SecTor Security Con (@sectorca) 's Twitter Profile
SecTor Security Con

@sectorca

Security Education Conference in Toronto

ID: 16119487

linkhttps://sector.ca calendar_today03-09-2008 20:53:40

9,9K Tweet

3,3K Takipçi

173 Takip Edilen

SecTor Security Con (@sectorca) 's Twitter Profile Photo

MITRE ATT&CK is a great framework for tracking cyber threats. Now a team of researchers has proposed several approaches to make it even better. buff.ly/3CZPyFh #MITRE #CyberSecurity

SecTor Security Con (@sectorca) 's Twitter Profile Photo

Punycode: The text encoding system for the internationally minded, which is also a cyber criminal's ideal #phishing toolkit. buff.ly/436oKOf #CyberCrime

Punycode: The text encoding system for the internationally minded, which is also a cyber criminal's ideal #phishing toolkit.  buff.ly/436oKOf
#CyberCrime
SecTor Security Con (@sectorca) 's Twitter Profile Photo

Sneaky Russian cyber intruders are targeting people of interest by using Signal's Linked Devices feature and malicious QR codes to hijack their accounts. buff.ly/3D6itYc #Russia #Signal #surveillance #infosec

Sneaky Russian cyber intruders are targeting people of interest by using Signal's Linked Devices feature and malicious QR codes to hijack their accounts. buff.ly/3D6itYc
#Russia #Signal #surveillance #infosec
SecTor Security Con (@sectorca) 's Twitter Profile Photo

Top tip: If you're a government contractor hoping to buy an #iPhone hacking tool, maybe don't send a email soliciting quotes for pricing to a bunch of investigative cybersecurity journalists. buff.ly/3F0m76s #CyberSecurity #Graykey

SecTor Security Con (@sectorca) 's Twitter Profile Photo

Here's how a sophisticated group exploited Cisco kit and lived off the land for the Salt Typhoon hack, says @talossecurity buff.ly/41pPIiP #SaltTyphoon #CyberEspionage #telco #infosec

Here's how a sophisticated group exploited <a href="/Cisco/">Cisco</a> kit and lived off the land for the Salt Typhoon hack, says @talossecurity buff.ly/41pPIiP
#SaltTyphoon #CyberEspionage #telco #infosec
SecTor Security Con (@sectorca) 's Twitter Profile Photo

Internal tensions lead to the publication of chat logs from #ransomware group Black Basta. Key members and victims exposed. buff.ly/4iaiXeY #CyberCrime

Internal tensions lead to the publication of chat logs from #ransomware group Black Basta. Key members and victims exposed. buff.ly/4iaiXeY
#CyberCrime
SecTor Security Con (@sectorca) 's Twitter Profile Photo

Australia joins the US in banning #Kaspersky software, citing Russian espionage worries. buff.ly/4k9DQZn #Antivirus #AV #CyberSecurity

Australia joins the US in banning #Kaspersky software, citing Russian espionage worries. buff.ly/4k9DQZn
#Antivirus #AV #CyberSecurity
SecTor Security Con (@sectorca) 's Twitter Profile Photo

Company data is impossible to hack - "Get it??", says rude CEO in response to researcher who found its data exposed in a public database. buff.ly/41sTeIV #DataBreach #Infosec #Teammate

SecTor Security Con (@sectorca) 's Twitter Profile Photo

MITRE has a new framework called OCCULT for mapping large language model-related security threats. buff.ly/4ihix6A #AI $LLM #GenAI #CyberSecurity #Offsec

SecTor Security Con (@sectorca) 's Twitter Profile Photo

A US law that allowed companies to share cybersecurity data with the government is expiring soon. Are lawmakers ready to renew it? buff.ly/4gXVjkW #CyberSecurity #privacy

A US law that allowed companies to share cybersecurity data with the government is expiring soon. Are lawmakers ready to renew it? buff.ly/4gXVjkW
#CyberSecurity #privacy
SecTor Security Con (@sectorca) 's Twitter Profile Photo

Researchers used #Apple's network to precisely geolocate any #Bluetooth-enabled device from any vendor within seconds. It's a stalker's dream. buff.ly/3QzRWG3 #privacy #CyberStalking #surveillance #AirTag

Researchers used #Apple's network to precisely geolocate any #Bluetooth-enabled device from any vendor within seconds. It's a stalker's dream. buff.ly/3QzRWG3
#privacy #CyberStalking #surveillance #AirTag
SecTor Security Con (@sectorca) 's Twitter Profile Photo

Another corker from the good folks over at Black Hills Information Security: Wi-Fi Forge is a free tool they developed that lets you practice #WiFi hacking without expensive hardware. buff.ly/4h6DYpQ #EthicalHacking #PenTest

Another corker from the good folks over at <a href="/BHinfoSecurity/">Black Hills Information Security</a>: Wi-Fi Forge is a free tool they developed that lets you practice #WiFi hacking without expensive hardware. buff.ly/4h6DYpQ
#EthicalHacking #PenTest
SecTor Security Con (@sectorca) 's Twitter Profile Photo

Say hello to Globstar, an open-source static analysis toolkit for writing and running code checkers. buff.ly/3QEvVFW #SAST #OSS #FOSS #SoftwareDevelopment #CyberSecurity