Hacking & Cybersecurity

Monthly report: August 2019

This month, The Essentials Report, has curated & analyzed the content published by 180 influencers like Kaspersky Lab and Infosecurity, discussing hashtags such as #security , #ransomware and #Android.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in August 2019

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in August 2019

A Multimillionaire Surveillance Dealer Steps Out Of The Shadows . . . And His $9 Million WhatsApp Hacking Van

On Aug 11, 2019
@threatintel shared
Spy-tech dealer gives rare interview and demo of $9 million hacking van https://t.co/HumpB20mLz
Open

He can hack your WhatsApp, find out where you are in 15 minutes and monitor your iPhone. But Tal Dilian says he's one of the good guys. It's badly-behaved governments who should be in trouble, not the $12 billion industry he's come to represent.

www.forbes.com
On Aug 11, 2019
@threatintel shared
Spy-tech dealer gives rare interview and demo of $9 million hacking van https://t.co/HumpB20mLz
Open

A Multimillionaire Surveillance Dealer Steps Out Of The Shadows . . . And His $9 Million WhatsApp Hacking Van

He can hack your WhatsApp, find out where you are in 15 minutes and monitor your iPhone. But Tal Dilian says he's one of the good guys. It's badly-behaved governments who should be in ...

A Top 10 Reading List if You’re Getting Started in Cyber Threat Intelligence

On Aug 9, 2019
@r0bertmart1nez shared
RT @lennyzeltser: For those getting started in threat intelligence, here's a top 10 reading list by @likethecoins: https://t.co/GjK8zX7ENE
Open

I’ve been thinking about writing this blog post for a while, but I felt like there are versions of this out there already, so didn’t…

medium.com
On Aug 9, 2019
@r0bertmart1nez shared
RT @lennyzeltser: For those getting started in threat intelligence, here's a top 10 reading list by @likethecoins: https://t.co/GjK8zX7ENE
Open

A Top 10 Reading List if You’re Getting Started in Cyber Threat Intelligence

I’ve been thinking about writing this blog post for a while, but I felt like there are versions of this out there already, so didn’t…

Black Hat Talk About ‘Time AI’ Causes Uproar, Is Deleted By Conference

On Aug 11, 2019
@alexhutton shared
RT @lorenzofb: Black Hat has removed contents related to a controversial sponsored talk that was peddling some questionable new encryption. Attended have made fun of the talk and criticized the conference for letting it happen. https://t.co/vYuXqft4RS
Open

A controversial sponsored talk at the Black Hat security conference caused an uproar among security professionals and prompted the conference to delete the talk from the internet.

www.vice.com
On Aug 11, 2019
@alexhutton shared
RT @lorenzofb: Black Hat has removed contents related to a controversial sponsored talk that was peddling some questionable new encryption. Attended have made fun of the talk and criticized the conference for letting it happen. https://t.co/vYuXqft4RS
Open

Black Hat Talk About ‘Time AI’ Causes Uproar, Is Deleted By Conference

A controversial sponsored talk at the Black Hat security conference caused an uproar among security professionals and prompted the conference to delete the talk from the internet.

20 month prison sentence for British hacker who made fortune helping SIM-swap fraudsters

On Aug 19, 2019
@gcluley shared
A teenage hacker, who previously played a role in the infamous TalkTalk data breach, has been sentenced to 20 months in prison after pleading guilty to selling hacking services and stolen personal data for cryptocurrency https://t.co/LDCVSUNCIE https://t.co/mSh8jo7urm
Open

A teenage British hacker has been sentenced to 20 months in prison after pleading guilty to selling hacking services and stolen personal data for cryptocurrency. 19-year-old Elliott Gunton was no stranger to the authorities, having previously been... #Britishhacker #hackingsentence ...

On Aug 19, 2019
@gcluley shared
A teenage hacker, who previously played a role in the infamous TalkTalk data breach, has been sentenced to 20 months in prison after pleading guilty to selling hacking services and stolen personal data for cryptocurrency https://t.co/LDCVSUNCIE https://t.co/mSh8jo7urm
Open

20 month prison sentence for British hacker who made fortune helping SIM-swap fraudsters

A teenage British hacker has been sentenced to 20 months in prison after pleading guilty to selling hacking services and stolen personal data for cryptocurrency. 19-year-old Elliott Gunton ...

How a 10-Year-Old Desk Phone Bug Came Back From the Dead

On Aug 13, 2019
@McAfee_Labs shared
A ten year old bug in the Avaya deskphone has been reincarnated. Experts from our Advanced Threat Research team shared the details with @WIRED. https://t.co/KSiSaYRUYi
Open

Avaya patched a problem hackers could exploit in phones. But the bad code never went away.

www.wired.com
On Aug 13, 2019
@McAfee_Labs shared
A ten year old bug in the Avaya deskphone has been reincarnated. Experts from our Advanced Threat Research team shared the details with @WIRED. https://t.co/KSiSaYRUYi
Open

How a 10-Year-Old Desk Phone Bug Came Back From the Dead

Avaya patched a problem hackers could exploit in phones. But the bad code never went away.

