#cybersecurity search results

Pentest-AI: Run Full Autonomous Pentests with One Command 🤖💀 Recon → Auth bypass → vuln discovery → exploit chaining → real PoCs → AI threat analysis → client-ready reports github.com/0xSteph/pentes… #CyberSecurity #Pentesting #RedTeam #BugBounty #AIsecurity


📢⚠️ Private chats, photos, and phone screengrabs of celebrities and influencers exposed after a suspected stalkerware setup left a database open. Over 86K files leaked. Read: hackread.com/private-chats-… #CyberSecurity #Privacy #Stalkerware #CyberCrime #DataBreach


🛡️ We added Linux kernel incorrect resource transfer between spheres vulnerability CVE-2026-31431 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

CISACyber's tweet image. 🛡️ We added Linux kernel incorrect resource transfer between spheres vulnerability CVE-2026-31431 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

🐀 RatLabs is live! 21 hands-on hacking challenges — from enumeration to advanced exploitation. XSS, SUID, TFTP, prompt injection & more. Register free, own the boxes, climb the leaderboard 👇 🔗 ratctf.thexssrat.com #CTF #HackingChallenges #CyberSecurity #BugBounty #PenTest


🚨 Speaker Reveal #10🚨 Purity Gachuhi will be co-leading the Sherlocks track 👀 If you are into DFIR, SOC, CTI etc this is the room to be in✅️💙 #HTBKenya #HTB #Cybersecurity #Kenya

hacktheboxkenya's tweet image. 🚨 Speaker Reveal #10🚨

Purity Gachuhi will be co-leading the Sherlocks track 👀
If you are into DFIR, SOC, CTI etc this is the room to be in✅️💙

#HTBKenya  #HTB #Cybersecurity #Kenya

🔐Atacurile de tip dictionary sunt tot mai frecvente și exploatează un obicei comun: folosirea unor parole simple și previzibile. 📘 Ghid „Inteligența Artificială & Manipularea Percepției Umane”: dnsc.ro/pagini/ghid-ai… 🔗 youtu.be/wce_Ix96y94 #DNSC #CyberSecurity #2FA


Newsletter: Anthropic's Mythos Hacked. What Is Protecting Our Water Supply? AI Is Reshaping Cyber Warfare. ow.ly/xtX950YRPz4 #cybersecurity

CyberSecInt's tweet image. Newsletter: Anthropic's Mythos Hacked. What Is Protecting Our Water Supply? AI Is  Reshaping Cyber Warfare.  ow.ly/xtX950YRPz4 #cybersecurity

🚨 Speaker Reveal #9🚨 Blue teamer don't worry we've got you 😌 Hamza will be leading the Sherlocks track✅️ Get to learn how to be an effective investigator🕵‍♀️🕵‍♂️ #HTBKenya #HTB #Cybersecurity #Kenya

hacktheboxkenya's tweet image. 🚨 Speaker Reveal #9🚨

Blue teamer don't worry we've got you 😌

Hamza will be leading the Sherlocks track✅️

Get to learn how to be an effective investigator🕵‍♀️🕵‍♂️

#HTBKenya #HTB #Cybersecurity #Kenya

Ever wonder what actually happens when you type a URL? 🌐 DNS → HTTP → Load Balancers → Web Servers — it all connects. Put the full picture together in just 15 mins with our FREE beginner room 🧩 🔗 tryhackme.com/room/puttingit… #TryHackMe #bebfundamentals #cybersecurity

tryhackme's tweet image. Ever wonder what actually happens when you type a URL? 🌐
DNS → HTTP → Load Balancers → Web Servers — it all connects.
Put the full picture together in just 15 mins with our FREE beginner room 🧩
🔗 tryhackme.com/room/puttingit…

#TryHackMe #bebfundamentals #cybersecurity

FIPS 140-2 retirement is now just 5 months away. Now is the time to review your environment and prepare for the transition to FIPS 140-3. Learn how Ubuntu Pro supports FIPS workloads: ubuntu.com/security/certi… #CyberSecurity #FIPS #OpenSource

Canonical's tweet image. FIPS 140-2 retirement is now just 5 months away. Now is the time to review your environment and prepare for the transition to FIPS 140-3.

