Hacking & Cybersecurity

Annual Report 2018

This year, The Essentials Report, has curated & analyzed the content published by 138 influencers like Cylance Inc. and CyberScoop, discussing hashtags such as #security , #infosec and #malware.
Read our yearly report or learn more about Essentials.

Trending Topics

What matters to our readers VS what matters to the rest of the world in 2018

Global Discussions Across the Web
Topics discussed by the influencers
Popular with our readers

Top Hashtags & Sources

Hashtags our readers care about

Top Mentioned Sources

Best articles in 2018

On Mar 27, 2018
@cylanceinc shared
InSecurity Podcast: Nic Percoco on the Evolving Role of the Hacker https://t.co/zRHyGOvRix #infosec #security #hacking https://t.co/URD0hjONkB

Evolving Role of the Hacker

In this episode of the InSecurity Podcast, host Matt Stephenson is joined by special guest Nic Percoco, Chief Security Officer at Uptake and founder of the THOTCON conference, who discusses ...

On Jul 13, 2018
@threatintel shared
#FridayFact: At least one software update supply chain took place each month in 2017. Hear more about these attacks in our latest #CyberSecurityBrief podcast: https://t.co/Jz6GCQsF0W https://t.co/LSc3MBTgAr

Symantec Cyber Security Brief Podcast

Your weekly dose of cyber security news, hosted by threat researchers from Symantec Security Response Subscribe Apple Android In this week’s podcast, we discuss software supply chain ...

On Jun 20, 2018
@cylanceinc shared
Threat Spotlight: URLZone Malware Campaigns Targeting Japan https://t.co/FWExvvQA98 #infosec #security #URLZone #malware #Japan https://t.co/tFsHIWtiXl

Threat Spotlight: URLZone Malware Campaigns Targeting Japan

The malware known as URLZone has plagued security professionals for nearly a decade. Now, it is back for an encore performance in 2018. First detected as a banking Trojan in 2009, this ...

On Apr 28, 2018
@CyberScoopNews shared
Researchers found a semi-legit way to turn an Amazon Echo into a wiretap https://t.co/71K0kNvQZ9

Researchers found a semi-legit way to turn an Amazon Echo into a wiretap

Security researchers have used Amazon's Echo to remotely listen to people's nearby conversations, according to cybersecurity firm CheckMarx.

On Mar 28, 2018
@cylanceinc shared
Combating the Scourge of Fileless Attacks https://t.co/1hmlHx4P9P #infosec #security #malware https://t.co/qKQ328KZ5e

Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive, signature-based, blacklists.

What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? Cylance provides a frontline ...

On Apr 18, 2018
@AccentureSecure shared
Read “Gaining ground on the cyber attacker” for five steps to #cyberresilience by our @LabsGuy. https://t.co/lk5bqgbK55 https://t.co/iwYkfxPkfU

2018 State of Cyber Resilience

Now is the time to fully realize the benefits of investments in cyber resilience. Read More.

On Aug 22, 2018
@Mike_Mimoso shared
This is a great read from @a_greenberg on the #NotPetya attack from inside victims like Maersk. https://t.co/jOoq68i2M8

The Untold Story of NotPetya, the Most Devastating Cyberattack in History

Crippled ports. Paralyzed corporations. Frozen government agencies. How a single piece of code crashed the world.

On Jul 8, 2018
@cylanceinc shared
Black Hat USA 2018 Presentation: The Predictive Advantage: Prevent Zero-Day Attacks Before They Start https://t.co/CieRFBG5CV #infosec #security #BHUSA https://t.co/apXHi3lAbD

Everything Cylance at Black Hat USA 2018!

Come celebrate Black Hat’s 21st birthday in Las Vegas on August 4th-9th 2018, with the team from Cylance!

On Aug 12, 2018
@_willash shared
RT @CybersecuritySF: Something I wrote.. if you think it's worth sharing, go ahead - Young girls are society's future cyber crime fighters #cybersecurity #cybercrime @GirlScouts https://t.co/4bcHuxU2KM via @csoonline

Young girls are society's future cyber crime fighters

There are lots of opportunities for girls in cybersecurity. The problem is they don't know what those opportunities are. Parents and guidance counselors can help.

On May 21, 2018
@CyberScoopNews shared
RT @gregotto: Jenovice Cyber Labs is ready to release their newest line of surveillance tech -- monitors/tracks devices over an entire city. Also comes w/ the ability to inject exploits into targets https://t.co/svc0ojVA9E https://t.co/8VxlGkhUsw

Meet the Israeli company ready to sell citywide surveillance

Israeli company Jenovice Cyber Labs is poised to launch new products that monitor everything from prisons to heavily populated areas.

On May 6, 2018
@CyberScoopNews shared
U.S. Cyber Command chief calls for debate around hacking unit's authorities https://t.co/SkA8PzJblB

U.S. Cyber Command chief calls for debate around hacking unit's authorities

Lawmakers and Pentagon leadership are considering plans that could one day provide U.S. Cyber Command with additional authorities to more easily operate outside declared war zones, two ...

