Damian Zelek (@damian_zelek) 's Twitter Profile
Damian Zelek

@damian_zelek

Passive Reconnaissanse, Mobile Security (Phone, GSM, GPS, IoT), Moving Target Defense, Intrusion Detection-Prevention. #IBMSecurity #HumanHacking

ID: 2369503294

calendar_today27-02-2014 18:35:04

659 Tweet

766 Takipçi

1,1K Takip Edilen

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

With 57% of internet traffic coming from mobile, 48% of #phishing is now happening outside of email. These attacks have three key aims - to extract money, credentials and personally identifiable information. #MobileSecurity #infosec #cybersecurity scmagazine.com/drastic-change…

Paula Januszkiewicz (@paulacqure) 's Twitter Profile Photo

When two security divas (😉) meet this is how ideas rise 😊 Paula & Paula #securities #cqure #gartner Gartner #staycqure CQURE Academy #cybersecurity #friendship

When two security divas (😉) meet this is how ideas rise 😊 Paula &amp; Paula #securities #cqure #gartner <a href="/Gartner_inc/">Gartner</a> #staycqure <a href="/CQUREAcademy/">CQURE Academy</a> #cybersecurity #friendship
Damian Zelek (@damian_zelek) 's Twitter Profile Photo

Government and Industry Players Address the #SS7 Flaw. #MobileSecurity #infosec #cybersecurity IBM Security securityintelligence.com/news/how-a-40-…

Suresh Suj (@sujan_suresh) 's Twitter Profile Photo

This is yet another serious topic to be known in #CyberSecurity current trends. #phishing these days, target maximum on #mobile users in information grabbing. #infosec #alert x.com/Damian_Zelek/s…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

Data #deception technologies are beginning to take responsibility away from workers. Automated products will routinely devise methods of deceiving hackers, using #MachineLearning to change / adapt over time. #AI #ML #automation #infosec #cybersecurity automation.com/automation-new…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

#MachineLearning approaches help to overcome the difficulty in detecting cyber attacks early due to computational limitations of #IoT devices. #AI #infosec #cybersecurity cioapplications.com/news/iot-secur…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

What happens in #steganography is that hackers extract the file and hide malicious code in image's User Comment #EXIF #metadata field. #malware #Mac #infosec #cybersecurity hackread.com/attackers-hide…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

The best part is that the scanning cannot only be performed on internet connected robots but also for those industries where robots are part of day-to-day operations. #Aztarna #infosec #cybersecurity Alias Robotics hackread.com/aztarna-tool-f…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

#MachineLearning groups PHA apps that exhibit similar malicious behaviors, such as #phishing or escalating privilege, into families and feeds the characteristics of those families back into the classification algorithms. #mobilesec #infosec #cybersecurity cio.com/article/333620…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

#MachineLearning technology can be attacked in different ways, all seek to deceive a system into misperception, misclassification, or faulty decision analysis. Efforts to detect and counter deception are at a very early stage. #AI #infosec #cybersecurity warontherocks.com/2019/11/first-…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

Leveraging a platform that uses #AI and #MachineLearning to analyze and produce real-time, comprehensive and prioritized insights of what needs to be addressed is key to making the #CISO organization and the IT teams effective. #ML #infosec #cybersecurity securityboulevard.com/2019/11/how-ga…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

To be able to #spoof multiple ships simultaneously into a circle is extraordinary technology. It looks like magic. #MobileSecurity #GPS #spoofing #infosec #cybersecurity thedrive.com/the-war-zone/3…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

The #privacy policies of many apps allow their developers to share your location with "trusted partners" which could be code for "companies who want to buy location data". #MobileSecurity #gps #infosec #cybersecurity securityboulevard.com/2019/12/shady-…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

Applying #MachineLearning to the application scan results can help in a significant reduction of manual labor that is used in identifying whether the issue is exploitable or not. #AI #ML #infosec #cybersecurity jaxenter.com/ml-ai-security…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

#Circles' #spyware operates by exploiting Signalling System No. 7 #SS7 - a protocol that enables information exchange and phone call routing between telecommunications companies. #MobileSecurity #malware #infosec #cybersecurity bankinfosecurity.com/researchers-25…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

It's a major concern. Take the example of Ukrainian operators Kyivstar, Vodafone and Lifecell, which have blocked access to their networks for subscribers in Russia and Belarus in a major #SS7 security move. #MobileSecurity #cybersecurity #infosec securityboulevard.com/2022/03/why-is…

Damian Zelek (@damian_zelek) 's Twitter Profile Photo

#Pegasus performs zero-click hacks by exploiting security flaws in popular applications installed by default on #iOS and #Android, such as WhatsApp, Telegram, Skype, or iMessage. #MobileSecurity #spyware #cybersecurity #infosec esecurityplanet.com/threats/zero-c…