DALETH - Servicios de Consultoría y Capacitación (@daleth_scc) 's Twitter Profile
DALETH - Servicios de Consultoría y Capacitación

@daleth_scc

Crear soluciones en modelos de negocios para que pequeñas y medianas empresas logren competencia y excelencia. #AI #CyberSecurity #MachineLearning #DataSciencie

ID: 1339595542007988224

linkhttps://daleth.com.mx calendar_today17-12-2020 15:37:40

1,1K Tweet

496 Followers

1,1K Following

Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

CrowdStrike has published a report containing technical details and root cause analysis of the faulty Falcon update. External Technical Root Cause Analysis — Channel File 291 crowdstrike.com/wp-content/upl… #cybersecurity #infosec #CrowdStrike

CrowdStrike has published a report containing technical details and root cause analysis of the faulty Falcon update.

External Technical Root Cause Analysis — Channel File 291

crowdstrike.com/wp-content/upl…

#cybersecurity #infosec #CrowdStrike
The Hacker News (@thehackersnews) 's Twitter Profile Photo

CrowdStrike reveals root cause of global Windows device crash, implements new safety measures, and faces potential lawsuit from Delta Air Lines. Read details here: thehackernews.com/2024/08/crowds… #cybersecurity #infosec

CISA Cyber (@cisacyber) 's Twitter Profile Photo

🤖Monitor and log #AI system activity and outputs! Robust logging and monitoring are crucial for detecting abnormal behavior, potential intrusions, as well as natural data drift. Discover more steps you can take to manage AI risk: ncsc.gov.uk/collection/gui…

🤖Monitor and log #AI system activity and outputs! Robust logging and monitoring are crucial for detecting abnormal behavior, potential intrusions, as well as natural data drift. Discover more steps you can take to manage AI risk: ncsc.gov.uk/collection/gui…
Kirk Borne (@kirkdborne) 's Twitter Profile Photo

Complex Network Analysis in #Python — Recognize • Construct • Visualize • Analyze • Interpret: amzn.to/2Rw8ZKL —— #BigData #DataScientists #DataScience #AI #Semantic #MachineLearning #LinkedData #GraphDB #GraphAnalytics #NetworkScience #DataStorytelling #100DaysOfCode

Complex Network Analysis in #Python — Recognize • Construct • Visualize • Analyze • Interpret: amzn.to/2Rw8ZKL
——
#BigData #DataScientists #DataScience #AI #Semantic #MachineLearning #LinkedData #GraphDB #GraphAnalytics #NetworkScience #DataStorytelling #100DaysOfCode
Malware Patrol (@malwarepatrol) 's Twitter Profile Photo

"#LummaC2, an #infostealer #malware actively exploiting PowerShell commands, has resurfaced to infiltrate and exfiltrate sensitive data." infosecurity-magazine.com/news/lummac2-i…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 Warning: A critical #vulnerability (CVE-2024-9680) in Firefox is being actively exploited. Don’t wait—ensure your browsers are updated now to protect against potential remote code execution. Learn more: thehackernews.com/2024/10/mozill… #cybersecurity #hacking

CISA Cyber (@cisacyber) 's Twitter Profile Photo

CISA has observed cyber threat actors leveraging information from unencrypted persistent cookies in F5 BIG-IP. Encrypt your cookies and see more at cisa.gov/news-events/al…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚩 A critical security flaw in #GitLab (CVE-2024-9164) could allow attackers to run CI/CD pipelines on unauthorized branches. Find details here: thehackernews.com/2024/10/new-cr… Update your instance ASAP to avoid becoming the next victim. #cybersecurity #devops

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Nearly 12,000 API keys and passwords found in AI training dataset - Ionut Ilascu bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Paragon Partition Manager's BioNTdrv.sys driver has a critical vulnerability (CVE-2025-0289) exploited in ransomware attacks. Attackers with local access can escalate privileges and run malicious code on Windows systems. Read the full analysis here: thehackernews.com/2025/03/hacker…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

A new phishing campaign uses the ClickFix technique to launch a multi-stage attack via SharePoint. It hides behind trusted services and uses the Havoc C2 framework to avoid detection. Read the full analysis here: thehackernews.com/2025/03/hacker…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

A threat group is exploiting AWS misconfigurations to send phishing emails. TGR-UNK-0011 uses exposed AWS access keys to bypass email security, blending in with trusted communications. Learn more about their tactics: thehackernews.com/2025/03/hacker…

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

VMware Workstation auto-updates broken After Broadcom URL redirect - Lawrence Abrams bleepingcomputer.com/news/software/… bleepingcomputer.com/news/software/…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 Old iPhones, new threats. Apple just patched 3 exploited zero-days—and yes, even your dusty iPhone 6s is getting a fix. 🛡️ What's at stake? • CVE-2025-24201 (CVSS 8.8): Malicious web content breaking free from Safari’s sandbox • CVE-2025-24085 (7.3): Apps hijacking system

🚨 Old iPhones, new threats. Apple just patched 3 exploited zero-days—and yes, even your dusty iPhone 6s is getting a fix.

🛡️ What's at stake?
• CVE-2025-24201 (CVSS 8.8): Malicious web content breaking free from Safari’s sandbox
• CVE-2025-24085 (7.3): Apps hijacking system
Kirk Borne (@kirkdborne) 's Twitter Profile Photo

Get this recent release from Manning Publications >> “AI Agents in Action” at amzn.to/44kbHsL Take a look inside the book here: manning.com/books/ai-agent… Gain hands-on experience in these areas: 🟡 Understand and implement AI agent behavior patterns 🟡 Design and deploy

Get this recent release from <a href="/ManningBooks/">Manning Publications</a> &gt;&gt; “AI Agents in Action” at amzn.to/44kbHsL

Take a look inside the book here: manning.com/books/ai-agent…

Gain hands-on experience in these areas:

🟡 Understand and implement AI agent behavior patterns
🟡 Design and deploy
Kaspersky (@kaspersky) 's Twitter Profile Photo

Hackers gone wild! 😂 From traffic lights roasting Zuckerberg to robot vacuums cursing at dogs, these pranks are next-level hilarious (but kinda scary). Slide to see the 3 most epic hacker shenanigans and the lessons they teach. 🚦🤖 For more on this check

Hackers gone wild! 😂 From traffic lights roasting Zuckerberg to robot vacuums cursing at dogs, these pranks are next-level hilarious (but kinda scary). Slide to see the 3 most epic hacker shenanigans and the lessons they teach. 🚦🤖
For more on this check