Twitter | Search | |
The CyberWire
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing and podcast. No marketing emails, just the news.
102,344
Tweets
730
Following
11,799
Followers
Tweets
The CyberWire 52m
: We talk about on the Podcast: adds security to apps.
Reply Retweet Like
The CyberWire 1h
: : Among its features are methods of evading & , & of reflective execution of files directly from memory.
Reply Retweet Like
The CyberWire 3h
: The 's proposed regulations attract little love. More on the Podcast.
Reply Retweet Like
The CyberWire 3h
: : It's patient, remaining quiescent for two weeks after installation before it makes its calls to the command-and-control servers. It also removes competing from the systems it infects.
Reply Retweet Like
The CyberWire 4h
At Sponsor 's DC & Seattle events: Hear about latest threats & solutions from experts at Dept of Justice, NSA, Pulse Secure, CenturyLink & more. VIP admission only $95 for CyberWire audience with code cyberwire95.
Reply Retweet Like
The CyberWire 5h
: Check out our Podcast Sponsor 's white paper: It highlights the importance of securing the evolving digital workspace & the need for enterprises to embrace a framework of trust between the components in their ecosystem.
Reply Retweet Like
The CyberWire 5h
: Where do professionals go to find jobs & career advice? Sponsor features thousands of opportunities across the country & overseas for cyber security pros. Check them out today by visiting
Reply Retweet Like
The CyberWire 5h
: We talk about Congress pursuing & on the Podcast.
Reply Retweet Like
The CyberWire 5h
CW Podcast Sponsor ’s in-platform analytics & automation will save your team time while making informed decisions for your security operations and strategy. Check out their latest white paper: More is Not More & sign up for a free account.
Reply Retweet Like
The CyberWire 5h
: : Researchers say it bears some similarity to# Locky . It can establish complete control over victim devices, delivering whatever payloads its unknown masters may wish to install.
Reply Retweet Like
The CyberWire 6h
: What distinguishes high-quality, actionable from low-quality "noise"? Find out in Briefing Sponsor ’s webinar with Security Ledger on Tuesday, June 26 @ 2pm ET. Sign up today at:
Reply Retweet Like
The CyberWire 7h
: Hear on the Podcast that sues a former employee.
Reply Retweet Like
The CyberWire 7h
: With Sponsor , you can security & investigation of your architecture in seconds. Check out a demo today.
Reply Retweet Like
The CyberWire 7h
: 's long retrospective look at the has led it to conclude that attackers are interested in using hidden tunnels to get into otherwise well-protected networks.
Reply Retweet Like
The CyberWire 9h
: Is your lab a pain to use? Security teams who use a cloud browser can reduce the time spent investigating cases by more than 50%. Use Sponsor 's browser & get online in seconds.
Reply Retweet Like
The CyberWire 9h
: A sophisticated & patient , , is observed in the , but it's not yet clear what it's up to.
Reply Retweet Like
The CyberWire 9h
: Podcast guest Ned Miller of reviews their “Winning the Game” report on the of training.
Reply Retweet Like
The CyberWire 9h
: Hear from Podcast Partner Ryan LaSalle of discusses the opening of their new Cyber Fusion Center.
Reply Retweet Like
The CyberWire 9h
: On the Podcast, hear about a app that will save your battery, but it will also install a , steal information, & click on a bunch of ads.
Reply Retweet Like
The CyberWire 9h
Have you ever been to security training? We have. You know, donuts, coffee, boredom...Well our Season 1 Sponsor wants to spring you from that break room with new-school security awareness training. Try their weekly CyberHeistNews at
Reply Retweet Like