#cybersecurity search results

Explored Threat Intelligence in class today, including the MITRE ATT&CK matrix, tactics vs techniques, CTI groups, and defenses. Learning how defenders map adversary behavior is changing how I view security. @TechSphereAcad @thompsonever #CyberSecurity #ThreatIntelligence #SOC

Ginaclinton2's tweet image. Explored Threat Intelligence in class today, including the MITRE ATT&CK matrix, tactics vs techniques, CTI groups, and defenses.

Learning how defenders map adversary behavior is changing how I view security.

@TechSphereAcad @thompsonever 
#CyberSecurity #ThreatIntelligence #SOC
Ginaclinton2's tweet image. Explored Threat Intelligence in class today, including the MITRE ATT&CK matrix, tactics vs techniques, CTI groups, and defenses.

Learning how defenders map adversary behavior is changing how I view security.

@TechSphereAcad @thompsonever 
#CyberSecurity #ThreatIntelligence #SOC
Ginaclinton2's tweet image. Explored Threat Intelligence in class today, including the MITRE ATT&CK matrix, tactics vs techniques, CTI groups, and defenses.

Learning how defenders map adversary behavior is changing how I view security.

@TechSphereAcad @thompsonever 
#CyberSecurity #ThreatIntelligence #SOC

#AICoding tools are boosting dev productivity like never before—but are teams keeping #Cybersecurity front & center? CTO @mmadou recommends using "trust scores" to measure AI usage, vulnerabilities & #SecureCoding skills to reduce #SDLC risk. Learn more: ow.ly/28ca50YO5v9


Make sure to follow @CyberMasterMSc for top #Cybersecurity tips on how to keep your assets safe in web3

🚨 Cybersecurity in Web3 isn’t optional — it’s survival. Here’s how to protect your assets: 1️⃣ Use multiple wallets 2️⃣ Revoke what you don’t use 3️⃣ Use security tools 4️⃣ Protect your seed phrase 5️⃣ Watch every interaction 6️⃣ Keep learning Don’t get rekt — get secure.

CyberMasterMSc's tweet image. 🚨 Cybersecurity in Web3 isn’t optional — it’s survival.

Here’s how to protect your assets:

1️⃣ Use multiple wallets
2️⃣ Revoke what you don’t use
3️⃣ Use security tools
4️⃣ Protect your seed phrase
5️⃣ Watch every interaction
6️⃣ Keep learning

Don’t get rekt — get secure.


متخصصون في مشاريع الذكاء الاصطناعي والأمن السيبراني لطلاب الحاسب والتقنية 🛡️ wa.me/966569481465 #ذكاء_اصطناعي #أمن_سيبراني #CyberSecurity #AI #تقنية"


🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev) Not beginner fluff — real material: • AV/EDR bypass • Buffer overflow • AD attacks • OSINT & recon • Bug bounty • SOC & threat hunting Download 👇 drive.google.com/drive/folders/… #CyberSecurity #EthicalHacking

VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking

Telegram OSINT Intelligence D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. #OSINT #Cybersecurity

d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity
d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity
d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity
d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity

new #phishing at hXXps://www[.]DropCatch[.]com/domain/owfield[.]com | 104.20.47.210 | None | CLOUDFLARENET - Cloudflare, Inc. | ASN AS13335 | #infosec #cybersecurity phishstats.info/search/2319745…

PhishStats's tweet image. new #phishing at hXXps://www[.]DropCatch[.]com/domain/owfield[.]com | 104.20.47.210 | None | CLOUDFLARENET - Cloudflare, Inc. | ASN AS13335 | #infosec #cybersecurity

phishstats.info/search/2319745…

AI SOCs aren’t one-size-fits-all. Customizable, transparent platforms — not black boxes — help teams automate, adapt, and respond faster to real-world threats. #cybersecurity #CISO #infosec #AI bit.ly/4mJGqH6


99% Managed IT client retention in Q1 2026! 🎯 Local support. Proactive service. Real results. If you’re ready for an IT partner that actually delivers—JustTech is here. #ManagedIT #ITSupport #Cybersecurity justtech.com/justtech-achie…


📢⚠️ Bluesky is back online after a roughly 24-hour DDoS attack disrupted services, with the Iran-linked 313 Team claiming responsibility. Read: hackread.com/bluesky-online… #CyberSecurity #CyberAttack #DDoSAttack #Bluesky #Iran #313Team


Encryption isn’t one thing. It’s two layers. One protects data at rest. The other protects it in transit. Most systems only protect one. That’s where things break. #Cybersecurity #Encryption #DataSecurity #Privacy #Infosec #Teknalyze teknalyze.com/technology/enc…


OpenAI just briefed the US government and all Five Eyes intelligence allies on a new cybersecurity product. The AI lab that started as a nonprofit research project is now sitting at the table with the world's most powerful spy agencies. What a glow-up. #AI #Cybersecurity


