Hacking & Cybersecurity

Monthly report: February 2019

This month, The Essentials Report, has curated & analyzed the content published by 156 influencers like CyberScoop and DarkReading, discussing hashtags such as #cybersecurity , #security and #InfoSec.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in February 2019

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in February 2019

A Safer World Starts With a Safer Internet

On Feb 16, 2019
@whitehatsec shared
While the internet creates a gateway to the entire world, it also can be an entryway to some very dark and dangerous places. So how do we continue to take advantage of all the internet has to offer us and strengthen our security? Read more >> https://t.co/E0WCko8bpX via @vmblog https://t.co/zJdBRaLxOe
Open

Holidays such as Safer Internet Day serve as a reminder for everyone across the globe to participate in creating a safer, more secure internet for everyone. Leading technology experts have provided their thoughts on the importance of creating a safer

vmblog.com
On Feb 16, 2019
@whitehatsec shared
While the internet creates a gateway to the entire world, it also can be an entryway to some very dark and dangerous places. So how do we continue to take advantage of all the internet has to offer us and strengthen our security? Read more >> https://t.co/E0WCko8bpX via @vmblog https://t.co/zJdBRaLxOe
Open

A Safer World Starts With a Safer Internet

Holidays such as Safer Internet Day serve as a reminder for everyone across the globe to participate in creating a safer, more secure internet for everyone. Leading technology experts have ...

China’s Huawei soft power push raises hard questions

On Feb 13, 2019
@Treadstone71LLC shared
China's Huawei soft power push raises hard questions but, this is all part of the program. Steal your tech. Populate your universities. Buy your tech. Buy your supply chain. Steal more IP. Gain street creds. Buy more, VC silent ownership, playing Go. https://t.co/vTz9e2gW3Y
Open

TORONTO (AP) — Canada's national game — brought to you by China's Huawei. As a nasty diplomatic feud deepens between the two countries over the tech company, involving arrests and execution orders, it hasn't gone unnoticed that Huawei's bright red fan-shaped logo is plastered prominently ...

apnews.com
On Feb 13, 2019
@Treadstone71LLC shared
China's Huawei soft power push raises hard questions but, this is all part of the program. Steal your tech. Populate your universities. Buy your tech. Buy your supply chain. Steal more IP. Gain street creds. Buy more, VC silent ownership, playing Go. https://t.co/vTz9e2gW3Y
Open

China’s Huawei soft power push raises hard questions

TORONTO (AP) — Canada's national game — brought to you by China's Huawei. As a nasty diplomatic feud deepens between the two countries over the tech company, involving arrests and execution ...

What's new in the FOR610: Reverse-Engineering Malware Analysis course in 2017

On Feb 4, 2019
@SANSInstitute shared
RT @sansforensics: Explore #MalwareAnalysis with @anujsoni in #Norfolk March 18-23 Register now: https://t.co/n0fOtv85Er Get an overview on #FOR610 from course author @LennyZeltser https://t.co/LbcyDG47W1 #DFIR
Open

SANS course FOR610: Reverse-Engineering Malware has undergone a major revamp in 2017. The refreshed materials introduce new malware analysis tools, fresh sam...

www.youtube.com
On Feb 4, 2019
@SANSInstitute shared
RT @sansforensics: Explore #MalwareAnalysis with @anujsoni in #Norfolk March 18-23 Register now: https://t.co/n0fOtv85Er Get an overview on #FOR610 from course author @LennyZeltser https://t.co/LbcyDG47W1 #DFIR
Open

What's new in the FOR610: Reverse-Engineering Malware Analysis course in 2017

SANS course FOR610: Reverse-Engineering Malware has undergone a major revamp in 2017. The refreshed materials introduce new malware analysis tools, fresh sam...

2019 Cybersecurity Predictions: Threats Grow as New Opportunities and Risks Emerge

On Feb 10, 2019
@RSAsecurity shared
#ICYMI: In 2019, #cybersecurity will become a business inhibitor. From security automation to #IoT, @Secureworks and RSA share what 5 challenges #InfoSec and business leaders will face (via @DellTech): https://t.co/KAGIBT3uHF
Open

Cybersecurity experts from RSA and Secureworks weigh in on the cyber threats—and—opportunities organizations will face in 2019.

www.delltechnologies.com
On Feb 10, 2019
@RSAsecurity shared
#ICYMI: In 2019, #cybersecurity will become a business inhibitor. From security automation to #IoT, @Secureworks and RSA share what 5 challenges #InfoSec and business leaders will face (via @DellTech): https://t.co/KAGIBT3uHF
Open

2019 Cybersecurity Predictions: Threats Grow as New Opportunities and Risks Emerge

Cybersecurity experts from RSA and Secureworks weigh in on the cyber threats—and—opportunities organizations will face in 2019.

Trisis investigator says Saudi plant outage could have been prevented

On Feb 16, 2019
@CyberScoopNews shared
Trisis investigator says Saudi plant outage could have been prevented https://t.co/OL8wVGDHOL
Open

A researcher who responded to the attack on Saudi petrochemical plant says the initial incident was not thoroughly investigated.

www.cyberscoop.com
On Feb 16, 2019
@CyberScoopNews shared
Trisis investigator says Saudi plant outage could have been prevented https://t.co/OL8wVGDHOL
Open

Trisis investigator says Saudi plant outage could have been prevented

A researcher who responded to the attack on Saudi petrochemical plant says the initial incident was not thoroughly investigated.

