#cybersecurity search results

Thanks for the shoutout, @Ekoparty! We're excited to support your event and the larger #InfoSec community in #Miami, and look forward to achieving great things working together. 💜 #CyberSecurity #Florida #Community #Partnership


Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️ Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags one lab at a time. On to the next challenge 🚀 #CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec

Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec
Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec
Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec
Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec

Attackers use GitHub attachments to spread a stealthy infostealer with advanced evasion tactics, abusing trusted CDN links to bypass defenses and steal sensitive data, @Cyderes reported. #cybersecurity #CISO #infosec bit.ly/3QjZpMt


Critical @github flaw let attackers trigger RCE via issue submission, risking token theft. @Microsoft patched it, highlighting urgent need to secure CI/CD pipelines. #cybersecurity #CISO #infosec bit.ly/4tKa4z3


🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev) Not beginner fluff — real material: • AV/EDR bypass • Buffer overflow • AD attacks • OSINT & recon • Bug bounty • SOC & threat hunting Download 👇 drive.google.com/drive/folders/… #CyberSecurity #EthicalHacking

VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking

Security Field Day is April 29-30! 📆 🔐 #XFD15 @NetworkingNerd & Fernando Montenegro of @TheFuturumGroup present Wednesday on YouTube, LinkedIn & website. 🔻 YouTube: youtube.com/techfieldday 🔹 LinkedIn: linkedin.com/company/tech-f… #Cybersecurity #FuturumResearch #TFDLive #AI

TechFieldDay's tweet image. Security Field Day is April 29-30! 📆 🔐 #XFD15

@NetworkingNerd & Fernando Montenegro of @TheFuturumGroup present Wednesday on YouTube, LinkedIn & website.

🔻 YouTube: youtube.com/techfieldday 
🔹 LinkedIn: linkedin.com/company/tech-f… 

 #Cybersecurity #FuturumResearch #TFDLive #AI

If you use Linux, which distro did you start with? 👇 #Linux #CyberSecurity #InfoSec #TechTwitter #LearnInPublic


NEW THREAT INTEL: Harvester APT GoGra Linux Backdoor - Ports GoGra malware to Linux, abuses Microsoft Graph API via Outlook mailbox for covert C2. 9 detections, 20 IOCs. intel.threadlinqs.com/#TL-2026-0410 #ThreatIntel #CyberSecurity #APT #Linux

threadlinqs's tweet image. NEW THREAT INTEL: Harvester APT GoGra Linux Backdoor - Ports GoGra malware to Linux, abuses Microsoft Graph API via Outlook mailbox for covert C2. 9 detections, 20 IOCs. intel.threadlinqs.com/#TL-2026-0410 #ThreatIntel #CyberSecurity #APT #Linux

🚨 Threat actors signal their moves if you know where to look. Join us for a webinar with @flaresystems to learn how security teams can cut through dark web noise and identify early attack indicators. 🎯 Register now: event.on24.com/wcc/r/5288912/… #cybersecurity #threatintel #webinar


Every system works, until it meets the wrong input. #CyberSecurity #EthicalHacking #InfoSec #TechTwitter


📢⚠️ Discord-linked group accessed Claude Mythos Preview through a third-party vendor environment, prompting an investigation by Anthropic. Read: hackread.com/discord-access… #CyberSecurity #Anthropic #Mythos #Claude #AI #Discord #DataBreach


UpGuard reports 198 million US voter records leaked from a misconfigured GOP analytics firm database. Personal info at risk. #RNCData #DataLeak #CyberSecurity


Cyber threats aren’t slowing down — neither should your skills. Black Hat MasterClass delivers live, one‑day intensive training led by real practitioners. ⏰ Early Registration rates end April 27 👉 Register now: blackhat.com/trainings/mast… #BlackHat #CyberSecurity #InfoSecTraining

BlackHatEvents's tweet image. Cyber threats aren’t slowing down — neither should your skills.
Black Hat MasterClass delivers live, one‑day intensive training led by real practitioners.
⏰ Early Registration rates end April 27

👉 Register now: blackhat.com/trainings/mast…

#BlackHat #CyberSecurity #InfoSecTraining

📢⚠️ Bluesky is back online after a roughly 24-hour DDoS attack disrupted services, with the Iran-linked 313 Team claiming responsibility. Read: hackread.com/bluesky-online… #CyberSecurity #CyberAttack #DDoSAttack #Bluesky #Iran #313Team


Claude found 500+ zero-days in Vim, FreeBSD, and Emacs in ONE month. Tools like CodeQL and AFL++ missed them all. This isn't just a Vim problem. It's a signal that your entire SAST toolchain has a documented blind spot. aithinkerlab.com/mad-bugs-month… #CyberSecurity #MADBugs2026

