Alter Ego (@dungan_dav77965) 's Twitter Profile
Alter Ego

@dungan_dav77965

ID: 1742905500075794432

calendar_today04-01-2024 13:47:27

77 Tweet

12 Followers

149 Following

Angela Moryan (@angelamoryantv) 's Twitter Profile Photo

“Fletcher Loyer didn’t look like a 5-star today? Trey Kaufman-Renn’s not a 5-star? Braden Smith’s not a 5-star? It makes no sense.” Great response & perspective from Matt Painter on his 500th win at #Purdue. Says it’s all about the players. WISH-TV News

Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

An entire city was forced into a state of emergency after a ransomware attack causing most public services to be suspended. Follow the link below to learn more! thecyberexpress.com/foster-city-cy…

An entire city was forced into a state of emergency after a ransomware attack causing most public services to be suspended.

Follow the link below to learn more!

thecyberexpress.com/foster-city-cy…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Meta and TikTok were discovered to be stealing personally identifiable information about users when they click on advertisements regardless of data sharing preferences. Follow the link below to learn more! darkreading.com/cyber-risk/met…

Meta and TikTok were discovered to be stealing personally identifiable information about users when they click on advertisements regardless of data sharing preferences.

Follow the link below to learn more!

darkreading.com/cyber-risk/met…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

This past weekend ICN apprentices attended Midwest CCDC. Indiana Tech apprentices crushed their wildcard and had a strong performance. Purdue Northwest apprentices, who fell short of qualifying, helped run the event, gaining knowledge of what vulnerabilities attackers target.

This past weekend ICN apprentices attended Midwest CCDC. 
Indiana Tech apprentices crushed their wildcard and had a strong performance.  
Purdue Northwest apprentices, who fell short of qualifying, helped run the event, gaining knowledge of what vulnerabilities attackers target.
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Iranian government-backed hackers are using telegram to control malware on the devices of journalists and dissidents, allowing them to steal information and spy on their activity. Follow the link below to learn more! ic3.gov/CSA/2026/26032… #Cybersecurity

Iranian government-backed hackers are using telegram to control malware on the devices of journalists and dissidents, allowing them to steal information and spy on their activity.

Follow the link below to learn more!

ic3.gov/CSA/2026/26032…

#Cybersecurity
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Google Quantum AI research shows that breaking blockchain encryption requires 20x fewer resources than previously estimated. Follow the link below to learn more! securityweek.com/google-slashes… #QuantumComputing #Cybersecurity

Google Quantum AI research shows that breaking blockchain encryption requires 20x fewer resources than previously estimated.

Follow the link below to learn more!

securityweek.com/google-slashes…

#QuantumComputing #Cybersecurity
Skipjacks (@skipjacks_) 's Twitter Profile Photo

Now that Artemis II has launched we have 10 days to get everyone on Earth a Planet of the Apes costume so we can do something hilarious when the astronauts return 😁

Now that Artemis II has launched we have 10 days to get everyone on Earth a Planet of the Apes costume so we can do something hilarious when the astronauts return 😁
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

A recent cyberattack on the toy giant Hasbro resulted in unauthorized network access, with the company currently investigating the full scope of potential data compromise. Follow the link below to learn more! securityweek.com/toy-giant-hasb…

A recent cyberattack on the toy giant Hasbro resulted in unauthorized network access, with the company currently investigating the full scope of potential data compromise.

Follow the link below to learn more!

securityweek.com/toy-giant-hasb…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

The FBI reported that due to cybercrime, individuals and businesses alike have lost almost 21 billion dollars in 2025, a 26% increase from 2024. Most involve investment fraud, business email compromise, and tech support scams. ic3.gov/AnnualReport/R…

The FBI reported that due to cybercrime, individuals and businesses alike have lost almost 21 billion dollars in 2025, a 26% increase from 2024. Most involve investment fraud, business email compromise, and tech support scams.

ic3.gov/AnnualReport/R…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Iranian hackers are exploiting internet-facing PLCs across U.S. critical infrastructure. CISA recommends hardening of OT environments and disconnecting devices from the public internet. Follow the link below to learn more. cisa.gov/news-events/cy…

Iranian hackers are exploiting internet-facing PLCs across U.S. critical infrastructure. CISA recommends hardening of OT environments and disconnecting devices from the public internet.

