Adam Goss(@gossy_84) 's Twitter Profile Photo

🚀 Discover the power of the Diamond Model for analyzing cyber intrusions in this comprehensive guide. Elevate your cyber threat intelligence skillset with practical tips and real-world case studies.

buff.ly/3xvFjFw

account_circle
☁ CHARBEL NEMNOM🇨🇭| MVP | MCT | CCSP | CISM ☁(@CHARBELNEMNOM) 's Twitter Profile Photo

🔐BLOGGED: lets you import , enhancing your security analysts' ability to detect and prioritize known s.
🚀This article illustrates all the steps to import , a free feed.
charbelnemnom.com/import-free-ta…

account_circle
VMRay(@vmray) 's Twitter Profile Photo

🚀 Exciting News! We're thrilled to announce the launch of a game-changing feature in our latest release: support for the advanced data-exchange format, 'STIX 2.1'!  bit.ly/3vHcLsh

🚀 Exciting News! We're thrilled to announce the launch of a game-changing feature in our latest release: support for the advanced data-exchange format, 'STIX 2.1'!  bit.ly/3vHcLsh

#ThreatIntelligence #STIX21
account_circle
Red Piranha(@RedPiranhaSec) 's Twitter Profile Photo

to Watch out for Hunter Group!
Last week, Hunter Ransomware impacted 13% of victims, surpassing Cactus and INC Ransom groups at 10%.

Read More: bit.ly/49oVFgF
Subscribe Now: bit.ly/3bTk7i9

#HealthcareIndustry to Watch out for Hunter #Ransomware Group!
Last week, Hunter Ransomware impacted 13% of victims, surpassing Cactus and INC Ransom groups at 10%.

Read More: bit.ly/49oVFgF
Subscribe Now: bit.ly/3bTk7i9

#ThreatIntelligence #DataSecurity
account_circle
BaseFortify | created by Axxemble(@BaseFortify) 's Twitter Profile Photo

As of today we are publishing our privacy, cookie, AI use and responsible disclosure policies for our tool BaseFortify | created by Axxemble - you can find links to the relevant pages @ basefortify.eu/about - remember, currently registration is free!

As of today we are publishing our privacy, cookie, AI use and responsible disclosure policies for our #ThreatIntelligence tool @BaseFortify - you can find links to the relevant pages @ basefortify.eu/about - remember, currently registration is free!
account_circle
Your Way to Cyber(@YourWaytoCyber) 's Twitter Profile Photo

The future is SIEM-powered! As cyber threats evolve, SIEM becomes even more crucial. Its machine learning capabilities and advanced analytics can identify sophisticated attacks & threats in your environment, allowing you to act.

account_circle
Robert Morton(@Robert4787) 's Twitter Profile Photo

U.S. intelligence knows full well that the Cold War Soviet Union invested heavily in developing directed energy beam technologies, and Putin's new Russia has continued to refine this weapon.
axios.com/2024/04/01/hav…

account_circle
Microsoft Security(@msftsecurity) 's Twitter Profile Photo

Threat actors know how to manipulate emotions. Making you feel fearful, guilty, or angry can give cyberattackers an upper hand—learn how: msft.it/6014cfhl8

account_circle
ThreatsEye(@ThreatsEye) 's Twitter Profile Photo

Spots suspicious activity before it strikes.
Frees your time for strategic security planning.
Prioritizes real threats, not just false alarms.
‍🗨️ Learn more at threatseye.com.





Spots suspicious activity before it strikes.
Frees your time for strategic security planning.
Prioritizes real threats, not just false alarms.
‍🗨️ Learn more at threatseye.com.

#ThreatsEye
#CyberSecurity
#ThreatIntelligence
#DefendingTheFuture
#CyberDefense
account_circle