🔊CyberGon
@Cyberwald_talks
I write and share posts on #cyber | #threat_intel | #ethical_hacking | #programming | #riskmanagement | #cisa | #ceh | #oscp | #cissp | #IT_auditing | #nature.
The US Treasury’s OCC disclosed an undetected major email breach for over a year ift.tt/MVDjNRG
How SOCs Triage Incidents in Seconds with Threat Intelligence cybersecuritynews.com/how-socs-triag…
cybersecuritynews.com
How SOCs Triage Incidents in Seconds with Threat Intelligence
When every minute counts, it’s important to have access to fresh threat intelligence at the tip of your finger. That’s what all high-performing SOC teams have in common.
✨ Red Canary ➕ @zscaler Today we are announcing Zscaler’s agreement to acquire Red Canary. It’s a major milestone in our journey. This is a significant step forward in our mission to improve security operations, not just for our customers, but for the entire cybersecurity…
Microsoft’s April update patches 126 flaws—but CVE-2025-29824, already exploited in ransomware attacks, has no fix for Windows 10. 🔗 More details: thehackernews.com/2025/04/micros… CISA demands federal agencies patch by April 29.
⚡️ New Malware Alert! Chinese-linked ToddyCat exploited an ESET flaw (CVE-2024-11859) to drop new malware TCESB — bypassing defenses and hijacking devices. Update now | Stay alert. Details 👉thehackernews.com/2025/04/new-tc…
Non-human identities (NHIs) are exploding — and leaking secrets faster than ever. In 2024: • 23.77M secrets leaked on GitHub (+25%) • NHIs outnumber humans 45-to-1 • 70% of leaked secrets still active • Private repos = 8x more leaks than public • Copilot = 40% more leaks •…
thehackernews.com
Explosive Growth of Non-Human Identities Creating Massive Security Blind Spots
23.77 million secrets leaked on GitHub in 2024 as non-human identities expand attack surfaces rapidly.
Police detains Smokeloader malware customers, seizes servers Read More (bleepingcomputer.com/news/security/…)
#subcat SubCat is a subdomain discovery tool that passively aggregates data from a variety of online sources to identify valid subdomains for websites. Designed with a modular and efficient architecture, SubCat is ideal for penetration testers, bug bounty hunters, and security…
Multiple vulnerabilities found in ICONICS industrial SCADA software ift.tt/r6JF0WH
cyberscoop.com
Multiple vulnerabilities found in ICONICS industrial SCADA software
A set of ICONICS SCADA software systems used in critical infrastructure around the world suffered from at least five known vulnerabilities.
#ddos #X_attack X hit by ‘massive cyberattack’ amid Dark Storm’s DDoS claims ift.tt/JrNURIz
United States Trends
- 1. Sedition 181K posts
- 2. Cheney 89.4K posts
- 3. Lamelo 7,133 posts
- 4. Texans 21K posts
- 5. Seditious 98.8K posts
- 6. Constitution 118K posts
- 7. Coast Guard 24.7K posts
- 8. Commander in Chief 55.5K posts
- 9. Seager 1,318 posts
- 10. First Take 47.8K posts
- 11. TMNT 4,540 posts
- 12. UCMJ 10.4K posts
- 13. Jeanie 2,113 posts
- 14. Last Ronin 1,885 posts
- 15. Trump and Vance 37.6K posts
- 16. UNLAWFUL 80.7K posts
- 17. Cam Newton 4,735 posts
- 18. Mark Walter 1,562 posts
- 19. Shayy 15K posts
- 20. Dizzy 7,445 posts
Something went wrong.
Something went wrong.