John Walsh III (@johnwalshiii) 's Twitter Profile
John Walsh III

@johnwalshiii

ex-rocket scientist who's been a Chairman,CEO,COO,CTO,CIO, board advisor, founder of @redsummitglobal. Need Advice? Book a 1:1 w/me: intro.co/johnwalsh

ID: 16359552

linkhttp://www.johnfwalshiii.com calendar_today19-09-2008 04:50:12

1,1K Tweet

601 Followers

937 Following

John Walsh III (@johnwalshiii) 's Twitter Profile Photo

How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?Discover how cloud-captive portal solutions improve Wi-Fi security by bringing the Zero Trust framework. Learn to implement Zero Trust principles, and🚨 Most companies are still on.fb.me/1sHha7h

How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?Discover how cloud-captive portal solutions improve Wi-Fi security by bringing the Zero Trust framework. Learn to implement Zero Trust principles, and🚨 Most companies are still on.fb.me/1sHha7h
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on JapanMirrorFace, an APT10 subgroup, targets Japan’s security with spear-phishing, sandbox evasion, and ANEL malware.🛑 China-linked MirrorFace has targeted Japan’s security and tech on.fb.me/1sHha7h

MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on JapanMirrorFace, an APT10 subgroup, targets Japan’s security with spear-phishing, sandbox evasion, and ANEL malware.🛑 China-linked MirrorFace has targeted Japan’s security and tech on.fb.me/1sHha7h
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Product Walkthrough: How Satori Secures Sensitive Data From Production to AISatori secures all data types, automates discovery, enforces access controls, and integrates workflows, mitigating risks from production to AI models.🔐 Data Security—Not Just About

Product Walkthrough: How Satori Secures Sensitive Data From Production to AISatori secures all data types, automates discovery, enforces access controls, and integrates workflows, mitigating risks from production to AI models.🔐 Data Security—Not Just About
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content CreationMicrosoft takes legal action against a hacking group using stolen Azure API keys to create harmful AI-generated content.🔥 Microsoft has taken legal action against hackers using on.fb.me/1sHha7h

Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content CreationMicrosoft takes legal action against a hacking group using stolen Azure API keys to create harmful AI-generated content.🔥 Microsoft has taken legal action against hackers using on.fb.me/1sHha7h
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA CodesMalvertising targets Google Ads users, redirecting to phishing sites that steal credentials, budgets, and 2FA codes.🧐 A new malvertising campaign is targeting businesses by on.fb.me/1sHha7h

Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA CodesMalvertising targets Google Ads users, redirecting to phishing sites that steal credentials, budgets, and 2FA codes.🧐 A new malvertising campaign is targeting businesses by on.fb.me/1sHha7h
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Check out my latest Edition #16 - The Intersection of Hollywood & Technology - Alice (Subservience 2024) linkedin.com/pulse/im-stron… via LinkedIn

John Walsh III (@johnwalshiii) 's Twitter Profile Photo

How to Eliminate Identity-Based ThreatsModern authentication technologies eliminate identity-based threats, including phishing and credential theft, impacting 90% of organizations.👉 50-80% of enterprise breaches are due to credential & user-based on.fb.me/1sHha7h

How to Eliminate Identity-Based ThreatsModern authentication technologies eliminate identity-based threats, including phishing and credential theft, impacting 90% of organizations.👉 50-80% of enterprise breaches are due to credential & user-based on.fb.me/1sHha7h
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix ControllersPalo Alto Networks patches severe Expedition vulnerabilities, including SQL injection (CVE-2025-0103, CVSS 7.8), exposing sensitive data.🚨 Critical flaws found in thehackernews.com/2025/01/major-…

Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix ControllersPalo Alto Networks patches severe Expedition vulnerabilities, including SQL injection (CVE-2025-0103, CVSS 7.8), exposing sensitive data.🚨 Critical flaws found in thehackernews.com/2025/01/major-…
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]This week in cybersecurity: zero-day exploits, advanced malware, and the latest hacking tricks you need to know about.🌐 This week in cybersecurity: From nation-state attacks to on.fb.me/1sHha7h

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]This week in cybersecurity: zero-day exploits, advanced malware, and the latest hacking tricks you need to know about.🌐 This week in cybersecurity: From nation-state attacks to on.fb.me/1sHha7h
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active AttacksCISA adds BeyondTrust CVE-2024-12686 to KEV catalog; Treasury breach linked to Silk Typhoon exploits.🚨 New Vulnerability Alert! CISA has added another critical BeyondTrust flaw to its on.fb.me/1sHha7h

CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active AttacksCISA adds BeyondTrust CVE-2024-12686 to KEV catalog; Treasury breach linked to Silk Typhoon exploits.🚨 New Vulnerability Alert!

CISA has added another critical BeyondTrust flaw to its on.fb.me/1sHha7h
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence CollectionDoNot Team deploys Tanzeem malware, exploiting Android permissions to steal data via fake chat apps.🚨 Urgent: Notorious DoNot Team (APT-C-35) is behind a new Android malware on.fb.me/1sHha7h

DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence CollectionDoNot Team deploys Tanzeem malware, exploiting Android permissions to steal data via fake chat apps.🚨 Urgent: Notorious DoNot Team (APT-C-35) is behind a new Android malware on.fb.me/1sHha7h
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Hackers Using RID Hijacking To Create Admin Accounts In WindowsCybersecurity researchers at AhnLab have discovered that a North Korean threat group uses malicious files to hijack RIDs and grant admin access toHackers Using RID Hijacking To Create Admin bit.ly/2ATapaj

Hackers Using RID Hijacking To Create Admin Accounts In WindowsCybersecurity researchers at AhnLab have discovered that a North Korean threat group uses malicious files to hijack RIDs and grant admin access toHackers Using RID Hijacking To Create Admin bit.ly/2ATapaj
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Hackers Use Google Ads To Distribute Malware Via Fake Homebrew SiteCybercriminals are using Google ads to spread malware by directing Mac and Linux users to a fake Homebrew website with an infostealer. This malwareHackers Use Google Ads To Distribute bit.ly/2ATapaj

Hackers Use Google Ads To Distribute Malware Via Fake Homebrew SiteCybercriminals are using Google ads to spread malware by directing Mac and Linux users to a fake Homebrew website with an infostealer. This malwareHackers Use Google Ads To Distribute bit.ly/2ATapaj
John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Check out my latest article: 🧠 “Common People” (Black Mirror S7E1): When Healthcare Becomes a Subscription linkedin.com/pulse/common-p… via LinkedIn

John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Check out my latest article: 🎬 The Intersection of Hollywood and Technology – Episode 18 Mission: Possible? linkedin.com/pulse/intersec… via LinkedIn

John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Check out my latest article: 🎬 The Intersection of Hollywood and Technology – Episode 21 “Blade Runner 2049” (2017) linkedin.com/pulse/intersec… via LinkedIn

John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Check out my latest article: 🔀 The Intersection of 🎬 Hollywood and Technology 🤖 🛰️ 📡 – Episode 22 - The Jetsons (1962–63, 1985–87) linkedin.com/pulse/intersec… via LinkedIn

John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Check out my latest article: 🎬 The Hollywood & Tech Technology Series 🛰️ - Episode 23 - Murderbot (2025) linkedin.com/pulse/hollywoo… via LinkedIn

John Walsh III (@johnwalshiii) 's Twitter Profile Photo

Check out my latest article: 🎬 The Hollywood & Technology Series 🛰️ — Episode 24 — Afraid (2024) linkedin.com/pulse/hollywoo… via LinkedIn