Navneet_PM's tweet image. Claude found 500+ zero-days in Vim, FreeBSD, and Emacs in ONE month. Tools like CodeQL and AFL++ missed them all.  This isn't just a Vim problem. It's a signal that your entire SAST toolchain has a documented blind spot. aithinkerlab.com/mad-bugs-month… 

#CyberSecurity #MADBugs2026

Cyberaanvallen worden slimmer en gerichter met focus op ransomware, kwetsbaarheden, datadiefstal en identiteit. Snel patchen en MFA zijn cruciaal. cyberstop.nl/spanje-ontmant… #cyberstop #cybersecurity


Bissa Scanner Exposed: AI-Assisted Mass Exploitation and Credential Harvesting dlvr.it/TS9PGL #CyberSecurity #DataPrivacy #CredentialHarvesting #Exploitation #AI

blueteamsec1's tweet image. Bissa Scanner Exposed: AI-Assisted Mass Exploitation and Credential Harvesting dlvr.it/TS9PGL #CyberSecurity #DataPrivacy #CredentialHarvesting #Exploitation #AI

L’armée américaine explore Bitcoin 👀 👉 L’amiral Samuel Paparo annonce le lancement d’un nœud BTC 👉 Tests pour cybersécurité & analyse réseau La blockchain devient un enjeu stratégique 🔐 #Bitcoin #Crypto #Cybersecurity #Web3 #Blockchain


🧪🔐 kyber ransomware experiments with post-quantum encryption A new ransomware strain is testing Kyber1024 encryption to target Windows and VMware ESXi systems. learn more bleepingcomputer.com #ransomware #postquantum #cybersecurity #infosec #security

Strivehawk's tweet image. 🧪🔐 kyber ransomware experiments with post-quantum encryption
A new ransomware strain is testing Kyber1024 encryption to target Windows and VMware ESXi systems. learn more bleepingcomputer.com
#ransomware #postquantum #cybersecurity #infosec #security

🤖 Surge in Bomgar RMM Exploitation Critical supply chain vulnerabilities are putting MSPs and IT teams at risk. Attackers are pivoting from trusted tools to internal networks. ↳ Full technical alert & source: Link in Bio 🔗 #CyberSecurity #Infosec #RMM #Automation


new #phishing at hXXps://www[.]DropCatch[.]com/domain/owfield[.]com | 104.20.47.210 | None | CLOUDFLARENET - Cloudflare, Inc. | ASN AS13335 | #infosec #cybersecurity phishstats.info/search/2319745…

PhishStats's tweet image. new #phishing at hXXps://www[.]DropCatch[.]com/domain/owfield[.]com | 104.20.47.210 | None | CLOUDFLARENET - Cloudflare, Inc. | ASN AS13335 | #infosec #cybersecurity

phishstats.info/search/2319745…

⚠️ Dark-Web Alert 🇺🇸 🏢 The Galliher Law Firm 🌐 galliher-law.com 💀 Listed by DragonForce | Blog 📊 436 GB 🔗 threatcluster.io/dark-web/under… #DarkWeb #DragonforceBlog #CyberSecurity #ThreatIntel

threatcluster's tweet image. ⚠️ Dark-Web Alert 🇺🇸

🏢 The Galliher Law Firm
🌐 galliher-law.com
💀 Listed by DragonForce | Blog
📊 436 GB

🔗 threatcluster.io/dark-web/under…
#DarkWeb #DragonforceBlog #CyberSecurity #ThreatIntel

⚠️ Dark-Web Alert 🇺🇸 🏢 The Galliher Law Firm 🌐 galliher-law.com 💀 Listed by DragonForce | Blog 📊 436 GB 🔗 threatcluster.io/dark-web/under… #DarkWeb #DragonforceBlog #CyberSecurity #ThreatIntel

threatcluster's tweet image. ⚠️ Dark-Web Alert 🇺🇸

🏢 The Galliher Law Firm
🌐 galliher-law.com
💀 Listed by DragonForce | Blog
📊 436 GB

🔗 threatcluster.io/dark-web/under…
#DarkWeb #DragonforceBlog #CyberSecurity #ThreatIntel

⚠️ Dark-Web Alert 🇬🇷 🏢 Primius Law Firm 🌐 primiuslawfirm.gr 💀 Listed by DragonForce | Blog on dark-web paste site 📊 71 GB · legal 📅 Posted 22 Apr 2026 🔗 threatcluster.io/dark-web/under… #DarkWeb #DragonforceBlog #CyberSecurity #ThreatIntel

threatcluster's tweet image. ⚠️ Dark-Web Alert 🇬🇷

🏢 Primius Law Firm
🌐 primiuslawfirm.gr
💀 Listed by DragonForce | Blog on dark-web paste site
📊 71 GB · legal
📅 Posted 22 Apr 2026

🔗 threatcluster.io/dark-web/under…
#DarkWeb #DragonforceBlog #CyberSecurity #ThreatIntel

