LoomingSecurity (@loomingsecurity) 's Twitter Profile
LoomingSecurity

@loomingsecurity

Always looking the edge in cybersecurity…

ID: 1409553635701370882

calendar_today28-06-2021 16:46:29

22 Tweet

11 Followers

228 Following

Michael Fisher (@fisher85m) 's Twitter Profile Photo

Internet of Things Living in #SmartCities {Infographic} #IoT #Healthcare #IIoT #M2M #CyberSecurity #Analytics #AI #ML Michael Fisher #fintech #BigData

Internet of Things Living in #SmartCities {Infographic}

#IoT #Healthcare #IIoT #M2M #CyberSecurity #Analytics #AI #ML <a href="/fisher85m/">Michael Fisher</a> #fintech #BigData
Tufin (@tufintech) 's Twitter Profile Photo

Our integration with the Fortinet Fabric makes #NetSecOps that much easier for joint customers with: ✅ faster access changes ✅ simplified mgmt of multi-vendor firewalls ✅ easier rule cleanup & audit trails Learn how here: okt.to/nwW0ZM #FortinetChampionship21

Tufin (@tufintech) 's Twitter Profile Photo

CEO & Co-Founder Ruvi Kitov took center stage at #FortinetChampionship21 during today's security summit to counsel attendees on #cloud enablement & digital transformation via #automation.

CEO &amp; Co-Founder <a href="/RuviKitov/">Ruvi Kitov</a> took center stage at #FortinetChampionship21 during today's security summit to counsel attendees on #cloud enablement &amp; digital transformation via #automation.
Tufin (@tufintech) 's Twitter Profile Photo

To control risk & maintain compliance, enterprises need full visibility of the perimeter and “inside” the #cloud. 👀☁️ Learn why #securitypolicy mgmt is critical for #cloudadoption & migrations: okt.to/wW9VKm  #cloudsecurity Cyber Management Alliance - Cybersecurity Training

Tufin (@tufintech) 's Twitter Profile Photo

💡Pro-Tip: Choose a vendor-agnostic solution to futureproof your investment in a hybrid #cloud solution. Want more pro advice to retain speed and agility? Learn how to create a strategy that makes sense for your hybrid environment: okt.to/qDVU0h

💡Pro-Tip: Choose a vendor-agnostic solution to futureproof your investment in a hybrid #cloud solution.

Want more pro advice to retain speed and agility? Learn how to create a strategy that makes sense for your hybrid environment: okt.to/qDVU0h
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

APT-C-36 dirigido a Colombia 🇨🇴 Phishing > PDF > OneDrive > .BZ2 > JS > PowerShell > Discord > .VBS /cdn.discordapp.com/attachments/940363101067411527/946390049979781130/cacha.pdf #NjRAT C2 /febenvi.duckdns.org:2050 tria.ge/220314-3qe5pad…

APT-C-36 dirigido a Colombia 🇨🇴

Phishing &gt; PDF &gt; OneDrive &gt; .BZ2 &gt; JS &gt; PowerShell &gt; Discord &gt; .VBS

/cdn.discordapp.com/attachments/940363101067411527/946390049979781130/cacha.pdf

#NjRAT
C2 /febenvi.duckdns.org:2050
tria.ge/220314-3qe5pad…
Anthony Randazzo (@amrandazz) 's Twitter Profile Photo

We were trying to conceptualize the "current state" of cloud [native] threat detection and this is what we sorta came up with. Sharing it more broadly in case others find it useful in organizing your cloud detection & response approach 🔎

We were trying to conceptualize the "current state" of cloud [native] threat detection and this is what we sorta came up with. Sharing it more broadly in case others find it useful in organizing your cloud detection &amp; response approach 🔎
Gartner (@gartner_inc) 's Twitter Profile Photo

Our top trends for tech providers for 2022: ✅ Are evident now and are expected to reach the midpoint of all adoption in 2 to 5 years. ✅ Have worldwide impact. ✅ Will influence business in multiple verticals. Explore the full list ➡️ gtnr.it/3v5NVPb #GartnerTGI

Our top trends for tech providers for 2022:

✅  Are evident now and are expected to reach the midpoint of all adoption in 2 to 5 years.
✅  Have worldwide impact.
✅  Will influence business in multiple verticals.

Explore the full list  ➡️ gtnr.it/3v5NVPb #GartnerTGI
Raj Samani (@raj_samani) 's Twitter Profile Photo

Analysis via SentinelOne details Lockbit #ransomware group "abusing the Windows Defender command line tool MpCmdRun.exe to decrypt and load Cobalt Strike payloads" sentinelone.com/blog/living-of… #malware #cybersecurity

Analysis via <a href="/SentinelOne/">SentinelOne</a> details Lockbit #ransomware group "abusing the Windows Defender command line tool MpCmdRun.exe to decrypt and load Cobalt Strike payloads" sentinelone.com/blog/living-of… #malware #cybersecurity
Tufin (@tufintech) 's Twitter Profile Photo

In this article from Silicon Republic, CTO & Co-Founder @reuvenharrison covers the dangers of an ‘us versus them’ attitude between developers and security teams plus how to avoid them: okt.to/mj6a2D

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

From my PoV it's only rational to share detection rules to lower the costs on the defense side In the end it'll be nearly impossible to pass through a kill chain w/o triggering one of the generic detection rules written for techniques and anomalies - ringing one of the bells 🔔

Hasan Toor ✪ (@hasantoxr) 's Twitter Profile Photo

Harvard University is offering free online courses. No application or fee required. Here are 10 FREE courses you don't want to miss:

HackGit (@hack_git) 's Twitter Profile Photo

Cybersecurity-Books Here you will get awesome collection of mostly all well-known and usefull cybersecurity books from beginner level to expert for all cybersecurity positions. github.com/zealraj/Cybers… #cybersecurity #infosec t.me/hackgit/8740

Cybersecurity-Books

Here you will get awesome collection of mostly all well-known and usefull cybersecurity books from beginner level to expert for all cybersecurity positions.

github.com/zealraj/Cybers…

#cybersecurity #infosec
t.me/hackgit/8740
Kaspersky (@kaspersky) 's Twitter Profile Photo

CVE-2023-23397 #vulnerability explained: How did attackers exploit it pre-public disclosure? Is your #MicrosoftOutlook at risk? Get all the answers ➡️ kas.pr/tna4

CVE-2023-23397 #vulnerability explained: How did attackers exploit it pre-public disclosure? Is your #MicrosoftOutlook at risk? Get all the answers ➡️ kas.pr/tna4
LaurieWired (@lauriewired) 's Twitter Profile Photo

Airdrop doesn't use cryptographic salts, and rainbow tables are easily able to de-anonymize users Nations like China are already taking advantage of this. Here's how it works: 1. Airdrop broadcasts a Bluetooth advertisement 2. Advertisement contains a partial hash of the

Airdrop doesn't use cryptographic salts, and rainbow tables are easily able to de-anonymize users

Nations like China are already taking advantage of this.  Here's how it works:

1. Airdrop broadcasts a Bluetooth advertisement
2. Advertisement contains a partial hash of the