Cybersecurity Essentials

Monthly report: June 2020

This month, The Essentials Report, has curated & analyzed the content published by 288 influencers like Bob Carver ✭ and Security Affairs, discussing hashtags such as #CyberSecurity , #ransomware and #Malware.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in June 2020

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in June 2020

Convert to Mitre ATT&CK sub-technique schema

On Jun 18, 2020
@strandjs shared
RT @mattifestation: Atomic Red Team now support @MITREattack sub-techniques! Check out @OrOneEqualsOne's PR for context but tl;dr, there were no structural changes but many tests have been moved accordingly. https://t.co/DmCtFz1SFi TY Carrie, your teammates, and @M_haggis for the hard work!
Open

These changes support the new Mitre ATT&CK sub-technique schema here: https://attack.mitre.org/beta/ The beta version of Mitre ATT&CK is expected to become the official release next month. ...

github.com
On Jun 18, 2020
@strandjs shared
RT @mattifestation: Atomic Red Team now support @MITREattack sub-techniques! Check out @OrOneEqualsOne's PR for context but tl;dr, there were no structural changes but many tests have been moved accordingly. https://t.co/DmCtFz1SFi TY Carrie, your teammates, and @M_haggis for the hard work!
Open

Convert to Mitre ATT&CK sub-technique schema

Convert to Mitre ATT&CK sub-technique schema

These changes support the new Mitre ATT&CK sub-technique schema here: https://attack.mitre.org/beta/ The beta version of Mitre ATT&CK is expected to become the official release next ...

Office 365 Users Targeted By ‘Coronavirus Employee Training’ Phish

On Jun 25, 2020
@NevilleGaunt shared
RT @Fabriziobustama: [email protected] Users Targeted By ‘Coronavirus Employee Training’ Phish By @threatpost https://t.co/AnI8MmAGS1 #CyberSecurity #COVID19 #coronavirus #Malware #Office365 Cc: @BillMew @KaiGrunwitz @DrJDrooghaag @mvollmer1 @NevilleGaunt @archonsec @robmay70 @alcgroup @gvalan @rtehrani https://t.co/9zeIh7548B
Open

Threat actors shift focus from COVID-19 to employee coronavirus training and current events like Black Lives Matter as cyber-attacks continue to rise.

threatpost.com
On Jun 25, 2020
@NevilleGaunt shared
RT @Fabriziobustama: [email protected] Users Targeted By ‘Coronavirus Employee Training’ Phish By @threatpost https://t.co/AnI8MmAGS1 #CyberSecurity #COVID19 #coronavirus #Malware #Office365 Cc: @BillMew @KaiGrunwitz @DrJDrooghaag @mvollmer1 @NevilleGaunt @archonsec @robmay70 @alcgroup @gvalan @rtehrani https://t.co/9zeIh7548B
Open

Office 365 Users Targeted By ‘Coronavirus Employee Training’ Phish

Office 365 Users Targeted By ‘Coronavirus Employee Training’ Phish

Threat actors shift focus from COVID-19 to employee coronavirus training and current events like Black Lives Matter as cyber-attacks continue to rise.

Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?

On Jun 18, 2020
@SCMagazine shared
At #InfoSecWorld 2020, Nicholas Takacs from @SapphireSoftwa will examine if we've reached the age of self-aware malware. See our @InfoSec_World "Hackers & Threats" and "Security Strategies" preview, also featuring @RSAsecurity @JuniperNetworks @Darktrace https://t.co/NMXBIjIVUu
Open

Both white hats and malicious hackers are turning to automation, analytics & AI in a never-ending duel. InfoSec World 2020 will examine this ongoing trend.

www.scmagazine.com
On Jun 18, 2020
@SCMagazine shared
At #InfoSecWorld 2020, Nicholas Takacs from @SapphireSoftwa will examine if we've reached the age of self-aware malware. See our @InfoSec_World "Hackers & Threats" and "Security Strategies" preview, also featuring @RSAsecurity @JuniperNetworks @Darktrace https://t.co/NMXBIjIVUu
Open

Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?

Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?

Both white hats and malicious hackers are turning to automation, analytics & AI in a never-ending duel. InfoSec World 2020 will examine this ongoing trend.

