Discover and read the best of Twitter Threads about #CyberSecurity

Most recents (24)

Second cache of 9/11 docs released by The Dark Overlord hackers…#september11 #DarkOverlord #TheDarkOverlord #ITsec #ITsecurity #IsraelDid911
According to @Forbes, the cybercrime group known as #TheDarkOverlord has acquired 18,000 documents, many of which are related to the 9/11 events, and are demanding #bitcoin ransom in return for the data. #DarkOverlord…
Read 24 tweets

THE JOURNEY OF #AfricaTweetChat

1. ATC, @AfricaTweetChat, was launched on 1st February 2018 by @janetmachuka_ & the co-founder, @barryonyango as a platform to bring African individual brands and start-ups to one #digitalmarketing learning space.
2. The second chat was led by @Ugaman01 on 8th February on "How can #Startups leverage on #socialmedia to cost effective #marketing." The chat was successful drawing in a new audience from Uganda. #AfricaTweetChat
3. Name: @Komana_MN from Zambia. She is a charming heart and as pretty as she is, she is a Digital Marketing specialist and founder of @IdeaBizDM. She handled the topic: "Why Building a #brand needs #Content."

Read 41 tweets
#China 🇨🇳
Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information…
#China 🇨🇳 ⚖️🇺🇸 #CyberSecurity
Deputy Attorney General Rod J. Rosenstein Announces Charges Against Chinese Hackers…
Read 4 tweets
To the #G20Summit in Argentina this week: live up to your responsibilities; put people and their rights first! #G20openletter for a positive, forward-looking digital agenda.

#access #privacy #freedomofspeech #cybersecurity #competition —
#Privacy & data protection rights: We urge the G20 to adopt, apply and enforce a comprehensive approach to privacy that protects all users’ privacy and personal data, whether citizens or not. People must be given more control and agency over their data.

#Freedomofexpression: We urge the G20 to promote freedom of expression online by adopting positions and policies that are consistent with maintaining an open internet for everyone.

Read 5 tweets
Group's hardline efforts against Pelosi becoming speaker: a Connection to RUSSIA via JUSTICE DEMOCRATS?
#TrumpRussiaMatrix via @suntimes
The RussiaTest.Club
#FVEY @NSAGov cc:@LibraryCongress
The RussiaTest.Club
#FVEY @NSAGov cc:@LibraryCongress
Read 4 tweets
0/ Lots of #CryptoNews as always! Below is a look into some of the eye-catching happenings in the #crypto and #blockchain space over the past 24 hours or so...
1/ 📝 @Ethfinex's #0x-powered #EthfinexTrustless hybrid DEX listed @MakerDAO [ $MKR / $DAI ], @SpankChain [ $SPANK ], @AttentionToken [ $BAT ], @AI_Autonio [ $NIO ] and @AugurProject [ $REP ].

Trade instantly vs. a highly liquid, centralized order book:
2/ 🔛 @GetGitcoin unveiled 'Kudos', an easy way to show appreciation and build relationships in open source.

Each Kudos is ltd. edition, sovereign to #Ethereum's #blockchain, with a custom art piece your collaborator can show off on their #Gitcoin profile (or #ERC721 wallet).
Read 25 tweets
(1) The Chinese spy chips found in hardware of Apple and Amazon should have been expected. There's a long history of cases like this. #cybersecurity #defense #security
(2) The Senate Armed Services Committee warned of this threat in May 2012, and found over 1 million counterfeit parts is US military systems — largely from China.…
(3) It reported: “The investigation uncovered dozens of examples ... including on thermal weapons sights delivered to the Army, on mission computers for the Missile Defense Agency’s Terminal High Altitude Area Defense (THAAD) missile, and on a large number of military airplanes.”
Read 21 tweets

THE HUNT: A Cyber Attack in the Process Industry

#cybersecurity #thehunt…
In manufacturing...

• 86% of cyber attacks are targeted

• 66% feature hacking

• Only 34% involve malware
In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.

