IT-ISAC (@itisac) 's Twitter Profile
IT-ISAC

@itisac

The IT-ISAC is a non-profit corporation formed by IT companies as a specialized forum for managing risks to their corporations and the IT infrastructure.

ID: 211178750

linkhttp://www.it-isac.org calendar_today02-11-2010 15:01:51

2,2K Tweet

2,2K Takipçi

588 Takip Edilen

IT-ISAC (@itisac) 's Twitter Profile Photo

NOW AVAILABLE - IT Sector Cyber Threat Report! Check out the report for a breakdown of the top 5 actors impacting the industry, their motivation, commonly used TTPs, and steps companies can take to mitigate risks.  → it-isac.org/reports #cybersecurity #cyber #IT #threat

NOW AVAILABLE - IT Sector Cyber Threat Report!

Check out the report for a breakdown of the top 5 actors impacting the industry, their motivation, commonly used TTPs, and steps companies can take to mitigate risks.  → it-isac.org/reports

#cybersecurity #cyber #IT #threat
IT-ISAC (@itisac) 's Twitter Profile Photo

📢 Don't Forget! 💥 Our upcoming webinar is next week - are you registered yet? Join us next Weds at 2 PM ET for a briefing on the 2024 IT threat landscape! Register now here for free: bit.ly/3FopvbM #ITsector #cyber #cybersecurity #cyberthreat #ISAC #webinar

📢 Don't Forget! 💥

Our upcoming webinar is next week - are you registered yet?

Join us next Weds at 2 PM ET for a briefing on the 2024 IT threat landscape!  

Register now here for free: bit.ly/3FopvbM

#ITsector #cyber #cybersecurity #cyberthreat #ISAC #webinar
IT-ISAC (@itisac) 's Twitter Profile Photo

💥 Last Chance! 💥 The best way to defend against cyberthreats is to know what you're up against. Don't miss our exclusive free webinar all about the IT Threat Landscape and its top threat actors. Register here: bit.ly/3FopvbM #cybersecurity #isac #informationsharing

💥 Last Chance! 💥

The best way to defend against cyberthreats is to know what you're up against. Don't miss our exclusive free webinar all about the IT Threat Landscape and its top threat actors.

Register here: bit.ly/3FopvbM

#cybersecurity #isac #informationsharing
IT-ISAC (@itisac) 's Twitter Profile Photo

Check out the latest Microsoft Threat Intelligence Podcast from Microsoft Security where we got to talk all things ransomware with 💻 Sherrod DeGrippo 🛸! ↓↓ thecyberwire.com/podcasts/micro… #security #cybersecurity #ransomware #Microsoft

IT-ISAC (@itisac) 's Twitter Profile Photo

Our Executive Director, Scott Algeier, wrote a reflective op-ed on the changing nature of information sharing over the past several decades - as well as showcasing our recently-released IT cyber threat report. Read the full piece in HSToday! → bit.ly/4bXBBEZ

Our Executive Director, Scott Algeier, wrote a reflective op-ed on the changing nature of information sharing over the past several decades - as well as showcasing our recently-released IT cyber threat report.

Read the full piece in <a href="/HSTodayMag/">HSToday</a>! → bit.ly/4bXBBEZ
IT-ISAC (@itisac) 's Twitter Profile Photo

It's time for a CyberByte! Atlantis AIO has become a powerful tool employed by cybercriminals, enabling them to rapidly test millions of stolen credentials. A tool like this significantly enhances the efficiency and speed of credential stuffing attacks - by leveraging validated

It's time for a CyberByte!

Atlantis AIO has become a powerful tool employed by cybercriminals, enabling them to rapidly test millions of stolen credentials. A tool like this significantly enhances the efficiency and speed of credential stuffing attacks - by leveraging validated
IT-ISAC (@itisac) 's Twitter Profile Photo

Don’t fall for AI-pril Fools! It's #AIFools Week - educate yourself on AI privacy and security, learn how to spot AI scams, brush up on how to use AI wisely, and stay safer online.

Don’t fall for AI-pril Fools! 

It's #AIFools Week - educate yourself on AI privacy and security, learn how to spot AI scams, brush up on how to use AI wisely, and stay safer online.
IT-ISAC (@itisac) 's Twitter Profile Photo

Today's CyberByte: Phishing actors continue to get more sophisticated. A new technique called Precision-Validated Phishing hinders traditional detective methods by only displaying the phishing content to intended victims. Real-time email validation confirms targets; error

IT-ISAC (@itisac) 's Twitter Profile Photo

We're proud to announce that the IT-ISAC's Director of Threat Intelligence, Jonathan Braley, is presenting at the #CyberThreatAlliance Threat Intelligence Practitioners' Summit (TIPS) Conference! Want to be there to hear his talk about collaboration in the threat intelligence

We're proud to announce that the IT-ISAC's Director of Threat Intelligence, Jonathan Braley, is presenting at the #CyberThreatAlliance Threat Intelligence Practitioners' Summit (TIPS) Conference!

