Hacking & Cybersecurity

Monthly report: April 2018

This month, The Essentials Report, has curated & analyzed the content published by 48 influencers like Cylance Inc. and CyberScoop, discussing hashtags such as #security , #infosec and #ISTR.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in April 2018

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in April 2018

Report: Criminals loved to target PowerPoint in 2017

On Mar 29, 2018
@CyberScoopNews shared
Cybercriminals exploited PowerPoint a lot in 2017 to steal money and information, reports @RecordedFuture https://t.co/m3OooBIg6T https://t.co/3dqUL2s7Mz
Open

The most widely exploited vulnerability in 2017 was a well-known Microsoft Office bug (CVE-2017-0199), according to new research. Recorded Future released a report Tuesday detailing the top 10 vulnerabilities used by cybercriminals in 2017. Microsoft products made up seven of the 10. ...

www.cyberscoop.com
On Mar 29, 2018
@CyberScoopNews shared
Cybercriminals exploited PowerPoint a lot in 2017 to steal money and information, reports @RecordedFuture https://t.co/m3OooBIg6T https://t.co/3dqUL2s7Mz
Open

Report: Criminals loved to target PowerPoint in 2017

The most widely exploited vulnerability in 2017 was a well-known Microsoft Office bug (CVE-2017-0199), according to new research. Recorded Future released a report Tuesday detailing the top ...

Cisco: Malware and encrypted traffic will challenge federal agencies

On Apr 15, 2018
@CyberScoopNews shared
Cisco: Malware and encrypted traffic will challenge federal agencies https://t.co/o4YPrztmYp
Open

Hackers will continue to give U.S. government agencies headaches in the coming months thanks to an evolving malware market and their use of encryption to evade detection, Cisco declared in a new report. ...

www.cyberscoop.com
On Apr 15, 2018
@CyberScoopNews shared
Cisco: Malware and encrypted traffic will challenge federal agencies https://t.co/o4YPrztmYp
Open

Cisco: Malware and encrypted traffic will challenge federal agencies

Hackers will continue to give U.S. government agencies headaches in the coming months thanks to an evolving malware market and their use of encryption to evade detection, Cisco declared in ...

2018 Internet Security Threat Report

On Apr 4, 2018
@symantec shared
2017 signaled the commoditization of ransomware. Read this year’s #ISTR to learn how cyber criminals are making a profit. https://t.co/YM8uxEMLrd
Open

Symantec's 2018 Internet Security Threat Report is the definitive guide of statistics on cyber crime activities and best cyber security practices. Visit Symantec to download a free report.

www.symantec.com
On Apr 4, 2018
@symantec shared
2017 signaled the commoditization of ransomware. Read this year’s #ISTR to learn how cyber criminals are making a profit. https://t.co/YM8uxEMLrd
Open

2018 Internet Security Threat Report

Symantec's 2018 Internet Security Threat Report is the definitive guide of statistics on cyber crime activities and best cyber security practices. Visit Symantec to download a free report.

Evolving Role of the Hacker

On Mar 27, 2018
@cylanceinc shared
InSecurity Podcast: Nic Percoco on the Evolving Role of the Hacker https://t.co/zRHyGOvRix #infosec #security #hacking https://t.co/URD0hjONkB
Open

In this episode of the InSecurity Podcast, host Matt Stephenson is joined by special guest Nic Percoco, Chief Security Officer at Uptake and founder of the THOTCON conference, who discusses the evolving role of the hacker in work, society, and culture.

threatmatrix.cylance.com
On Mar 27, 2018
@cylanceinc shared
InSecurity Podcast: Nic Percoco on the Evolving Role of the Hacker https://t.co/zRHyGOvRix #infosec #security #hacking https://t.co/URD0hjONkB
Open

Evolving Role of the Hacker

In this episode of the InSecurity Podcast, host Matt Stephenson is joined by special guest Nic Percoco, Chief Security Officer at Uptake and founder of the THOTCON conference, who discusses ...

McAfee Researchers Find Poor Security Exposes Medical Data to Cybercriminals

On Mar 12, 2018
@McAfee_Labs shared
Medical #data has become an irresistible target for #cybercriminals and current systems make it easy to access. Don't believe us? See what we created with the data gathered from a vulnerable PACS server via @ChristiaanBeek. https://t.co/Ty5e0Gkm2Z
Open

The nonperishable nature of medical data makes an irresistible target for cybercriminals. The art of hacking requires significant time and effort, encouraging experienced cybercriminals to plot their attacks based on the return they will see from their investment. ...

securingtomorrow.mcafee.com
On Mar 12, 2018
@McAfee_Labs shared
Medical #data has become an irresistible target for #cybercriminals and current systems make it easy to access. Don't believe us? See what we created with the data gathered from a vulnerable PACS server via @ChristiaanBeek. https://t.co/Ty5e0Gkm2Z
Open

McAfee Researchers Find Poor Security Exposes Medical Data to Cybercriminals

The nonperishable nature of medical data makes an irresistible target for cybercriminals. The art of hacking requires significant time and effort, encouraging experienced cybercriminals to ...

