Ben Nahorney (@benn333) 's Twitter Profile
Ben Nahorney

@benn333

Security writer and analyst for @CiscoSecure.

ID: 15754643

calendar_today06-08-2008 20:21:56

307 Tweet

104 Takipçi

207 Takip Edilen

Chris Dale (@chrisadale) 's Twitter Profile Photo

On the 6th of December, me and Ben Nahorney talk about EDR's and Ransomware. Come enjoy a fun, engaging and in-depth talk about these topics. Register here: sans.org/webcasts/endpo…

Amit Serper (@0xamit) 's Twitter Profile Photo

People think that the research part of being a security researcher is hard. They are wrong. The hard part is actually making the diagrams with the red arrows.

Shak The Hack (@shaktavist) 's Twitter Profile Photo

Too much cybersecurity awareness training focuses on teaching unnecessary terms which no one will remember. Tip: don't waste your time trying to explain the difference between malware, virus, trojan etc its all the same to them keep it simple to what they need to know..

Dr. Jennifer Cassidy (@oxforddiplomat) 's Twitter Profile Photo

THREAD: As Roe v Wade trends. The people of Ireland deeply remember Savita Halappanavar. If the people of the United States have not heard this story, please read. If you feel comfortable. In Oct 2012, Savita arrived in an Irish hospital, complaining of lower back pain that…

THREAD: As Roe v Wade trends. 

The people of Ireland deeply remember Savita Halappanavar. If the people of the United States have not heard this story, please read. If you feel comfortable.

In Oct 2012, Savita arrived in an Irish hospital, complaining of lower back pain that…
Hazel Chandler 🇺🇦 (@hazeburton) 's Twitter Profile Photo

Well it's "Episode 3: A New Role" in my career journey at Cisco Security. Delighted to be starting a new position as a Product Marketing Manager. Honoured to be working with Steve Ragan ⚠️ and Ben Nahorney and helping to bring some narrative storytelling to our suite of products.

Cisco Security (@ciscosecure) 's Twitter Profile Photo

#ThreatTrends is back! Check out this blog by Ben Nahorney to see what our latest #security research says about vulnerability management: cs.co/6019MjwAX & explore the nature of vulnerabilities in the latest episode of #ThreatWiseTV 📺 (embedded in the blog)!

#ThreatTrends is back! Check out this blog by <a href="/benn333/">Ben Nahorney</a> to see what our latest #security research says about vulnerability management: cs.co/6019MjwAX

&amp; explore the nature of vulnerabilities in the latest episode of #ThreatWiseTV 📺 (embedded in the blog)!
Ben Nahorney (@benn333) 's Twitter Profile Photo

New episode of #ThreatWiseTV out today, looking at the latest Talos Incident Response Quarterly Trends Report. Check out the video and blog below.

S.T.O.P.—Surveillance Technology Oversight Project (@stopspyingny) 's Twitter Profile Photo

Cars collect more data than our cellphones but receive less legal and tech protections. Read more about car data in STOP's latest report.  stopspying.org/wiretaps-on-wh…

Cars collect more data than our cellphones but receive less legal and tech protections. Read more about car data in STOP's latest report.  stopspying.org/wiretaps-on-wh…
Ben Nahorney (@benn333) 's Twitter Profile Photo

We all know someone who trusts what their email says a little too much. In our latest blog we look at email scams circulating this holiday season and what happens if you click those links. Be sure to share with your overly trusting friends and family members!

Ben Nahorney (@benn333) 's Twitter Profile Photo

New Threat Trends blog out asking the question, are bad actors using more recent vulnerabilities in attacks than they have in the past?

Cisco Security (@ciscosecure) 's Twitter Profile Photo

Think old vulnerabilities are no longer a threat? Think again! Data shows many stick around for years, putting your organization at risk. 😱 🔐 Protect your systems with insights from our latest #security blog by Ben Nahorney: cs.co/6010ucgpQ #CybersecurityAwarenessMonth

Cisco Security (@ciscosecure) 's Twitter Profile Photo

👻 Unmasking the spookiest #security threats! Discover how we uncovered the top 10 chilling vulnerabilities haunting the digital realm. Beware of these wicked tricks and treat your systems to a safer #Halloween 🎃: cs.co/6013uYWjf Snort 🐷 #CyberSecMonth

👻 Unmasking the spookiest #security threats! 

Discover how we uncovered the top 10 chilling vulnerabilities haunting the digital realm. Beware of these wicked tricks and treat your systems to a safer #Halloween 🎃: cs.co/6013uYWjf

<a href="/snort/">Snort 🐷</a> #CyberSecMonth
Decipher (@deciphersec) 's Twitter Profile Photo

Ransomware and info stealers are two of the major threats at the moment, and Ben Nahorney of @cisco shows how DNS data can help identify their presence. How to Unearth Ransomware, Infostealer Trends From Malicious Domain Data decipher.sc/how-to-unearth…

Expel (@expelsecurity) 's Twitter Profile Photo

⚠️ Malicious advertisements have replaced phishing as the top delivery method for malware in incidents that Expel has seen. Our threat intel team shares some recent malware campaign indicators in this thread 🧵👇

⚠️ Malicious advertisements have replaced phishing as the top delivery method for malware in incidents that Expel has seen.

Our threat intel team shares some recent malware campaign indicators in this thread 🧵👇