#cybersecurity search results

🚨 BREAKING: LAPSUS$ leaked Checkmarx's stolen GitHub data including source code, API keys, and credentials. The supply chain attack began March 23. Customer data wasn't stored in the repo. #BreakingNews #Cybersecurity #SupplyChainAttack #LAPSUS$

Archange_Shadow's tweet image. 🚨 BREAKING: LAPSUS$ leaked Checkmarx's stolen GitHub data including source code, API keys, and credentials. The supply chain attack began March 23. Customer data wasn't stored in the repo. #BreakingNews #Cybersecurity #SupplyChainAttack #LAPSUS$

⚠️ New threat actor on the radar ⚠️ 🥷🏻 Prinz MNT6 🗓️ added on April 28, 2026 #ransomNews #cybersecurity #newthreatactor

ransomnews's tweet image. ⚠️ New threat actor on the radar ⚠️

🥷🏻 Prinz MNT6
🗓️ added on April 28, 2026

#ransomNews #cybersecurity #newthreatactor

Google says quantum computers could crack Bitcoin's encryption in 9 minutes. 1.7M BTC already sitting in vulnerable addresses. ⚛️ 🕐 The attack window fits inside a single block confirmation hubs.li/Q04dnL920 #Cybersecurity #Crypto #QuantumComputing


Pentest-AI: Run Full Autonomous Pentests with One Command 🤖💀 Recon → Auth bypass → vuln discovery → exploit chaining → real PoCs → AI threat analysis → client-ready reports github.com/0xSteph/pentes… #CyberSecurity #Pentesting #RedTeam #BugBounty #AIsecurity


LiteLLM breach shows #AI supply chain risk has shifted — trusted code can act inside runtime, making continuous monitoring and control essential, says BlueRock's Harold Byun in this op-ed. #cybersecurity #CISO #infosec bit.ly/4vPkZso


A Chinese national accused in the Silk Typhoon cyberattacks has been extradited to the US. Nearly 13,000 US organizations were compromised, exposing COVID-19 research. International teamwork is making cybercrime riskier than ever. 🛡️ #cybersecurity #espionage Source: CyberScoop

efani's tweet image. A Chinese national accused in the Silk Typhoon cyberattacks has been extradited to the US. Nearly 13,000 US organizations were compromised, exposing COVID-19 research. International teamwork is making cybercrime riskier than ever. 🛡️ #cybersecurity #espionage
Source: CyberScoop

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

I have just completed the Login Brute Forcing module on HTB Academy! academy.hackthebox.com/achievement/16… #hackthebox #htbacademy #cybersecurity


AI isn't creating entirely new threats, but accelerating their arrival. Businesses must prepare for the inevitable influx of new vulnerabilities. What are the key implications, and what steps should be taken now? #AI #BusinessStrategy #Cybersecurity


📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

WPS Is Still a Risk ⚠️📶 Testing wireless security on networks with WPS enabled using mobile tools. Many routers still expose weak configurations — making proper setup critical for your safety. Share and Comment "WPS" 📶👇 #wifi #cybersecurity #wps #infosec #networksecurity


Registry Persistence 2026 — Run Keys, COM Hijacking & Boot Execute | Hacking Course Day 38 securityelites.com/day-38-registr… #bugbounty #cybersecurity

securityelit3s's tweet image. Registry Persistence 2026 — Run Keys, COM Hijacking & Boot Execute | Hacking Course Day 38

securityelites.com/day-38-registr…

#bugbounty #cybersecurity

⚡ The grid is changing—and so are the risks. We break down the security challenges behind Inverter-Based Resources (IBRs) . Watch now: youtu.be/wqGMCsx4Nro #Cybersecurity #IBR #EnergyGrid #CriticalInfrastructure #GridSecurity

archersec's tweet card. Archer

youtube.com

YouTube

Archer


Join the conversation at the 13th Cyber & SCADA Security & NIS2 Readiness for Power & Utilities Industry 2026 conference. 📅 15–16 Oct 2026 📍 Amsterdam ✅ Register & Download Agenda: cyber-scada-power-utilities.com #CyberSecurity #SCADASecurity #PowerUtilities

