In the Last 15 days there's been 65 influencers like InfosecurityMag and RSAConference, discussing topics such as #cybersecurity, #RSACand #security.



Trends


Top hashtags

Top influencers

InfosecurityMag
RSAConference
DarkReading
SecurityWeek
CyberScoopNews
georgevhulme
Treadstone71LLC
whitehatsec
cyberdefensemag

Top sources

infosecurity-magazine.com
darkreading.com
securityweek.com
cyberdefensemagazine.com
cyberscoop.com
rsaconference.com
forbes.com
threatvector.cylance.com
insidecybersecurity.com

News

Threats to users of adult websites in 2018

On Feb 22, 2019
@kaspersky shared
Read the full report here: https://t.co/gLRr40h7wl https://t.co/3nC9Q2T1as
Open

We examined malware disguised as pornographic content, and malware that hunts for credentials to access pornography websites. We looked at the threats that are attacking users across the internet in order to find out which popular websites might be dangerous to visit. ...

securelist.com
On Feb 22, 2019
@kaspersky shared
Read the full report here: https://t.co/gLRr40h7wl https://t.co/3nC9Q2T1as
Open

Threats to users of adult websites in 2018

We examined malware disguised as pornographic content, and malware that hunts for credentials to access pornography websites. We looked at the threats that are attacking users across the ...


On Feb 14, 2019
@_willash shared
RT @CiscoSecurity: [email protected] discusses how Cisco disrupts malicious activity such as #cryptojacking, and the use of data analytics to identify attacks with @furrier and @dvellante of theCUBE. https://t.co/aJfimkbJWB https://t.co/0JhAWBMUSL
Open

Telemetry and machine learning provide foundation for Cisco’s cyberattack defense

Telemetry and machine learning provide foundation for Cisco's cyberattack defense - SiliconANGLE

On Feb 21, 2019
@STOPTHNKCONNECT shared
RT @StaySafeOnline: A9. Our top 3 ✅ @IRSNews: https://t.co/TMTtdiUN09 ✅ @FTC: https://t.co/0QBTdTTP4U ✅ @TheJusticeDept: https://t.co/KEIjxy0f4f #ChatSTC https://t.co/rmT7civ0HF
Open

Appendix D of Prosecuting Computer Crimes.docx

This updated version includes additional incident response considerations, including ransomware, information sharing pursuant to the Cybersecurity Information Sharing Act of 2015, cloud ...

On Feb 19, 2019
@TechCrunch shared
Senseon raises $6.4M to tackle cybersecurity threats with an AI ‘triangulation’ approach https://t.co/aMFyJPtWte by @ingridlunden
Open

Senseon raises $6.4M to tackle cybersecurity threats with an AI ‘triangulation’ approach

Darktrace helped pave the way for using artificial intelligence to combat malicious hacking and enterprise security breaches. Now a new UK startup founded by an ex-Darktrace executive has ...

On Feb 10, 2019
@RSAsecurity shared
#ICYMI: In 2019, #cybersecurity will become a business inhibitor. From security automation to #IoT, @Secureworks and RSA share what 5 challenges #InfoSec and business leaders will face (via @DellTech): https://t.co/KAGIBT3uHF
Open

2019 Cybersecurity Predictions: Threats Grow as New Opportunities and Risks Emerge

Cybersecurity experts from RSA and Secureworks weigh in on the cyber threats—and—opportunities organizations will face in 2019.

On Feb 21, 2019
@rapid7 shared
A quick overview of the most common kinds of cyberattacks https://t.co/8FkQgp9osO
Open

Common Types of Cybersecurity Attacks

What are the most common cyber security attacks being performed today? Let us tell you about them. Learn more.

On Feb 14, 2019
@SecurityWeek shared
Business is Now the Primary Target for Ransomware, and Nation-States are Among the Attackers - https://t.co/yhmJTUoHqL
Open

Increasing Involvement of Nation-states in Ransomware Attacks

Business is now the primary target for ransomware, and Nation-States are among the attackers, says a report from Recorded Future.

On Feb 9, 2019
@cylanceinc shared
Combating #cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with alarming frequency, and no executive today can afford to ignore the damage that #phishing and #malware pose to their company’s future. https://t.co/UyJECqaQ8z https://t.co/za267Rq36M
Open

InSecurity Podcast: Kip Boyle - Cybersecurity Is a Business Problem, Not a Technical Problem

In this week’s episode of InSecurity, Matt Stephenson chats with Kip Boyle, Founder and CEO at Cyber Risk Opportunities and author of the new book Fire Doesn’t Innovate. They discuss the ...

On Feb 9, 2019
@Treadstone71LLC shared
Cyber Insurance, Cyber Warfare, and Modern IT Needs https://t.co/Mqsuuhou69 #cybersecurity
Open

Cyber Insurance, Cyber Warfare, and Modern IT Needs

Security professionals talk about cybercrime as though it’s a war, an ongoing battle against malicious actors. Apparently, insurance companies now agree.