The Global Machine Behind the Rise of Far-Right Nationalism

On Aug 11, 2019
@dinodaizovi shared
RT @nycsouthpaw: Nothing to see here folks https://t.co/a83cWw4bM3 https://t.co/ZQR18SJ4fL
Open

Sweden was long seen as a progressive utopia. Then came waves of immigrants — and the forces of populism at home and abroad.

www.nytimes.com
On Aug 11, 2019
@dinodaizovi shared
RT @nycsouthpaw: Nothing to see here folks https://t.co/a83cWw4bM3 https://t.co/ZQR18SJ4fL
Open

The Global Machine Behind the Rise of Far-Right Nationalism

Sweden was long seen as a progressive utopia. Then came waves of immigrants — and the forces of populism at home and abroad.

Microsoft finds Russia-backed attacks that exploit IoT devices

On Aug 8, 2019
@NetworkWorld shared
Russia-backed attacks exploited #IoT devices -- Another example of why you need to change the manufacturer’s default password on your IoT devices and install all #security patches. https://t.co/HvV7dul2SV @NWWJonGold #IoTsecurity #cyberattack #STRONTIUM
Open

Microsoft says default passwords, unpatched devices, poor inventory of IoT gear led to exploits against companies by Russia's STRONTIUM hacking group.

www.networkworld.com
On Aug 8, 2019
@NetworkWorld shared
Russia-backed attacks exploited #IoT devices -- Another example of why you need to change the manufacturer’s default password on your IoT devices and install all #security patches. https://t.co/HvV7dul2SV @NWWJonGold #IoTsecurity #cyberattack #STRONTIUM
Open

Microsoft finds Russia-backed attacks that exploit IoT devices

Microsoft says default passwords, unpatched devices, poor inventory of IoT gear led to exploits against companies by Russia's STRONTIUM hacking group.

A Boeing code leak exposes security flaws deep in a 787’s guts

On Aug 9, 2019
@arstechnica shared
A Boeing code leak exposes security flaws deep in a 787’s guts https://t.co/Wrz5umnAmx by @wired
Open

Boeing's response to this glaring security lapse has not been reassuring.

arstechnica.com
On Aug 9, 2019
@arstechnica shared
A Boeing code leak exposes security flaws deep in a 787’s guts https://t.co/Wrz5umnAmx by @wired
Open

A Boeing code leak exposes security flaws deep in a 787’s guts

Boeing's response to this glaring security lapse has not been reassuring.

Top Influencers

Picture of @kaspersky

Kaspersky Lab is the world’s largest privately held vendor of Internet security solutions for businesses and consumers.

Follow 274.3k Followers

Picture of @InfosecurityMag

The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.

Follow 138.1k Followers

Picture of @WIRED

WIRED is where tomorrow is realized.

Follow 8.4M Followers

Picture of @threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Follow 132.9k Followers

Picture of @Treadstone71LLC

Intelligence, Cyber Counterintel, intel tradecraft, threat intelligence analysis, training, clandestine Cyber HUMINT, Business and Competitive Intelligence

Follow 943.6k Followers

Picture of @threatintel

Symantec Security Response brings you the latest threat intelligence from the IT security world.

Follow 67.5k Followers

Picture of @ForbesTech

Tech news and insights from Forbes.

Follow 2.5M Followers

Picture of @r0bertmart1nez

Security Researcher, Speaker & Trainer | Member of the Global Research and Analysis Team (GReAT) at @Kaspersky Lab | PGP Key: A5517F19 | Tweets are my own.

Follow 12.8k Followers

Picture of @alexhutton

I like risk! Also, My comments do not not necessarily represent the views of my employer.

Follow 14.3k Followers

Picture of @dinodaizovi

Co-founder & CTO @Capsule8. Securing 🐧 with ❤️ in 🗽. Prev: @Square Mobile Security Lead. Devoted to getting to the bottom of things, not staying on top of them.

Follow 28.9k Followers

Picture of @arstechnica

Original news, reviews, analysis of tech trends, and expert advice on the most fundamental aspects of tech.

Follow 1.1M Followers

Picture of @CNET

CNET is the place to find out what's happening in tech and why it matters.

Follow 1.4M Followers

Picture of @e_kaspersky

Chairman and CEO of #Kaspersky Lab. Waging war against #malware for 27 years. #Infosec, #cybercrime, #cyberwar. Views are my own.

Follow 160.1k Followers

Picture of @RSAConference

#RSAC: Helping you stay ahead of an ever-changing #security landscape.

Follow 43.1k Followers

Picture of @DarkReading

News and information on IT security, helping information security pros manage the balance between data protection and user access.

Follow 148.0k Followers

Picture of @josephmenn

Personal account for author of true cyber thriller Fatal System Error + Napster bio All the Rave, at Reuters. PGP key on LinkedIn profile. Open dms.

Follow 6.6k Followers

Picture of @gcluley

Award-winning computer security expert, writer and public speaker. Fighting cybercrime since early 1990s. Co-host of @SmashinSecurity podcast

Follow 57.9k Followers

Picture of @McAfee_Labs

The official tweets of McAfee Labs. McAfee is now part of @IntelSecurity.

Follow 75.4k Followers

Picture of @a_greenberg

I'm a reporter for Wired and the author of This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information.

Follow 36.5k Followers

Picture of @NetworkWorld

The Connected Enterprise. Network World, from IDG, is the premier provider of news, intelligence and insight for network and IT executives.

Follow 102.2k Followers