Future of Hacking & Cybersecurity



In the Last 15 days there's been 65 influencers like cylanceinc and CyberScoopNews, discussing topics such as #infosec, #securityand #cybersecurity.



Trends


Top hashtags

Top influencers

cylanceinc
CyberScoopNews
InfosecurityMag
SecurityTube
WIRED
AccentureSecure
CTIN_Global
CNET
threatintel

Top sources

infosecurity-magazine.com
cyberscoop.com
wired.com
darkreading.com
threatvector.cylance.com
cnet.com
securityweek.com
politico.com
threatpost.com

News

Accenture releases mid-year Threatscape report that identifies five global #cybersecurity threats to watch

On Aug 8, 2018
@AccentureSecure shared
RT @pattonadams: @iDefense Program Manager @robcoderre on cyber crime trends: expect low and slow activity, prepare for the long haul. Know your crown jewels, your enemies, and your backup plan. #BHUSA @AccentureSecure https://t.co/edNlxmE8iR https://t.co/SJV7gWFxBU
Open

Accenture mid-year Threatscape Report identifies five global cybersecurity threats.

newsroom.accenture.com
On Aug 8, 2018
@AccentureSecure shared
RT @pattonadams: @iDefense Program Manager @robcoderre on cyber crime trends: expect low and slow activity, prepare for the long haul. Know your crown jewels, your enemies, and your backup plan. #BHUSA @AccentureSecure https://t.co/edNlxmE8iR https://t.co/SJV7gWFxBU
Open

On Aug 9, 2018
@threatintel shared
DeepLocker AI-powered malware demoed at Black Hat https://t.co/ipc3iReWUK #BlackHat2018 #BlackHatUSA
Open

Should I infect this PC, wonders malware. Let me ask my neural net...

How does it work? Nobody really knows what goes on in the black box

On Aug 8, 2018
@McAfee_Labs shared
From Wi-Fi and external connections to driving assistance and autonomous operations, #connectedcars will need strong #security very soon. @fr0gger_ takes us through some risks. 🚗 https://t.co/N67ki2Gcf0
Open

Today’s Connected Cars Vulnerable to Hacking, Malware

The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and ...

On Aug 8, 2018
@CiscoSecurity shared
It’s not too late to sign up for tomorrow’s webinar, Securing Multicloud and Hybrid Networks with Stealthwatch Cloud, to learn how Cisco can help you secure an environment that spans multiple cloud providers and an on-premises network. Register now. https://t.co/sz0igwueSh https://t.co/GMBAHv6RjE
Open

Cisco Security Webinars.

Cisco Security Webinars. The New Security Model: Before, During, and After an Attack.

On Aug 9, 2018
@McAfee_Labs shared
RT @dannyjpalmer: New: North Korea's hackers are re-using old code to build new attacks. Researchers found some of the code behind WannaCry in a decade old campaign - and it isn't the only example of code re-use in North Korean malware campaigns https://t.co/Jofc5td2Pz via @ZDNet
Open

North Korea's hackers are re-using old code to build new attacks

One of the world's most notorious cyber warfare operations has been cutting corners - but it hasn't dented their potency.

On Aug 11, 2018
@threatintel shared
When fiction is stranger than reality: 5 novels with hacking plot holes that need to be patched https://t.co/fpqebUWFTU #reading #cybersecurity https://t.co/m5HTdiaDRW
Open

When fiction is stranger than reality: 5 novels with hacking plot holes that need to be patched

Not all novels featuring hacking are created equal — with some containing more holes than others.

On Aug 7, 2018
@AccentureSecure shared
RT @jimmy_guinn: As committed here is our Cyber Threatscape Report covering TTPs for some of the worlds most operational effective and nefarious nation state actors including #IRGC and inside Iran. @WSJ @Reuters @chron https://t.co/Mg15dRXYGx
Open

Click here to read the article

iDefense threat intelligence analysts believe that a result of political tensions stemming from the possible abolishment of the JCPOA agreement will be that the IRGC Cyber Command is highly ...

On Aug 2, 2018
@cylanceinc shared
Will #Blockchain Improve Financial #Cybersecurity? https://t.co/VDV5sZQArs #infosec #security #fintech https://t.co/xEC5x9w2bl
Open

Will Blockchain Improve Financial Cybersecurity?

Blockchain is a technology that can keep records of transactions secure. Financial services companies are counting on blockchain technology to help secure the financial sector. But how, ...

