Hacking & Cybersecurity

Monthly report: May 2018

This month, The Essentials Report, has curated & analyzed the content published by 84 influencers like CyberScoop and Security Tube, discussing hashtags such as #security , #RSAC and #SINETNYC.
Read our monthly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in May 2018

Global Discussions Across the Web
Topics discussed by the influencers
circles
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in May 2018

8 cyber security professionals share their essential reads

On Apr 19, 2017
@threatintel shared
What should you be reading if you want to get into #infosec? 8 Symantec pros reveal their top reads https://t.co/RkzqZ2RYNs #WednesdayWisdom
Open

Ahead of World Book Day, 8 Symantec cyber security professionals share their recommendations for the essential books they turn to.

medium.com
On Apr 19, 2017
@threatintel shared
What should you be reading if you want to get into #infosec? 8 Symantec pros reveal their top reads https://t.co/RkzqZ2RYNs #WednesdayWisdom
Open

8 cyber security professionals share their essential reads

Ahead of World Book Day, 8 Symantec cyber security professionals share their recommendations for the essential books they turn to.

4 Tips for Making Your Smart Home Virtually Hack-Proof

On Apr 17, 2018
@STOPTHNKCONNECT shared
4️⃣Tips for Making Your Smart Home Virtually Hack-Proof. #CyberAware #RSAC https://t.co/4pxCv9RY3A
Open

How safe are our smart homes and the data they collect?

staysafeonline.org
On Apr 17, 2018
@STOPTHNKCONNECT shared
4️⃣Tips for Making Your Smart Home Virtually Hack-Proof. #CyberAware #RSAC https://t.co/4pxCv9RY3A
Open

4 Tips for Making Your Smart Home Virtually Hack-Proof

How safe are our smart homes and the data they collect?

Command and control: A fight for the future of government hacking

On Apr 11, 2018
@CyberScoopNews shared
Is it ultimately the work of spies, or the work of troops? Or both? @bing_chris looks at the debate over U.S. Cyber Command's place in the offensive hacking arsenal https://t.co/3cHbpzXKlp https://t.co/Rhm4YTXB5L
Open

A quiet but constant tug of war is raging between the intelligence community and the military over the future of U.S. Cyber Command.

www.cyberscoop.com
On Apr 11, 2018
@CyberScoopNews shared
Is it ultimately the work of spies, or the work of troops? Or both? @bing_chris looks at the debate over U.S. Cyber Command's place in the offensive hacking arsenal https://t.co/3cHbpzXKlp https://t.co/Rhm4YTXB5L
Open

Command and control: A fight for the future of government hacking

A quiet but constant tug of war is raging between the intelligence community and the military over the future of U.S. Cyber Command.

Wicked Botnet Uses Passel of Exploits to Target IoT

On May 22, 2018
@threatpost shared
The Wicked #botnet uses at least three exploits that target unpatched #IoT devices, including closed-circuit cameras and Netgear routers: https://t.co/9qbatIu58k
Open

The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers.

threatpost.com
On May 22, 2018
@threatpost shared
The Wicked #botnet uses at least three exploits that target unpatched #IoT devices, including closed-circuit cameras and Netgear routers: https://t.co/9qbatIu58k
Open

Wicked Botnet Uses Passel of Exploits to Target IoT

The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers.

Python for Pentesters and Hackers

On Feb 23, 2017
@SecurityTube shared
Script Pentesting tools in Python: https://t.co/CxZwWl3fPy learn from the basics. Enroll Now! https://t.co/2bVCjhGdmw
Open

We will be covering topics in system security, network security, attacking web applications and services, exploitation techniques, malware and binary analysis and task automation. A non-exhaustive list of topics to be taught includes: Module 1: Python Scripting – Language Essentials ...

On Feb 23, 2017
@SecurityTube shared
Script Pentesting tools in Python: https://t.co/CxZwWl3fPy learn from the basics. Enroll Now! https://t.co/2bVCjhGdmw
Open

Python for Pentesters and Hackers

We will be covering topics in system security, network security, attacking web applications and services, exploitation techniques, malware and binary analysis and task automation. A ...

: a Pentester Academy Initiative

On Apr 8, 2018
@SecurityTube shared
Stay up to date on the latest Hacker Arsenal news, such as new product releases or when we've restocked our #hacktillery: https://t.co/6WruAHKnpc https://t.co/YIlARohg1X
Open

We promise to only update you on Hacker Arsenal news!

promo.pentesteracademy.com
On Apr 8, 2018
@SecurityTube shared
Stay up to date on the latest Hacker Arsenal news, such as new product releases or when we've restocked our #hacktillery: https://t.co/6WruAHKnpc https://t.co/YIlARohg1X
Open

: a Pentester Academy Initiative

We promise to only update you on Hacker Arsenal news!

