You might like
Reacting to a #cyrberattack is not when you want to realize that you need a proper security program. Denizen Security provides executive consulting to launch or reboot your information security program right. denizensecurity.com
Free "Awesome Incident Response" book "aimed to help security leaders, analysts, and DFIR teams." github.com/hevnsnt/Awesom…
Vector databases are built to handle unstructured or semi-structured data, such as embeddings or feature vectors generated by machine learning models. These vectors can represent a wide range of data types, including images, text, audio, and more. github.com/dangkhoasdc/aw…
AI prompt cheatsheet. Get more from your chats with smarter prompts. github.com/f/awesome-chat…
🔒 Researchers have uncovered an ingenious side-channel attack that can recover secret keys from a device using video footage of its power LED. Find out how threat actors exploit this: thehackernews.com/2023/06/resear… #cybersecurity #informationtechnology
OPA enables declarative authorization policy that can be applied refactoring, green-field, and legacy. While refactoring, override policy execution buried in code, confirm that it executes as expected, and deprecate that quasi-policy buried in your code base.
Open Policy Agent is something every architect should get familiar with. openpolicyagent.org
openpolicyagent.org
Open Policy Agent - Homepage | Open Policy Agent
Open Policy Agent - Homepage | Open Policy Agent
One for the bookmarks list. Of course, many decisions must be made and attention given to integrating any of these services with business processes. linkedin.com/pulse/controls…
linkedin.com
Controls Cheatsheet for AWS, Azure and GCP
AWS AWS Identity and Access Management (IAM) ISO 27001: A.9 - Access Control PCI DSS: Requirement 7 - Restrict access to cardholder data by business need-to-know FedRAMP: AC-2 - Account Management...
"...Easily exploited vulnerability allows any unprivileged user to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration" Active exploits. blog.qualys.com/vulnerabilitie…
I started a group to connect leaders (biz, tech, medical, etc.) in the healthcare startup space. Would love to have you as a member. meetup.com/healthcare-tec… #Meetup #Minneapolis via @Meetup
meetup.com
MN Health Startup Hub | Meetup
We're bringing together professionals in the healthcare startup community.Meetups are for leaders and professionals who are navigating the business, product, legal, compliance, and security space as...
The entire dataset of 1.7M+ arXiv papers is now available on @kaggle. We can't wait to see what the machine learning community will do with it! blogs.cornell.edu/arxiv/2020/08/…
Hackers stole Twitter employee credentials via phone phishing - @serghei bleepingcomputer.com/news/security/…
Chip-based payment cards are supposed to make it infeasible for skimmers or malware to clone your card when you pay for something by dipping the chip vs. swiping the stripe. But recent breaches at U.S. merchants suggest much may depend on where you bank. krebsonsecurity.com/2020/07/is-you…
Tor Browser Leaks "Secure Cookies" Into Insecure Backend Channels. github.com/alecmuffett/eo…
Hackers stole GitHub and GitLab OAuth tokens from Git analytics firm Waydev buff.ly/3jDUQrD
Emotet botnet is now heavily spreading QakBot malware - @Ionut_Ilascu bleepingcomputer.com/news/security/…
bleepingcomputer.com
Emotet botnet is now heavily spreading QakBot malware
Researchers tracking Emotet botnet noticed that the malware started to push QakBot banking trojan at an unusually high rate, replacing the longtime TrickBot payload.
"The three golden rules to ensure computer security are: do not own a computer; do not power it on; and do not use it." -- Robert Morris
"There are strong indications that this attack was perpetrated by individuals who’ve traditionally specialized in hijacking social media accounts via SIM swapping.... krebsonsecurity.com/2020/07/whos-b…
Twitter Attack Raises Concerns Over its Internal Controls ow.ly/KKue50ABkZn by @jaivijayan #twitter #cyberattack #bitcoin #scam
United States Trends
- 1. Thanksgiving 373K posts
- 2. Golesh 2,102 posts
- 3. Fani Willis 12.1K posts
- 4. Trumplican 2,824 posts
- 5. Hong Kong 15.9K posts
- 6. #WipersDayGiveaway N/A
- 7. Khabib 6,576 posts
- 8. Stranger Things 158K posts
- 9. Africans 26.1K posts
- 10. Riker N/A
- 11. NextNRG N/A
- 12. Camp Haven 6,763 posts
- 13. Ruth 13.6K posts
- 14. Tom Hardy 1,204 posts
- 15. #TejRan 4,018 posts
- 16. Elijah Moore N/A
- 17. #Wednesdayvibe 3,597 posts
- 18. #wednesdaymotivation 6,709 posts
- 19. Fassbender N/A
- 20. #PuebloEnBatallaYVictoria 3,692 posts
Something went wrong.
Something went wrong.