⚠️ Dark-Web Alert 🇬🇷 🏢 Primius Law Firm 🌐 primiuslawfirm.gr 💀 Listed by DragonForce | Blog on dark-web paste site 📊 71 GB · legal 📅 Posted 22 Apr 2026 🔗 threatcluster.io/dark-web/under… #DarkWeb #DragonforceBlog #CyberSecurity #ThreatIntel

threatcluster's tweet image. ⚠️ Dark-Web Alert 🇬🇷

🏢 Primius Law Firm
🌐 primiuslawfirm.gr
💀 Listed by DragonForce | Blog on dark-web paste site
📊 71 GB · legal
📅 Posted 22 Apr 2026

🔗 threatcluster.io/dark-web/under…
#DarkWeb #DragonforceBlog #CyberSecurity #ThreatIntel

The Access Control Mistake Everyone Makes If your CUI lives in a folder called “Public”… we need to talk. Not everyone needs access to everything. Isolate data, control access, & know where your CUI actually lives. #CyberSecurity #Compliance #CMMC #DataProtection


Indie book recommendations trend online, helping lesser-known authors gain exposure through viral reviews and reading lists. #CyberSecurity #TravelGoals


📢⚠️ Discord-linked group accessed Claude Mythos Preview through a third-party vendor environment, prompting an investigation by Anthropic. Read: hackread.com/discord-access… #CyberSecurity #Anthropic #Mythos #Claude #AI #Discord #DataBreach


Kaspersky found a new wiper targeting Venezuela’s energy sector. Lotus Wiper fully destroys systems—no ransom, no recovery. It uses scripts to disable defenses, then wipes drives, deletes backups, and erases files using native Windows tools. #cybersecurity #hacking

donald_mxo's tweet image. Kaspersky found a new wiper targeting Venezuela’s energy sector.

Lotus Wiper fully destroys systems—no ransom, no recovery. It uses scripts to disable defenses, then wipes drives, deletes backups, and erases files using native Windows tools.

#cybersecurity #hacking

A “wrong number” text scam tricks you into replying and building trust to try to steal your personal information. hubs.la/Q04cW4RZ0 #KnowBe4 #Cybersecurity #SecurityTip

kellerschroeder's tweet image. A “wrong number” text scam tricks you into replying and building trust to try to steal your personal information. hubs.la/Q04cW4RZ0
#KnowBe4 #Cybersecurity #SecurityTip

Critical @github flaw let attackers trigger RCE via issue submission, risking token theft. @Microsoft patched it, highlighting urgent need to secure CI/CD pipelines. #cybersecurity #CISO #infosec bit.ly/4tKa4z3


Change "500 failed logins" to "5" in a log file. Your AI will classify an active brute-force attack as normal traffic. No alerts. No investigation. #cybersecurity #AI


Very important, provided our frequency of indulging in this. What can happen can be extremely messy. Observe caution #wifi #coffeeshops #cybersecurity #hackers

Avoid using public Wi-Fi at cafes or airports. Hackers on the same network can intercept your connection to steal passwords, bank details, and private data. If you have to connect, use a VPN to encrypt your traffic or use your mobile data or hotspot instead.



Worried about cyber incidents? Some law firms, like Spencer Fane, offer $0 retainer cybersecurity groups. They handle deconfliction and paperwork, ensuring you have an attorney ready to answer when you need them most. #Cybersecurity #LegalTips


ABC Nigeria hosted its 5th Cybersecurity Conference, uniting leaders across finance, gov’t & tech. Key message: Nigeria’s cyber defence must be unified—and urgent. With AI accelerating threats, real-time response is critical. The work continues. #Cybersecurity #Nigeria

ABCouncil_ng's tweet image. ABC Nigeria hosted its 5th Cybersecurity Conference, uniting leaders across finance, gov’t & tech. Key message: Nigeria’s cyber defence must be unified—and urgent. With AI accelerating threats, real-time response is critical. The work continues. #Cybersecurity #Nigeria
ABCouncil_ng's tweet image. ABC Nigeria hosted its 5th Cybersecurity Conference, uniting leaders across finance, gov’t & tech. Key message: Nigeria’s cyber defence must be unified—and urgent. With AI accelerating threats, real-time response is critical. The work continues. #Cybersecurity #Nigeria
ABCouncil_ng's tweet image. ABC Nigeria hosted its 5th Cybersecurity Conference, uniting leaders across finance, gov’t & tech. Key message: Nigeria’s cyber defence must be unified—and urgent. With AI accelerating threats, real-time response is critical. The work continues. #Cybersecurity #Nigeria
ABCouncil_ng's tweet image. ABC Nigeria hosted its 5th Cybersecurity Conference, uniting leaders across finance, gov’t & tech. Key message: Nigeria’s cyber defence must be unified—and urgent. With AI accelerating threats, real-time response is critical. The work continues. #Cybersecurity #Nigeria

