Discover and read the best of Twitter Threads about #Cybersecurity

Most recents (24)

I did this one before. But since we're making #30daysofthreads a great opportunity for folks to learn gems going into 2020, I figured I bring this one back!

With that being said, I will list 10 books to get started you in #hacking & #penetrationtesting
#CyberSecurity #infosec
“Penetration Testing" by
@GeorgiaWeidman
- 1 of the top books you must read if you're new to hacking or reviewing. Some material is dated but it is still a great book (Georgia is working on a new version. Don't bother her about it!) -

amzn.to/2WRB4N7
@georgiaweidman “Linux Basics for Hackers” by OccupyTheWeb

This book is great for those learning or working w/ Linux. It explains how to install Kali & what services are installed & what they're used for. This book also explains how to create scripts in BASH & Python

amzn.to/2NcCKNN
Read 10 tweets
Welcome to the Member of Congress Tracking Report for the week ending November 10, 2019. With Congress on recess this week, we are going to do things a bit differently this week. We are going to take a dive into #McConnellsGraveyard.
#MoCTrack 1/33
bit.ly/34FD5jk
#GOP keeps trotting out their tired talking point about the “do-nothing-Dems” and all we can concentrate on is #Impeachment.

NOT TRUE.

What you’ll find below are 30 bills of the 300+ that #McConnell has stalled in the Senate.

#MoCTrack #DemCast 2/33
demcastusa.com/2019/11/10/mit…
HR 1 - #ForThePeople

A bill that would improve voting rights, fix campaign finance regulations, and mandate ethics and accountability reforms.
💯 over 100 co-sponsors (236)

#MoCTrack #McConnellsGraveyard 3/33
vox.com/2019/3/8/18253…
Read 33 tweets
1/6 HOW TO SET GOOD GUIDELINES FOR VOTING SYSTEMS
1) Consult with #cybersecurity experts
2) Do what they say
House bill #HR3351 says "the voter shall have the option to mark his or her ballot by hand." That's good. That's what the majority of cybersecurity experts recommend.
2/6 HOW NOT TO SET GUIDELINES FOR VOTING SYSTEMS
Senate bill #SecureElectionsAct sets up a panel of "independent experts on #ElectionSecurity" then fills it with ppl who are NOT #security experts. If you have to have heart surgery - do you want a surgeon or a hospital admin?
3/6 The #SecureElectionsAct has #bipartisan support, but contrary to current narrative it is NOT less intrusive to states - just less effective. It still sets up standards - but instead of specific ones, they are undefined & will be determined later by a panel of non-security ppl
Read 7 tweets
After #cyberattack while NPCIL officials have admitted to their administrative system being breached by malware, actual damage assessment is yet to be determined. Meanwhile #cybersecurity community is concerned whether India's #thorium secrets got stolen. greatgameindia.com/did-kudankulam…
@issuemakerslab #cybersecurity experts based out of #SouthKorea who have been monitoring suspicious activity in Indian #cyberspace, have claimed that ‘the possible reason behind the #cyberattack was to obtain information about #thorium based nuclear power. greatgameindia.com/did-kudankulam…
On the morning of October 29, 2019, @GreatGameIndia was the first to report #cyberattack at #KKNPP). #NPCIL after initially claiming it to be ‘false information’ did actually admit next day that their system was indeed breached by the #malware. greatgameindia.com/kudankulam-nuc…