Learn how Ubuntu Pro supports FIPS workloads: ubuntu.com/security/certi…

#CyberSecurity #FIPS #OpenSource

🛡️ We added WebPros cPanel & WHM and WP2 (WordPress Squared) missing authentication for critical function vulnerability CVE-2026-41940 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity

CISACyber's tweet image. 🛡️ We added WebPros cPanel & WHM and WP2 (WordPress Squared) missing authentication for critical function vulnerability CVE-2026-41940 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity

China’s MSS isn’t just chasing spy secrets. It’s after medical research, tech flaws, and data that affect real people. One hacked server can ripple into hospitals, businesses, and homes. #China #CyberSecurity #NationalSecurity justice.gov/usao-sdtx/pr/p…


Time to start pushing out, Built an AI-powered phishing detection system that catches attacks blacklists can't see. 391K real-world domains trained. 20 security features extracted. 95%+ accuracy. It's trained to be able to handle Zero-day phishing attacks. #Cybersecurity #ML

consolelog_'s tweet image. Time to start pushing out,
Built an AI-powered phishing detection system that catches attacks blacklists can't see.
391K real-world domains trained. 20 security features extracted. 95%+ accuracy.
It's trained to be able to handle Zero-day phishing attacks. 
#Cybersecurity #ML
consolelog_'s tweet image. Time to start pushing out,
Built an AI-powered phishing detection system that catches attacks blacklists can't see.
391K real-world domains trained. 20 security features extracted. 95%+ accuracy.
It's trained to be able to handle Zero-day phishing attacks. 
#Cybersecurity #ML
consolelog_'s tweet image. Time to start pushing out,
Built an AI-powered phishing detection system that catches attacks blacklists can't see.
391K real-world domains trained. 20 security features extracted. 95%+ accuracy.
It's trained to be able to handle Zero-day phishing attacks. 
#Cybersecurity #ML
consolelog_'s tweet image. Time to start pushing out,
Built an AI-powered phishing detection system that catches attacks blacklists can't see.
391K real-world domains trained. 20 security features extracted. 95%+ accuracy.
It's trained to be able to handle Zero-day phishing attacks. 
#Cybersecurity #ML

CISA added CVE-2026-31431 to KEV. Linux LPE: low-priv user → root. Not remote by itself, but dangerous after a small foothold: SSH, CI, or container access. For Web3 infra, RPC config is only one layer. The host still matters. thehackernews.com/2026/05/cisa-a… #CyberSecurity #Web3Sec


An AI coding agent reportedly deleted a production database — and said it “guessed instead of verifying.” That’s not an AI problem. It’s a permissions problem. Would you let an agent run destructive commands in prod? #AI #AIAgents #Cybersecurity


tomorow i have an exam but today i am going to download the pdf lol... #cybersecurity #ethicalhacking #examprep #lol


⚡ This week’s #cybersecurity recap is ugly in the usual way. • Poisoned password manager CLI • Fake Teams help desks • Federal firewall backdoor • Energy wiper • Booby-trapped AI pages • Fake Authenticator extensions • and many more... Read → thehackernews.com/2026/04/weekly…


A Kigali startup is offering the first "Personal Data Leak" audit for individuals today. 🕵️‍♂️ For 500 Frw, they scan your phone number against regional breach databases to see if your MoMo PIN is at risk. 🛡️💻 #CyberSecurity #FintechRwanda #RwOT

fordbee's tweet image. A Kigali startup is offering the first "Personal Data Leak" audit for individuals today. 🕵️‍♂️ For 500 Frw, they scan your phone number against regional breach databases to see if your MoMo PIN is at risk. 🛡️💻 #CyberSecurity #FintechRwanda #RwOT

Hackers don’t wait. They scan → find → exploit. One vulnerability is enough. Vulota finds it first. 🔐 Secure before they breach. #CyberSecurity #Vulota