On Aug 1, 2018
@RSAConference shared
#Security must evolve with connectivity if automobiles are to stay safe: https://t.co/Usw6FwwCU6 via @IntelTransport
Open

Security must evolve with connectivity if automobiles are to stay safe

Ang Cui, CEO and Chief Scientist of Red Balloon Security, discusses how the increase in connectivity provides hackers with vulnerabilities to exploit.

On Aug 6, 2018
@StaySafeOnline shared
RT @CyberNews4you: From the wishful thinking department: 75% of IT decision makers believe that AI is the silver bullet to solving #CyberSecurity challenges https://t.co/s6LJC0cwkr #MachineLearning #ArtificialIntelligence
Open

Three quarters of IT decision makers believe AI is the ‘silver bullet’ to cybersecurity challenges

News about ESET's product launches and updates, directly from the maker of legendary NOD32 technology.

Browse topics

Get updates live! Follow us on

Subscribe to our mailing list

On Aug 3, 2018
@McAfee_Labs shared
Woah, we're half way there… 🎶🤘Checking in halfway to our threat predictions for 2018. See what’s happened. https://t.co/HFDChTLS2v
Open

Checking In Halfway: The McAfee Labs 2018 Threats Predictions

Time flies when you’re fighting cybercrime. Now that’s not exactly how the phrase goes, but for us at McAfee, it’s hard to believe that we’re already almost halfway through 2018. It seems ...

On Aug 9, 2018
@TheHackersNews shared
Researchers Developed AI-Powered (Artificial Intelligence) Stealthy "DeepLocker" Malware to Demonstrate Future Threats https://t.co/qTmiRDWqqb —by @Unix_Root https://t.co/wht7zf4Oox
Open

Researchers Developed Artificial Intelligence-Powered Stealthy Malware

Researchers Weaponized Artificial Intelligence to Develop Stealthy DeepLocker Malware as a Proof-of-Concept

On Aug 10, 2018
@CTIN_Global shared
DeepLocker: How AI Can Power a Stealthy New Breed of Malware https://t.co/yhzl9Zn1jH
Open

DeepLocker: How AI Can Power a Stealthy New Breed of Malware

DeepLocker has changed the game of malware evasion by taking a fundamentally different approach from any other current evasive and targeted malware. Here's what you need to know.

On Aug 10, 2018
@CTIN_Global shared
Iasiello_E: Spear phishing -- threat vectors highlight new realities https://t.co/5ervDQdA2M
Open

Spear phishing -- threat vectors highlight new realities

Not knowing when, where or how phishing and ransomware attacks might succeed in tricking end-users into downloading malware on to their endpoint devices and bypass perimeter defenses exacts ...

On Aug 7, 2018
@InfosecurityMag shared
IT Leaders Believe AI is a ‘Silver Bullet’ for Threats https://t.co/NKAIf5Nki9 https://t.co/Rc6v0RJIq7
Open

IT Leaders Believe AI is a ‘Silver Bullet’ for Threats

ESET study reveals the security hype machine is having an effect

On Aug 3, 2018
@CTIN_Global shared
Iasiello_E: Hacking group combines spear-phishing with mass malware campaign https://t.co/yKIjIXqdnI
Open

Hacking group combines spear-phishing with mass malware campaign

Pakistani hacking group uses basic techniques and has poor operational security - but appears to have slithered into a large number of networks.

On Aug 2, 2018
@StaySafeOnline shared
🎤3 TED Talks on #Cybersecurity You Should Watch. – via @KaylaEMatthews #CyberAware https://t.co/uDDbgRBdBw
Open

3 TED Talks on Cybersecurity You Should Watch

TED Talks are excellent resources if you want to learn from an expert and spark your curiosity. Here are three speakers and their talks on cybersecurity.

On Aug 4, 2018
@CyberScoopNews shared
Pence urges states to accept federal help in securing elections https://t.co/tYBJaC3fCe
Open

Pence urges states to accept federal help in securing elections

Vice President Mike Pence delivered the most direct and high-profile appeal from the Trump administration to states to accept aid in securing election systems.

On Aug 1, 2018
@McAfee_Labs shared
Bad actors are working relentlessly to develop new technologies and tactics to evade defenses. @Raj_Samani breaks down some of our key findings from the June Threats Report. https://t.co/6yWQdW6xvZ
Open

‘McAfee Labs Threats Report’ Spotlights Innovative Attack Techniques, Cryptocurrency Mining, Multisector Attacks

In the McAfee Labs Threats Report June 2018, published today, we share investigative research and threat statistics gathered by the McAfee Advanced Threat Research and McAfee Labs teams in ...