Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#CyberSecurity
Pratik Nilange
PratikNilange
Top 11 Books on Cyber Security. #BigData #Analytics #DataScience #CyberSecurity #IoT #IIoT #PyTorch #Python #RStats #TensorFlow #Java #JavaScript #ReactJS #GoLang #CloudComputing #Serverless #DataScientist #Linux #Programming #Coding #100DaysofCode h
Read more
Ty
tyrus_
Curated thread of free #Infosec course which could benefit anyone across the spectrum from a novice user to a professional. 1/ Physical security, Covert entry and social engineering. This makes
Read more
Ramona
desderamona
Feb '16 Krutskikh told Russian computer security officials Putin gov't will unleash #cyber nuclear attack http://www.mcclatchydc.com/news/politics-government/white-house/article139695453.html #cyberwar 2/ "the offensive would cause U.S.
Read more
🗣 Rob Rosenberger
vmyths
1/7Dave calls it "terrible reporting" but I'll DEFEND writer @kari_paul for summarizing the cybersecurity community's own #hyperbole.Dave notes the story includes NO comments from "security researchers." Okay then, let'
Read more
blueteamblog
blueteamblog
This is so, so bad.CVE-2020-1350 with CVSS of 10 named #SIGRed. Wormable RCE vulnerability in Windows DNS Server affecting all versions of Windows server running the DNS role. https://msrc-blog.microsoft.com/2020/07/14/july-2020-security-up
Read more
Truth
1foreverseeking
Georgia knew about software "glitch"!Kemp paid $100 million for Dominion Voting Systems last year. Lawsuit was filed that voters can't be confident votes are accurately counted. Dominion hired Pro V&V
Read more
Jathan Sadowski
jathansadowski
Everybody who is aware that I do critical work about tech assumes, without fail, that it’s about privacy and security. Even after actually reading my work, which explicitly is not
Read more
Ness
the_cheeky_ness
It's time for another #CyberSecurity thread! This one is about social engineering and I'm using content from Phish Insight. I'm sure you know about phishing by now but do you
Read more
Robᵉʳᵗ Graham😷, provocateur
ErrataRob
1/ I feel that any textbook on "Cybersecurity 101" should start with stories like this. Politics is more integral to cybersecurity than other subjects.https://twitter.com/zackwhittaker/status/1265704383104405505 2/ Ideally, cybers
Read more
Zephyr Teachout
ZephyrTeachout
1/What do these people have in common?Jay Carney, the former press secretary under President Obama; Anne Rung, the former procurement chief under President Obama; Michelle Lee, former U.S. Patent &
Read more
MIT Technology Review
techreview
Can the US election be secured? We’ll be asking Brandon Wales that exact question in today’s live stream at 1 p.m. ET. Wales is the director of @DHSgov’s Office of
Read more
Jeff Kosseff
jkosseff
THREAD: In the past week, I've received the same general question from four different media outlets, so it's worth amplifying the answer: a platform's decision to moderate (or not moderate)
Read more
Kevin Beaumont
GossiTheDog
The corporate ransomware situation is playing out depressingly exactly as I predicted years ago. You’ve got orgs secretly paying millions, attackers getting much better with huge budgets etc. For most
Read more
AAAS EPI Center
AAASEPICenter
Internet voting, including through mobile apps, is not a secure solution for voting in the United States, nor will it be in the foreseeable future. Period. 1. All internet voting
Read more
Danit Gal
DanitGal
Thread: Parts of Israel's AI plan unveiled. Full release expected January 2020. Plan is globally aligned + includes concrete steps leveraging successful cybersecurity plan as a basis for this one,
Read more
The Hacker News
TheHackersNews
WARNING !!!It's possible to hack iPhones / iPads just by sending an email to targeted users.Hackers have been exploiting critical 0-click + 0-day RCE #vulnerability in the default mail app
Read more
‹
1
2
3
4
5
6
7
8
...
19
20
›