FORTBRIDGE (@fortbridge) 's Twitter Profile
FORTBRIDGE

@fortbridge

FORTBRIDGE โ€“ Leading IT Security Services in London | Cybersecurity, Penetration Testing, Red Teaming and Cloud Security

ID: 1332228256565768193

linkhttps://www.fortbridge.co.uk/ calendar_today27-11-2020 07:42:36

614 Tweet

161 Followers

8 Following

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

๐Ÿšจ The EU AI Act is here โ€” are you ready? ๐Ÿšจ The worldโ€™s first comprehensive legal framework for AI will change how businesses design, deploy, and secure AI systems. In our Complete Guide to the EU AI Act, we break down: โœ… Who the Act applies to โœ… The four AI risk categories

๐Ÿšจ The EU AI Act is here โ€” are you ready? ๐Ÿšจ

The worldโ€™s first comprehensive legal framework for AI will change how businesses design, deploy, and secure AI systems.

In our Complete Guide to the EU AI Act, we break down:

โœ… Who the Act applies to
โœ… The four AI risk categories
FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

The Dutch National Cyber Security Centre (NCSC-NL) has confirmed active cyberattacks targeting CVE-2025-6543, a critical vulnerability (CVSS 9.2) in Citrix NetScaler ADC and NetScaler Gateway. This flaw affects devices configured as a Gateway (VPN, ICA Proxy, CVPN, RDP Proxy)

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

Cisco has released an urgent security update addressing a critical vulnerability in its Secure Firewall Management Center (FMC) Software. Watch the video till the end to explore the details of the vulnerability, who was impacted, mitigation strategies, and essential tips for

Lord Steak (@adrian__t) 's Twitter Profile Photo

A couple of years ago, I took the DevSecOps certification from the Practical DevSecOps , and it truly exceeded my expectations. It wasnโ€™t just another certification โ€” it was highly practical, insightful, and extremely useful in my day-to-day work. Recently, I noticed that they launched

A couple of years ago, I took the DevSecOps certification from the <a href="/PDevsecops/">Practical DevSecOps</a> , and it truly exceeded my expectations. It wasnโ€™t just another certification โ€” it was highly practical, insightful, and extremely useful in my day-to-day work.

Recently, I noticed that they launched
FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

Weโ€™re proud to share that our very own Bogdan took the stage at DEF CON 33, one of the worldโ€™s most iconic security conferences. ๐ŸŽค๐Ÿ” In his talk, Bogdan presented his original research on the Feeld Dating App (also featured in major media outlets including The Guardian )

Weโ€™re proud to share that our very own <a href="/Bogdan___T/">Bogdan</a>  took the stage at <a href="/defcon/">DEF CON</a> 33, one of the worldโ€™s most iconic security conferences. ๐ŸŽค๐Ÿ”

In his talk, Bogdan presented his original research on the Feeld Dating App (also featured in major media outlets including The Guardian )
FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

Citrix has released security updates addressing three high-severity vulnerabilities in NetScaler ADC and NetScaler Gateway, with one of them already being actively exploited in the wild. Organizations relying on these appliances should treat this as a priority. Watch the video

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

WhatsApp has recently patched a zero-day vulnerability affecting its iOS and macOS clients. This flaw was actively exploited in targeted attacks, underscoring the increasing use of messaging platforms as entry points for sophisticated spyware campaigns. Watch the video till the

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

Docker has released an urgent security update addressing a critical container escape vulnerability with a CVSS score of 9.3. The flaw impacted Docker Desktop for Windows and macOS, allowing a malicious container to break isolation and gain access to the underlying host system.

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, urging organizations to take immediate action. Watch the video till the end to explore the details of the

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two TP-Link router vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. This means attackers are actively targeting these flaws in the wild, putting organizations and individuals at

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

A new critical vulnerability in SAP S/4HANA has come under active exploitation, putting organizations at serious risk. SAP S/4HANA is a widely used ERP system, making this flaw especially concerning. Watch the video till the end to explore the details of the vulnerability, who

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

A new software supply chain attack has compromised 20 popular npm packages that collectively see over 2 billion weekly downloads. This incident highlights the growing risks facing open-source ecosystems and the importance of strong security practices for both developers and

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

This month, Microsoft released patches for over 80 vulnerabilities across Windows operating systems and related software. While no zero-days were reported in Microsoftโ€™s update, several high-severity flaws require urgent attention. Watch the video till the end to explore the

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

Weโ€™re proud to share that our very own Bogdan had the pleasure of speaking at BSides Bristol 2025 last week and what an amazing experience it was! His session focused on original security research: โ€œ๐—˜๐˜…๐—ฎ๐—บ๐—ถ๐—ป๐—ถ๐—ป๐—ด ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—–๐—ผ๐—ป๐˜๐—ฟ๐—ผ๐—น

Weโ€™re proud to share that our very own <a href="/Bogdan___T/">Bogdan</a>  had the pleasure of speaking at <a href="/bsidesbristol/">BSides Bristol</a> 2025 last week and what an amazing experience it was!

His session focused on original security research: โ€œ๐—˜๐˜…๐—ฎ๐—บ๐—ถ๐—ป๐—ถ๐—ป๐—ด ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—–๐—ผ๐—ป๐˜๐—ฟ๐—ผ๐—น
FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

Samsung has released its September 2025 security update addressing a critical zero-day vulnerability that has already been exploited in the wild. Watch the video till the end to explore the details of this vulnerability, who is affected, mitigation strategies, and essential tips

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

Apple has released critical security updates addressing a high-severity vulnerability in the ImageIO component. This flaw allowed attackers to exploit memory corruption via a malicious image file. Watch the video till the end to explore the details of this vulnerability, who is

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

The weakest link in your supply chain could open the door for attackers. Watch the video till the end to learn more about supply chain attacks, see real examples, and discover essential tips to prevent them. ๐Ÿ” Concerned about your Company's Security? Ask FORTBRIDGE ! Our

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

Google has released an urgent security update for the Chrome browser, addressing four vulnerabilities, including a zero-day flaw that is actively being exploited by attackers. Watch the video till the end to explore the details of this vulnerability, who is affected, mitigation

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

Fortra has released an urgent patch addressing a critical vulnerability (CVSS 10.0) in its GoAnywhere Managed File Transfer (MFT) solution. This flaw could allow attackers to execute arbitrary commands on vulnerable systems. Watch the video till the end to explore the details of

FORTBRIDGE (@fortbridge) 's Twitter Profile Photo

Phishing remains the #1 entry point for cyberattacks and attackers are getting smarter with their tactics. Watch the video till the end to explore common phishing tricks like spear phishing, whaling, and clone phishing, plus how to stay safe. ๐Ÿ” Concerned about your Company's