ProsperoEvents's tweet image. Join the conversation at the 13th Cyber & SCADA Security & NIS2 Readiness for Power & Utilities Industry 2026 conference.
📅 15–16 Oct 2026 
📍 Amsterdam

✅ Register & Download Agenda: cyber-scada-power-utilities.com

#CyberSecurity #SCADASecurity #PowerUtilities

باحثون حذروا من أن برمجية VECT 2.0 تفشل في تشفير الملفات الكبيرة وتتلفها نهائيًا بسبب خطأ في التصميم، ما يجعل استعادة البيانات مستحيلة حتى للمهاجمين أنفسهم، ويحوّل الهجوم إلى عملية مسح بيانات شاملة تستهدف أنظمة ويندوز ولينكس وESXi. #cybersecurity #الأمن_السيبراني


Simplify Cyber Risk Management with Cyrisma Deploy Cyrisma Agent for ConnectWise Automate and help clients detect vulnerabilities, monitor risks, and strengthen security with ease. techpio.com/plugins/produc… #CyberSecurity #ConnectWiseAutomate #MSPTools #RiskManagement #TechPIO

techpio_team's tweet image. Simplify Cyber Risk Management with Cyrisma

Deploy Cyrisma Agent for ConnectWise Automate and help clients detect vulnerabilities, monitor risks, and strengthen security with ease.

techpio.com/plugins/produc…

#CyberSecurity #ConnectWiseAutomate #MSPTools #RiskManagement #TechPIO

Digitale dreigingen stijgen: ransomware, zero days, supply chain risico en AI versterken aanvallen. Doe assetlijst, MFA, offline backups en incidentplan. cyberstop.nl/de-race-om-ai-… #cyberstop #cybersecurity


SOC 1 = trust in your financial controls. Automate evidence. Stay audit-ready. 👉 Learn more → bit.ly/soc1-ak #SOC1 #Compliance #CyberSecurity #Akitra

Akitra_Inc's tweet image. SOC 1 = trust in your financial controls.

Automate evidence. Stay audit-ready.

👉 Learn more → bit.ly/soc1-ak 

#SOC1 #Compliance #CyberSecurity #Akitra

MFA isn’t the full picture. Attackers can reuse active sessions to bypass it. Watch how it works, and how to stay protected. ow.ly/KzJH50YNbOF #Cybersecurity #MFA #SessionHijacking #ITSecurity


AI code assistants aren’t the risk - they’re the biggest opportunity for AppSec. Andrew Becherer (CISO at Sublime Security) on why slowing adoption is a mistake. Full episode - ciso.club/PracticalSecur… #CISO #CyberSecurity #AppSec #ThePracticalSecurityShow


Scams related to Social Security, Medicare, and financial accounts are becoming more common, which makes protecting your personal and financial information more important than ever. Read the article here: hubs.li/Q04cZp-40 #CyberSecurity #RetirementSafety

REAPFinancial's tweet image. Scams related to Social Security, Medicare, and financial accounts are becoming more common, which makes protecting your personal and financial information more important than ever.
Read the article here:
hubs.li/Q04cZp-40
#CyberSecurity #RetirementSafety

Protecting patient data is about trust and accountability. Strong data governance in EHR keeps information secure, accurate, and compliant. Cellma helps ensure safer, more efficient care delivery. To know more click here: riomed.com/our-accerditat… #CyberSecurity #DataSecurity

RioMed's tweet image. Protecting patient data is about trust and accountability. 

Strong data governance in EHR keeps information secure, accurate, and compliant. Cellma helps ensure safer, more efficient care delivery.

