Advertisement · 728 × 90

Posts by Cyber Threat Alliance

This article explores how Mythos‑class models are reshaping expectations for cyber programs and pressuring today’s vulnerability‑sharing frameworks. It also outlines actions CISOs, GCs, and boards should consider as AI accelerates vulnerability discovery and exploitation.
tinyurl.com/3n4zfmjj
#vulns

2 hours ago 1 0 0 0

CTA Member @mcafee.com notes that cloud storage scams are making headlines again:
www.mcafee.com/blogs/securi...
#cybersecurity #scams #cloudsecurity

5 days ago 2 0 0 0
Preview
Your AI Security Agents Are Forgetting What They Did, And That’s a Massive Vulnerability — ExtraHop AI agents promise to scale security operations, but their limited memory can create silent, compounding vulnerabilities. Learn how continuous network context ensures decisions remain traceable and rel...

CTA member @extrahop.bsky.social notes 'Enterprises are rushing to deploy AI agents for cybersecurity. But a fundamental flaw in how these systems handle memory is quietly undermining their defenses'...

www.extrahop.com/blog/why-ai-...

5 days ago 2 0 1 0

CTA member Check Point research shows a long‑standing trend: attackers consistently exploit highly trusted brands to steal credentials and gain initial access to personal and enterprise environments.
blog.checkpoint.com/research/the...

#phishing #cybersecurity #threatintellignece #cyberesearch

5 days ago 0 0 0 0
Preview
BlueHammer, RedSun, and UnDefend: Three Windows Defender Zero-Days Exploited in the Wild Three Windows Defender vulnerabilities disclosed as zero-days in April 2026 are now being actively exploited: BlueHammer, RedSun, and UnDefend...

CTA Member SOCRadar on the three Windows Defender vulnerabilities disclosed as zero-days that are being actively exploited: BlueHammer, RedSun, and UnDefend.
socradar.io/blog/blueham...
#cybersecurity #threatintelligence #0day #vulnerabilities

5 days ago 1 0 0 0
Preview
CTA 2025 Year in Review - Cyber Threat Alliance

Our 2025 Year in Review is live. Data sharing soared. Engagement deepened. Our member and partner community grew stronger. And our voice in #cybersecurity news and thought leadership reached new heights.
This is what collective defense looks like in action.
tinyurl.com/mr255wvp
#strongertogether

5 days ago 3 1 0 0

Tomorrow - April 15th! Register:
www.cybernextconference.org
We convene policymakers and #cybersecurity leaders to unpack the trends driving the global cybersecurity agenda, from EU competitiveness & digital sovereignty to quantum readiness & evolving international partnerships
#cyberpolicy

1 week ago 1 0 0 0
Preview
Why We Joined the Cyber Threat Alliance - Cyber Threat Alliance By Sotiraki Sima, Chief Information Security Officer, OneFirewall Alliance When we started OneFirewall, the idea was straightforward: block bad traffic before it hits your network. IPs, domains, URLs,...

CTA member OneFirewall says that "joining @cyberalliance.bsky.social was one of the better decisions we've made. Not because it's a magic bullet—there isn't one—but because it fundamentally changed what we can see and how fast we can act on it"
tinyurl.com/exwe5v84
#cybersecurity #strongertogether

1 week ago 2 0 0 0
Advertisement
Preview
Cybernext

Join us April 15th for CyberNext Brussels!
We bring together policymakers and cybersecurity leaders to assess the forces shaping the global agenda.
Register and agenda:
www.cybernextconference.org
@cyberalliance.bsky.social
@cybercoalition.bsky.social
#cyberpolicy #cybersecurity

1 week ago 1 0 0 0

CTA Member @silentpush.bsky.social blog on tool sprawl challenges:
www.silentpush.com/blog/pivot-p...
#cybersecurity

1 week ago 0 0 0 0
Graphalgo fake recruiter-test campaign respawned | ReversingLabs NK threat actors targeting crypto developers are back with an LLC and new techniques to hide malware. Here's RL's analysis.

