.co/wDgE7KwAkB
Open

Insights on Cyber Command malware samples — Where cyberspace meets outer space

www.politico.com
On Nov 8, 2019
@FireEye shared
[email protected] spoke with @POLITICOPro about the U.S. Cyber Command's latest #malware samples for today's @MorningCybersec. via @timstarks >> Read: https://t.co/21mYsHNTCF https://t.co/wDgE7KwAkB
Open

Feedback on the DHS ‘Cyber Essentials’ initiative

Insights on Cyber Command malware samples — Where cyberspace meets outer space

I'm the Google whistleblower. The medical data of millions of Americans is at risk

On Nov 15, 2019
@opexxx shared
RT @Adam_K_Levin: “Data security is important in any field, but when that data relates to the personal details of an individual’s health, it is of the utmost importance as this is the last frontier of data privacy.” https://t.co/WxP4YBzlQm
Open

When I learned that Google was acquiring the intimate medical records of 50 million patients, I couldn’t stay silent

www.theguardian.com
On Nov 15, 2019
@opexxx shared
RT @Adam_K_Levin: “Data security is important in any field, but when that data relates to the personal details of an individual’s health, it is of the utmost importance as this is the last frontier of data privacy.” https://t.co/WxP4YBzlQm
Open

I'm the Google whistleblower. The medical data of millions of Americans is at risk

When I learned that Google was acquiring the intimate medical records of 50 million patients, I couldn’t stay silent

‘Windows Update’ Installs Cyborg Ransomware

On Nov 26, 2019
@anoufriev shared
Fake ‘Windows Update’ Installs Cyborg #Ransomware https://t.co/CkD2df4Dli
Open

An executable file disguised as a .jpg leads not only to ransomware but also its builder, which can be used to create variants.

threatpost.com
On Nov 26, 2019
@anoufriev shared
Fake ‘Windows Update’ Installs Cyborg #Ransomware https://t.co/CkD2df4Dli
Open

‘Windows Update’ Installs Cyborg Ransomware

An executable file disguised as a .jpg leads not only to ransomware but also its builder, which can be used to create variants.

Cyber threats continue to evolve, but security teams remain confident

On Nov 23, 2019
@Dejan_Kosutic shared
Cyber threats continue to evolve, but security teams remain confident | Help Net Security https://t.co/rNWe053w9i by @helpnetsecurity https://t.co/Eyv54r267B
Open

Security teams remain confident despite evolving threats. In fact, thirty percent of respondents gave their program an “A” grade this year.

www.helpnetsecurity.com
On Nov 23, 2019
@Dejan_Kosutic shared
Cyber threats continue to evolve, but security teams remain confident | Help Net Security https://t.co/rNWe053w9i by @helpnetsecurity https://t.co/Eyv54r267B
Open

Cyber threats continue to evolve, but security teams remain confident

Security teams remain confident despite evolving threats. In fact, thirty percent of respondents gave their program an “A” grade this year.

Inside the Microsoft team tracking the world’s most dangerous hackers

On Nov 6, 2019
@lorenzofb shared
RT @HowellONeill: New: I just visited Microsoft HQ to meet MSTIC, the team tasked with tracking and defending against the growing number of government-sponsored hackers. MSFT, which won the Pentagon’s cloud contract last week, has incredible visibility across the internet. https://t.co/GIf9XNf5mn
Open

From Russian Olympic cyberattacks to billion-dollar North Korean malware, how one tech giant monitors nation-sponsored hackers everywhere on earth.

www.technologyreview.com
On Nov 6, 2019
@lorenzofb shared
RT @HowellONeill: New: I just visited Microsoft HQ to meet MSTIC, the team tasked with tracking and defending against the growing number of government-sponsored hackers. MSFT, which won the Pentagon’s cloud contract last week, has incredible visibility across the internet. https://t.co/GIf9XNf5mn
Open

Inside the Microsoft team tracking the world’s most dangerous hackers

From Russian Olympic cyberattacks to billion-dollar North Korean malware, how one tech giant monitors nation-sponsored hackers everywhere on earth.

Tactics of the North Korean hackers

On Nov 23, 2019
@wynandbooysen shared
RT @reach2ratan: US Cyber Command Calling Out North Korean Hackers https://t.co/En9FsTlogc #CyberSecurity #Databreach #Hackers #infosec @reach2ratan #AI #ML #malware #cloud #cloudsecurity #Machinelearning #Analytics #Blockchain #Bigdata #Digital #ArtificialIntelligence https://t.co/b3WW8SmMiu
Open

U.S. Cyber Command uploaded a total of 7 new malware samples used by North Korean hackers to draw attention to tactics used to steal state secrets, conduct corporate espionage and find backdoors into the nation’s critical infrastructure.

www.cpomagazine.com
On Nov 23, 2019
@wynandbooysen shared
RT @reach2ratan: US Cyber Command Calling Out North Korean Hackers https://t.co/En9FsTlogc #CyberSecurity #Databreach #Hackers #infosec @reach2ratan #AI #ML #malware #cloud #cloudsecurity #Machinelearning #Analytics #Blockchain #Bigdata #Digital #ArtificialIntelligence https://t.co/b3WW8SmMiu
Open

Tactics of the North Korean hackers

U.S. Cyber Command uploaded a total of 7 new malware samples used by North Korean hackers to draw attention to tactics used to steal state secrets, conduct corporate espionage and find ...

