The Security Bulldog (@securitybdog) 's Twitter Profile
The Security Bulldog

@securitybdog

Cybersecurity Intelligence Platform #cyber #threat #infosec #startup #appsec #CVE #news #MITRE #podcasts

ID: 1359569386173059075

linkhttp://www.securitybulldog.com calendar_today10-02-2021 18:26:26

749 Tweet

353 Takipçi

1,1K Takip Edilen

ShortArm Solutions (@shortarmsas) 's Twitter Profile Photo

Thank you Jeff Majka from The Security Bulldog for being on The Cyber Pro Podcast! LinkedIn: linkedin.com/feed/update/ur… Apple: podcasts.apple.com/us/podcast/cyb… Spotify: open.spotify.com/show/7DK84gmUP… YouTube: youtu.be/KDYm5UEgz4E #CyberSecurityAwareness #informationsecurity #artificalintelligence

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Blind Eagle APT targets Colombia’s insurance sector with custom Quasar RAT via phishing and Google Drive. Learn more: thehackernews.com/2024/09/blind-… Sensitive data at risk—secure your systems and train employees to spot threats. #CyberSecurity

CISA Cyber (@cisacyber) 's Twitter Profile Photo

🛡️ #SecurebyDesign Principle 1: Software manufacturers must harden applications, enhance security features & set secure defaults. Security should be integrated, not added later. This reduces risks & improves product quality. Learn more 👉 go.dhs.gov/3jp

🛡️ #SecurebyDesign Principle 1: 
Software manufacturers must harden applications, enhance security features & set secure defaults. Security should be integrated, not added later. This reduces risks & improves product quality. Learn more 👉 go.dhs.gov/3jp
The Hacker News (@thehackersnews) 's Twitter Profile Photo

CosmicBeetle launches ScRansom, new #ransomware hitting SMBs globally. Linked to RansomHub, it targets manufacturing, healthcare, tech & more. Exploits vulnerabilities for sophisticated attacks. Learn more: thehackernews.com/2024/09/cosmic… #infosec #cybersecurity

CISA Cyber (@cisacyber) 's Twitter Profile Photo

🛡️ We added #Microsoft Publisher and #Windows vulnerabilities, #CVE-2024-38014,CVE 2024-38217, CVE-2024-38226, &CVE-2024-43491 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity

🛡️ We added #Microsoft Publisher and #Windows vulnerabilities, #CVE-2024-38014,CVE 2024-38217, CVE-2024-38226, &CVE-2024-43491 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity
CISA Cyber (@cisacyber) 's Twitter Profile Photo

#Cisco released security updates to address vulnerabilities in Cisco IOS XR software. Read more at cisa.gov/news-events/al…. #Cybersecurity #InfoSec

The Hacker News (@thehackersnews) 's Twitter Profile Photo

GitLab has just released patches for 17 vulnerabilities, including a critical flaw (CVE-2024-6678) with a CVSS score of 9.9/10. Learn more: thehackernews.com/2024/09/urgent… Don’t wait for an exploit—apply the update today!

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Verizon outage: iPhones, Android devices stuck in SOS mode - Mayank Parmar bleepingcomputer.com/news/technolog… bleepingcomputer.com/news/technolog…

CISA Cyber (@cisacyber) 's Twitter Profile Photo

🛡️ We added an #Ivanti Endpoint Manager SQL injection vulnerability, #CVE-2024-29824, to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec

🛡️ We added an #Ivanti Endpoint Manager SQL injection vulnerability, #CVE-2024-29824, to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 Fortinet confirms a critical #vulnerability (CVE-2024-47575 / CVSS 9.8) affecting FortiManager is being actively exploited! It could allow unauthorized remote access, potentially compromising sensitive data & configurations. thehackernews.com/2024/10/fortin… Don't wait—patch now.

The Security Bulldog (@securitybdog) 's Twitter Profile Photo

How does threat intel work? Threat intelligence platforms process vast amounts of raw data on emerging and existing threats to enable swift, informed cybersecurity decisions. securitybulldog.com/blog/how-does-…

The Security Bulldog (@securitybdog) 's Twitter Profile Photo

Beyond optimizing human skills and accelerating threat response, threat intelligence solutions provide new efficiencies for various roles: securitybulldog.com/blog/how-does-…

Beyond optimizing human skills and accelerating threat response, threat intelligence solutions provide new efficiencies for various roles:
securitybulldog.com/blog/how-does-…
The Security Bulldog (@securitybdog) 's Twitter Profile Photo

A Quick Survey- The Security Bulldog We would love to hear your thoughts or feedback on how we can improve your experience! We want to build integrations with popular cybersecurity tools so we are a more valuable resource for you and your team. docs.google.com/forms/d/e/1FAI…

CISA Cyber (@cisacyber) 's Twitter Profile Photo

⚠️ Cybersecurity and Infrastructure Security Agency issued six NEW public #ICS advisories. These advisories provide info about current security issues, vulnerabilities, & exploits surrounding ICS. More at bit.ly/3EBMZcO

⚠️ <a href="/CISAgov/">Cybersecurity and Infrastructure Security Agency</a> issued six NEW public #ICS advisories. These advisories provide info about current security issues, vulnerabilities, &amp; exploits surrounding ICS. More at bit.ly/3EBMZcO