Tesla's Model 3 is a big target at the next Pwn2Own

On Feb 16, 2019
@CyberScoopNews shared
Tesla's Model 3 is a big target at the next Pwn2Own https://t.co/2DD1WNQopH
Open

The hacking competition Pwn2Own is adding an automotive category to its March event in Vancouver, and participants will be able to take a crack at one of Tesla’s top models. The additional category is the result of a new partnership with Tesla, according to Japanese cybersecurity company ...

www.cyberscoop.com
On Feb 16, 2019
@CyberScoopNews shared
Tesla's Model 3 is a big target at the next Pwn2Own https://t.co/2DD1WNQopH
Open

Tesla's Model 3 is a big target at the next Pwn2Own

The hacking competition Pwn2Own is adding an automotive category to its March event in Vancouver, and participants will be able to take a crack at one of Tesla’s top models. The additional ...

10 cybersecurity trends to watch for 2019

On Feb 2, 2019
@whitehatsec shared
There are 10 cyber security trends that are set to impact security professionals and companies of all sizes in the year ahead >> https://t.co/Q7UmpJdIV8 via @CSOonline https://t.co/vIqIbn26mU
Open

In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and companies of all sizes in the year ahead.

www.csoonline.com
On Feb 2, 2019
@whitehatsec shared
There are 10 cyber security trends that are set to impact security professionals and companies of all sizes in the year ahead >> https://t.co/Q7UmpJdIV8 via @CSOonline https://t.co/vIqIbn26mU
Open

10 cybersecurity trends to watch for 2019

In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and ...

ISTR 24: Symantec’s Annual Threat Report Reveals More Ambitious and Destructive Attacks

On Feb 20, 2019
@threatintel shared
RT @symantec: It’s finally here. The biggest threats you may (or may not) have seen coming. Get a glimpse into this year’s #ISTR. https://t.co/xjlKRiK3Cs
Open

ISTR Volume 24 is here, providing insights into global threat activity, cyber criminal trends, attacker motivations, and other happenings in the threat landscape in 2018.

www.symantec.com
On Feb 20, 2019
@threatintel shared
RT @symantec: It’s finally here. The biggest threats you may (or may not) have seen coming. Get a glimpse into this year’s #ISTR. https://t.co/xjlKRiK3Cs
Open

ISTR 24: Symantec’s Annual Threat Report Reveals More Ambitious and Destructive Attacks

ISTR Volume 24 is here, providing insights into global threat activity, cyber criminal trends, attacker motivations, and other happenings in the threat landscape in 2018.

Top Influencers

Picture of @CyberScoopNews

Capitol Hill, Silicon Valley and beyond. News, analysis and commentary from cybersecurity’s cutting edge. A @ScoopNewsGroup property.

Follow 938.0 Followers

Picture of @DarkReading

News and information on IT security, helping information security pros manage the balance between data protection and user access.

Follow 148.0k Followers

Picture of @whitehatsec

WhiteHat Security helps prevent website attacks by providing the most complete Web security solution for companies of any size.

Follow 35.1k Followers

Picture of @CTIN_Global

Aggregating high-quality CTIN member sources with real-time posting on threats | ISAOs | CTI-TC | OSINT | Analytics | ThreatIntel | CyberSecurity | Malware

Follow 1.0k Followers

Picture of @cylanceinc

Prevent #cyberattacks with #ArtificialIntelligence. Need support? Contact @CylanceSupport.

Follow 8.9k Followers

Picture of @RSAsecurity

RSA helps organizations mitigate the risk of operating in a digital world – providing the ability to detect, investigate, & respond to advanced threats.

Follow 99.7k Followers

Picture of @Treadstone71LLC

Intelligence, Cyber Counterintel, intel tradecraft, threat intelligence analysis, training, clandestine Cyber HUMINT, Business and Competitive Intelligence

Follow 943.6k Followers

Picture of @SANSInstitute

SANS is the most trusted and by far the largest source for computer security, IT and information security training, certification and research in the world.

Follow 89.9k Followers

Picture of @ericgeller

Cybersecurity reporter at @POLITICOPro/@politico. Star Wars fan. Pun aficionado. ✉️ [email protected] 📱 301-547-6954 ⚠ See website for secure contact info.

Follow 40.2k Followers

Picture of @TechCrunch

Breaking technology news, analysis, and opinions from TechCrunch. The number one guide for all things tech. Got a tip? Let us know [email protected]

Follow 8.7M Followers

Picture of @SecurityWeek

Internet and Enterprise Security News, Threats, Insights and Expert Analysis #SCADA #infosec Coverage

Follow 107.5k Followers

Picture of @symantec

Helping companies, governments, and individuals secure their most important data wherever it lives. Need support? Contact @SymantecHelp

Follow 160.4k Followers

Picture of @rapid7

Rapid7 is engineering better security to help companies reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.

Follow 68.1k Followers

Picture of @WIRED

WIRED is where tomorrow is realized.

Follow 8.4M Followers

Picture of @AP

News from The Associated Press, and a taste of the great journalism produced by AP members and customers. Managed 24/7 by these editors: http://t.co/BibaTN49vB

Follow 10.4M Followers

Picture of @threatintel

Symantec Security Response brings you the latest threat intelligence from the IT security world.

Follow 67.5k Followers

Picture of @gcluley

Award-winning computer security expert, writer and public speaker. Fighting cybercrime since early 1990s. Co-host of @SmashinSecurity podcast

Follow 57.9k Followers

Picture of @threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Follow 132.9k Followers

Picture of @georgevhulme

Writer • IT security • Cloud Computing • Technology • Science • Markets

Follow 15.0k Followers

Picture of @politico

Nobody knows politics like POLITICO.

Follow 2.9M Followers