Researchers found a semi-legit way to turn an Amazon Echo into a wiretap

On Apr 28, 2018
@CyberScoopNews shared
Researchers found a semi-legit way to turn an Amazon Echo into a wiretap https://t.co/71K0kNvQZ9
Open

Security researchers have used Amazon's Echo to remotely listen to people's nearby conversations, according to cybersecurity firm CheckMarx.

www.cyberscoop.com
On Apr 28, 2018
@CyberScoopNews shared
Researchers found a semi-legit way to turn an Amazon Echo into a wiretap https://t.co/71K0kNvQZ9
Open

Researchers found a semi-legit way to turn an Amazon Echo into a wiretap

Security researchers have used Amazon's Echo to remotely listen to people's nearby conversations, according to cybersecurity firm CheckMarx.

InSecurity Podcast: The Cylance Threat Report - 2017 Year in Review

On May 24, 2018
@cylanceinc shared
InSecurity Podcast: The Cylance Threat Report - 2017 Year in Review https://t.co/qYkw4Nir7r #infosec #security #podcast https://t.co/F1KaPlP2rR
Open

In this episode of the InSecurity Podcast, host Matt Stephenson is joined by special guests Aditya Kapoor, Jim Walter, and Steve Salinas to discuss some of the most salient outcomes of The Cylance Threat Report: 2017 Year in Review.

threatvector.cylance.com
On May 24, 2018
@cylanceinc shared
InSecurity Podcast: The Cylance Threat Report - 2017 Year in Review https://t.co/qYkw4Nir7r #infosec #security #podcast https://t.co/F1KaPlP2rR
Open

InSecurity Podcast: The Cylance Threat Report - 2017 Year in Review

In this episode of the InSecurity Podcast, host Matt Stephenson is joined by special guests Aditya Kapoor, Jim Walter, and Steve Salinas to discuss some of the most salient outcomes of The ...

Top Influencers

Picture of @CyberScoopNews

Capitol Hill, Silicon Valley and beyond. News, analysis and commentary from cybersecurity’s cutting edge. A @ScoopNewsGroup property.

Follow 938.0 Followers

Picture of @SecurityTube

Comprehensive, Hands-on, Practical and Affordable infosec training. Join students from 90+ Countries: http://t.co/QVTIJZCdlx http://t.co/0vm0BnkqLa

Follow 95.6k Followers

Picture of @kaspersky

Kaspersky Lab is the world’s largest privately held vendor of Internet security solutions for businesses and consumers.

Follow 274.3k Followers

Picture of @RSAsecurity

RSA helps organizations mitigate the risk of operating in a digital world – providing the ability to detect, investigate, & respond to advanced threats.

Follow 99.7k Followers

Picture of @RSAConference

#RSAC: Helping you stay ahead of an ever-changing #security landscape.

Follow 43.1k Followers

Picture of @SINETconnection

SINET Mission: Advance innovation and enable global collaboration between the public and private sectors to defeat Cybersecurity threats

Follow 1.9k Followers

Picture of @cylanceinc

Prevent #cyberattacks with #ArtificialIntelligence. Need support? Contact @CylanceSupport.

Follow 8.9k Followers

Picture of @SecurityWeek

Internet and Enterprise Security News, Threats, Insights and Expert Analysis #SCADA #infosec Coverage

Follow 107.5k Followers

Picture of @McAfee_Labs

The official tweets of McAfee Labs. McAfee is now part of @IntelSecurity.

Follow 75.4k Followers

Picture of @threatintel

Symantec Security Response brings you the latest threat intelligence from the IT security world.

Follow 67.5k Followers

Picture of @STOPTHNKCONNECT

Official page of STOP. THINK. CONNECT., the global cybersecurity education & awareness campaign. Co-founded by @StaySafeOnline @APWG @cyber.

Follow 29.4k Followers

Picture of @threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Follow 132.9k Followers

Picture of @symantec

Helping companies, governments, and individuals secure their most important data wherever it lives. Need support? Contact @SymantecHelp

Follow 160.4k Followers

Picture of @StaySafeOnline

The National Cyber Security Alliance (NCSA) is a nonprofit that empowers people to use the Internet safely & securely. Co-founder of @STOPTHNKCONNECT campaign.

Follow 39.2k Followers