U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked

On Jun 6, 2020
@Infosec_Tourist shared
RT @threatpost: A U.S. military nuclear contractor was hit with the Maze #ransomware - and cybercriminals have started to leak its documents online. #ICYMI https://t.co/uEEwfh44LC
Open

Westech International provides maintenance for the Minuteman III nuclear-missile program and runs programs for multiple branches of the military.

threatpost.com
On Jun 6, 2020
@Infosec_Tourist shared
RT @threatpost: A U.S. military nuclear contractor was hit with the Maze #ransomware - and cybercriminals have started to leak its documents online. #ICYMI https://t.co/uEEwfh44LC
Open

U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked

U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked

Westech International provides maintenance for the Minuteman III nuclear-missile program and runs programs for multiple branches of the military.

As Businesses Reopen, A New Storm Of Cybercrime Activity Looms

On Jun 24, 2020
@wynandbooysen shared
RT @envisiontech: "The managed chaos of #cyberthreats is an everyday reality, but in times of challenge, chaos escalates exponentially." As businesses reopen, a new storm of #cybercrime activity looms: https://t.co/UUs0gxiZIz #cybersecurity #cyber #security #infosec #phishing #cyberattack
Open

A rapid rise of opportunistic cybercriminals are taking advantage of the chaos created by COVID-19. Rethinking IT and security strategies will ensure that businesses avoid long-term damage.

www.forbes.com
On Jun 24, 2020
@wynandbooysen shared
RT @envisiontech: "The managed chaos of #cyberthreats is an everyday reality, but in times of challenge, chaos escalates exponentially." As businesses reopen, a new storm of #cybercrime activity looms: https://t.co/UUs0gxiZIz #cybersecurity #cyber #security #infosec #phishing #cyberattack
Open

As Businesses Reopen, A New Storm Of Cybercrime Activity Looms

As Businesses Reopen, A New Storm Of Cybercrime Activity Looms

A rapid rise of opportunistic cybercriminals are taking advantage of the chaos created by COVID-19. Rethinking IT and security strategies will ensure that businesses avoid long-term damage.

Email is still one of the greatest security threats around

On Jun 16, 2020
@attcyber shared
While #phishing remains a threat, what other email attacks should businesses be prepared for? https://t.co/sGMbtT0t6z @ITProPortal #cybersecurity #infosec https://t.co/oEgpYDSQBL
Open

Spoofing, phishing, brand impersonation and ransomware are wreaking havoc.

www.itproportal.com
On Jun 16, 2020
@attcyber shared
While #phishing remains a threat, what other email attacks should businesses be prepared for? https://t.co/sGMbtT0t6z @ITProPortal #cybersecurity #infosec https://t.co/oEgpYDSQBL
Open

Email is still one of the greatest security threats around

Email is still one of the greatest security threats around

Spoofing, phishing, brand impersonation and ransomware are wreaking havoc.

Hackers are attacking the German PPE supply chain

On Jun 10, 2020
@PatrickCMiller shared
Hackers are attacking the German PPE supply chain https://t.co/bIVo0uaerI
Open

Hackers are attacking high ranking executives of a German multinational corporation part of a government-private sector task force focused on personal protective equipment (PPE) procurement.

www.bleepingcomputer.com
On Jun 10, 2020
@PatrickCMiller shared
Hackers are attacking the German PPE supply chain https://t.co/bIVo0uaerI
Open

Hackers are attacking the German PPE supply chain

Hackers are attacking the German PPE supply chain

Hackers are attacking high ranking executives of a German multinational corporation part of a government-private sector task force focused on personal protective equipment (PPE) procurement.

Ransomware attack disrupts operations at Australian beverage company Lion

On Jun 14, 2020
@securityaffairs shared
#Ransomware attack disrupts operations at Australian beverage company #Lion https://t.co/KNeBqA1QwI #securityaffairs #malware
Open

Systems at Australian beverages company Lion were infected with a ransomware that disrupted to manufacturing processes and customer service. Systems at Australian beverages company Lion were infected with a ransomware, the security breach caused the disruption of manufacturing processes ...

securityaffairs.co
On Jun 14, 2020
@securityaffairs shared
#Ransomware attack disrupts operations at Australian beverage company #Lion https://t.co/KNeBqA1QwI #securityaffairs #malware
Open

Ransomware attack disrupts operations at Australian beverage company Lion

Ransomware attack disrupts operations at Australian beverage company Lion

Systems at Australian beverages company Lion were infected with a ransomware that disrupted to manufacturing processes and customer service. Systems at Australian beverages company Lion ...