Calypso APT Emerges from the Shadows to Target Governments

On Nov 4, 2019
@wynandbooysen shared
RT @javier_carriazo: ALERT! #Calypso #APT Emerges from the Shadows to Target #Governments #cyberattacks #cybersecurity #cybersec #cyberthreats #cybercrime #security #DataProtection #privacy #phishing #Ransomware #malware #ThreatIntel #darkweb #cloudsecurity #infosec #hackers https://t.co/XNB3F55ICc
Open

Researchers believe the threat group is based in China.

threatpost.com
On Nov 4, 2019
@wynandbooysen shared
RT @javier_carriazo: ALERT! #Calypso #APT Emerges from the Shadows to Target #Governments #cyberattacks #cybersecurity #cybersec #cyberthreats #cybercrime #security #DataProtection #privacy #phishing #Ransomware #malware #ThreatIntel #darkweb #cloudsecurity #infosec #hackers https://t.co/XNB3F55ICc
Open

Calypso APT Emerges from the Shadows to Target Governments

Researchers believe the threat group is based in China.

Top Influencers

Picture of @wynandbooysen

🇿🇦 | Systems Engineer | Tinkerer | Photographer | Talend (ETL) | Docker | Traefik | DevOps | Python | Go | HomeAutomation | #kaizen

Follow 1.5k Followers

Picture of @reach2ratan

100% Geek, Listener & Learner CISO and Advisory Board Member, #CyberSecurity Influencer, Researcher & Author, Tweets my own ▶️https://t.co/BHuLIrQTkI

Follow 19.4k Followers

Picture of @CybersecuritySF

Founder & Editor-In-Chief @ Cybersecurity Ventures. Cybercrime Researcher, Publisher, Journalist. Track Cybersecurity Companies. Launching Cybercrime Magazine!

Follow 10.9k Followers

Picture of @BrianHonan

InfoSec Consultant, Blogger, Author, Founder & Head of Ireland's CSIRT @irisscert, & former Special Advisor on CyberSecurity to Europol. PGP ID 0xF1B5CF7D

Follow 32.5k Followers

Picture of @threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Follow 132.9k Followers

Picture of @AghiathChbib

CEO-founder #CyberSecurity #Blockchain #AI #DigitalForensics #FinTech #Leadership

Follow 5.7k Followers

Picture of @helpnetsecurity

Mirko Zorz, Editor in Chief of Help Net Security and (IN)SECURE Magazine.

Follow 46.9k Followers

Picture of @kaspersky

Kaspersky Lab is the world’s largest privately held vendor of Internet security solutions for businesses and consumers.

Follow 274.3k Followers

Picture of @cybersecboardrm

Twitter Top10 #CyberSecurity #infosec #IoT #privacy #AI #ML #disrupt #blockchain #Industry40 #startups #Cloud #FutureOfWork #technology #Speaker RT != agree

Follow 45.1k Followers

Picture of @RSAConference

#RSAC: Helping you stay ahead of an ever-changing #security landscape.

Follow 43.1k Followers

Picture of @teamcymru

We exist to enable organizations to identify and eradicate threats within their network by providing unique insight that saves and improves human lives

Follow 39.6k Followers

Picture of @openbusinesshq

https://t.co/mIRJzUbqJn #business #digitaltransformation #directory #searchengine #SMEs #Blockchain #AI #socialimpact #education @ztudium @DinisGuarda

Follow 21.3k Followers

Picture of @InfosecurityMag

The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.

Follow 138.1k Followers

Picture of @attcyber

AT&T Cybersecurity’s Edge-to-Edge technologies provide phenomenal threat intelligence, collaborative defense and security without the seams.

Follow 80.2k Followers

Picture of @FireEye

FireEye offers a single platform that blends innovative security technologies, nation-state grade #threatintel, and world-renowned @Mandiant consulting.

Follow 243.7k Followers

Picture of @Mandiant

Responding to the most critical cybersecurity incidents & empowering orgs to protect their assets. A @FireEye company.

Follow 91.8k Followers

Picture of @opexxx

PGP: A80C890B8AC6DE59910F76EFDEFF681566678BE4 https://t.co/7dF3xMxgSr

Follow 11.6k Followers

Picture of @cfarivar

"suh-ROOS" / I mostly cover privacy, surveillance, and law for @arstechnica / [email protected] / Signal/WhatsApp: 510-394-5485 / Tips welcome.

Follow 16.7k Followers

Picture of @anoufriev

CISO with cadenza @ThousandEyes; Music enthusiast; Technology; DIY; SSA: Strategy, Security, Architecture; Tweets are my own

Follow 7.8k Followers

Picture of @Dejan_Kosutic

Expert in information security management (ISO 27001 standard) and business continuity management (ISO 22301/BS 25999-2 standard)

Follow 40.9k Followers