Bryce Austin (@brycea) 's Twitter Profile
Bryce Austin

@brycea

#CIO #CISO. CEO of TCE Strategy. Technology and #cybersecurity advisor. Professional speaker and #author of "Secure Enough? 20 Questions on Cybersecurity".

ID: 17056335

linkhttp://www.bryceaustin.com calendar_today30-10-2008 00:36:28

8,8K Tweet

1,1K Takipçi

716 Takip Edilen

Bryce Austin (@brycea) 's Twitter Profile Photo

The same thing happened as part of the Equifax breach, so I'm not seeing this as a new event. Warning, NYT paywall. buff.ly/NCQZrUU

The same thing happened as part of the Equifax breach, so I'm not seeing this as a new event. Warning, NYT paywall. buff.ly/NCQZrUU
Bryce Austin (@brycea) 's Twitter Profile Photo

"The FBI used the VerifTools marketplace to generate and purchase counterfeit New Mexico driver’s licenses, which were paid for with cryptocurrency. The FBI has identified the equivalent of approximately $6.4 million of illicit proceeds linked to the..." buff.ly/0SJb7rL

Bryce Austin (@brycea) 's Twitter Profile Photo

"The compromised Nx versions included a malicious script designed to exploit local AI command-line interface (CLI) tools, which used large language models, such as Anthropic’s Claude, Google’s Gemini and the Amazon Q coding assistant..." buff.ly/TaONBAF

"The compromised Nx versions included a malicious script designed to exploit local AI command-line interface (CLI) tools, which used large language models, such as Anthropic’s Claude, Google’s Gemini and the Amazon Q coding assistant..." buff.ly/TaONBAF
Bryce Austin (@brycea) 's Twitter Profile Photo

"According to the files, their reach spreads outside China’s borders, supplying censorship and surveillance technology to governments in Myanmar, Pakistan, Ethiopia, Kazakhstan, and others linked to the Belt and Road Initiative." buff.ly/JrcsJrU

"According to the files, their reach spreads outside China’s borders, supplying censorship and surveillance technology to governments in Myanmar, Pakistan, Ethiopia, Kazakhstan, and others linked to the Belt and Road Initiative." buff.ly/JrcsJrU
Bryce Austin (@brycea) 's Twitter Profile Photo

Do you have a #Cisco ASA #firewall? Keep it patched, and start working toward replacing it. ASA's are end-of-life. I have not seen good results with Cisco's new FTD firewall line, so I'd recommending looking at alternatives. #cybersecurity #cyberaware buff.ly/dQtvobH

Do you have a #Cisco ASA #firewall? Keep it patched, and start working toward replacing it. ASA's are end-of-life. I have not seen good results with Cisco's new FTD firewall line, so I'd recommending looking at alternatives. #cybersecurity #cyberaware buff.ly/dQtvobH
Bryce Austin (@brycea) 's Twitter Profile Photo

"In a letter from the Senate Health, Education, Labor and Pensions Committee sent on Aug. 22, Sen. Bill Cassidy, M.D., R-La., and Sen. Maggie Hassan, D-N.H., prodded Aflac CEO Daniel Amos about providing the lawmakers with details about the incident..." buff.ly/be8GJhF

"In a letter from the Senate Health, Education, Labor and Pensions Committee sent on Aug. 22, Sen. Bill Cassidy, M.D., R-La., and Sen. Maggie Hassan, D-N.H., prodded Aflac CEO Daniel Amos about providing the lawmakers with details about the incident..." buff.ly/be8GJhF
Bryce Austin (@brycea) 's Twitter Profile Photo

It is scary how good AI audio deep-fakes have become. I got 3 out of 5 right on this quiz. Warning: WSJ paywall. buff.ly/iERXUSx

Bryce Austin (@brycea) 's Twitter Profile Photo

Interesting example of "walling the garden" to try to keep cybercriminals from putting malicious apps as "side-loaded" apps that run inside an app on the Google Play store. buff.ly/ba9AV65

Interesting example of "walling the garden" to try to keep cybercriminals from putting malicious apps as "side-loaded" apps that run inside an app on the Google Play store. buff.ly/ba9AV65
Bryce Austin (@brycea) 's Twitter Profile Photo

Developers take notice! This npm attack appears to be very serious (and challenging for developers to detect). #cybersecurity #cyberaware #cybersecuritynews #cyberattack ift.tt/RBc10vJ

Developers take notice! This npm attack appears to be very serious (and challenging for developers to detect). #cybersecurity #cyberaware #cybersecuritynews #cyberattack ift.tt/RBc10vJ
Bryce Austin (@brycea) 's Twitter Profile Photo

