Ivan Mateos (@ivansophos) 's Twitter Profile
Ivan Mateos

@ivansophos

Sophos Iberia Sales Engineer
Las opiniones publicadas por esta cuenta son personales y no corporativas.

ID: 169584823

linkhttp://www.sophos.com calendar_today22-07-2010 17:58:52

514 Tweet

4,4K Followers

4,4K Following

Carlos Sánchez (@chocotuits) 's Twitter Profile Photo

La mayoría de la gente no es consciente de lo peligroso que es compartir el DNI sin marca de agua. Por eso hemos creado Saferlayer, una herramienta gratuita para proteger tus documentos y evitar estafas. Enlace a la app y explicación más detallada a continuación 👇

HackManac (@h4ckmanac) 's Twitter Profile Photo

🚨 Critical Cisco Vulnerability Earns a Perfect 10.0 CVSS Score. A hardcoded token. Root access. No login required. Source: thehackernews.com/2025/05/cisco-…

SophosIberia (@sophosiberia) 's Twitter Profile Photo

El estado del ransomware en el sector sanitario 2025 292 directivos de TI y ciberseguridad revelan la realidad actual del ransomware en los centros sanitarios news.sophos.com/es-es/2025/10/…

SophosIberia (@sophosiberia) 's Twitter Profile Photo

Presentamos Sophos Identity Threat Detection and Response (ITDR) Neutraliza las amenazas basadas en la identidad antes de que puedan afectar a tu negocio news.sophos.com/es-es/2025/10/…

Ivan Mateos (@ivansophos) 's Twitter Profile Photo

Así opera Sturnus, un nuevo troyano bancario para Android que 'lee' WhatsApp o Telegram | EscudoDigital escudodigital.com/ciberseguridad…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🛑 WARNING: CVE-2025-20393 is rated 10.0, with no patch available. Cisco confirmed active exploitation of an AsyncOS zero-day by a China-linked APT. The flaw allows root-level command execution on affected email security appliances and enables attackers to establish

🛑 WARNING: CVE-2025-20393 is rated 10.0, with no patch available.

Cisco confirmed active exploitation of an AsyncOS zero-day by a China-linked APT.

The flaw allows root-level command execution on affected email security appliances and enables attackers to establish
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 NeuroSploitv2 - AI-Powered Pentesting Tool With Claude, GPT, & Gemini models Source: cybersecuritynews.com/neurosploitv2-… NeuroSploitv2 is an AI-powered penetration testing framework that automates critical aspects of offensive security operations through advanced language models. The

🚨 NeuroSploitv2 - AI-Powered Pentesting Tool With Claude, GPT, & Gemini models  

Source: cybersecuritynews.com/neurosploitv2-…

NeuroSploitv2 is an AI-powered penetration testing framework that automates critical aspects of offensive security operations through advanced language models.

The
Olexander (@_aircorridor) 's Twitter Profile Photo

Artificial Intelligence in Cybersecurity, Part 1: Using AI for Port Scanning Just tell it "scan my network" in plain English. LLM selects commands, runs scans, analyzes results, and identifies vulnerabilities. hackers-arise.com/artificial-int… OccupytheWeb

Artificial Intelligence in Cybersecurity, Part 1: Using AI for Port Scanning

Just tell it "scan my network" in plain English. LLM selects commands, runs scans, analyzes results, and identifies vulnerabilities.
hackers-arise.com/artificial-int…
<a href="/three_cube/">OccupytheWeb</a>
Sophos (@sophos) 's Twitter Profile Photo

🚩 A small ask from a remote IT hire might seem harmless—until it’s not. North Korean operatives are posing as job seekers to earn Western paychecks and gain access. The CISO Playbook breaks down how to detect, respond, and defend. 🔗 bit.ly/3Zbcbhl

🚩 A small ask from a remote IT hire might seem harmless—until it’s not.

North Korean operatives are posing as job seekers to earn Western paychecks and gain access.

The CISO Playbook breaks down how to detect, respond, and defend.

🔗 bit.ly/3Zbcbhl