Discover and read the best of Twitter Threads about #CyberThreats

Most recents (4)

⚠️⚠️

$Teddy Doge developers pull out $4.5M in alleged ‘soft rug pull.’

What is the difference between—

‘Soft Rug Pull’ and ‘Hard Rug Pull’

🔽👇🔽
1/🧵

Rug pulls come in two forms: hard and soft.

Malicious code and liquidity stealing are hard pulls, whereas,

soft pulls refer to dumping an asset.

#cryptocurrecy | #Web3
2/🧵

🪡Hard rug pulls occur when project developers code malicious backdoors into their tokens.

Malicious backdoors are hidden exploits that have been coded into the project’s smart contract by the developers.

#SmartContract | #NFT | #crypto
Read 6 tweets
It has taken over 7 years for India to revamp its #cybersecurity policy — experts say there's room for carrots and sticks but not surveillance

businessinsider.in/tech/news/indi…

By @pabsgill Image
@pabsgill India was among the first few countries to launch a #cybersecurity policy back in 2013 and now it is looking to revamp that framework. According to Bloomberg, the new rules will be approved by the cabinet committee on security headed by Prime Minister #NarendraModi.
@pabsgill The move to set up a new system comes amid increasing reports of hackers from other countries targeting users in India and the country’s critical infrastructure.

#cybersecurity
Read 9 tweets
ICYMI, @PwC_UK’s 2020 #threatintel Year in Retrospect report is out now! All team contributed but h/t to @KystleM_Reid! :fire: You can check it out here: pwc.to/2ZPx7fo In this thread, I will summarise some of what I thought were key findings: 🧵👇 1/n
#Ransomware has become the most significant cyber security threat faced by organisations, irrespective of industry/location. TTPs have pivoted to mass data exfiltration prior to encryption, along with leaks & extortion. S/o to @andyp346 for all your work countering this.🙏 2/n
In 2020, 86% of the incidents that PwC’s Incident Response team responded to were attributable to cyber criminals. 79% of leaks happened in 2nd half of 2020. Our data sees Manufacturing, TMT, & Professional Services most impacted. 3/n
Read 19 tweets
Key points from my “Lessons from the world's leading cyber threat intelligence (CTI) programs” talk at @gcfriyadh in Riyadh. Video will be shared soon. Talking points aren’t ideal for Twitter but I’ll give it a go [1/24] #ThreatIntel #CyberThreats
@gcfriyadh A CTI program is all about reducing risk for an orgs. Risk = probability x impact. CTI about understanding the internal and external factors that impact probability + impact of risks so decisions can be made that reduce risk [2/24]
@gcfriyadh CTI by definition is threat focused. A threat is a person/group with a motivation, intent and a way of working (TTPs). Malware isn’t a threat, the person using it is. Therefore a CTI program tracks threats being people/groups over time [3/24]
Read 24 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!