#cybersecurity search results

Pentest-AI: Run Full Autonomous Pentests with One Command 🤖💀 Recon → Auth bypass → vuln discovery → exploit chaining → real PoCs → AI threat analysis → client-ready reports github.com/0xSteph/pentes… #CyberSecurity #Pentesting #RedTeam #BugBounty #AIsecurity


15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

WPS Is Still a Risk ⚠️📶 Testing wireless security on networks with WPS enabled using mobile tools. Many routers still expose weak configurations — making proper setup critical for your safety. Share and Comment "WPS" 📶👇 #wifi #cybersecurity #wps #infosec #networksecurity


A single file can contain both visible content and hidden data without affecting how it functions. This makes it possible for malicious payloads to remain undetected while the file appears completely normal. #CyberSecurity #Steganography #DigitalForensics #SOC #InfoSec

CTF_Room's tweet image. A single file can contain both visible content and hidden data without affecting how it functions.

This makes it possible for malicious payloads to remain undetected while the file appears completely normal.

#CyberSecurity #Steganography #DigitalForensics #SOC #InfoSec

Kali NetHunter: Mobile Penetration Testing Platform 📱 Kali NetHunter extends Kali Linux capabilities to Android devices, enabling portable security testing, network auditing, and analysis in a compact setup. #KaliNetHunter #CyberSecurity #MobileSecurity #Pentesting #InfoSec

Anastasis_King's tweet image. Kali NetHunter: Mobile Penetration Testing Platform 📱

Kali NetHunter extends Kali Linux capabilities to Android devices, enabling portable security testing, network auditing, and analysis in a compact setup. 

#KaliNetHunter #CyberSecurity #MobileSecurity #Pentesting #InfoSec
Anastasis_King's tweet image. Kali NetHunter: Mobile Penetration Testing Platform 📱

Kali NetHunter extends Kali Linux capabilities to Android devices, enabling portable security testing, network auditing, and analysis in a compact setup. 

#KaliNetHunter #CyberSecurity #MobileSecurity #Pentesting #InfoSec
Anastasis_King's tweet image. Kali NetHunter: Mobile Penetration Testing Platform 📱

Kali NetHunter extends Kali Linux capabilities to Android devices, enabling portable security testing, network auditing, and analysis in a compact setup. 

#KaliNetHunter #CyberSecurity #MobileSecurity #Pentesting #InfoSec
Anastasis_King's tweet image. Kali NetHunter: Mobile Penetration Testing Platform 📱

Kali NetHunter extends Kali Linux capabilities to Android devices, enabling portable security testing, network auditing, and analysis in a compact setup. 

#KaliNetHunter #CyberSecurity #MobileSecurity #Pentesting #InfoSec

Threat actors seeking unauthorized access to operational technology (OT) systems have exploited trusted connections through IT systems, third-party partnerships, and the internet. Zero Trust offers a modern, adaptive approach to #cybersecurity by eliminating implicit trust and

FBICyberDiv's tweet image. Threat actors seeking unauthorized access to operational technology (OT) systems have exploited trusted connections through IT systems, third-party partnerships, and the internet. Zero Trust offers a modern, adaptive approach to #cybersecurity by eliminating implicit trust and

Contact iGrace Mediatech today to ensure your website remains protected and secure. 🔒 #CyberSecurity #iGraceMediatech #WebProtection #DataSecurity #TechSafety #SmallBusinessSecurity


Nmap: Network Discovery and Scanning Tool 📡 Nmap is a widely used tool for network discovery and security auditing, helping identify active hosts, open ports, and running services. #nmap #networksecurity #cybersecurity #infosec #security

Anastasis_King's tweet image. Nmap: Network Discovery and Scanning Tool 📡

Nmap is a widely used tool for network discovery and security auditing, helping identify active hosts, open ports, and running services. 

#nmap #networksecurity #cybersecurity #infosec #security
Anastasis_King's tweet image. Nmap: Network Discovery and Scanning Tool 📡

Nmap is a widely used tool for network discovery and security auditing, helping identify active hosts, open ports, and running services. 

