Apona.ai (@ai_apona) 's Twitter Profile
Apona.ai

@ai_apona

Embracing Security at the Source

ID: 1615461302616432653

calendar_today17-01-2023 21:30:08

34 Tweet

2 Takipçi

3 Takip Edilen

Apona.ai (@ai_apona) 's Twitter Profile Photo

Endor Labs has introduced an OWASP-style listing of the most important or impactful risks inherent in the use of open source software (OSS). Check out the list here: securityweek.com/top-10-securit…

Apona.ai (@ai_apona) 's Twitter Profile Photo

Cybersecurity trends for 2023 include more Treachery and Risk ahead as Attack Surface and Hacker Capabilities grow. Hackers are becoming more intelligent and are able to evade detection more easily. Read more here ow.ly/AKYH50NBolg

Apona.ai (@ai_apona) 's Twitter Profile Photo

VMware released a patch for a critical vulnerability that could allow an attacker to take control of systems. If you are running VMware products, make sure you install the patch as soon as possible. Learn more: [insert link]darkreading.com/endpoint/vmwar…

Apona.ai (@ai_apona) 's Twitter Profile Photo

Google introduced a new project called "Open Source Insights" to enhance the security of open-source software. The project includes a new dependency analysis service that aims to help developers identify and fix security vulnerabilities in their software. ow.ly/k09E50NYLBm

Apona.ai (@ai_apona) 's Twitter Profile Photo

Last week our very own Roger Neal and Aviram Jenkin attended the RSA Conference in San Francisco, a wonderful event where thousands of cybersecurity professionals came together to listen to expert perspectives, groundbreaking innovations, and best practices. #RSAConference2023

Last week our very own Roger Neal and Aviram Jenkin attended the RSA Conference in San Francisco, a wonderful event where thousands of cybersecurity professionals came together to listen to expert perspectives, groundbreaking innovations, and best practices. #RSAConference2023
Apona.ai (@ai_apona) 's Twitter Profile Photo

The "Money" ransomware gang has joined the double extortion trend, threatening to publish stolen data if the ransom is not paid. It is distributed via phishing emails and exploits vulnerabilities in remote desktop protocols. ow.ly/nhyN50NYNAU

Apona.ai (@ai_apona) 's Twitter Profile Photo

Microsoft has released a security patch to address a zero-day vulnerability in Windows that attackers are actively exploiting. Users are advised to regularly update their systems and implement security best practices to mitigate the risk of cyber threats. scmagazine.com/news/vulnerabi…

Apona.ai (@ai_apona) 's Twitter Profile Photo

Permiso discovered a smishing campaign that targets AWS users by tricking them into divulging their login credentials. The attackers can use these credentials to access the victim's AWS account, steal sensitive data, or launch further attacks. Learn more: ow.ly/1vEJ50NYOBR

Apona.ai (@ai_apona) 's Twitter Profile Photo

The U.S. Senate Committee on Homeland Security and Government Affairs passed the Securing Open Source Software Act. The bill requires the DHS to establish a program to identify and address vulnerabilities in open-source software used by federal agencies. ow.ly/V57L50NYPCu

Apona.ai (@ai_apona) 's Twitter Profile Photo

Apona’s Software Code Analysis uses redundancy elimination technology to scan code across file, component, and function levels, detecting modified OSS and nested OSS components and generating high-fidelity SBOMs. Visit our website to demo our SCA tool: ow.ly/VvLb50NYPRR

Apona’s Software Code Analysis uses redundancy elimination technology to scan code across file, component, and function levels, detecting modified OSS and nested OSS components and generating high-fidelity SBOMs. Visit our website to demo our SCA tool: ow.ly/VvLb50NYPRR
Apona.ai (@ai_apona) 's Twitter Profile Photo

The RTM Locker ransomware gang is targeting corporate networks with a new variant of their malware. The new variant, dubbed "Grief," uses advanced techniques to evade detection by security tools and can encrypt data on Windows and Linux systems. ow.ly/tpPp50NYQ3x

Apona.ai (@ai_apona) 's Twitter Profile Photo

In a new report, CISA highlights the growing threat of cyber attacks against the manufacturing sector and outlines best practices for securing industrial control systems and operational technology environments. ow.ly/ccXz50NYQni

Apona.ai (@ai_apona) 's Twitter Profile Photo

Attackers use ads on Google, Facebook, and other platforms to spread the Redline Stealer malware. Users who click on the ads are taken to a website that prompts them to download a file, which then installs the malware on their device. ow.ly/CAUx50NYLOm

Apona.ai (@ai_apona) 's Twitter Profile Photo

A recent study looked into the effects of a healthcare cyberattack, and the results are alarming. Find out how nearby hospitals were impacted by the attack: ow.ly/qI4s50OCazs

Apona.ai (@ai_apona) 's Twitter Profile Photo

Royal ransomware gang is on the rise, and their attacks are becoming increasingly sophisticated. Find out how they are using tools to target critical infrastructure organizations and how you can protect yourself. ow.ly/mcNP50OCaRH

Apona.ai (@ai_apona) 's Twitter Profile Photo

Stay secure online with Microsoft Authenticator's new number-matching feature. It helps protect your accounts against MFA fatigue attacks. Learn more here: ow.ly/3Qp050OCb33

Apona.ai (@ai_apona) 's Twitter Profile Photo

Experts have just discovered a zero-click Windows vulnerability that can be used to steal NTLM credentials. Learn more: ow.ly/t8qa50OCbce

Apona.ai (@ai_apona) 's Twitter Profile Photo

A new form of ransomware has surfaced that could take extortion techniques to a whole new level. Find out how Western Digital was impacted by this cyberattack and how you can protect yourself. ow.ly/4kMp50OCbgw

Apona.ai (@ai_apona) 's Twitter Profile Photo

Wondering if AI helps or hinders compliance efforts? Get the answers you need to keep your business and its customers safe from potential threats. Check out this insightful article from Security Boulevard to find out more. ow.ly/UW5r50OCbqB

Apona.ai (@ai_apona) 's Twitter Profile Photo

Are you up-to-date on the latest security knowledge regarding APIs and machine learning? Get the scoop from BrillianceSecMag. Learn about the importance of APIs, how machine learning can be used for threat detection, and more. ow.ly/kOM850OCbxM

Are you up-to-date on the latest security knowledge regarding APIs and machine learning? Get the scoop from <a href="/BscSteve/">BrillianceSecMag</a>. Learn about the importance of APIs, how machine learning can be used for threat detection, and more. ow.ly/kOM850OCbxM