Marco Essomba (@marcoessomba) 's Twitter Profile
Marco Essomba

@marcoessomba

Founder & CTO @blockapt | #CyberSecurity Expert | Top100 Global @GetEngati Influencer | Tweet #AI #Tech #Startups #QuantumSecurity | 🇨🇲🇬🇧🇺🇸🇦🇺🇨🇦🇳🇿

ID: 3123025469

linkhttp://linkedin.com/in/marcoessomba calendar_today28-03-2015 04:57:31

34,34K Tweet

31,31K Takipçi

34,34K Takip Edilen

BT Group (@btgroup) 's Twitter Profile Photo

We’ve joined forces with Starlink to bring ultrafast, low-latency satellite broadband to rural and remote homes across the UK – making us the first provider in the country to offer this kind of connectivity, and one of the first in the world. A major leap forward for rural

We’ve joined forces with Starlink to bring ultrafast, low-latency satellite broadband to rural and remote homes across the UK – making us the first provider in the country to offer this kind of connectivity, and one of the first in the world.

A major leap forward for rural
GCHQ (@gchq) 's Twitter Profile Photo

They shall grow not old as we that are left grow old. Age shall not weary them nor the years condemn. At the going down of the sun and in the morning, We will remember them.

They shall grow not old as we that are left grow old.
Age shall not weary them nor the years condemn.
At the going down of the sun and in the morning,
We will remember them.
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Mandiant Threat Defense recently observed exploitation of CVE-2025-12480, which gives threat actors unauthenticated access on Gladinet’s Triofox platform. Learn about the threat, and get IOCs to defend against it. 📄 Read more: bit.ly/484TGR3

Mandiant Threat Defense recently observed exploitation of CVE-2025-12480, which gives threat actors unauthenticated access on Gladinet’s Triofox platform. Learn about the threat, and get IOCs to defend against it.

📄 Read more: bit.ly/484TGR3
Marco Essomba (@marcoessomba) 's Twitter Profile Photo

The Digital Immune System – Single Pane of Glass - Command & Control System - Building Cyber Resilience with @BlockAPT Adaptive, Intelligent, Self-Healing: 🧠 AI-Powered Detection 💉 Automated Response 🫀 Integrated Visibility 🧬 Predictive Intelligence Your cybersecurity

Marco Essomba (@marcoessomba) 's Twitter Profile Photo

The UK economy contracted again in September — a 0.1% drop — driven in part by the cyber-attack on Jaguar Land Rover. One incident disrupting an entire sector is a stark reminder: cyber risk is an economic risk. Modern economies run on digital infrastructure. When that

The UK economy contracted again in September — a 0.1% drop — driven in part by the cyber-attack on Jaguar Land Rover. One incident disrupting an entire sector is a stark reminder: cyber risk is an economic risk.

Modern economies run on digital infrastructure. When that
CISA Cyber (@cisacyber) 's Twitter Profile Photo

🛡️ Akira ransomware is on the rise—primarily targeting small & medium sized orgs. Review our updated joint advisory with additional details on IOCs & TTPs & implement the recommended mitigations to help protect your data from this ongoing cyber threat. 🔗 go.dhs.gov/J9n

🛡️ Akira ransomware is on the rise—primarily targeting small & medium sized orgs. Review our updated joint advisory with additional details on IOCs & TTPs & implement the recommended mitigations to help protect your data from this ongoing cyber threat. 🔗 go.dhs.gov/J9n
Marco Essomba (@marcoessomba) 's Twitter Profile Photo

Research and analysis | Summary of research on the economic impact of #cyberattacks | UK Govt Cyber attacks represent one of the most pressing threats to the UK’s national security and economic stability in the modern era, with the UK being the most… gov.uk/government/pub…

Marco Essomba (@marcoessomba) 's Twitter Profile Photo

Self-defending networks: reality or fiction? by Marco Essomba | Founder & CTO BlockAPT The idea of a self-defending network is not new. In the early 2000s, companies like IBM and Cisco introduced the concept of the network-as-a-platform – a coordinated fabric of network and

Self-defending networks: reality or fiction? by <a href="/marcoessomba/">Marco Essomba</a> | Founder &amp; CTO <a href="/blockapt/">BlockAPT</a>