Read 4 tweets
Heres Aharon Almog-Assoulin, a retired Israeli security official who until recently served on the town council in a suburb of #TelAviv. He was one of the undercover agents used by #BlackCube hired by #NSOGroup to #spy on #CitizenLab journalists exposing #Pegasus among other jobs.
Heres a partial list of #cybersecurity firms linked directly to #cyber weapons dealer #NSOGroup that targeted Indian journalists and activists using #Pegasus. Almost all of them spawned out of Israeli intelligence #Unit8200. #WhatsApp #WhatsAppSpywareRow
Acc to 2016 price list, #NSOGroup charges customers $650,000 to hack 10 devices on top of $500,000 installation fee. If 41 Indians were targeted it will be 4 times the fee + installation. That comes to a whopping 31,00,000 USD equals 21,96,80,725.00 INR. Thanks to @Kodungolan737
Read 10 tweets
Thread. BIG NEWS the Voluntary Voting System Guidelines 2.0 #cybersecurity working group is going to recommend NO #Wi-Fi & NO #Internet capability for #voting systems. This does not include #epollbooks but does include tabulators & election management systems. @secureourvotes
This is not a done deal, but it is a good step! The working group recommendations will be given to the Technical Guidelines Development Committee this Fri & they (the TGDC) may vote on these recs (could be up/down) then (supposedly) they go to the EAC for a public comment period.
Keep in mind that even if the EAC adopts these guidelines - they are still VOLUNTARY. States can choose to disregard them, or follow some & not others. Also the recommendation is not for the Wi-Fi capability to be removed, but instead permanently disabled due to cost of removal.
Read 9 tweets
#India's Kudankulam #Nuclear Power Plant has been hit by #cyberattack. Authorities were already alerted of the threat months in advance. The power plant project built in collaboration with #Russia has been a target of foreign players since its inception.
greatgameindia.com/kudankulam-nuc…
The second 1,000 MW #nuclear power unit at #Kudankulam, owned by the Nuclear Power Corporation of India Ltd (NPCIL) stopped power generation on Saturday 19th October, owing to “SG level low”.
greatgameindia.com/kudankulam-nuc…
More than a month before the unit stopped operating, NCSC was notified of intrusion of their systems by #cyber threat intelligence analyst @RungRage. The alert was generated on investigation by #cybersecurity firm #Kaspersky into spy tools dubbed #DTrack. greatgameindia.com/kudankulam-nuc…
Read 10 tweets
YOUR LOCAL PUBLIC SCHOOLS IN YOUR STATES HAS CHANGED THE GRADING SYSTEM WHERE YOUR CHILD WHO ORIGINALLY EARNED 100 PERCENT=A. IS NOW BEING DOWNGRADED TO A C LEVEL. THIS IS PROVEN FACT THAT THEY ARE DEMONIZING OUR CHILDREN TO BE LIL COMMIE SOCIALIST BRATS. PREPPIN 4 #Agenda21
This criteria that Public Schools within US is mandated its efforts introduced by the Dems in congress and Senate of Each District of 50 states 2 Mandatory push #Communism Teachings to Children. Targeting #Hatred #Racism #Sexism #LGBTQ & more
thenotebook.org/articles/2017/…
Where the Kids @fedupwarrior4q have new Grading System
A New Kind of Classroom: No Grades, No Failing, No Hurry
all 50 states #RedFlag @realDonaldTrump @BetsyDe