Today’s Connected Cars Vulnerable to Hacking, Malware

On Apr 4, 2018
@McAfee_Labs shared
From WiFi, external connections, and autonomous operations. Connected cars will very soon be a hot target for hackers 🚗 More on the risks. https://t.co/ZpbBaZqQrX
Open

The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation. ...

securingtomorrow.mcafee.com
On Apr 4, 2018
@McAfee_Labs shared
From WiFi, external connections, and autonomous operations. Connected cars will very soon be a hot target for hackers 🚗 More on the risks. https://t.co/ZpbBaZqQrX
Open

Today’s Connected Cars Vulnerable to Hacking, Malware

The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and ...

Managing Cybersecurity Risks: Next Generation Kaspersky Endpoint Security for Business

On Apr 13, 2018
@kaspersky shared
#ICYMI: Our new @Kaspersky #Endpoint #Security for Business boasts increased visibility and granular security controls, credentials protection and other #nextgen technologies https://t.co/NI68z0LCzM #netsec #cybersec https://t.co/kl1oGRlYaR
Open

Kaspersky Lab announces the next generation of Kaspersky Endpoint Security for Business, offering enterprise-ready scalability and EDR integration.

www.businesswire.com
On Apr 13, 2018
@kaspersky shared
#ICYMI: Our new @Kaspersky #Endpoint #Security for Business boasts increased visibility and granular security controls, credentials protection and other #nextgen technologies https://t.co/NI68z0LCzM #netsec #cybersec https://t.co/kl1oGRlYaR
Open

Managing Cybersecurity Risks: Next Generation Kaspersky Endpoint Security for Business

Kaspersky Lab announces the next generation of Kaspersky Endpoint Security for Business, offering enterprise-ready scalability and EDR integration.

Verizon 2018 Data Breach Investigations Report

On Apr 11, 2018
@hrbrmstr shared
RT @gdbassett: Hey, if you've got a minute today, go download the report I help write, the @VZDBIR: https://t.co/FkzZZKcaSC. You don't even have to register if you don't want to. Just click 'View Only'.
Open

Read Verizon's 2018 Data Breach Investigations Report (DBIR). And, for the first time, get hands-on access to data and processes used to create the report via DBIR Interactive.

www.verizonenterprise.com
On Apr 11, 2018
@hrbrmstr shared
RT @gdbassett: Hey, if you've got a minute today, go download the report I help write, the @VZDBIR: https://t.co/FkzZZKcaSC. You don't even have to register if you don't want to. Just click 'View Only'.
Open

Verizon 2018 Data Breach Investigations Report

Read Verizon's 2018 Data Breach Investigations Report (DBIR). And, for the first time, get hands-on access to data and processes used to create the report via DBIR Interactive.

Top Influencers

Picture of @cylanceinc

Prevent #cyberattacks with #ArtificialIntelligence. Need support? Contact @CylanceSupport.

Follow 8.9k Followers

Picture of @CyberScoopNews

Capitol Hill, Silicon Valley and beyond. News, analysis and commentary from cybersecurity’s cutting edge. A @ScoopNewsGroup property.

Follow 938.0 Followers

Picture of @McAfee_Labs

The official tweets of McAfee Labs. McAfee is now part of @IntelSecurity.

Follow 75.4k Followers

Picture of @symantec

Helping companies, governments, and individuals secure their most important data wherever it lives. Need support? Contact @SymantecHelp

Follow 160.4k Followers

Picture of @kaspersky

Kaspersky Lab is the world’s largest privately held vendor of Internet security solutions for businesses and consumers.

Follow 274.3k Followers

Picture of @IntelSec_Biz

@IntelSecurity news and resources on solutions for your small business or enterprise. #SecChat organizer/moderator.

Follow 44.3k Followers

Picture of @joshcorman

Director Cyber Statecraft @AtlanticCouncil | CyberSafety Advocate | Philosopher | Strategist | Co-Founder: https://t.co/szaUmgPzwT https://t.co/FOfIaMx5Tk

Follow 30.7k Followers

Picture of @hrbrmstr

Don't look at me…I do what he does—just slower. #rstats fanatic • 🍊Resistance Fighter • Cook • Christian • [Master] Chef des Données de Sécurité @ @rapid7

Follow 7.9k Followers