Twitter | Search | |
Search Refresh
The Hacker News Sep 12
💥 SimJacker (0-day under active attack) A new SIM card-based flaw could allow remote attackers to hijack and spy on any phone just by sending an SMS – regardless of which handset the victim is using. Read details —
Reply Retweet Like
Vulcan Cyber Sep 18
For an organization to be confident it must have a solid posture, and for this, regular testing is key. Two types of testing are critical – and scans. Learn more ->
Reply Retweet Like
US Cybersecurity Mag. Sep 19
Ramsey County says the number of people who may have had their private health information compromised in a cyber-attack last year has increased to more than 117,000.
Reply Retweet Like
Ross Rosenberg Sep 17
Reply Retweet Like
Andrew Hughes Sep 11
This month I look at named theatre caps and consider what's going on behind some of the reactions to them Thanks to &
Reply Retweet Like
Sachin Wagh Sep 19
Reply Retweet Like
Caitlin Weston 4h
It can be lonely at the top. Leadership quality is a key determinant of unit performance. There’s so much pressure on leaders but we don’t always think to support and connect with them. How can we help our leaders embrace & embody both and ?
Reply Retweet Like
Ptrace Security GmbH Sep 16
From BinDiff to Zero-Day: A Proof of Concept Exploiting CVE-2019-1208 in Internet Explorer
Reply Retweet Like
Cross Border in Ethiopia, Kenya & Somalia Sep 17
“In my 20 years of work in 🇪🇹🇰🇪🇸🇴🇸🇸🇾🇪🇨🇩's borders I saw improvement on women . However, our women still face gender , , limited access & control to productive assets & resources critical to meet their dev priorities” Eunice Obala, VSF Germany.
Reply Retweet Like
Michael Fisher Sep 18
Reply Retweet Like
Sabe Barker Sep 13
[webapps] phpMyAdmin 4.9.0.1 - Cross-Site Request Forgery
Reply Retweet Like
Sarah Gat Sep 17
Guess what? I’ve been working as a math coach, and I know that I didn’t learn math myself, conceptually. Math can still give me some anxiety (as I know it does for many). I am and have committed to Re-learning (or really learning) the math that I missed.
Reply Retweet Like
Vulcan Cyber Sep 11
[Video] What does the future of management hold? We asked Yaniv for some answers...
Reply Retweet Like
Vulcan Cyber Sep 17
With so many management tools on the market, it's tricky to know which ones are essential and which are not. We've put together a great checklist of the 8 essential components >>>
Reply Retweet Like
Vulcan Cyber Sep 19
It's harsh to say but if you're not automating your management process, you're wasting precious time >>>
Reply Retweet Like
Stella Rose 7h
Good morning! boundaries HAVE A GREAT DAY!
Reply Retweet Like
Konstantin Lyakhov 3h
Motors Car Dealer & Classified Ads < 1.4.1 - Multiple Issues
Reply Retweet Like
US Cybersecurity Mag. Sep 18
A new form of ransomware that has been spotted in the wild uses what researchers call "overkill" levels of encryption to hijack infected systems.
Reply Retweet Like
CeptBiro 3h
Reply Retweet Like
Megan Griffith 4h
Okay, so a week ago I saw this crazy tweet about , and I haven't been able to stop thinking about it since, so I wrote a post about it.
Reply Retweet Like