The idea of a self-defending network is not new. In the early 2000s, companies like <a href="/IBM/">IBM</a> and <a href="/Cisco/">Cisco</a> introduced the concept of the network-as-a-platform – a coordinated fabric of network and
FBI (@fbi) 's Twitter Profile Photo

The FBI and our partners successfully dismantled an infostealer, remote access trojan, and botnet as part of Operation Endgame. This marks the third large-scale action in this ongoing initiative, which was launched to combat criminal infrastructure used for ransomware attacks

The FBI and our partners successfully dismantled an infostealer, remote access trojan, and botnet as part of Operation Endgame. This marks the third large-scale action in this ongoing initiative, which was launched to combat criminal infrastructure used for ransomware attacks
Mimi Mefo Info (@mimimefoinfo) 's Twitter Profile Photo

#Replay Francis Ngannou Turns His Back on Paul Biya The PFL MMA world champion stated in an interview that he would not have voted for Paul Biya if he had had the opportunity to participate in the election. According to the boxer, after 43 years in power, the president

CISA Cyber (@cisacyber) 's Twitter Profile Photo

Malicious cyber actors are exploiting a newly disclosed Fortinet FortiWeb path traversal vulnerability, CVE-2025-64446. We urge organizations to implement Fortinet’s guidance immediately by applying upgrades or disabling HTTP/HTTPS services. Learn more 👉 go.dhs.gov/i8Y

Malicious cyber actors are exploiting a newly disclosed Fortinet FortiWeb path traversal vulnerability, CVE-2025-64446. We urge organizations to implement Fortinet’s guidance immediately by applying upgrades or disabling HTTP/HTTPS services. Learn more 👉 go.dhs.gov/i8Y
Marco Essomba (@marcoessomba) 's Twitter Profile Photo

The Next Generation Cyber Defence Platform | @BLOCKAPT Security is stuck in two extremes: 🔹 Monolithic lock-in 🔹 Tool sprawl chaos Cybersecurity Executives and investors are asking the same question: “Why can’t security work as one?” It can. @BLOCKAPT — the Gartner-defined

The Next Generation Cyber Defence Platform | @BLOCKAPT 

Security is stuck in two extremes:
🔹 Monolithic lock-in
🔹 Tool sprawl chaos

Cybersecurity Executives and investors are asking the same question: “Why can’t security work as one?”

It can.

@BLOCKAPT — the Gartner-defined
Marco Essomba (@marcoessomba) 's Twitter Profile Photo

🚨 Self-defending networks — reality or fiction? In my latest blog, I explore a question the industry has been chasing for 20+ years: Can unified networks ecosystems really detect, decide and defend on their own? The idea wasn’t wrong. The timing was. Back in the 2000s, most

🚨 Self-defending networks — reality or fiction?

In my latest blog, I explore a question the industry has been chasing for 20+ years: Can unified networks ecosystems really detect, decide and defend on their own?

The idea wasn’t wrong. The timing was. Back in the 2000s, most
Marco Essomba (@marcoessomba) 's Twitter Profile Photo

Sam Altman Freaking Out As Gov Rejects Bailout Request | By Wall Street Millennial OpenAI's recent request for a government bailout. A request which was swiftly rejected… youtu.be/kj4zATlfwUU?si… via YouTube

Sam Altman Freaking Out As Gov Rejects Bailout Request | By Wall Street Millennial

OpenAI's recent request for a government bailout. A request which was swiftly rejected…

youtu.be/kj4zATlfwUU?si… via <a href="/YouTube/">YouTube</a>
Marco Essomba (@marcoessomba) 's Twitter Profile Photo

#OpenAI walks back statement it wants a government 'backstop' for its massive loans — company says government 'playing its part' critical for industrial AI capacity increases tomshardware.com/tech-industry/…

NCSC UK (@ncsc) 's Twitter Profile Photo

Cyber criminals tend to target vulnerabilities, not sectors. Attackers don’t care who they hit or how they hurt them. Here’s what you need to know about ransomware: ncsc.gov.uk/ransomware/home

Cyber criminals tend to target vulnerabilities, not sectors. 

Attackers don’t care who they hit or how they hurt them. 

Here’s what you need to know about ransomware:

ncsc.gov.uk/ransomware/home