CTA Member @reversinglabs.com on a fake recruiter campaign:
www.reversinglabs.com/blog/graphal...
#cybersecurity #scam #fakerecruiter

1 week ago 1 1 0 0

CTA Member @Lumu on Remcos RAT
lumu.io/blog/remcos-...
#cybersecurity #RAT

1 week ago 0 0 0 0

CTA Member CyberCX on Shadow AI:
cybercx.com.au/blog/shadow-...
#cybersecurity #Cyber #AI #ShadowAI

1 week ago 1 0 0 0
Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company This activity began in early February and has continued in recent days. What organizations should expect next from Iran-aligned groups and the steps they should take to guard against cyberattacks.

CTA member @symantec.bsky.social
This activity began in early February and has continued in recent days. What organizations should expect next from Iran-aligned groups and the steps they should take to guard against cyberattacks.
www.security.com/threat-intel...
#cybersecurity #cyberattacks

1 week ago 0 0 0 0
These Iranian-affiliated Attackers Didn't Need a Zero-Day. They Just Used the Manual. Here’s what CISA’s joint advisory on Iranian-affiliated cyber actors exploiting internet-exposed PLCs tells us about the importance of visibility in critical infrastructure security.

From CTA member @nozominetworks.bsky.social
www.nozominetworks.com/blog/these-i...
#cybersecurity #OT #CriticalInfrastructure #CISA

1 week ago 0 0 0 0
Advertisement
March 2026 Cyber Threat Report: Ransomware & GenAI Risk March 2026 cyber threat update: attacks dip to 1,995/week, ransomware rebounds, and GenAI data leakage risk rises—plus key sector and regional trends.

CTA member Check Point March Threat Report
672 ransomware attacks were reported globally. This represents an 8% decrease yoy, yet a 7% increase compared to February, indicating renewed attacker momentum following short-term declines earlier in the qtr
More stats:
blog.checkpoint.com/research/mar...

1 week ago 0 0 0 0
The cyber winners and losers in Trump’s 2027 budget The administration’s 2027 civilian agencies budget trims federal cybersecurity spending despite escalating threats, with deep cuts at CISA even as other agencies see boosts.

“By decreasing spending on cybersecurity at a time when the threats in #cybersecurity are accelerating, from both nation-state adversaries and criminal organizations, you’re choosing to increase the nation’s risk,” @cyallianceprez.bsky.social
www.csoonline.com/article/4156...
#CISA #cyberpolicy

1 week ago 0 0 0 0
Post image

Join us April 15th for CyberNext Brussels!
We bring together policymakers and cybersecurity leaders to assess the forces shaping the global agenda. .
Register and agenda:
www.cybernextconference.org
@cyberalliance.bsky.social @cybercoalition.bsky.social

1 week ago 0 0 0 1
VB2026 CFP closing now - last chance to submit (deadline April 9).
VB2026 Seville 14-16 October.

VB2026 CFP closing now - last chance to submit (deadline April 9). VB2026 Seville 14-16 October.

The VB2026 Call for Papers closes in just 2 days.

If you have insights, research or real-world experiences to share with the security community, this is your last chance to submit your proposal for VB2026 Seville 🎤

Deadline: 9 April 2026

Click for more info ➡️ www.virusbulletin.com/conference/v...

2 weeks ago 3 3 0 0
CTA Webinar: Shaken and Stirred - Geopolitics and Cybersecurity in 2026
CTA Webinar: Shaken and Stirred - Geopolitics and Cybersecurity in 2026 YouTube video by Cyber Threat Alliance

Now On-Demand: Shaken and Stirred: Geopolitics and Cybersecurity
Panelists explored how fast‑shifting geopolitics & technology are turning #cybersecurity from a standalone technical field into a core element of national resilience, military operations, and information influence
tinyurl.com/mr43d4w6