nytimes.com/2017/08/11/nyr…
Read 7 tweets
2/16 Silencing expert voices in the cybersecurity discussion space is a
strategy for weakness not strength, as any Red Team expert would tell
you. #CyberCon #CensorCon
3/16 The @CyberGovAU removed me from the #AISA #CyberCon speakers list
8 days b4 the event. Reason: my talk content was 'incongruent' w/ the
largest cybersec conf in AU. Yet they had not seen my talk content yet.
#CensorCon #cyber #infosec #cybersecurity #informationsecurity
4/16 #CyberCon removed me from the speakers list based on my talk title
alone. I'm not the only speaker removed: @Thomas_Drake1 was also disinvited. Others
told to alter format. #CensorCon #cyber #infosec #cybersecurity #informationsecurity
Read 16 tweets
As part of our @NASSorg #NCSAM IT Director spotlight, we wanted to highlight a few key partners in state #cybersecurity.

The first one up is @CISAgov's @CISAManfra. Follow along with this 5 Q&A thread...
Q1: Can you walk us through a day in the life as the Assistant Director for Cybersecurity for @CISAgov?

A1: The thing about cybersecurity is no 2 days are the same & you need to be ready for anything. My day typically starts with reviewing the news & current intelligence &...
A1 cont'd:...receiving updates from my team on operational priorities. Based on this, we determine appropriate actions. This could mean speaking with gov’t partners to declassify information about urgent threats or meeting with @NASSorg to discuss next steps on election security.
Read 16 tweets
Wenn bei der ÖVP Tatsächlich ein Hacker am Werk war muss das BVT unmittelbar die gesamte Infrastruktur der ÖVP konfiszieren um eine Manipulation der Beweise durch die ÖVP ausschließen zu können. Eine Beweissicherung in diesem Umfang wird wohl mehrere Monate in Anspruch nehmen 1/
Damit ist die ÖVP wenige Wochen vor der Wahl handlungsunfähig. Das betrifft alles, jeden Router, jedes Notebook, jeden Server, jedes Mobiltelefon. Sollte das nicht passieren kann man das als FAKE NEWS abtun. Wenn es passiert ist die ÖVP wenige Wochen vor der Wahl nicht mehr 2/
Handlungsfähig. Nur damit die Tragweite der Aussagen des „unabhängigen“ Cybersecurity Experten und der ÖVP im richtigen Kontext stehen. 3/3
Read 7 tweets
This afternoon, Twitter and Facebook announced they identified and took down a significant disinformation campaign backed by the Chinese government and aimed at undermining the legitimacy of the protests in Hong Kong. Twitter removed 200,000+ accounts.

blog.twitter.com/en_us/topics/c…
"As Twitter is blocked in PRC, many of these accounts accessed Twitter using VPNs. However, some accounts accessed Twitter from specific unblocked IP addresses originating in mainland China."
Twitter followed up this takedown with another major announcement: Twitter will no longer accept advertising from state-controlled (either financially or editorially) news media. Presumably, this should apply to RT, Sputnik, Xinhua, etc.

blog.twitter.com/en_us/topics/c…
Read 5 tweets
A thread about #journalism and #infosec/#cybersecurity.

I hear ALL the time from executives who read about infosec issues in the news and want to know more. Journalists are the most important part of the education and information component of #cybersecurity.
I consider journalists part of #infosec - not outside of it. They serve their purpose like a Firewall admin serves theirs for the larger #cybersecurity space. I've never met a malicious journalist, not saying they're out there but, almost all have good intentions.
Most journalists have a non-technical background. This is changing but it is still the case. Just like many of #infosec who came from a non-traditional background and joined our space we need to be supportive and mentor them.
Read 5 tweets
After my tweet about the Tuwaiq bootcamp, I had some people DM me on how to get started on you own in #cybersecurity as I mentioned.

Here are some general resources.

- FREE COURSES -
cybrary.it
youtube.com
edx.org
udemy.com
-- FREE LABS TO TEST YOUR SKILLS -=
hackthebox.eu
vulnhub.com

If you want to set up a more advanced lab, I created this video guide to great a free lab in the cloud. bit.ly/2XzTwdA
In my opinion you have 2 tracks:
- Fast Track, (aka get rich quick scam), it pays out less in the long run,
- Right way, takes longer by building up the right skills to become an expert.

1) The "Fast Track" is what most people want today, is from zero to cybersecurity expert.
Read 9 tweets
Ahead of @DEFCON, we're highlighting professionals from our Leaders Directory who work in #security & #cybersecurity. And check out our full Leaders Directory for who to know in #tech, #policy, & #politics. #thebridgeleaders thebridgework.com/profiles
@defcon .@CISAManfra, Assistant Director for Cybersecurity @CISAgov says, "Cybersecurity is a significant challenge that requires innovation not just in technical solutions but also in our policies." #thebridgeleaders bit.ly/2YMsoMJ
U.S. Congressman @HurdOnTheHill told us, "I think it’s important for innovators to understand some of the concerns that regulators are going to have further on down the line." #thebridgeleaders bit.ly/2LW4w39
Read 12 tweets
This thread includes all my #infographics so far, they present different terms related to Information Security 🔐

It's an easy way to learn new things 📖 I hope it will be useful to the community. RT appreciated 🌐

Follow me @Guillaume_Lpl for more about #infosec #cybersecurity
What is a Botnet & How ti works?
Follow me @Guillaume_Lpl for more about #infosec #cybersecurity #dataprivacy #ITsecurity #technology
What is a Bug Bounty?
Follow me @Guillaume_Lpl for more about #infosec #cybersecurity #dataprivacy #ITsecurity #technology
Read 29 tweets
Does cybersecurity *suffer* from a rational discourse? YouTube's "Hot Mess" channel discusses a growing need to "respond[] to the science through fear, and that made me a much more committed, much more engaged climate person than I had ever benn before."
*Should* we apply hysteria to #cybersecurity? "That's what many people have found so surprising: that fear can actually make people more engaged... Maybe [psychologists are wrong] at least for some people... Fear is an incredibly powerful motivator."
*Should* we apply hysteria to #cybersecurity? "If the science is alarming, then it's okay to alarm readers with it -- to alarm people with it -- and in fact it's the only, I think, responsible way to respond to that news."
Read 8 tweets
Dear Internaut I Am Not,

For internet safety tips, our experts recommend a unique resource called Stop.Think.Connect.