#nmap #networksecurity #cybersecurity #infosec #security
Anastasis_King's tweet image. Nmap: Network Discovery and Scanning Tool 📡

Nmap is a widely used tool for network discovery and security auditing, helping identify active hosts, open ports, and running services. 

#nmap #networksecurity #cybersecurity #infosec #security
Anastasis_King's tweet image. Nmap: Network Discovery and Scanning Tool 📡

Nmap is a widely used tool for network discovery and security auditing, helping identify active hosts, open ports, and running services. 

#nmap #networksecurity #cybersecurity #infosec #security

🛡️ We added four vulnerabilities to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

CISACyber's tweet image. 🛡️ We added four vulnerabilities to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

Credential management is often overlooked in automation. Non-human identities can create hidden security risks if not governed properly. Cybiant whitepaper explains. Read now: zurl.co/ar6wk #Cybiant #Automation #Cybersecurity #RPA #AI #DigitalTransformation

cybiant's tweet image. Credential management is often overlooked in automation. Non-human identities can create hidden security risks if not governed properly. Cybiant whitepaper explains.

Read now: zurl.co/ar6wk

#Cybiant #Automation #Cybersecurity #RPA #AI #DigitalTransformation

BlueNoroff e le riunioni Zoom fasulle: come la Corea del Nord usa l’IA e i deepfake per svuotare i portafogli crypto dei CEO il blog: insicurezzadigitale.com/bluenoroff-e-l… #cybersecurity #apt #backdoor #bitcoin #coreadelnord #criptovalute #deepfake #lazarusgroup #spyware #web3

nuke86's tweet image. BlueNoroff e le riunioni Zoom fasulle: come la Corea del Nord usa l’IA e i deepfake per svuotare i portafogli crypto dei CEO
il blog: insicurezzadigitale.com/bluenoroff-e-l…

#cybersecurity #apt #backdoor #bitcoin #coreadelnord #criptovalute #deepfake #lazarusgroup #spyware #web3

Asset Criticality × Attack Stage Meaning: How sure is the threat? How important is the target? How far has the attacker gone? Cybersecurity is calm thinking under pressure—and I’m loving every lesson. 🧵4/4 #Cybersecurity #IncidentResponse #LearningwithTS


Cyber resilience requires collaboration. At CYBERSEC Taipei 2026, ONEKEY presents its partnership with Advantech to strengthen product cybersecurity across IoT and OT environments. Visit us at booth P308. #Cybersecurity #IoT #ONEKEY 📅Book your meeting: onekey.com/resource/meet-…

onekey_sec's tweet image. Cyber resilience requires collaboration.
At CYBERSEC Taipei 2026, ONEKEY presents its partnership with Advantech to strengthen product cybersecurity across IoT and OT environments.
Visit us at booth P308.
#Cybersecurity #IoT #ONEKEY

📅Book your meeting: onekey.com/resource/meet-…

Stop scrolling if you read Chinese PDFs ⚠️ Hackers are spreading a fake SumatraPDF loaded with malware. It installs a backdoor (AdaptixC2) and abuses VS Code tunnels to stay hidden. Download only from official sources & verify signatures. #CyberSecurity #Malware


MFA for HURIS goes live on 18 May 2026, 12PM. 🔐 Mandatory for all users. If you’ve set up MFA for M365/Staff Portal, you’re good to go. Let’s keep IIUM secure. #CyberSecurity


Vazamento da One UI 8.5 focada em IA mostra a corrida por “smartphones cada vez mais autônomos”. Mas quanto mais IA no bolso, maior a superfície de ataque: modelo, dados, privacidade e supply chain viram alvo. #Cybersecurity #Privacy Fonte: Google News


ENFORCE joined the CyberProjects cluster webinar on 29 April 2026 alongside CONSOLE, CYBERSUITE, NERO, CYBERAID, ACT4FOOD, ACTIX & SONIC. Great discussions on synergies, standardisation, impact & exploitation. Looking forward to continued collaboration! #Cybersecurity #ECCC

ENFORCE_EUP's tweet image. ENFORCE joined the CyberProjects cluster webinar on 29 April 2026 alongside CONSOLE, CYBERSUITE, NERO, CYBERAID, ACT4FOOD, ACTIX & SONIC.