✅ Hide your IP address ✅ Access restricted content safely ✅ Block trackers and surveillance Learn how to use it properly in our complete guide: 🔗 lovefortechnology.org/2026/04/tor-br… #TorBrowser #Privacy #CyberSecurity #AnonymousBrowsing #TechTips (2/2)


Your web browser might be the biggest security blind spot in your company! A new 2026 report reveals how AI tools and SaaS apps are turning browsers into prime targets. Is your business data truly protected? #EnterpriseSecurity #Cybersecurity #TechTrends bleepingcomputer.com/news/security/…


Layers that matter for Web3 infra: 1. RPC exposure 2. node config 3. container isolation 4. CI/CD permissions 5. Linux host hardening Most people only look at layer 1. #CyberSecurity #Web3Security


CISA added CVE-2026-31431 to KEV. Linux LPE: low-priv user → root. Not remote by itself, but dangerous after a small foothold: SSH, CI, or container access. For Web3 infra, RPC config is only one layer. The host still matters. thehackernews.com/2026/05/cisa-a… #CyberSecurity #Web3Sec


#Poster क्या आप जानते हैं कि आपकी डिजिटल पहचान कैसे बनती है? जो आप साझा करते हैं और जो चुपचाप एकत्र होता है—दोनों को सुरक्षित रखना जरूरी है। #CyberSecurity #StaySafeOnline #DigitalFootprint #DataPrivacy #CyberAwareness #OnlineSafety #PrivacyMatters #ThinkBeforeYouClick

SSOIndia's tweet image. #Poster
क्या आप जानते हैं कि आपकी डिजिटल पहचान कैसे बनती है? जो आप साझा करते हैं और जो चुपचाप एकत्र होता है—दोनों को सुरक्षित रखना जरूरी है।

#CyberSecurity #StaySafeOnline #DigitalFootprint #DataPrivacy #CyberAwareness #OnlineSafety #PrivacyMatters #ThinkBeforeYouClick

🐀 RatLabs is live! 21 hands-on hacking challenges — from enumeration to advanced exploitation. XSS, SUID, TFTP, prompt injection & more. Register free, own the boxes, climb the leaderboard 👇 🔗 ratctf.thexssrat.com #CTF #HackingChallenges #CyberSecurity #BugBounty #PenTest


Most websites don’t get hacked by advanced attacks — they get hacked because of basic vulnerabilities. Vulota finds them. Fixes them. Secures you. 🔐 Don’t wait for a breach. #CyberSecurity #Vulota #WebsiteSecurity


Schütze dein Unternehmen vor Spam, Phishing & Schad-Mails – mit dem Cloud Spamfilter 🚀 Gehostet in 🇩🇪, 24/7 geschützt – einfach aktivieren und sicherer arbeiten. Mehr erfahren unter: scoopex.de/cloud-security… #CyberSecurity #EmailSecurity #Spamfilter #ITSecurity #CloudSecurity


Cyber-physical resilience reshaping industrial cybersecurity beyond perimeter defense to protect core processes - Industrial Cyber news.google.com/rss/articles/C… #cybersecurity #hacking

cliffvazquez's tweet image. Cyber-physical resilience reshaping industrial cybersecurity beyond perimeter defense to protect core processes - Industrial Cyber news.google.com/rss/articles/C… #cybersecurity #hacking

Quantum leaps ⚡ MIT 3D-prints motors in hours as AI & quantum tech reshape security and connection. signaloftech.com/en/2026/05/qua… #technology #quantum #cybersecurity

SignalOfTech's tweet image. Quantum leaps ⚡

MIT 3D-prints motors in hours as AI & quantum tech reshape security and connection.

signaloftech.com/en/2026/05/qua… #technology #quantum #cybersecurity

CVE-2026-41940 was a cPanel/WHM zero-day for ~2 months before the April 28 patch. CISA added it to KEV the same week. ~650k exposed instances, 44k IPs Full details + 8 dark web leak claims in #Cybersecurity #ThreatIntel #InfoSec #CISO #CVE linkedin.com/posts/donald-h…