99% Managed IT client retention in Q1 2026! 🎯 Local support. Proactive service. Real results. If you’re ready for an IT partner that actually delivers—JustTech is here. #ManagedIT #ITSupport #Cybersecurity justtech.com/justtech-achie…


Security Field Day is April 29-30! 📆 🔐 #XFD15 @DellTech presents at 1:30 PM US/Pacific Wednesday on YouTube, LinkedIn & website. 🔻 YouTube: buff.ly/GXW1J2S 🔹 LinkedIn: buff.ly/DkeViNf @NetworkingNerd @TechFieldDay #Cybersecurity #AI #AISecurity #TFDLive

TechFieldDay's tweet image. Security Field Day is April 29-30! 📆 🔐 #XFD15

@DellTech presents at 1:30 PM US/Pacific Wednesday on YouTube, LinkedIn & website.

🔻 YouTube: buff.ly/GXW1J2S 
🔹 LinkedIn: buff.ly/DkeViNf 

@NetworkingNerd @TechFieldDay #Cybersecurity #AI #AISecurity #TFDLive

Cybersecurity spending is rising. So are threats. $522B projected by 2026. But here’s the real question: Is more spend = better security? #CyberSecurity #Infosec #CyberRisk #DigitalTrust

allendevaux's tweet image. Cybersecurity spending is rising.
So are threats.
$522B projected by 2026.

But here’s the real question:
Is more spend = better security?

#CyberSecurity #Infosec #CyberRisk #DigitalTrust

Cyber agents should not be judged only on full wins or full fails. This CTF paper argues for partial-credit evaluation, which is much closer to how real security work creates value and risk. Source: arxiv.org/abs/2604.19354 #AIResearch #Cybersecurity #Agents


CISA adds Microsoft Defender vulnerability CVE-2026-33825 to its Known Exploited Vulnerabilities Catalog. The flaw involves insufficient granularity of access control within the software. #CyberSecurity #CISA


Cloud and cybersecurity go hand in hand. A live discussion on protecting the digital future of healthcare as systems scale and evolve. #MexicoHIS #Cloud #CyberSecurity #DigitalHealth

BambergHealth's tweet image. Cloud and cybersecurity go hand in hand.

A live discussion on protecting the digital future of healthcare as systems scale and evolve.

#MexicoHIS #Cloud #CyberSecurity #DigitalHealth

Looking for #cybersecurity resources tailored to you? DTMB’s Cybersecurity Resource Hub has resources for students, parents, senior citizens, and businesses. Learn more ➡ go.mi.gov/resourcehub

MichiganDTMB's tweet image. Looking for #cybersecurity resources tailored to you? DTMB’s Cybersecurity Resource Hub has resources for students, parents, senior citizens, and businesses.

Learn more ➡ go.mi.gov/resourcehub

Protecting Enterprise Data: Advanced Malware Scanning Strategies. buff.ly/dh6ep0G #cybersecurity #IT #technology #machinelearning


leak or platform update away from losing it all. What’s YOUR biggest website frustration right now? Drop it below 👇 #WebDev #CyberSecurity #WebsiteArchitecture


Surfshark підрахував: глобальні збитки від deepfake шахрайства вже досягли $2.19 млрд Найприбутковіша схема фейки з селебріті та політиками, які “рекламують” інвестиції: ≈52% усіх втрат Це сотні мільйонів доларів 😳 І це тільки початок! #Deepfake #Scam #CyberSecurity

karparostyk's tweet image. Surfshark підрахував:

глобальні збитки від deepfake шахрайства вже досягли $2.19 млрд 

Найприбутковіша схема фейки з селебріті та політиками, які “рекламують” інвестиції:
≈52% усіх втрат

Це сотні мільйонів доларів 😳

І це тільки початок!

#Deepfake #Scam #CyberSecurity

Telegram OSINT Intelligence D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. #OSINT #Cybersecurity

d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity
d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity
d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity
d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity

📹 تم الانتهاء من تسجيل جميع فيديوهات دورة CPTS Prep، وهي الآن متاحة بالكامل عبر أكاديمية الدرع الأخضر 🛡. ⚔️صُممت الدورة بطريقة احترافية ومتكاملة لتساعدك في التحضير لشهادة CPTS، بإسلوب عملي وتطبيقي يغطي جميع محاور المسار بوضوح وشمولية. 👇🏻 #الأمن_السيبراني #CPTS #CyberSecurity

GREENARM0R's tweet image. 📹 تم الانتهاء من تسجيل جميع فيديوهات دورة CPTS Prep، وهي الآن متاحة بالكامل عبر أكاديمية الدرع الأخضر 🛡.