Top Influencers

Picture of @cybersecboardrm

Twitter Top10 #CyberSecurity #infosec #IoT #privacy #AI #ML #disrupt #blockchain #Industry40 #startups #Cloud #FutureOfWork #technology #Speaker RT != agree

Follow 45.1k Followers

Picture of @securityaffairs

Pierluigi Paganini, founder of Security Affairs and Cybaze SPA, ENISA ETL Group, Ethical Hacker, Researcher, Security Evangelist, Security Analyst.

Follow 28.8k Followers

Picture of @SCMagazine

The official Twitter feed for all things IT security. Like us on http://t.co/FjXz6RfGEC

Follow 95.7k Followers

Picture of @PatrickCMiller

Infrastructure & Industrial Security Advisor. Recovering regulator. Airport dweller. @ArcherSec Managing Partner. @Info_CCI US Coordinator. @EnergySec Founder.

Follow 6.7k Followers

Picture of @threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Follow 132.9k Followers

Picture of @AghiathChbib

CEO-founder #CyberSecurity #Blockchain #AI #DigitalForensics #FinTech #Leadership

Follow 5.7k Followers

Picture of @hackernoon

how hackers start their afternoons. elevate your brand with us: https://t.co/lriVCpsgKN. limited edition: https://t.co/wG2L9WJkmR

Follow 50.7k Followers

Picture of @redcanaryco

Red Canary is a security operations partner for modern teams.

Follow 9.0k Followers

Picture of @EduardKovacs

Contributing Editor @SecurityWeek - I cover ICS security, data breaches, vulnerabilities, mobile security, cybercrime, malware, and industry news

Follow 13.1k Followers

Picture of @wynandbooysen

🇿🇦 | Systems Engineer | Tinkerer | Photographer | Talend (ETL) | Docker | Traefik | DevOps | Python | Go | HomeAutomation | #kaizen

Follow 1.5k Followers

Picture of @CIOonline

https://t.co/QF0TfbhsqX (an IDG brand) delivers the latest news, analysis, video, blogs, tips and research for techies and IT professionals.

Follow 170.6k Followers

Picture of @TalosSecurity

The Official Twitter account of the Talos Group at Cisco.

Follow 15.6k Followers

Picture of @automeme

Passionate About Latest #Technology Trends. Visit https://t.co/YJzQ5TtzM0 for Updates in #AI #DataScience #CloudComputing #IoT #fintech #Robotics #BigData #NLP

Follow 3.9k Followers

Picture of @antgrasso

Digital Transformation Advisor | B2B Tech Influencer | Author & Speaker | #Startups Mentor | CEO @dbi_srl | #AI #Blockchain #CyberSecurity #Energy #FinServ #IoT

Follow 82.2k Followers

Picture of @cyberdefensemag

Cyber Defense Magazine - The Premier Source for IT Security and Compliance Information. http://t.co/JrLHX9E64N.

Follow 155.1k Followers

Picture of @strandjs

I will light the way by the bridges I burn. Senior SANS Instructor IANS Faculty Black Hills Information Security Active Countermeasures Security Weekly

Follow 21.0k Followers

Picture of @NevilleGaunt

#Founder @MindFitLtd Can-Do Mindsets #Mentor #Coach #Speaker #Author #PeakPerformance 3 Keys to Success #BehaviouralWaste @YP2Grow @DSRPTNDisciples #SDGs

Follow 11.3k Followers

Picture of @archonsec

Microsoft Silver Partner, #Cloud, #PCI, #HIPAA, #SecurityasaService, #BigData, #Azure, #BCDR, #IoT, #Office365, #Compliance, #AI, #ML. Contact us 👇

Follow 6.5k Followers

Picture of @SecurityWeek

Internet and Enterprise Security News, Threats, Insights and Expert Analysis #SCADA #infosec Coverage

Follow 107.5k Followers

Picture of @Infosec_Tourist

Transcending Infosec BS. KSE OS controls/trusted computing vs Insider Threat/espionage. Langsec,algebraic modelling, automated WAF attack denial,Red Team fails

Follow 1.9k Followers