@STOPTHNKCONNECT is a global #CyberSecurity education & awareness campaign co-founded by @cyber, @StaySafeOnline & @APWG

bit.ly/2LfkZPj

#AskMollyHale Ask Molly Hale - on cybersecurity
Stop.Think.Connect. is an unprecedented partnership between federal & state governments, law enforcement, industry, & NGOs to increase the understanding of cyber threats & empower all #netizens to be safer & more secure online.

Pretty cool, right?

#CyberSecurity #AskMollyHale
Stop.Think.Connect has tools & resources for students, parents, teachers, older Americans, law enforcement, small businesses, etc. Many in foreign languages too!

USA: dhs.gov/stopthinkconne…

Global: stopthinkconnect.org

#CyberSecurity #AskMollyHale
Read 4 tweets
1 of 8: On our journey to a #ZeroTrust #cybersecurity model, @Akamai is helping customers get there with us. How many of these 7 steps are you taking to adapt to a world of #ZeroTrust? (thread follows)
1. Provide users with application-only access, not network access—on a need-to-know basis, based on user identity, device posture, authentication and authorization
2. Eliminate the ever-growing list of holes punched in your firewall that expose your network infrastructure to the public internet. If malicious actors can’t find your network, they can’t attack it.
Read 8 tweets
#CPEC is the backbone of #Pakistan's Grand Strategy. Enemies are keen to foment trouble in #Balochistan to sabotage the project.
A hike in terror attacks has been witnessed in the past months in Balochistan especially in areas in proximity to #Gwadar which is part of #Sabotage.
Killings of #Hazara Shias in Balochistan helps the enemy kill two birds with a stone.
1. It causes trouble in Balochistan,
2. It decreses confidence of Shias in the state of #Pakistan and leads to anger and frustration in Gilgit Baltistan, The Critical province in #CPEC.
Read 9 tweets
2019 is the 50th edition of the #SIPRIYearbook. Join SIPRI as we celebrate the occasion with a 50-day countdown and share the history of the Yearbook over the past 50 years. Watch the introductory video with SIPRI Director @dansmith2020:
The first #SIPRIYearbook was published in 1969 with the aim ‘to produce a factual and balanced account of a controversial subject—the arms race and attempts to stop it’. The rise in world military spending and disarmament efforts, including the #NPT, take central focus.
'In whatever way the nuclear situation is examined, the inescapable feature is what enormous quantities of weapons have been amassed' – Movement towards a first-strike capability by the #US and #USSR, the #SALT talks and European security were a focus of the 1970 #SIPRIYearbook.
Read 52 tweets
"1/3 of our global food supply is pollinated by bees. Simply put, bees keep plants and crops alive."
🐝 If All The Bees In The World Die, Humans Will Not Survive: elitedaily.com/news/world/hum…
Deregulation and control of judiciary appointments: The core tactics at the heart of GOP anti-governance. Here's the latest in banking deregulation and it's corrosive effect on the living standards of us 99%:
Read 29 tweets
For those who want to learn about #infosec 🔐 here is a #thread that includes all my #infographics.
An easy way to learn new things 📖Feel free to share with your community🌐

Follow @Guillaume_Lpl for more things about #CyberSecurity #startup #ITsecurity #security #technologies
Some good tools useful in Infosec

Follow @Guillaume_Lpl for more things about #infosec #cybersecurity
Some good tools useful for OSINT

Follow @Guillaume_Lpl for more things about #infosec #cybersecurity
Read 20 tweets
Thread updated of my infograhics : To make things more convenient and to help beginners in #infosec , I decided to regroup my #infographics with this tweet ! #Cybersecurity #Startups #IoT #ITsecurity #Security #tools
Some good tools useful in Infosec : by @Guillaume_Lpl #infosec #cybersecurity #Infographic
Some good tools for Mobile APP Security Testing : by @Guillaume_Lpl #infosec #cybersecurity #Infographic
Read 13 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!