My Top 10 Articles of the Week Available here on @Medium Every Friday The @CorixPartners Friday Reading List: Hand-picked Content for Top #Leaders Check it Out >> buff.ly/7ht7nu3 #cybersecurity #business #leadership #management #governance #CISO #CIO #CTO #CEO

Corix_JC's tweet image. My Top 10 Articles of the Week Available here on @Medium Every Friday

The @CorixPartners Friday Reading List: Hand-picked Content for Top #Leaders

Check it Out >> buff.ly/7ht7nu3 

#cybersecurity #business #leadership #management #governance #CISO #CIO #CTO #CEO

🚀 A I completed the “Walking An Application” room on @tryhackme. 🔐 Web Security 🛡️ Ethical Hacking Every small win counts. Keep learning, keep practicing! #CyberSecurity #TryHackMe #PenetrationTesting #EthicalHacking #WebSecurity #InfoSec #LearningInPublic #GermanyJobs

sanjeevbadhan34's tweet image. 🚀 A
I completed the “Walking An Application” room on @tryhackme.
🔐 Web Security
🛡️ Ethical Hacking
Every small win counts. Keep learning, keep practicing!
#CyberSecurity #TryHackMe #PenetrationTesting #EthicalHacking #WebSecurity #InfoSec #LearningInPublic #GermanyJobs

🚨 Speaker Reveal #10🚨 Purity Gachuhi will be co-leading the Sherlocks track 👀 If you are into DFIR, SOC, CTI etc this is the room to be in✅️💙 #HTBKenya #HTB #Cybersecurity #Kenya

hacktheboxkenya's tweet image. 🚨 Speaker Reveal #10🚨

Purity Gachuhi will be co-leading the Sherlocks track 👀
If you are into DFIR, SOC, CTI etc this is the room to be in✅️💙

#HTBKenya  #HTB #Cybersecurity #Kenya

🚨 Speaker Reveal #9🚨 Blue teamer don't worry we've got you 😌 Hamza will be leading the Sherlocks track✅️ Get to learn how to be an effective investigator🕵‍♀️🕵‍♂️ #HTBKenya #HTB #Cybersecurity #Kenya

hacktheboxkenya's tweet image. 🚨 Speaker Reveal #9🚨

Blue teamer don't worry we've got you 😌

Hamza will be leading the Sherlocks track✅️

Get to learn how to be an effective investigator🕵‍♀️🕵‍♂️

#HTBKenya #HTB #Cybersecurity #Kenya

🛡️ We added Linux kernel incorrect resource transfer between spheres vulnerability CVE-2026-31431 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

CISACyber's tweet image. 🛡️ We added Linux kernel incorrect resource transfer between spheres vulnerability CVE-2026-31431 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

Ever wonder what actually happens when you type a URL? 🌐 DNS → HTTP → Load Balancers → Web Servers — it all connects. Put the full picture together in just 15 mins with our FREE beginner room 🧩 🔗 tryhackme.com/room/puttingit… #TryHackMe #bebfundamentals #cybersecurity

tryhackme's tweet image. Ever wonder what actually happens when you type a URL? 🌐
DNS → HTTP → Load Balancers → Web Servers — it all connects.
Put the full picture together in just 15 mins with our FREE beginner room 🧩
🔗 tryhackme.com/room/puttingit…

#TryHackMe #bebfundamentals #cybersecurity

🛡️ We added four vulnerabilities to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

CISACyber's tweet image. 🛡️ We added four vulnerabilities to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

🛡️ We added WebPros cPanel & WHM and WP2 (WordPress Squared) missing authentication for critical function vulnerability CVE-2026-41940 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity

CISACyber's tweet image. 🛡️ We added WebPros cPanel & WHM and WP2 (WordPress Squared) missing authentication for critical function vulnerability CVE-2026-41940 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity

⏰2 days left. 📅May 5, 16:00 CEST. How to catch 0-days – Boris Larin, Kaspersky GReAT. Your industry. Your risks. Your response. 👉Register free: kas.pr/1w8m #zeroday #cybersecurity #GReAT

kaspersky's tweet image. ⏰2 days left.
📅May 5, 16:00 CEST.