Great discussions on synergies, standardisation, impact & exploitation.

Looking forward to continued collaboration!

#Cybersecurity #ECCC

🔎 Unauthorized port scans 🔎 Mapped in realtime 🔎 Every 6 hours 🔎 #cybersecurity electricbrain.com.au/pages/analytic…

whoisscanningme's tweet image. 🔎 Unauthorized port scans
🔎 Mapped in realtime
🔎 Every 6 hours
🔎 #cybersecurity
electricbrain.com.au/pages/analytic…

🚨 Critical alert: CVE-2026-41940 lets attackers bypass auth in cPanel/WHM. Patch now—manual update required. High risk of mass exploitation. ⚠️ #CyberSecurity #Infosec #ZeroDay


Porn clips disrupt Delhi High Court Chief Justice's virtual hearings twice 📸 Credit: Asianet Read more from Madhyamam English and other top sources here: w.dhunt.in/14e3sl?partner… #DelhiHighCourt #CyberSecurity #IndiaNews #LegalTech #current #sho

DailyhuntApp's tweet image. Porn clips disrupt Delhi High Court Chief Justice's virtual hearings twice
📸 Credit: Asianet

Read more from Madhyamam English and other top sources here: w.dhunt.in/14e3sl?partner…

#DelhiHighCourt #CyberSecurity #IndiaNews #LegalTech #current #sho

Contact iGrace Mediatech today to ensure your website remains protected and secure. 🔒 #CyberSecurity #iGraceMediatech #WebProtection #DataSecurity #TechSafety #SmallBusinessSecurity


Attackers are exploiting CVE-2026-6644 in ASUSTOR ADM with a public PoC, allowing critical RCE. This could lead to full system compromise. Patch now to secure your network. #NerdieNews #CyberSecurity #InfoSec #Ransomware #Malware

NewsNerdie's tweet image. Attackers are exploiting CVE-2026-6644 in ASUSTOR ADM with a public PoC, allowing critical RCE. This could lead to full system compromise. Patch now to secure your network.

#NerdieNews #CyberSecurity #InfoSec #Ransomware #Malware

Most attacks don’t start with hackers “breaking in.” They start with one ignored device. One endpoint gets compromised. Then it spreads quietly. Don’t wait to react. Build security into everything you do. #CyberSecurity #EndpointSecurity #Apexium


NordPass Business vs Enterprise in Pakistan (2026): Which plan is right? 🔐 This blog breaks down features, differences & use cases to help you choose the best option for your business. 🔗 Read the full blog: rfr.bz/td08124 #BreTechNet #CyberSecurity #TechBlog

BreTechPK's tweet image. NordPass Business vs Enterprise in Pakistan (2026): Which plan is right? 🔐

This blog breaks down features, differences & use cases to help you choose the best option for your business.

🔗 Read the full blog: rfr.bz/td08124

#BreTechNet #CyberSecurity #TechBlog

أصلحت غوغل ثغرة أمنية بالغة الخطورة في أداة Gemini CLI تُمكّن من تنفيذ أوامر على الأنظمة المستهدفة، كما كُشف عن خلل في أداة التطوير Cursor يسمح بتنفيذ تعليمات خبيثة والوصول إلى مفاتيح حساسة، ما يزيد مخاطر هجمات سلسلة التوريد واختراق بيئات… #cybersecurity #الأمن_السيبراني

Cyberet1's tweet image. أصلحت غوغل ثغرة أمنية بالغة الخطورة في أداة Gemini CLI تُمكّن من تنفيذ أوامر على الأنظمة المستهدفة، كما كُشف عن خلل في أداة التطوير Cursor يسمح بتنفيذ تعليمات خبيثة والوصول إلى مفاتيح حساسة، ما يزيد مخاطر هجمات سلسلة التوريد واختراق بيئات…

#cybersecurity #الأمن_السيبراني

Elevator Ventures leads a €7.3M funding round for QuoIntelligence to enable proactive cyber risk management — TFN buff.ly/X4nlsLJ #Cybersecurity

Minh_Q_Tran's tweet image. Elevator Ventures leads a €7.3M funding round for QuoIntelligence to enable proactive cyber risk management — TFN buff.ly/X4nlsLJ #Cybersecurity

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

CISACyber's tweet image. 📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement

EU AI Act is being enforcing. Boards want proof, not promises. Most teams still can't answer: "Where does our AI security program actually stand?" 📥 That answer arrives May 12 → go.sans.org/PJjMWh #AISecurity #Cybersecurity

SANSInstitute's tweet image. EU AI Act is being enforcing. Boards want proof, not promises. Most teams still can't answer: "Where does our AI security program actually stand?"