#cybersecurity #thehunt
Read 89 tweets
THREAD: This summer @DNI @SenDanCoats said that when it came to #cybersecurity, the lights were "blinking red." After reading @KimZetter's penetrating piece, it is more clear than ever that when it comes to #ElectionSecurity, America has turned off the alarm system. /1
Quite simply, despite an unprecented act of information warfare combining espionage, computational propoganda, computer hacking and exploitation of our election systems, our country has not taken sufficient action to reduce the risk of it happening again and again /2
I don't mean to disrespect my former @DHS colleagues, who repeatedly have said they have seen no signs of direct manipulation of election votes, but this quote from @KimZetter's piece is damning: "the truth is that no one has really looked for evidence" of election hacking. /3
Read 11 tweets
This could explain Javad Zarif's anxiety:
"It should be noted that on the Internet, especially Telegram, the enemy and especially the [#MEK], have gained complete control… The terminology of regime change is gaining complete control in social media networks." -Tehran Press #Iran
The mullahs have always been fearful of #MEK's connecting to citizens. Here is what @NYTimes wrote in 1996: "Gov officials said the number of banned sites was not available, but they include those with information distributed by opposition groups like the [MEK]..." #CyberSecurity
The @NYTimes continued: ''The brains of the young are very impressionable, so the Mujahedeen Khalq [#MEK] might be able to brainwash people to join them, or they might be able to influence an election,'' said a senior Gov official familiar w/ the Internet project. #CyberSecurity
Read 7 tweets
I imagine the #sonytruthers playing armchair #DFIR investigators will emerge from wherever they’ve been hiding in order to dispute the #DPRK #indictment. My advice: you were wrong in 2014-2015, and you’d still be wrong today. HT ⁦…
Because #attribution is inherently political per @RidT and @BuchananBen, you need more than “hacking” knowledge to assess national policy. Experience w/ #cybersecurity clearly helps, but gov internals, intel agency processes, bureaucracy, trade, diplomacy, LE, are all important.
I think it’s slowly changing, but a failure of #cybersecurity has been to think “soft” areas are much easier than coding, so any leet hacker is inherently qualified to address political science, history, economics, and related topics by virtue of their ability to code in ASM.
Read 4 tweets
Türkiye ile ABD arasında yeni bir kriz yaşanabilir. Son raporlara göre Türkiye'de bulunan bazı 'hacker' (!) gruplarının ABD'ye yönelik siber saldırı yapacağı ve uzun zamandır hazırlık çalışması yaptıkları yazıyor. #CyberWar
Raporda Türkiye'deki hackerların ilk saldırı yapacağı yerler arasında ABD'deki bankalar ve Trump'ın grupları gösteriliyor. Peki ABD zarar görürse siber alanda sessiz mi kalır? Siber alanda olabilecekleri ve korunma yöntemlerini anlatıyorum. #CyberWar #CyberSecurity
PS 1*: Siber saldırı floodumuza başlamadan önce sizi bir konuda uyarmak istiyorum.

Twitter ve Facebook hesaplarınız Phishing (oltalama) yöntemi ile çalınıyor ve banka fake hesabı olarak kullanılıyor. Banka fake hesabı olarak kullanılması başınızı çok fazla ağrıtabilir.
Read 6 tweets
Selected list of #indictments and #sentencings
Week of July 30, 2018
1. Las Cruces Man Pleads Guilty to Federal Child Pornography Charges.

