Cybersecurity Essentials

Annual Report 2019

This year, The Essentials Report, has curated & analyzed the content published by 270 influencers like Ratan Jyoti and RSA Conference, discussing hashtags such as #cybersecurity , #malware and #infosec.
Read our yearly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in 2019

Global Discussions Across the Web
Topics discussed by the influencers
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in 2019

On Oct 16, 2019
@CybersecuritySF shared
Special National Cyber Security Awareness Month #NCSAM post from #cybersecurity expert @RobertHerjavec, CEO @HerjavecGroup on how to stay safe from #phishing scams watch the video too!

Cybersecurity CEO: Top 5 Resources To Combat Phishing Scams During NCSAM

National Cyber Security Awareness Month is here and it’s time to protect against the most popular form of cybercrime

On Nov 9, 2019
@reach2ratan shared
Italian Bank UniCredit Suffers New Data Breach Impacting 3 Million Customers #CyberSecurity #Databreach #Hackers #infosec @reach2ratan #AI #ML #malware #cloud #cloudsecurity #Machinelearning #Fintech #Blockchain #Bigdata #Digital #ArtificialIntelligence

A “data incident” or “data breach”?

UniCredit suffered a recent data breach which exposed PII of nearly 3 million customers. The bank said there is no stolen banking account information that enables hackers to make ...

On Dec 8, 2019
@reach2ratan shared
RT @reach2ratan: How to Develop Detection and Response Strategy for Email Phishing? #CyberSecurity #Databreach #Hackers #infosec @reach2ratan #AI #ML #malware #cloud #cloudsecurity #Machinelearning #Analytics #Blockchain #Bigdata #Digital #ArtificialIntelligence

Response strategy for email phishing

Phishing attacks are not going away by any means; however, they can be mitigated with a well-defined plan which includes detection, response, training, and prevention.

On Oct 31, 2019
@RSAConference shared
"The most successful #security teams I have known have the core values of collaboration, transparency, diversity and the want to do the right thing. If your team doesn’t have these attributes, then you probably have other gaps too." #RSAC

Building Secure Security Teams

We can safely say that cybercrime is less risky than any other crime, making it a very appealing target, with the ability to destroy a firm through regulation, fraud or cyberattack. ...

On Nov 8, 2019
@FireEye shared
[email protected] spoke with @POLITICOPro about the U.S. Cyber Command's latest #malware samples for today's @MorningCybersec. via @timstarks >> Read:

Feedback on the DHS ‘Cyber Essentials’ initiative

Insights on Cyber Command malware samples — Where cyberspace meets outer space

On Nov 15, 2019
@opexxx shared
RT @Adam_K_Levin: “Data security is important in any field, but when that data relates to the personal details of an individual’s health, it is of the utmost importance as this is the last frontier of data privacy.”

I'm the Google whistleblower. The medical data of millions of Americans is at risk

When I learned that Google was acquiring the intimate medical records of 50 million patients, I couldn’t stay silent

On Nov 26, 2019
@anoufriev shared
Fake ‘Windows Update’ Installs Cyborg #Ransomware

‘Windows Update’ Installs Cyborg Ransomware

An executable file disguised as a .jpg leads not only to ransomware but also its builder, which can be used to create variants.

On Nov 23, 2019
@Dejan_Kosutic shared
Cyber threats continue to evolve, but security teams remain confident | Help Net Security by @helpnetsecurity

Cyber threats continue to evolve, but security teams remain confident

Security teams remain confident despite evolving threats. In fact, thirty percent of respondents gave their program an “A” grade this year.

On Dec 3, 2019
@quttera shared
141 Cybersecurity Predictions For 2020

141 Cybersecurity Predictions For 2020

141 predictions for 2020 from key participants in the cybersecurity defense industry, highlighting all that’s hot today and tomorrow

On Oct 23, 2019
@CTIN_Global shared
Iasiello_E: Russian hackers masqueraded as Iranian threat group OilRig by using its tools to perform spying attacks in 35 countries

Iranian hacking tools hijacked by Turla group to perform cyber-espionage

Russian hackers masqueraded as Iranian threat group OilRig by using its tools to perform spying attacks in 35 countries, says NSA and NCSC. The joint

On Oct 24, 2019
@ZeljkaZorz shared
RT @helpnetsecurity: Phishing attacks are a complex problem that requires layered solutions - - @greathorn @kobrien82 #phishing #BECscams #email #cybercrime

Phishing attacks are a complex problem that requires layered solutions

Most cyber attacks start with a social engineering attempt and, most often that not, it takes the form of a phishing email.

On Nov 6, 2019
@lorenzofb shared
RT @HowellONeill: New: I just visited Microsoft HQ to meet MSTIC, the team tasked with tracking and defending against the growing number of government-sponsored hackers. MSFT, which won the Pentagon’s cloud contract last week, has incredible visibility across the internet.

Inside the Microsoft team tracking the world’s most dangerous hackers

From Russian Olympic cyberattacks to billion-dollar North Korean malware, how one tech giant monitors nation-sponsored hackers everywhere on earth.

