Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile
Center for Security Studies and Cyber Defense

@csscd_au

Your Security is Our Priority!

Phone: (765) 641-4311
Email: [email protected]

ID: 1296096762327949312

linkhttps://linktr.ee/aucsscd calendar_today19-08-2020 14:49:13

640 Tweet

81 Followers

130 Following

Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Unidentified threat actors have been detected exploiting publicly accessible Microsoft Exchange servers by embedding malicious code into login pages to capture user credentials. Follow the link below to learn more! thehackernews.com/2025/06/hacker…

Unidentified threat actors have been detected exploiting publicly accessible Microsoft Exchange servers by embedding malicious code into login pages to capture user credentials.

Follow the link below to learn more!

thehackernews.com/2025/06/hacker…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Hawaiian Airlines reported that a cyberattack disrupted portions of its IT infrastructure, though it confirmed all flights continue to operate on schedule. Follow the link below to learn more! reuters.com/business/hawai…

Hawaiian Airlines reported that a cyberattack disrupted portions of its IT infrastructure, though it confirmed all flights continue to operate on schedule.

Follow the link below to learn more!

reuters.com/business/hawai…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Today, we would like to introduce Zach B. Zach is getting started at the AU CSSCD as a cybersecurity analyst! Stay tuned to meet future members of our team!

Today, we would like to introduce Zach B.

Zach is getting started at the AU CSSCD as a cybersecurity analyst!

Stay tuned to meet future members of our team!
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Many mobile and online games often use tactics that may negatively impact players—such as manipulative interface designs, vague disclosure around loot box mechanics, and unsuitable in-game advertising. Follow the link below to learn more! cybernews.com/gaming/games-u…

Many mobile and online games often use tactics that may negatively impact players—such as manipulative interface designs, vague disclosure around loot box mechanics, and unsuitable in-game advertising.

Follow the link below to learn more!

cybernews.com/gaming/games-u…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Today, we would like to introduce C.J. F! C.J. is getting started at the AU CSSCD as a cybersecurity analyst! Stay tuned to meet future members of our team!

Today, we would like to introduce C.J. F!

C.J. is getting started at the AU CSSCD as a cybersecurity analyst!

Stay tuned to meet future members of our team!
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

David Dungan of the AU CSSCD writes blogs for the Indiana Executive Council on Cybersecurity, and they are posted on the Indiana Cybersecurity Hub blog page. Follow the link below to learn more on how to avoid getting reeled in by phishing attacks! in.gov/cybersecurity/…

David Dungan of the AU CSSCD writes blogs for the Indiana Executive Council on Cybersecurity, and they are posted on the Indiana Cybersecurity Hub blog page.

Follow the link below to learn more on how to avoid getting reeled in by phishing attacks!

in.gov/cybersecurity/…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Eighteen malicious Chrome and Edge extensions—used by over 2.3 million users—were found hijacking data and redirecting to harmful sites, prompting Koi Security to advise immediate removal and credential resets. Follow the link below to learn more! cybernews.com/security/chrom…

Eighteen malicious Chrome and Edge extensions—used by over 2.3 million users—were found hijacking data and redirecting to harmful sites, prompting Koi Security to advise immediate removal and credential resets.

Follow the link below to learn more!

cybernews.com/security/chrom…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Cybersecurity experts warn of increasingly 'treacherous' landscape as major brands fall victim to attacks. Follow the link below to learn more! foxbusiness.com/technology/cyb…

Cybersecurity experts warn of increasingly 'treacherous' landscape as major brands fall victim to attacks.

Follow the link below to learn more!

foxbusiness.com/technology/cyb…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Hackers are using Microsoft Teams to deliver Matanbuchus 3.0, a stealth-enhanced variant of the malware loader flagged by researchers for its advanced evasion capabilities. Follow the link below to learn more! thehackernews.com/2025/07/hacker…

Hackers are using Microsoft Teams to deliver Matanbuchus 3.0, a stealth-enhanced variant of the malware loader flagged by researchers for its advanced evasion capabilities.

Follow the link below to learn more!

thehackernews.com/2025/07/hacker…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

A newly uncovered flaw in train braking systems could allow hackers to remotely halt trains using low-cost hardware, raising concerns about potential derailments. Follow the link below to learn more! cybersecuritydive.com/news/railroad-…

A newly uncovered flaw in train braking systems could allow hackers to remotely halt trains using low-cost hardware, raising concerns about potential derailments.

