Cyber Tzar (@cybertzar) 's Twitter Profile
Cyber Tzar

@cybertzar

Official Twitter account of Cyber Tzar.

Cyber Security Assessment, Score Carding, Benchmarking, and Risk Management Platform.

ID: 1335355352037150720

linkhttps://cybertzar.com calendar_today05-12-2020 22:49:00

8,8K Tweet

1,1K Followers

4,4K Following

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

The Interlock ransomware gang has flaunted a 43GB haul of files allegedly stolen from the city of Saint Paul, following a late-July cyberattack that forced the Minnesota capital to declare a state of national emergency. #cybersecurity theregister.com/2025/08/13/ran…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

Cybersecurity researchers have discovered a new campaign that employs a previously undocumented ransomware family called Charon to target the Middle East's public sector and aviation industry. #cybersecurity thehackernews.com/2025/08/charon…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

Initial access broker services are a booming dark web market, with threat actors able to purchase a variety of options at low cost, according to a new Rapid7 report. #cybersecurity infosecurity-magazine.com/news/cybercrim…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

Hackers have released stolen data belonging to US insurance giant Allianz Life, exposing 2.8 million records with sensitive information on business partners and customers in ongoing Salesforce data theft attacks. #cybersecurity bleepingcomputer.com/news/security/…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

Very few people are immune to the siren song of nostalgia, a yearning for a "better time" when this was all fields and kids respected their elders - and it looks like cyber criminals are no exception. #cybersecurity theregister.com/2025/08/13/cro…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting N-able N-central to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. #cybersecurity thehackernews.com/2025/08/cisa-a…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

Fake Minecraft clone Eaglercraft 1.12 Offline spreads NjRat spyware stealing passwords, spying via webcam and microphone, warns Point Wild security team. #cybersecurity hackread.com/fake-minecraft…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

Fortinet is warning about a remote unauthenticated command injection flaw in FortiSIEM that has in-the-wild exploit code, making it critical for admins to apply the latest security updates. #cybersecurity bleepingcomputer.com/news/security/…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

At least a dozen ransomware gangs have incorporated kernel-level EDR killers into their malware arsenal. #cybersecurity theregister.com/2025/08/14/edr…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

Multiple HTTP/2 implementations have been found susceptible to a new attack technique called MadeYouReset that could be explored to conduct powerful denial-of-service (DoS) attacks. #cybersecurity thehackernews.com/2025/08/new-ht…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

A surge in brute-force attempts targeting Fortinet SSL VPNs that was spotted earlier this month could be a portent of imminent attacks leveraging currently undisclosed (potentially zero-day) vulnerabilities in Fortinet devices. #cybersecurity helpnetsecurity.com/2025/08/14/bru…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

More than $300 million worth of cryptocurrency linked to cybercrime and fraud schemes has been frozen due to two separate initiatives involving law enforcement and private companies. #cybersecurity bleepingcomputer.com/news/security/…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

Multinational telco Colt Technology Services says a "cyber incident" is to blame for its customer portal and other services being down for a number of days. #cybersecurity theregister.com/2025/08/15/lon…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

The threat actor known as EncryptHub is continuing to exploit a now-patched security flaw impacting Microsoft Windows to deliver malicious payloads. #cybersecurity thehackernews.com/2025/08/russia…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

The House of Commons and Canada’s cybersecurity agency are investigating a significant data breach caused by an unknown “threat actor” targeting employee information. #cybersecurity securityaffairs.com/181155/hacking…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

The British telecommunications and network services provider disclosed that the attack started on August 12 and the disruption continues as its IT staff works around the clock to mitigate its effects. #cybersecurity bleepingcomputer.com/news/security/…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

The lingering effects of a cyberattack on the Public Prosecution Service of the Netherlands are preventing it from reactivating speed cameras across the country. #cybersecurity theregister.com/2025/08/15/cyb…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC 3.0, uncovering serious shortcomings in the operators' infrastructure. #cybersecurity thehackernews.com/2025/08/ermac-…

Cyber Tzar (@cybertzar) 's Twitter Profile Photo

The cyber insurance market is entering a new phase of evolution and showing early signs of maturity, according to recent research from Arctic Wolf. #cybersecurity helpnetsecurity.com/2025/08/15/cyb…