"The 'Salt Typhoon' campaign dates back to at least 2019 but was only discovered by U.S. authorities last year. It allowed China-linked actors to access U.S. customer call data, private communications for a limited number of individuals..." buff.ly/PrsLQUV

Bryce Austin (@brycea) 's Twitter Profile Photo

Update or uninstall #WinRAR ASAP! This is a serious vuln being exploited by two different #ransomware gangs. #cybersecurity #cybersecuritynews #cyberaware buff.ly/aWWru28

Update or uninstall #WinRAR ASAP! This is a serious vuln being exploited by two different #ransomware gangs. #cybersecurity #cybersecuritynews #cyberaware buff.ly/aWWru28
Bryce Austin (@brycea) 's Twitter Profile Photo

Has anyone had issues buying or servicing a Jaguar or Land Rover? This must be one heck of a breach. "Reports suggest that every day of disruption is losing the company £72 million ($98 million) in sales. The company has also confirmed that the..." ift.tt/YnB6a7e

Has anyone had issues buying or servicing a Jaguar or Land Rover? This must be one heck of a breach. "Reports suggest that every day of disruption is losing the company £72 million ($98 million) in sales. The company has also confirmed that the..." ift.tt/YnB6a7e
Bryce Austin (@brycea) 's Twitter Profile Photo

Do you have a #WatchGuardfirewall? You need to patch that #WatchGuard firewall! #cybersecurity #securitypatch #securityupdate #cyberaware #patchnow buff.ly/w9MpCko

Bryce Austin (@brycea) 's Twitter Profile Photo

This is clever. "The method relies on full-resolution images that carry instructions invisible to the human eye but become apparent when the image quality is lowered through resampling algorithms." buff.ly/XMGg13T

This is clever. "The method relies on full-resolution images that carry instructions invisible to the human eye but become apparent when the image quality is lowered through resampling algorithms." buff.ly/XMGg13T
Bryce Austin (@brycea) 's Twitter Profile Photo

"The lawsuit against Norfolk sheds light on just how frequently drivers’ movements are recorded without a warrant for that information ...176 cameras across the city logged his location 526 times between Feb. 19 and July 2, according to a Monday court..." buff.ly/d9wO0MZ

"The lawsuit against Norfolk sheds light on just how frequently drivers’ movements are recorded without a warrant for that information ...176 cameras across the city logged his location 526 times between Feb. 19 and July 2, according to a Monday court..." buff.ly/d9wO0MZ
Bryce Austin (@brycea) 's Twitter Profile Photo

Anyone having issues traveling in Europe? A ransomware attack has brought down many airport services across the EU. One example: "A spokesperson for Brussels Airport said Collins Aerospace had not yet delivered a secure, updated version of the software.." ORSA.short.gy/3WpFNz

Bryce Austin (@brycea) 's Twitter Profile Photo

Be careful what you put into #ChatGPT (or any AI engine that you aren't hosting yourself to be honest). #cybersecurity #cyberaware buff.ly/ML9TmcB

Be careful what you put into #ChatGPT (or any AI engine that you aren't hosting yourself to be honest). #cybersecurity #cyberaware buff.ly/ML9TmcB
Bryce Austin (@brycea) 's Twitter Profile Photo

$130MM bank robbery, all from the convenience of a keyboard. "Evertec notes that part of the $130 million has already been recovered, without mentioning how much, with recovery efforts still contining." buff.ly/KtGI37I

$130MM bank robbery, all from the convenience of a keyboard. "Evertec notes that part of the $130 million has already been recovered, without mentioning how much, with recovery efforts still contining." buff.ly/KtGI37I
Bryce Austin (@brycea) 's Twitter Profile Photo

This is some really interesting reading on real-world cyberattack response techniques. Good job putting this together CISA. This is some really interesting reading on real-world cyberattack response techniques. Good job putting this together CISA. ift.tt/4pEKVqP

Bryce Austin (@brycea) 's Twitter Profile Photo

"The developer, commonly known as ‘qix,’ said he received an email to reset his two-factor authentication (2FA) that looked “very legitimate,” but that was malicious. He added that it only involved his npm account and that he was in contact with NPM..." buff.ly/Iqcg0OM

"The developer, commonly known as ‘qix,’ said he received an email to reset his two-factor authentication (2FA) that looked “very legitimate,” but that was malicious. He added that it only involved his npm account and that he was in contact with NPM..." buff.ly/Iqcg0OM