To know more click here: riomed.com/our-accerditat…

#CyberSecurity #DataSecurity

Cyber threats are rising… and so is the demand for Cybersecurity experts. Don’t just use the internet… learn how to protect it. Start Cybersecurity at Bizmarrow Technologies, Abuja today. To Start, call or WhatsApp us on 08088996437,09096669196. #cybersecurity #careergrowth


NEW THREAT INTEL: VECT Ransomware 2.0 - Russian RaaS with ChaCha20 bug acting as wiper on Windows/Linux/ESXi. 9 detections, 27 IOCs. intel.threadlinqs.com/#TL-2026-0432 #ThreatIntel #CyberSecurity #Ransomware #RaaS

threadlinqs's tweet image. NEW THREAT INTEL: VECT Ransomware 2.0 - Russian RaaS with ChaCha20 bug acting as wiper on Windows/Linux/ESXi. 9 detections, 27 IOCs. intel.threadlinqs.com/#TL-2026-0432 #ThreatIntel #CyberSecurity #Ransomware #RaaS

Protecting against threats means training your tools and people to recognize what's normal. By establishing a baseline and understanding your environment, you can detect abnormal activity, even when it uses existing tools. #Cybersecurity #EDR #ThreatDetection


Protecting against threats means training your tools and people to understand what's normal. Establishing a baseline for your environment is key to detecting abnormal activity and distinguishing it from everyday operations. #CyberSecurity #EDR


Dell has added quantum-ready protections to commercial PCs and upgraded backup, detection and recovery tools to help firms counter AI and post-quantum threats. #CyberSecurity #QuantumReady #DataProtection #AI techday.ie/story/dell-exp…


बदलते अपराधों पर महाराष्ट्र की स्मार्ट स्ट्राइक… टेक्नोलॉजी, स्पीड और सख्त रणनीति से सुरक्षित बनता राज्य। #CyberSecurity #SmartPolicing #DigitalSafety #CyberCrime #MumbaiPolice #SafeMaharashtra


Iranian group Handala claims a major data breach of U.S. Marines, saying they published nearly 2,400 service member details and threaten more. This highlights evolving cyber warfare, data as a strategic asset, and regional security risks. #CyberSecurityift.tt/sLZFx0G


🚨 BREAKING: LAPSUS$ leaked Checkmarx's stolen GitHub data including source code, API keys, and credentials. The supply chain attack began March 23. Customer data wasn't stored in the repo. #BreakingNews #Cybersecurity #SupplyChainAttack #LAPSUS$

Archange_Shadow's tweet image. 🚨 BREAKING: LAPSUS$ leaked Checkmarx's stolen GitHub data including source code, API keys, and credentials. The supply chain attack began March 23. Customer data wasn't stored in the repo. #BreakingNews #Cybersecurity #SupplyChainAttack #LAPSUS$

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

If malware is designed to be invisible… how do you catch it? AdaptixC2 blends into normal traffic using HTTP, DNS, and encryption. But it still leaves patterns. Are you watching for them? 👀 kas.pr/6yr1 #cybersecurity #threatintel

kaspersky's tweet image. If malware is designed to be invisible… how do you catch it?

AdaptixC2 blends into normal traffic using HTTP, DNS, and encryption.

But it still leaves patterns.

Are you watching for them? 👀
kas.pr/6yr1

#cybersecurity #threatintel

That airport Wi-Fi? Risky. With Kaspersky eSIM Store: 📶 Connect before you land 🌍 Internet in 150+ countries 🚫 Skip public Wi-Fi 🔐 Add Kaspersky VPN for extra protection 🎁 15% off with code KASPERESIM #esim #travelsmart #cybersecurity

kaspersky's tweet image. That airport Wi-Fi? Risky.

With Kaspersky eSIM Store:
📶 Connect before you land
🌍 Internet in 150+ countries
🚫 Skip public Wi-Fi

🔐 Add Kaspersky VPN for extra protection

🎁 15% off with code KASPERESIM

#esim #travelsmart #cybersecurity

🚀 From Zero to Ethical Hacker: A Clear Roadmap Stop consuming random content. Follow a structured path: Networking → OS → Programming → Security → Tools → Practice Consistency beats everything. #CyberSecurity #EthicalHacking #InfoSec

VivekIntel's tweet image. 🚀 From Zero to Ethical Hacker: A Clear Roadmap

Stop consuming random content. Follow a structured path:
Networking → OS → Programming → Security → Tools → Practice

Consistency beats everything.
#CyberSecurity #EthicalHacking #InfoSec

eJPT just leveled up. ☝️ • More hands-on labs • Updated real-world scenarios • New content, including generative AI for pentesters It’s built to match the skills the job actually demands today. Take a look 👉 bit.ly/4dKNbWX #CyberSecurity #PenTesting #RedTeam

SecurityTube's tweet image. eJPT just leveled up. ☝️

• More hands-on labs
• Updated real-world scenarios
• New content, including generative AI for pentesters

It’s built to match the skills the job actually demands today.