Want to be there to hear his talk about collaboration in the threat intelligence
IT-ISAC (@itisac) 's Twitter Profile Photo

Time for a CyberByte! A China-nexus APT group exploited critical stack buffer overflow vulnerabilities (CVE-2025-0282 and CVE-2025-22457) in Ivanti Connect Secure VPN appliances. The victims span nearly twenty different industries across twelve countries; the vulnerabilities

Time for a CyberByte!

A China-nexus APT group exploited critical stack buffer overflow vulnerabilities (CVE-2025-0282 and CVE-2025-22457) in Ivanti Connect Secure VPN appliances. The victims span nearly twenty different industries across twelve countries; the vulnerabilities
IT-ISAC (@itisac) 's Twitter Profile Photo

We're honored to announce our Director of Threat Intelligence, Jonathan Braley, has been nominated for the 2025 #CyberScoop50 Awards! Jonathan is proud to be among a standout group of cybersecurity leaders. See the nominees and vote here: cyberscoop.com/cyberscoop50/ #cybersecurity

We're honored to announce our Director of Threat Intelligence, Jonathan Braley, has been nominated for the 2025 #CyberScoop50 Awards!

Jonathan is proud to be among a standout group of cybersecurity leaders. See the nominees and vote here: cyberscoop.com/cyberscoop50/

#cybersecurity
IT-ISAC (@itisac) 's Twitter Profile Photo

Good morning - time for a #CyberByte! ELUSIVE COMET, notorious for stealing millions in cryptocurrency, has launched a sophisticated social engineering campaign, targeting high-profile individuals via fake Zoom interviews. During the Zoom session, the threat actors use Zoom’s

Good morning - time for a #CyberByte!

ELUSIVE COMET, notorious for stealing millions in cryptocurrency, has launched a sophisticated social engineering campaign, targeting high-profile individuals via fake Zoom interviews. 

During the Zoom session, the threat actors use Zoom’s
IT-ISAC (@itisac) 's Twitter Profile Photo

We are excited to announce and welcome IMS, Inc. as a new IT-ISAC member! IMS provides specialized omnichannel communication services, including both print and digital solutions. Their services help businesses manage communications, improve customer experiences, and streamline

We are excited to announce and welcome <a href="/IMS_NY/">IMS, Inc.</a> as a new IT-ISAC member!

IMS provides specialized omnichannel communication services, including both print and digital solutions. Their services help businesses manage communications, improve customer experiences, and streamline
CISA Cyber (@cisacyber) 's Twitter Profile Photo

It’s #WorldPasswordDay! 🔐 Strengthen your digital defenses by using long, random, and unique passwords for each account. Rely on a trusted password manager to keep them secure and #EnableMFA whenever possible. Protect your online presence and stay safe! #Cybersecurity

IT-ISAC (@itisac) 's Twitter Profile Photo

Our Q1 2025 Ransomware Report update is out now! Featuring updated analysis through the first quarter of this year, predictions through 2025, and more. Read our blog and find the full update on our website, along with our 2024 report: bit.ly/3YYansl #ransomware

Our Q1 2025 Ransomware Report update is out now!

Featuring updated analysis through the first quarter of this year, predictions through 2025, and more.

Read our blog and find the full update on our website, along with our 2024 report: bit.ly/3YYansl

#ransomware
National Cybersecurity Alliance (@staysafeonline) 's Twitter Profile Photo

We’ve seen it all (actually, probably too much). So we’ve compiled our best #online survival tips into a guide that you can take with you to all the corners of the internet. Access it here: hubs.la/Q03ldbkr0

IT-ISAC (@itisac) 's Twitter Profile Photo

Time for a CyberByte! A recent study by Specops shows that in FTP attacks, the most common passwords breached are "admin," "root," and "123456." Other passwords included "password," "admin123," or basic keyboard patterns like "qwerty." Remember to keep your passwords complex

Time for a CyberByte!

A recent study by Specops shows that in FTP attacks, the most common passwords breached are "admin," "root," and "123456." Other passwords included "password," "admin123," or basic keyboard patterns like "qwerty." 

Remember to keep your passwords complex
IT-ISAC (@itisac) 's Twitter Profile Photo

With CISA 2015 up for reauthorization, our Executive Director, Scott Algeier, has released a blog overviewing its impact and effectiveness over the last decade. Read the blog here: bit.ly/4j563yJ The blog was referenced in the testimony of John Miller, Senior Vice

With CISA 2015 up for reauthorization, our Executive Director, Scott Algeier, has released a blog overviewing its impact and effectiveness over the last decade. 

Read the blog here: bit.ly/4j563yJ

The blog was referenced in the testimony of John Miller, Senior Vice