Follow the link below to learn more.

cisa.gov/news-events/cy…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Default wildcard permissions created in AWS AgentCore starter toolkit create an “Agent God Mode” vulnerability. This allows attackers to hijack every AI agent within a compromised account. Follow the link below to learn more! unit42.paloaltonetworks.com/exploit-of-aws…

Default wildcard permissions created in AWS AgentCore starter toolkit create an “Agent God Mode” vulnerability. This allows attackers to hijack every AI agent within a compromised account.

Follow the link below to learn more!

unit42.paloaltonetworks.com/exploit-of-aws…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Booking.com warns of data breach exposing customer names, contact info, and booking history. Attackers are already using this data to launch convincing phishing attacks Follow the link below to learn more! securityweek.com/booking-com-sa…

Booking.com warns of data breach exposing customer names, contact info, and booking history. Attackers are already using this data to launch convincing phishing attacks

Follow the link below to learn more!

securityweek.com/booking-com-sa…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Martin and Avery of the ICN were part of the Innovation Challenge Pitch Event final presentations this week! They presented on Classcloud, a project that allows professors to establish virtual machines without frustrations.

Martin and Avery of the ICN were part of the Innovation Challenge Pitch Event final presentations this week!  They presented on Classcloud, a project that allows professors to establish virtual machines without frustrations.
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Zane, an ICN apprentice and Purdue Northwest student, received the Most Novel Idea award at the 2026 VICEROY Symposium for his research, “Quantum-Safe Hybrid Key Exchange,” highlighting advancements in cryptographic resilience against quantum threats.

Zane, an ICN apprentice and Purdue Northwest student, received the Most Novel Idea award at the 2026 VICEROY Symposium for his research, “Quantum-Safe Hybrid Key Exchange,” highlighting advancements in cryptographic resilience against quantum threats.
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Unit 42 researchers identified automated Mirai-style botnet companies attempting to exploit a command injection flaw in legacy TP-link routers. Follow the link below to learn more! unit42.paloaltonetworks.com/exploitation-o…

Unit 42 researchers identified automated Mirai-style botnet companies attempting to exploit a command injection flaw in legacy TP-link routers.

Follow the link below to learn more!

unit42.paloaltonetworks.com/exploitation-o…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Incidents related to the STAC4713 campaign involved using QEMU as a reverse SSH backdoor, as it leaves little forensic evidence on the host. Follow the link below to learn more! sophos.com/en-us/blog/qem…

Incidents related to the STAC4713 campaign involved using QEMU as a reverse SSH backdoor, as it leaves little forensic evidence on the host.

Follow the link below to learn more!

sophos.com/en-us/blog/qem…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

A logic flaw in OpenSSH authentication incorrectly treats commas within a certificate principal name as delimiters. This can lead to access control bypass through specifically crafted certificates. Follow the link below to learn more! securityweek.com/openssh-flaw-a…

A logic flaw in OpenSSH authentication incorrectly treats commas within a certificate principal name as delimiters. This can lead to access control bypass through specifically crafted certificates.

Follow the link below to learn more!

securityweek.com/openssh-flaw-a…
Center for Security Studies and Cyber Defense (@csscd_au) 's Twitter Profile Photo

Cybercriminals drove around with “SMS Blasters,” suitcases-sized devices that force nearby phones onto insecure 2G, to steal cellphone data and blast smishing scams though a large area. Follow the link below to learn more! tomshardware.com/tech-industry/…

Cybercriminals drove around with “SMS Blasters,” suitcases-sized devices that force nearby phones onto insecure 2G, to steal cellphone data and blast smishing scams though a large area.

Follow the link below to learn more!

tomshardware.com/tech-industry/…