Hacking & Cybersecurity


WEEKLY REVIEW


Trends


Top hashtags

Top influencers

RSAConference
cyberdefensemag
DarkReading
InfosecurityMag
CyberScoopNews
RSAsecurity
SANSInstitute
cylanceinc
whitehatsec

Top sources

darkreading.com
cyberdefensemagazine.com
infosecurity-magazine.com
rsaconference.com
cyberscoop.com
insidecybersecurity.com
threatvector.cylance.com
securityweek.com
techcrunch.com

Get updates live! Follow us on

Subscribe to our mailing list

News

Cyber Security Statistics for 2019

On Mar 21, 2019
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky thrilled to share #CYBERSECURITY #STATISTICS for 2019 exclusively on #CDM thanks to https://t.co/g9ZOdd6RsC https://t.co/AW2RhOeO3N #CYBERCRIME #CYBERJOBS #CYBERRISK #CYBERSPENDING https://t.co/JRW8oVscQa
Open

Just 38% of global organizations claim that they are equipped and able to handle a complex cyber attack (Source: IBM) Perhaps one of the most alarming cyber security statistics on this list is the understanding that 62% of global organizations cannot claim that they are equipped to handle ...

On Mar 21, 2019
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky thrilled to share #CYBERSECURITY #STATISTICS for 2019 exclusively on #CDM thanks to https://t.co/g9ZOdd6RsC https://t.co/AW2RhOeO3N #CYBERCRIME #CYBERJOBS #CYBERRISK #CYBERSPENDING https://t.co/JRW8oVscQa
Open

Cyber Security Statistics for 2019

Just 38% of global organizations claim that they are equipped and able to handle a complex cyber attack (Source: IBM) Perhaps one of the most alarming cyber security statistics on this list ...



On Mar 20, 2019
@CTIN_Global shared
Microsoft Office Dominates Most Exploited List https://t.co/83Tqjvr3oO
Open

Microsoft Office Dominates Most Exploited List

Lone Android vulnerability among the top 10 software flaws most abused by cybercriminals.

On Mar 22, 2019
@SecurityWeek shared
Industry Reactions to Norsk Hydro Breach: Feedback Friday https://t.co/ZzAffeoFFL
Open

Industry Reactions to Norsk Hydro Breach: Feedback Friday

Industry professionals comment on the Norsk Hydro ransomware attack and its implications.

On Mar 22, 2019
@gcluley shared
Be sure to check out the latest "Smashing Security" podcast, with special guest (and Pi-lover) @duckblog from @Sophos. Find us in your fave podcast app or at https://t.co/WUfCF4g4Q3 Apple Podcasts: https://t.co/FOyLoof0F9 Google Podcasts: https://t.co/G9Sfg9o51u https://t.co/jLXhRz8vZX
Open

By Graham Cluley, Carole Theriault

Download past episodes or subscribe to future episodes of Smashing Security by Graham Cluley, Carole Theriault for free.

On Mar 22, 2019
@AccentureSecure shared
#Cybercrime is increasing, taking more time to resolve and costing orgs more. But there is good news: https://t.co/NWbVUuj05U #cybersecurity https://t.co/1TDr5NCaAh
Open

Ninth Annual Cost of Cybercrime Study

In the 9th Cost of Cybercrime Study, Accenture and Ponemon Institute reveal how to reduce cybercrime cost, improve investments and unlock economic value.

On Mar 21, 2019
@DarkReading shared
Hacker AI vs. Enterprise AI: A New Threat https://t.co/gvY8RNDxv9 by Satish Abburi @@ElysiumAnalytic #artificialintelligence #machinelearning #hackers
Open

Hacker AI vs. Enterprise AI: A New Threat

Artificial intelligence and machine learning are being weaponized using the same logic and functionality that legitimate organizations use.

On Mar 20, 2019
@schneierblog shared
An Argument that Cybersecurity Is Basically Okay https://t.co/olciNGp8KW
Open

An Argument that Cybersecurity Is Basically Okay

WE DON'T KNOW if there are foreign nation-states that have collected ample access to our industrial systems so they can cause massive disruption at their will: Such access would be hoarded ...

On Mar 23, 2019
@SANSInstitute shared
RT @Panda_Security: Panda Adaptive Defense put to the test by @SANSInstitute Find out more about how this study was carried out, as well as its findings, in the webcast on March 27 at 15:00 UTC ➡ https://t.co/RdB4EThYQF https://t.co/r3ElvSx1GC
Open

Panda Adaptive Defense put to the test by SANS Institute

SANS Institute, one of the most influential institutions in the cybersecurity world, has published a review of the solution, Panda Adaptive Defense 360.