Take a look 👉 bit.ly/4dKNbWX

#CyberSecurity #PenTesting #RedTeam

Hunters 🚨 One resource you should definitely bookmark: bugbountyhunting.com Writeups. Resources. Real learning. No fluff. #BugBountyHunter #CyberSecurity #InfoSec #EthicalHacking

obscaries's tweet image. Hunters 🚨

One resource you should definitely bookmark:
 bugbountyhunting.com

Writeups. Resources. Real learning. No fluff.

#BugBountyHunter #CyberSecurity #InfoSec #EthicalHacking

🐧 Ciberseguridad dual: El arte de dominar la ciberseguridad en entornos Windows y Linux. 🪟 Domingos 3, 10, 17, y 24 de Mayo 2026. De 9:00 am a 12:00 pm (UTC -05:00). 📲 WhatsApp: wa.me/51949304030 🌎 Info: reydes.com/archivos/curso… #cybersecurity #infosec #security

Alonso_ReYDeS's tweet image. 🐧 Ciberseguridad dual: El arte de dominar la ciberseguridad en entornos Windows y Linux. 🪟 Domingos 3, 10, 17, y 24 de Mayo 2026. De 9:00 am a 12:00 pm (UTC -05:00). 📲 WhatsApp: wa.me/51949304030 🌎 Info: reydes.com/archivos/curso…

#cybersecurity #infosec #security

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

EU AI Act is being enforcing. Boards want proof, not promises. Most teams still can't answer: "Where does our AI security program actually stand?" 📥 That answer arrives May 12 → go.sans.org/PJjMWh #AISecurity #Cybersecurity

SANSInstitute's tweet image. EU AI Act is being enforcing. Boards want proof, not promises. Most teams still can't answer: "Where does our AI security program actually stand?"

📥 That answer arrives May 12 → go.sans.org/PJjMWh

#AISecurity #Cybersecurity

FIPS 140-2 retirement is now just 5 months away. Now is the time to review your environment and prepare for the transition to FIPS 140-3. Learn how Ubuntu Pro supports FIPS workloads: ubuntu.com/security/certi… #CyberSecurity #FIPS #OpenSource

Canonical's tweet image. FIPS 140-2 retirement is now just 5 months away. Now is the time to review your environment and prepare for the transition to FIPS 140-3.

Learn how Ubuntu Pro supports FIPS workloads: ubuntu.com/security/certi…

#CyberSecurity #FIPS #OpenSource

CISOs are asking: "How do we actually know if our AI security program is working?" The SANS AI Security Maturity Model™ eBook gives you the answer. Available May 12. Reserve your copy → go.sans.org/PJjMWh #AISecurity #Cybersecurity #CISO

SANSInstitute's tweet image. CISOs are asking: "How do we actually know if our AI security program is working?" The SANS AI Security Maturity Model™ eBook gives you the answer.

Available May 12.  Reserve your copy → go.sans.org/PJjMWh

#AISecurity #Cybersecurity #CISO

They are secretly spying on users and profiling them. Learn more: cnews.link/malicious-tikt… #Chrome #privacy #cybersecurity

Cybernews's tweet image. They are secretly spying on users and profiling them. Learn more: cnews.link/malicious-tikt…

#Chrome #privacy #cybersecurity

Sophos, a security company, warns about active abuse of QEMU: cnews.link/windows-hacker… #cybersecurity #Linux

Cybernews's tweet image. Sophos, a security company, warns about active abuse of QEMU: cnews.link/windows-hacker…

#cybersecurity #Linux

Loading...

Something went wrong.


Something went wrong.