2 weeks ago 1 0 0 0
Post image

CyberNext Brussels is April 15th
We unite policymakers and cybersecurity leaders to examine key trends—from EU competitiveness and digital sovereignty to quantum and changing geopolitical partnerships—shaping today’s global cybersecurity landscape.
Register www.cybernextconference.org
#cybersecurity

2 weeks ago 1 0 0 0

Starting soon! 9 am ET
us06web.zoom.us/webinar/regi...
#cybersecurity #webinar #geopolitics

2 weeks ago 0 0 0 0
Preview
Tax Season 2026: Inside Early‑Stage Cyber Crime Campaigns Tax season 2026 is driving a surge in phishing, malicious domains, and IRS impersonation as cyber criminals prepare attacks months in advance.

CTA Member Check Point on how cyber criminals are preparing their attacks months in advance
blog.checkpoint.com/research/tax...
#cybersecurity #scams

2 weeks ago 2 1 0 0
Post image

Join us Monday, April 6th at 9 am EDT for CTA Webinar: Shaken and Stirred: Geopolitics and Cybersecurity in 2026. Panelists will discuss how geopolitical turmoil is reshaping #cybersecurity assumptions and how fragmentation is influencing our path forward
Register: tinyurl.com/ycxf6um4
#geopolitics

2 weeks ago 0 0 0 0
Preview
New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay New research from Rapid7 Labs, involving the analysis of nearly 300 samples, has uncovered 7 new BPFDoor variants acting as a silent trapdoor. Activation allows malware to perfectly blend into the tar...

New research from @rapid7.com Labs has uncovered undocumented features leading to the discovery of 7 new BPFDoor variants: a stealthy kernel-level backdoor that uses Berkeley Packet Filters (BPFs) to inspect traffic from right inside the operating system kernel.
www.rapid7.com/blog/post/ne...

2 weeks ago 0 0 0 0
Advertisement
Post image

Have you registered?
Join us Monday, April 6th at 9 am ET
Shaken and Stirred: Geopolitics and Cybersecurity in 2026.
Panelists will discuss how geopolitical turmoil is reshaping #cybersecurity assumptions and how fragmentation is influencing our path forward
Register: tinyurl.com/43a22327

3 weeks ago 0 0 0 0
CTA Webinar - Give to Gain: Investing in Women to Strengthen Cyber Resilience
CTA Webinar - Give to Gain: Investing in Women to Strengthen Cyber Resilience YouTube video by Cyber Threat Alliance

Cyber resilience isn’t built by technology alone—it grows when we invest in the people behind it. “Give to Gain” shows how empowering women across cybersecurity strengthens readiness, response, and long‑term stability.
www.youtube.com/watch?v=ICvR...
#cybersecurity #investinwomen #cyberresilience

3 weeks ago 1 0 0 0
Cyber Threat Alliance Welcomes Motorola Solutions as Newest Member - Cyber Threat Alliance WASHINGTON – April 1, 2026 – Cyber Threat Alliance (CTA), a nonprofit organization dedicated to improving the cybersecurity of the global digital ecosystem, today announced Motorola Solutions as its n...

Big news: Motorola Solutions has joined @cyberalliance.bsky.social!
As a global leader in mission‑critical safety and security tech, Motorola brings powerful new perspectives to our shared fight against cyber threats.
Stronger together!
#cybersecurity #threatintel #publicsafety
tinyurl.com/4h5krn3m

3 weeks ago 1 0 0 0
When Ransomware is a Business: How Become "Unattractive" to Attackers Ransomware is no longer a tech issue. It's a criminal business model. Learn how to make your organization a less profitable target.

CTA member Penta Security:
“Orgs must stop viewing #ransomware as a technical issue and start treating it as a profit‑driven criminal business…the goal isn’t preventing every attack, but making attacks as unprofitable as possible.”
tinyurl.com/59umvj49

3 weeks ago 1 0 0 0

CTA member @mcafee.com's research team identified an Android rootkit campaign tracked as Operation Novoice.
www.mcafee.com/blogs/other-...
#cybersecurity #android #rootkit

3 weeks ago 1 0 0 0