On Mar 22, 2019
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky thrilled to learn about Most Serious Threats Facing Online Businesses #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/ibH5AvgyYd by Matt Davis @fhsales who we hope to see @BlackHatEvents https://t.co/JUZAqaTHvL
Open

The Four Most Serious Threats Facing Online Businesses In 2018

by Matt Davis, Future Hosting Online crime will cost businesses $2 trillion in 2019. SME’s can’t afford to ignore the risk posed by DDoS attacks, ransomware, phishing, and crypto ...

On Mar 19, 2019
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky thrilled to learn about industry data leaks #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/wHME2K6Opy by Mark Wah @markwah who we hope to see @BlackHatEvents https://t.co/QW1Enx0VyI
Open

What recent industry data leaks tell us about CYBER-SECURITY

The cat and mouse game of hackers chasing data and organizations working to secure their customers’ personal information continues, requiring security teams to regularly review their ...

Browse topics

Get updates live! Follow us on

Subscribe to our mailing list

On Mar 22, 2019
@CTIN_Global shared
Iasiello_E: Hackers hit government agencies and banks hard in Singapore https://t.co/NT370MaZJV
Open

Hackers hit government agencies and banks hard in Singapore

An international company specialising in preventing cyberattacks presented an analysis of the hi-tech crime landscape in Asia in 2018 and concluded th

On Mar 19, 2019
@SecurityWeek shared
Aluminum Giant Norsk Hydro Hit by Ransomware - https://t.co/eU4nf2qDsK < New details from press conference
Open

Aluminum Giant Norsk Hydro Hit by Ransomware

Norwegian metals and energy giant Norsk Hydro has been hit by a serious ransomware attack that impacted operations, forcing the company to resort to manual processes.

On Mar 18, 2019
@RSAsecurity shared
RT @DeloitteRiskFin: If #digital technologies are to deliver on their immense promise, evolving cyber vulnerabilities and threats must be addressed. What does this mean for your organization? https://t.co/7ZKbKYI7I4
Open

Protecting against the changing cybersecurity risk landscape

In order for digital technologies to deliver on their immense promise, evolving cyber vulnerabilities and threats need to be abated.

On Mar 20, 2019
@symantec shared
RT @SymantecCanada: [email protected]'s Robert Arandjelovic discusses the rise of #formjacking with @HowardITWC from @itworldca. Here's what you need to know about the latest #hacking technique: https://t.co/aEmwyXMegy #ISTR https://t.co/gGFGBHaMX2
Open

Beware of rise of formjacking, says Symantec

Email remains among the biggest threats enterprises faced in 2018, according to a vendor report, but the increase in formjacking -- stealing

On Mar 21, 2019
@arstechnica shared
Microsoft ships antivirus for macOS as Windows Defender becomes Microsoft Defender https://t.co/1uYruUPEwu by @drpizza
Open

Microsoft ships antivirus for macOS as Windows Defender becomes Microsoft Defender

Microsoft is expanding the reach of its device management services.

On Mar 21, 2019
@SecurityWeek shared
How Three of 2018's Critical Threats Used Email to Execute Attacks - https://t.co/FfmgxZ9eUI
Open

How Three of 2018's Critical Threats Used Email to Execute Attacks

Understanding the latest attacks and how attackers innovate and operate can help security professionals identify and close gaps in email security.

On Mar 18, 2019
@gcluley shared
BBC News has published a nice profile of Emsisoft malware analyst Fabian Wosar https://t.co/uQ5mNG4Wv0 https://t.co/xcbyjrfZmM
Open

Hated and hunted

The perilous life of the computer virus cracker who makes powerful enemies online

On Mar 19, 2019
@kaspersky shared
Driverless vehicles are expected to be the norm within the next decade. But many security concerns still need to be addressed. #autonomousvehicles #selfdriving https://t.co/TJhluxnmpB
Open

Privacy Regulations Needed for Next-Gen Cars

With wide deployment expected in the next decade, the driverless automobile landscape looks fraught – from road safety to data protection.

On Mar 20, 2019
@CyberScoopNews shared
New FIN7 hacking tools uncovered months after Ukrainian arrests https://t.co/ySbxVLVJiv by @jeffstone500 https://t.co/isKgXdZ8li
Open

New FIN7 hacking tools uncovered months after three suspects were arrested

There is some evidence to suggest the group’s infrastructure is starting to reappear after months, according to research published Wednesday by Flashpoint.