Follow the link below to learn more!

cybersecuritydive.com/news/railroad-…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

David Dungan of the AU CSSCD writes blogs for the Indiana Executive Council on Cybersecurity, and they are posted on the Indiana Cybersecurity Hub blog page. Follow the link below to learn more about AI and privacy! in.gov/cybersecurity/…

David Dungan of the AU CSSCD writes blogs for the Indiana Executive Council on Cybersecurity, and they are posted on the Indiana Cybersecurity Hub blog page.

Follow the link below to learn more about AI and privacy!

in.gov/cybersecurity/…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

A global zero-day attack exploited an undiscovered flaw in Microsoft SharePoint, compromising governments, universities, energy firms, and businesses worldwide. Follow the link below to learn more! breitbart.com/tech/2025/07/2…

A global zero-day attack exploited an undiscovered flaw in Microsoft SharePoint, compromising governments, universities, energy firms, and businesses worldwide.

Follow the link below to learn more!

breitbart.com/tech/2025/07/2…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Lawmakers revived the Smart Cities and Communities Act, proposing $1.1 billion in tech funding despite past setbacks. Follow the link below to learn more! smartcitiesdive.com/news/bill-look…

Lawmakers revived the Smart Cities and Communities Act, proposing $1.1 billion in tech funding despite past setbacks.

Follow the link below to learn more!

smartcitiesdive.com/news/bill-look…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

The notorious cybercrime group known as Scattered Spider is targeting VMware ESXi hypervisors in attacks targeting retail, airline, and transportation sectors in North America. Follow the link below to learn more! thehackernews.com/2025/07/scatte…

The notorious cybercrime group known as Scattered Spider is targeting VMware ESXi hypervisors in attacks targeting retail, airline, and transportation sectors in North America.

Follow the link below to learn more!

thehackernews.com/2025/07/scatte…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Researchers are spotlighting a stealthy campaign using fake crypto trading apps to deliver malware, which harvests credentials and wallet data. Follow the link below to learn more! thehackernews.com/2025/07/hacker…

Researchers are spotlighting a stealthy campaign using fake crypto trading apps to deliver malware, which harvests credentials and wallet data. 

Follow the link below to learn more!

thehackernews.com/2025/07/hacker…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Cybersecurity experts have uncovered a wave of attacks in which threat actors mimic enterprises using fake Microsoft OAuth apps to steal credentials and hijack accounts. Follow the link below to learn more! thehackernews.com/2025/08/attack…

Cybersecurity experts have uncovered a wave of attacks in which threat actors mimic enterprises using fake Microsoft OAuth apps to steal credentials and hijack accounts.

Follow the link below to learn more!

thehackernews.com/2025/08/attack…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

David Dungan of the AU CSSCD writes blogs for the Indiana Executive Council on Cybersecurity, and they are posted on the Indiana Cybersecurity Hub blog page. Follow the link below to learn more about the innovation vs. invasion of smart glasses! in.gov/cybersecurity/…

David Dungan of the AU CSSCD writes blogs for the Indiana Executive Council on Cybersecurity, and they are posted on the Indiana Cybersecurity Hub blog page.

Follow the link below to learn more about the innovation vs. invasion of smart glasses!

in.gov/cybersecurity/…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

U.S. authorities have dismantled the BlackSuit ransomware group, responsible for attacks on over 450 organizations worldwide, in a major international operation Follow the link below to learn more! cybersecuritynews.com/blacksuit-rans…

U.S. authorities have dismantled the BlackSuit ransomware group, responsible for attacks on over 450 organizations worldwide, in a major international operation

Follow the link below to learn more!

cybersecuritynews.com/blacksuit-rans…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Zoom has revealed a critical flaw in its Windows-based clients that could let attackers escalate privileges and compromise systems through malicious links or files. Follow the link below to learn more! cybersecuritynews.com/zoom-clients-f…

Zoom has revealed a critical flaw in its Windows-based clients that could let attackers escalate privileges and compromise systems through malicious links or files.

Follow the link below to learn more!

cybersecuritynews.com/zoom-clients-f…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Cybersecurity researchers have uncovered a new Android trojan named PhantomCard that exploits NFC to perform relay attacks, enabling fraudulent transactions. Follow the link below to learn more! thehackernews.com/2025/08/new-an…

Cybersecurity researchers have uncovered a new Android trojan named PhantomCard that exploits NFC to perform relay attacks, enabling fraudulent transactions. 

Follow the link below to learn more!

thehackernews.com/2025/08/new-an…