Twitter | Search | |
The CyberWire
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing and podcast. No marketing emails, just the news.
114,083
Tweets
792
Following
17,661
Followers
Tweets
The CyberWire 4h
Making the Most out of the Framework with Symantec’s Ken Durbin & Recorded Future’s Allan Liska on the most recent episode of :
Reply Retweet Like
The CyberWire retweeted
Accenture Security 5h
What are tabletop exercises in the world? Accenture’s . joins . to explain.
Reply Retweet Like
The CyberWire 8h
Replying to @thecyberwire
As someone or other once said, in some science fiction movie from like the 1970s, "Don't be too proud of this technological terror you've created."
Reply Retweet Like
The CyberWire 8h
More advice to patch BlueKeep, Facebook announcement of planned launch of a , updates on alleged power grid operations, and details on from compromised social media accounts. This and more on today’s :
Reply Retweet Like
The CyberWire retweeted
Justin Harvey 9h
I'm on today's speaking on tabletops!
Reply Retweet Like
The CyberWire 9h
Replying to @thecyberwire
In the wake of stories about on social media, ZDNet summarizes FBI warnings of the ways in which foreign intelligence services use to recruit sources.
Reply Retweet Like
The CyberWire 10h
Replying to @luodai
Glad you found us!
Reply Retweet Like
The CyberWire retweeted
Eboni Thamavong 11h
I have no idea how I didn’t know about this podcast. ⁦⁩ fantastic analysis and commentary on dwell time.
Reply Retweet Like
The CyberWire 11h
Like the CyberWire's Daily Briefing? If you enjoy catching up with the CyberWire & it's a valuable part of your day, why not share it with friends & colleagues? Invite them to join you by subscribing here:
Reply Retweet Like
The CyberWire 11h
Thoughts on , from the CISO, Matthew Dunlop.
Reply Retweet Like
The CyberWire 12h
Catch up on: Border breach. True lies. AI for espionage. Cities vs. malware. Huawei updates. Hong Kong unrest. Industry notes. Get the skinny in this week's edition of the .
Reply Retweet Like
The CyberWire 12h
"...at that point, the host that has executed the malware begins to use that IP range and scan it for multiple weaknesses in security." - Tom Hegel of Alien Labs. More on
Reply Retweet Like
The CyberWire retweeted
Amit Ahuja XⓋX Jun 18
Hi Dave! I just wanted to say that your podcast Cyber Wire is an outstanding podcast. I really enjoy listening to all the latest stories that come from the cybersecurity world. ✌️
Reply Retweet Like
The CyberWire 12h
Replying to @CADinc @ErichKron
Thanks for listening and sharing!
Reply Retweet Like
The CyberWire 12h
Replying to @marialiya_
Thanks for sharing, !
Reply Retweet Like
The CyberWire retweeted
W2 Communications 13h
. from discusses the troubling issue of adversary dwell time and the vigilance gap on . Check it out!
Reply Retweet Like
The CyberWire 13h
Russo-American grid and deterrence, Argentina blackout update, Spies troll for sources, and Facebook's . Check out today’s :
Reply Retweet Like
The CyberWire 16h
Making the Most out of the Framework with Symantec’s Ken Durbin & Recorded Future’s Allan Liska on the most recent episode of :
Reply Retweet Like
The CyberWire 20h
Like the CyberWire's Daily Briefing? If you enjoy catching up with the CyberWire & it's a valuable part of your day, why not share it with friends & colleagues? Invite them to join you by subscribing here:
Reply Retweet Like
The CyberWire Jun 18
The troubling issue of adversary dwell time and the IT vigilance gap with guest is from on today’s :
Reply Retweet Like