📥 That answer arrives May 12 → go.sans.org/PJjMWh

#AISecurity #Cybersecurity

🛡️ We added ConnectWise ScreenConnect path traversal vulnerability CVE-2024-1708 & Microsoft Windows protection mechanism failure vulnerability CVE-2026-32202 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity

CISACyber's tweet image. 🛡️ We added ConnectWise ScreenConnect path traversal vulnerability CVE-2024-1708 & Microsoft Windows protection mechanism failure vulnerability CVE-2026-32202 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity

🛡️ We added four vulnerabilities to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

CISACyber's tweet image. 🛡️ We added four vulnerabilities to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

Nmap: Network Discovery and Scanning Tool 📡 Nmap is a widely used tool for network discovery and security auditing, helping identify active hosts, open ports, and running services. #nmap #networksecurity #cybersecurity #infosec #security

Anastasis_King's tweet image. Nmap: Network Discovery and Scanning Tool 📡

Nmap is a widely used tool for network discovery and security auditing, helping identify active hosts, open ports, and running services. 

#nmap #networksecurity #cybersecurity #infosec #security
Anastasis_King's tweet image. Nmap: Network Discovery and Scanning Tool 📡

Nmap is a widely used tool for network discovery and security auditing, helping identify active hosts, open ports, and running services. 

#nmap #networksecurity #cybersecurity #infosec #security
Anastasis_King's tweet image. Nmap: Network Discovery and Scanning Tool 📡

Nmap is a widely used tool for network discovery and security auditing, helping identify active hosts, open ports, and running services. 

#nmap #networksecurity #cybersecurity #infosec #security
Anastasis_King's tweet image. Nmap: Network Discovery and Scanning Tool 📡

Nmap is a widely used tool for network discovery and security auditing, helping identify active hosts, open ports, and running services. 

#nmap #networksecurity #cybersecurity #infosec #security

Kali NetHunter: Mobile Penetration Testing Platform 📱 Kali NetHunter extends Kali Linux capabilities to Android devices, enabling portable security testing, network auditing, and analysis in a compact setup. #KaliNetHunter #CyberSecurity #MobileSecurity #Pentesting #InfoSec

Anastasis_King's tweet image. Kali NetHunter: Mobile Penetration Testing Platform 📱

Kali NetHunter extends Kali Linux capabilities to Android devices, enabling portable security testing, network auditing, and analysis in a compact setup. 

#KaliNetHunter #CyberSecurity #MobileSecurity #Pentesting #InfoSec
Anastasis_King's tweet image. Kali NetHunter: Mobile Penetration Testing Platform 📱

Kali NetHunter extends Kali Linux capabilities to Android devices, enabling portable security testing, network auditing, and analysis in a compact setup. 

#KaliNetHunter #CyberSecurity #MobileSecurity #Pentesting #InfoSec
Anastasis_King's tweet image. Kali NetHunter: Mobile Penetration Testing Platform 📱

Kali NetHunter extends Kali Linux capabilities to Android devices, enabling portable security testing, network auditing, and analysis in a compact setup. 

#KaliNetHunter #CyberSecurity #MobileSecurity #Pentesting #InfoSec
Anastasis_King's tweet image. Kali NetHunter: Mobile Penetration Testing Platform 📱

Kali NetHunter extends Kali Linux capabilities to Android devices, enabling portable security testing, network auditing, and analysis in a compact setup. 

#KaliNetHunter #CyberSecurity #MobileSecurity #Pentesting #InfoSec

Loading...

Something went wrong.


Something went wrong.