⚔️صُممت الدورة بطريقة احترافية ومتكاملة لتساعدك في التحضير لشهادة CPTS، بإسلوب عملي وتطبيقي يغطي جميع محاور المسار بوضوح وشمولية.
👇🏻
#الأمن_السيبراني #CPTS #CyberSecurity

🔐 Control access smarter with Microsoft Sentinel! 👥 Resource-based RBAC for fine-grained permissions 📊 Limit data visibility by team needs ☁️ Secure logs via Azure Monitor Learn how 👉 msft.it/6019Q2pKX #Azure #RBAC #CyberSecurity

AzureSupport's tweet image. 🔐 Control access smarter with Microsoft Sentinel!
👥 Resource-based RBAC for fine-grained permissions
📊 Limit data visibility by team needs
☁️ Secure logs via Azure Monitor
Learn how 👉 msft.it/6019Q2pKX
#Azure #RBAC #CyberSecurity

🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev) Not beginner fluff — real material: • AV/EDR bypass • Buffer overflow • AD attacks • OSINT & recon • Bug bounty • SOC & threat hunting Download 👇 drive.google.com/drive/folders/… #CyberSecurity #EthicalHacking

VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking
VivekIntel's tweet image. 🚨 200+ Cybersecurity eBooks (Red Team / Pentest / Exploit Dev)

Not beginner fluff — real material:
• AV/EDR bypass
• Buffer overflow
• AD attacks
• OSINT & recon
• Bug bounty
• SOC & threat hunting

Download 👇
drive.google.com/drive/folders/…

#CyberSecurity #EthicalHacking

15 types of cyber attacks you should know 🔐 Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual. Cybersecurity = business resilience. Credit: Cybersecurity Insights #CyberSecurity #InfoSec #CyberAttacks #TechRisk

ingliguori's tweet image. 15 types of cyber attacks you should know 🔐

Phishing, malware, DDoS, SQL injection, MITM, insider threats & more — all in one visual.

Cybersecurity = business resilience.

Credit: Cybersecurity Insights

#CyberSecurity #InfoSec #CyberAttacks #TechRisk

DNN, is the leading open-source CMS in the Microsoft ecosystem. Read more about the vulnerability: cnews.link/dnn-vulnerabil… #DNN #cybersecurity #Microsoft

Cybernews's tweet image. DNN, is the leading open-source CMS in the Microsoft ecosystem. Read more about the vulnerability: cnews.link/dnn-vulnerabil…

#DNN #cybersecurity #Microsoft

StegoForge 🧠🔍: El kit híbrido de esteganografía + forense con MLOculta datos en imágenes, audio, vídeo, docs y paquetes de red. Detecta con 11 motores avanzados (incluyendo CNNs). Ideal para CTFs y red teaming. Solo uso autorizado. #steganography #forensics #cybersecurity #ctf

EsGeeks's tweet image. StegoForge 🧠🔍: El kit híbrido de esteganografía + forense con MLOculta datos en imágenes, audio, vídeo, docs y paquetes de red. Detecta con 11 motores avanzados (incluyendo CNNs). Ideal para CTFs y red teaming. Solo uso autorizado.
#steganography #forensics #cybersecurity #ctf

🚨 Cyberattacks don’t stop at detection—and neither should your defenses. Join us for a webinar with @KaseyaCorp to learn how MSPs stay ahead of AI phishing, ransomware, & data loss by combining security and recovery. 🎯 Register: event.on24.com/wcc/r/5301783/… #cybersecurity #webinar

BleepinComputer's tweet image. 🚨 Cyberattacks don’t stop at detection—and neither should your defenses.

Join us for a webinar with @KaseyaCorp to learn how MSPs stay ahead of AI phishing, ransomware, & data loss by combining security and recovery.

🎯 Register: event.on24.com/wcc/r/5301783/…
#cybersecurity #webinar

🛡️ Secure smarter with Microsoft Sentinel! ✨ Cloud-native SIEM & SOAR ✨ AI-powered threat detection ✨ Automated response playbooks Start protecting now 👉 msft.it/6014Q2TJi #Azure #CyberSecurity #SIEM

AzureSupport's tweet image. 🛡️ Secure smarter with Microsoft Sentinel!
✨ Cloud-native SIEM & SOAR
✨ AI-powered threat detection
✨ Automated response playbooks
Start protecting now 👉 msft.it/6014Q2TJi
#Azure #CyberSecurity #SIEM

Telegram OSINT Intelligence D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. #OSINT #Cybersecurity

d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity
d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity
d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity
d4rk_intel's tweet image. Telegram OSINT Intelligence

D4rk_Intel-OSINT-Investigative-Toolkit has been updated with Telegram OSINT - a powerful angle for investigations, as the platform hosts vast amounts of public data that isn't always easy to navigate with its native search. 

#OSINT #Cybersecurity

Hunters 🚨 One resource you should definitely bookmark: bugbountyhunting.com Writeups. Resources. Real learning. No fluff. #BugBountyHunter #CyberSecurity #InfoSec #EthicalHacking

obscaries's tweet image. Hunters 🚨

One resource you should definitely bookmark:
 bugbountyhunting.com

Writeups. Resources. Real learning. No fluff.

#BugBountyHunter #CyberSecurity #InfoSec #EthicalHacking

Loading...

Something went wrong.


Something went wrong.