How to catch 0-days – Boris Larin, Kaspersky GReAT.
Your industry. Your risks. Your response.

👉Register free: kas.pr/1w8m

#zeroday #cybersecurity #GReAT

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

FIPS 140-2 retirement is now just 5 months away. Now is the time to review your environment and prepare for the transition to FIPS 140-3. Learn how Ubuntu Pro supports FIPS workloads: ubuntu.com/security/certi… #CyberSecurity #FIPS #OpenSource

Canonical's tweet image. FIPS 140-2 retirement is now just 5 months away. Now is the time to review your environment and prepare for the transition to FIPS 140-3.

Learn how Ubuntu Pro supports FIPS workloads: ubuntu.com/security/certi…

#CyberSecurity #FIPS #OpenSource

🚨 Scam Alert: No, you didn't win the lottery. 🚨 If an email promises you a huge monetary prize, it's a trap to steal your personal and financial info. Keep your data safe: Never reply. Never click. Stay curious but stay secure. #CyberSecurity #StaySafeOnline #DigitalIndia

GoI_MeitY's tweet image. 🚨 Scam Alert: No, you didn't win the lottery. 🚨
If an email promises you a huge monetary prize, it's a trap to steal your personal and financial info. Keep your data safe: Never reply. Never click.
Stay curious but stay secure.

#CyberSecurity #StaySafeOnline #DigitalIndia

Module 1 of @CiscoNetAcad NETWORKING BASICS. DONE ☑️ Covered everything from network types to the math behind bits and terabits. Also finally cleared up the difference between Bandwidth (the max capacity) and Throughput (the actual speed) #CyberSecurity #Cisco #Networking

mr_kay7's tweet image. Module 1 of @CiscoNetAcad NETWORKING BASICS. DONE ☑️ 

Covered everything from network types to the math behind bits and terabits. Also finally cleared up the difference between Bandwidth (the max capacity) and Throughput (the actual speed)

#CyberSecurity  #Cisco #Networking
mr_kay7's tweet image. Module 1 of @CiscoNetAcad NETWORKING BASICS. DONE ☑️ 

Covered everything from network types to the math behind bits and terabits. Also finally cleared up the difference between Bandwidth (the max capacity) and Throughput (the actual speed)

#CyberSecurity  #Cisco #Networking
mr_kay7's tweet image. Module 1 of @CiscoNetAcad NETWORKING BASICS. DONE ☑️ 

Covered everything from network types to the math behind bits and terabits. Also finally cleared up the difference between Bandwidth (the max capacity) and Throughput (the actual speed)

#CyberSecurity  #Cisco #Networking

Switched lanes to @CiscoNetAcad TryHackMe was a good start, but diving into the raw basics of Data Transmission and Network Types today. Realizing everything we do online eventually just boils down to bits and ASCII #CyberSecurity #Networking #Cisco #LearningInPublic

mr_kay7's tweet image. Switched lanes to @CiscoNetAcad 

TryHackMe was a good start, but diving into the raw basics of Data Transmission and Network Types today. Realizing everything we do online eventually just boils down to bits and ASCII 

#CyberSecurity #Networking #Cisco #LearningInPublic
mr_kay7's tweet image. Switched lanes to @CiscoNetAcad 

TryHackMe was a good start, but diving into the raw basics of Data Transmission and Network Types today. Realizing everything we do online eventually just boils down to bits and ASCII 

#CyberSecurity #Networking #Cisco #LearningInPublic
mr_kay7's tweet image. Switched lanes to @CiscoNetAcad 

TryHackMe was a good start, but diving into the raw basics of Data Transmission and Network Types today. Realizing everything we do online eventually just boils down to bits and ASCII 

#CyberSecurity #Networking #Cisco #LearningInPublic
mr_kay7's tweet image. Switched lanes to @CiscoNetAcad 

TryHackMe was a good start, but diving into the raw basics of Data Transmission and Network Types today. Realizing everything we do online eventually just boils down to bits and ASCII 

#CyberSecurity #Networking #Cisco #LearningInPublic


Loading...

Something went wrong.


Something went wrong.