On Oct 17, 2019
@kaspersky shared
It all begins with an email from HR, recommending a performance appraisal and a link to a website with an "appraisal form" to be filled out. #spam #phishing

Corporate phishing under the guise of performance appraisals

Scammers prod employees to take performance appraisals but in reality siphon off their work account passwords.

On Nov 23, 2019
@wynandbooysen shared
RT @reach2ratan: US Cyber Command Calling Out North Korean Hackers #CyberSecurity #Databreach #Hackers #infosec @reach2ratan #AI #ML #malware #cloud #cloudsecurity #Machinelearning #Analytics #Blockchain #Bigdata #Digital #ArtificialIntelligence

Tactics of the North Korean hackers

U.S. Cyber Command uploaded a total of 7 new malware samples used by North Korean hackers to draw attention to tactics used to steal state secrets, conduct corporate espionage and find ...

On Nov 4, 2019
@wynandbooysen shared
RT @javier_carriazo: ALERT! #Calypso #APT Emerges from the Shadows to Target #Governments #cyberattacks #cybersecurity #cybersec #cyberthreats #cybercrime #security #DataProtection #privacy #phishing #Ransomware #malware #ThreatIntel #darkweb #cloudsecurity #infosec #hackers

Calypso APT Emerges from the Shadows to Target Governments

Researchers believe the threat group is based in China.

Top Influencers

Picture of @reach2ratan

100% Geek, Listener & Learner CISO and Advisory Board Member, #CyberSecurity Influencer, Researcher & Author, Tweets my own ▶️

Follow 19.4k Followers

Picture of @RSAConference

#RSAC: Helping you stay ahead of an ever-changing #security landscape.

Follow 43.1k Followers

Picture of @threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Follow 132.9k Followers

Picture of @kaspersky

Kaspersky Lab is the world’s largest privately held vendor of Internet security solutions for businesses and consumers.

Follow 274.3k Followers

Picture of @BrianHonan

InfoSec Consultant, Blogger, Author, Founder & Head of Ireland's CSIRT @irisscert, & former Special Advisor on CyberSecurity to Europol. PGP ID 0xF1B5CF7D

Follow 32.5k Followers

Picture of @CybersecuritySF

Founder & Editor-In-Chief @ Cybersecurity Ventures. Cybercrime Researcher, Publisher, Journalist. Track Cybersecurity Companies. Launching Cybercrime Magazine!

Follow 10.9k Followers

Picture of @helpnetsecurity

Mirko Zorz, Editor in Chief of Help Net Security and (IN)SECURE Magazine.

Follow 46.9k Followers

Picture of @wynandbooysen

🇿🇦 | Systems Engineer | Tinkerer | Photographer | Talend (ETL) | Docker | Traefik | DevOps | Python | Go | HomeAutomation | #kaizen

Follow 1.5k Followers

Picture of @nytimes

News tips? Share them here: "The Weekly" is our new TV series. Episodes air Sundays at 10 p.m. on FX and on Hulu the next day.

Follow 44.4M Followers

Picture of @FireEye

FireEye offers a single platform that blends innovative security technologies, nation-state grade #threatintel, and world-renowned @Mandiant consulting.

Follow 243.7k Followers

Picture of @AghiathChbib

CEO-founder #CyberSecurity #Blockchain #AI #DigitalForensics #FinTech #Leadership

Follow 5.7k Followers

Picture of @CTIN_Global

Aggregating high-quality CTIN member sources with real-time posting on threats | ISAOs | CTI-TC | OSINT | Analytics | ThreatIntel | CyberSecurity | Malware

Follow 1.0k Followers

Picture of @ZeljkaZorz

Zeljka Zorz, Managing Editor of Help Net Security and (IN)SECURE Magazine.

Follow 2.4k Followers

Picture of @cybersecboardrm

Twitter Top10 #CyberSecurity #infosec #IoT #privacy #AI #ML #disrupt #blockchain #Industry40 #startups #Cloud #FutureOfWork #technology #Speaker RT != agree

Follow 45.1k Followers

Picture of @teamcymru

We exist to enable organizations to identify and eradicate threats within their network by providing unique insight that saves and improves human lives

Follow 39.6k Followers

Picture of @InfosecurityMag

The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.

Follow 138.1k Followers

Picture of @IronBastionAu

Australia's phishing and cybersecurity experts. #phishing #cybersecurity #auslaw #ausbiz

Follow 1.4k Followers

Picture of @Mandiant

Responding to the most critical cybersecurity incidents & empowering orgs to protect their assets. A @FireEye company.

Follow 91.8k Followers

Picture of @opexxx

PGP: A80C890B8AC6DE59910F76EFDEFF681566678BE4

Follow 11.6k Followers

Picture of @cfarivar

"suh-ROOS" / I mostly cover privacy, surveillance, and law for @arstechnica / [email protected] / Signal/WhatsApp: 510-394-5485 / Tips welcome.

Follow 16.7k Followers