#childpornography #projectsafechildhood #ICAC #NewMexico…
Read 38 tweets
Here's a short list of key, NON-technical skills and trainings for CISOs and those who aspire to be a #CISO. Tech skills are important, but most #cybersecurity pros who reach senior positions will succeed or fail based on so-called "soft skills" (I hate that phrase). #CISOSkills
1. Management skills. When I interview manager candidates, I ask "What's your management framework?" There's no ONE right answer, but you should have SOME formal system for managing. My favorite is Situational #Leadership @sitlead_cls. Their multi-day training is 🔥🔥 #CISOSkills
Situational Leadership defines leadership as "influencing people". The model works in influencing up, down, & laterally. We put ALL our managers through this. Their 360 process will show you how your leadership style is perceived by coworkers and direct reports. #CISOSkills
Read 9 tweets
Over the last year @CLTCBerkeley has looked at the range of cyberattacks targeting civil society organizations and the existing ecosystem of support those orgs receive to counter these attacks. We’ve published our report today: /1
We focused our report on “politically vulnerable organizations” – in other words, orgs whose work makes them the focus of targeted cyberattacks as a means to achieve political ends (as opposed to criminal or mischief) /2
Previous research shows us that nonprofits in general suffer from poor cybersecurity posture. This is hardly a surprise – any type of IT investment is expensive, and only 1 in 11 IT professionals have any background in security. /3
Read 18 tweets
I've had my 2nd coffee and it's time for another #infosec rant. This one is aimed, with love, at my white male colleagues in this biz. I love that many of us are helping our brothers and sisters build their careers in infosec. But PLEASE be careful with the advice you give out.
Before we white dudes give career advice to others, we have to consider that the tech industry (including #infosec) still has HUGE double standards when it comes to race and gender. Thus, what worked for ME might actually be harmful advice for a woman or for a black man.
One obvious example is: "You don't need a college degree." I'm a college dropout myself - I did 2 yrs of a CS degree before deciding that school wasn't for me. By the time my class graduated, I'd already co-founded @rapid7. Great!
Read 9 tweets
Obama cyber chief confirms 'stand down' order against Russian cyberattacks in summer 2016… via @YahooNews
How did Obama Admin deal w 2016 Russian cyber attacks
Caught flat-footed in 2016
Read 12 tweets
In conjunction with @SlickRockWeb, now let’s take a look at #WalkAway from a different perspective. Who’s the man behind the curtain, and who’s backing him? His name is Brandon Straka, know here as @UsMinority. Let’s get to know him a bit. #infosec #osint #psyops
Before #WalkAway took off (with surprising rapidity), Straka was a performance artist and stylist in New York. His most recent work appears to have been this show, showing his evolution away from #TheResistance. Here’s a link to the GoFundMe…
His first announcement of the #WalkAway campaign was on May 26th. However, shortly after the dates of his show, on a Facebook post dated 10/27/17, we see the following exchange after a post about @TheEllenShow, which appears to be the first public use of the “walk away” idea.
Read 14 tweets
Testifying before House Armed Services Cmte, U. of Cincinnati political science prof. Dr. Richard Harknett says Russian cyber operations "are not hacks or thefts or even espionage — we are facing comprehensive strategic campaigns to undermine our national sources of power."

Dr. Harknett: "I don't know why we should afford first amendment rights to bots... If an issue is trending because of foreign manipulation, that's not free speech."

Heather Conley, Center for Strategic & International Studies, tells Senate Armed Services Cmte:

"Russia exploits the weaknesses it finds. They're exploiting weaknesses that already exist." Need to help Americans understand what is coming.


Read 7 tweets
214 #Twitterbots that I noticed while looking into the #ReleaseTheMemo hashtag.
They are spamming people with replies linking to /

#cybersecurity #infosec #bots #AI #Russia #Ukraine #Trump
more examples of the bots replying to people with spam:
I 1st noticed them because they re-tweeted a russian bots favorite account: @dbongino a fox news contributor who was one of the first people to mention the memo online.
There are some other notable russian favorites in here to:
Read 9 tweets
This ENDS the Russia Narrative, I DECREE it in Jesus' Name! #CrowdStrike #QAnon

please see thread! retweet, share
#CrowdStrike #Qanon

please see thread!
Read 57 tweets
Is the US any better prepared today than we were one year ago to resist foreign intervention in our next presidential election?
The clock is ticking, and it'll happen again unless we prepare. #FairElections
2/ There appear to be two main avenues requiring active defenses: #cybersecurity / hacking, and disinformation / #FakeNews
3/ From my vantage, governments who conduct elections, and corporations who curate #SocialMedia & news are treading water. The next Presidential election is 3 years away, and we've let one year slip away. #FairElections
Read 7 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($3.00/month or $30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!