📌 DEVELOPING: Anthropic investigates a potential security breach of its new Mythos AI model, which was recently deployed to select companies for software vulnerability detection. #Anthropic #CyberSecurity


Cybersecurity dreigingen worden slimmer en gerichter. Organisaties moeten sneller patchen, beter monitoren, menselijk gedrag trainen en data beschermen. cyberstop.nl/ai-tools-helpe… #cyberstop #cybersecurity


🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev) Not beginner fluff — real material: • AV/EDR bypass • Buffer overflow • AD attacks • OSINT & recon • Bug bounty • SOC & threat hunting Download 👇 drive.google.com/drive/folders/… #CyberSecurity #EthicalHacking

VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking

📹 تم الانتهاء من تسجيل جميع فيديوهات دورة CPTS Prep، وهي الآن متاحة بالكامل عبر أكاديمية الدرع الأخضر 🛡. ⚔️صُممت الدورة بطريقة احترافية ومتكاملة لتساعدك في التحضير لشهادة CPTS، بإسلوب عملي وتطبيقي يغطي جميع محاور المسار بوضوح وشمولية. 👇🏻 #الأمن_السيبراني #CPTS #CyberSecurity

GREENARM0R's tweet image. 📹 تم الانتهاء من تسجيل جميع فيديوهات دورة CPTS Prep، وهي الآن متاحة بالكامل عبر أكاديمية الدرع الأخضر 🛡.

⚔️صُممت الدورة بطريقة احترافية ومتكاملة لتساعدك في التحضير لشهادة CPTS، بإسلوب عملي وتطبيقي يغطي جميع محاور المسار بوضوح وشمولية.
👇🏻
#الأمن_السيبراني #CPTS #CyberSecurity

Akamai SIRT warns of a new Mirai campaign weaponizing EOL D-Link routers via CVE-2025-29635. Protect your network from zombie botnets—retire old hardware now. #MiraiBotnet #DLink #CyberSecurity #IoT #CVE202529635 #InfoSec #Botnet #DDoS securityonline.info/mirai-botnet-d…

the_yellow_fall's tweet image. Akamai SIRT warns of a new Mirai campaign weaponizing EOL D-Link routers via CVE-2025-29635. Protect your network from zombie botnets—retire old hardware now.

#MiraiBotnet #DLink #CyberSecurity #IoT #CVE202529635 #InfoSec #Botnet #DDoS
securityonline.info/mirai-botnet-d…

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

🔐 Control access smarter with Microsoft Sentinel! 👥 Resource-based RBAC for fine-grained permissions 📊 Limit data visibility by team needs ☁️ Secure logs via Azure Monitor Learn how 👉 msft.it/6019Q2pKX #Azure #RBAC #CyberSecurity

AzureSupport's tweet image. 🔐 Control access smarter with Microsoft Sentinel!
👥 Resource-based RBAC for fine-grained permissions
📊 Limit data visibility by team needs
☁️ Secure logs via Azure Monitor
Learn how 👉 msft.it/6019Q2pKX
#Azure #RBAC #CyberSecurity

Apache Log4j 2.25.4 fixes 4 "silent" flaws, including TLS bypasses and log injection. Secure your infrastructure—upgrade now to prevent data loss. #Log4j #CyberSecurity #InfoSec #Vulnerability #Java #ThreatIntel securityonline.info/log4j-2-vulner…

the_yellow_fall's tweet image. Apache Log4j 2.25.4 fixes 4 "silent" flaws, including TLS bypasses and log injection. Secure your infrastructure—upgrade now to prevent data loss.

#Log4j #CyberSecurity #InfoSec #Vulnerability #Java #ThreatIntel
securityonline.info/log4j-2-vulner…

🚪 Offboard with confidence in Microsoft Sentinel! 🗑️ Remove data connectors safely 🔒 Disconnect workspaces securely ⚙️ Clean up automation rules Step-by-step guide 👉 msft.it/6013Q2pel #Azure #CyberSecurity #Cloud

AzureSupport's tweet image. 🚪 Offboard with confidence in Microsoft Sentinel!
🗑️ Remove data connectors safely
🔒 Disconnect workspaces securely
⚙️ Clean up automation rules
Step-by-step guide 👉 msft.it/6013Q2pel
#Azure #CyberSecurity #Cloud

DNN, is the leading open-source CMS in the Microsoft ecosystem. Read more about the vulnerability: cnews.link/dnn-vulnerabil… #DNN #cybersecurity #Microsoft

Cybernews's tweet image. DNN, is the leading open-source CMS in the Microsoft ecosystem. Read more about the vulnerability: cnews.link/dnn-vulnerabil…

#DNN #cybersecurity #Microsoft

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

Loading...

Something went wrong.


Something went wrong.