On Feb 18, 2018
@SANSDefense shared
Learn how to leverage existing non-security capabilities and core competencies to help reduce security challenges in automotive products at #SANSAutoSummit | May 7-8 | Chicago | Summit agenda: https://t.co/EZvcp8xqLL https://t.co/EHFTfIBuV6

Automotive Cybersecurity Summit

Information Security Training Chicago, IL from SANS Institute. Cybersecurity training courses in Chicago

On May 9, 2018
@CyberScoopNews shared
Inside the new, state-of-the-art U.S. cyberwarfare bunker https://t.co/dTL7jvFJvP by @Bing_Chris https://t.co/1BtpHKSBvV

Inside the U.S.' new state-of-the-art cyberwarfare bunker

The Integrated Cyber Center is the latest step to equip U.S. "cyberwarriors" with the infrastructure needed to combat online threats.

On Mar 9, 2018
@symantec shared
Don't miss @CSOonline discuss how #DLP has evolved with Symantec's Senior Vice President of Information Protection, Nico Popp. https://t.co/dBBXWJyX8C https://t.co/O127dCeFBq

Detecting malicious insiders: a new use case for data loss prevention

A discussion with Symantec’s Nico Popp about how DLP has evolved over the years.

On May 11, 2018
@threatpost shared
This #Facebook-spread #malware enables credential theft, cryptomining, according to @radware researchers: https://t.co/tBE7uTyxqK

New Facebook-Spread Malware Triggers Credential Theft, Cryptomining

A new malware campaign being rapidly spread on Facebook is infecting users' systems to perform credential theft, cryptomining, and click fraud.

Top Influencers

Picture of @cylanceinc

Prevent #cyberattacks with #ArtificialIntelligence. Need support? Contact @CylanceSupport.

Follow 8.9k Followers

Picture of @CyberScoopNews

Capitol Hill, Silicon Valley and beyond. News, analysis and commentary from cybersecurity’s cutting edge. A @ScoopNewsGroup property.

Follow 938.0 Followers

Picture of @RSAsecurity

RSA helps organizations mitigate the risk of operating in a digital world – providing the ability to detect, investigate, & respond to advanced threats.

Follow 99.7k Followers

Picture of @AccentureSecure

Intelligence and insights to increase security effectiveness and improve business resilience. https://t.co/9dfUu8mIMs

Follow 12.5k Followers

Picture of @threatpost

Threatpost is the first stop for fast-breaking security news, conversations and analysis from around the world.

Follow 132.9k Followers

Picture of @NetworkWorld

The Connected Enterprise. Network World, from IDG, is the premier provider of news, intelligence and insight for network and IT executives.

Follow 102.2k Followers

Picture of @symantec

Helping companies, governments, and individuals secure their most important data wherever it lives. Need support? Contact @SymantecHelp

Follow 160.4k Followers

Picture of @SANSInstitute

SANS is the most trusted and by far the largest source for computer security, IT and information security training, certification and research in the world.

Follow 89.9k Followers

Picture of @kaspersky

Kaspersky Lab is the world’s largest privately held vendor of Internet security solutions for businesses and consumers.

Follow 274.3k Followers

Picture of @threatintel

Symantec Security Response brings you the latest threat intelligence from the IT security world.

Follow 67.5k Followers

Picture of @FireEye

FireEye offers a single platform that blends innovative security technologies, nation-state grade #threatintel, and world-renowned @Mandiant consulting.

Follow 243.7k Followers

Picture of @SteveGrobman

Passionate about defending the good people of earth against the #cybersecurity threats of today and tomorrow with @IntelSecurity

Follow 970.0 Followers

Picture of @cyberdefensemag

Cyber Defense Magazine - The Premier Source for IT Security and Compliance Information. http://t.co/JrLHX9E64N.

Follow 155.1k Followers

Picture of @Mandiant

Responding to the most critical cybersecurity incidents & empowering orgs to protect their assets. A @FireEye company.

Follow 91.8k Followers

Picture of @Mike_Mimoso

Editor-in-Chief, Threatpost

Follow 4.9k Followers

Picture of @WIRED

WIRED is where tomorrow is realized.

Follow 8.4M Followers

Picture of @a_greenberg

I'm a reporter for Wired and the author of This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information.

Follow 36.5k Followers

Picture of @_willash

Helping U.S. governments and schools defend against #cybersecurity threats. @CiscoSecurity sales leader for U.S. Public Sector. #securingthecountry

Follow 450.0 Followers

Picture of @StaySafeOnline

The National Cyber Security Alliance (NCSA) is a nonprofit that empowers people to use the Internet safely & securely. Co-founder of @STOPTHNKCONNECT campaign.

Follow 39.2k Followers

Picture of @SANSDefense

The Cyber Defense Curriculum @SANS Institute is the definitive source for cyber defense news, updates and events. This is your moment!

Follow 22.0k Followers