On Feb 13, 2019
@RSAsecurity shared
#DYK: In 2018, #phishing made up 49% of all #fraud while social media fraud attacks increase 43%, representing a growing #cyberattack risk for businesses to address (via @RSAFraud): https://t.co/6FuWr2akWC https://t.co/ZWffSVXCjx
Open

Cybercrime Results Are In and The Winner Is…

Uncover the fastest growing fraud attacks from 2018, and how you can prepare for 2019.

Browse topics

Get updates live! Follow us on

Subscribe to our mailing list

On Feb 16, 2019
@whitehatsec shared
While the internet creates a gateway to the entire world, it also can be an entryway to some very dark and dangerous places. So how do we continue to take advantage of all the internet has to offer us and strengthen our security? Read more >> https://t.co/E0WCko8bpX via @vmblog https://t.co/zJdBRaLxOe
Open

A Safer World Starts With a Safer Internet

Holidays such as Safer Internet Day serve as a reminder for everyone across the globe to participate in creating a safer, more secure internet for everyone. Leading technology experts have ...

On Feb 21, 2019
@KimZetter shared
One good thing about N. Carolina election fraud scandal and the do-over election in the House race - the state uses optical-scan machines w/paper ballots and passed law last yr banning use of cellular modems in the machines after my story about the modems https://t.co/7L1ouyp4sx
Open

The Myth of the Hacker-Proof Voting Machine

Election officials have insisted that machines can’t be remotely compromised because they’re not “connected to the Internet.” But security experts point out crucial ways in which they are.

On Feb 8, 2019
@WIRED shared
On June 27, 2017, a piece of malware called NotPetya infected computers across the globe. It crippled ports, paralyzed corporations, and froze government agencies. This is the untold story of the most devastating cyberattack in history https://t.co/Tc5VYbZt7k
Open

The Untold Story of NotPetya, the Most Devastating Cyberattack in History

Crippled ports. Paralyzed corporations. Frozen government agencies. How a single piece of code crashed the world.

On Feb 13, 2019
@TheHackersNews shared
Researchers find a way to implant "super stealthy malware" on #Intel processors by abusing its own hardware-based memory #encryption feature, i.e. SGX Enclaves, designed to protect sensitive data even if a system gets compromised Read→ https://t.co/7r4fEPyFJm —by @Swati_THN https://t.co/qWulHJ2yRI
Open

Researchers Implant "Protected" Malware On Intel SGX Enclaves

Researchers find a way to implants stealthy malware inside Intel SGX Enclaves

On Feb 20, 2019
@threatintel shared
When fiction is stranger than reality: 5 novels with hacking plot holes that need to be patched https://t.co/fpqebVehiu #reading #CyberSecurity #infosec https://t.co/tGTqV80Rd6
Open

When fiction is stranger than reality: 5 novels with hacking plot holes that need to be patched

Not all novels featuring hacking are created equal — with some containing more holes than others.

On Feb 18, 2019
@CiscoSecurity shared
Our new #CiscoCR report is as close as we can get to anticipating the future without a crystal ball. Our experts explain the approach in this video. Watch & read the report: https://t.co/V08rK8eiKC https://t.co/nSJ1VRdoPk
Open

2018 Annual Cybersecurity Report

See the latest threat intelligence and key security trends

On Feb 15, 2019
@r0bertmart1nez shared
RT @GustavoColsKL: When Kaspersky Lab provides training to a security team to help them be more efficient, that training comes from the company’s threat-hunting researchers themselves. https://t.co/8CmrWMdO7c
Open

How Kaspersky Lab is Helping Organizations Protect Their Digital Assets Through Research, Expertise, and Educational Events

TL; DR: Kaspersky Lab, a next-generation online security organization with more than 21 years of experience, uses its intelligence and security expertise to protect businesses, governments, ...

On Feb 14, 2019
@InfosecurityMag shared
How to Stop Paying Ransomware https://t.co/bvXdZzEp2j
Open

How to Stop Paying Ransomware

Ransomware is a relatively new form of malware that poses significant threats to computer networks, even those with effective security systems.

On Feb 18, 2019
@threatintel shared
8 cyber security professionals share their essential reads https://t.co/X9wsidzCPM #reading #infosec #CyberSecurity https://t.co/JmDnuq0NEK
Open

8 cyber security professionals share their essential reads

Ahead of World Book Day, 8 Symantec cyber security professionals share their recommendations for the essential books they turn to.

On Feb 15, 2019
@WIRED shared
Your connected vibrator is a security risk. https://t.co/YY7HKTMGwT
Open

The Next Security Risk May Be Your Vibrator

Opinion: The internet of things has permitted the hacking of whole new categories of products -- including sex toys.

On Feb 22, 2019
@kaspersky shared
Did you know that healthcare providers and hospitals are increasingly targeted by attackers for the data they hold? Learn more in our exclusive whitepaper: https://t.co/Vk7yudzm6X https://t.co/AsQFaMyiYz
Open

Kaspersky Lab

Unfortunately this was not an isolated incident, WannaCry is part of a frightening new trend. Ransomware has become a particular threat to hospitals and medical devices, with 2016 seeing a ...