Since we started collecting data (around 4 months ago), the CyberAlerts KEV includes 6 vulnerabilities exploited in the wild, not listed in CISA KEV.
We expect this to be around 12 or more by the end of the year.
blog.cyberalerts.io/cyberalerts-...
Posts by Joe Pettit
Our CEO Ivan Novikov spoke at GISEC Global 2025! 🙌
Proud to bring the Wallarm voice to one of the industry’s key stages.
#CyberSecurity #APISecurity #GISEC
The FBI, CISA, and MS-ISAC have issued a joint advisory warning about the Medusa ransomware gang, which has targeted over 300 organizations across critical infrastructure sectors, including healthcare, education, and technology.
Learn more from @grahamcluley.com: www.tripwire.com/state-of-sec...
Initial access brokers and ransomware-as-a-service platforms like Medusa are reshaping the cyber threat landscape.
@grahamcluley.com explains how Medusa operates and why prevention is critical: www.tripwire.com/state-of-sec...
#DataSecurity #ThreatIntelligence #Malware #Ransomware
What makes Space Bears stand out in the crowded ransomware scene?
A corporate-style image with devastating impact. Read @grahamcluley.com's analysis and tips to safeguard your organization: www.tripwire.com/state-of-sec...
#CyberCrime #Ransomware #CyberSecurity
SOC Scalability: How AI Supports Growth Without Overloading Analysts
securityaffairs.com/172831/secur...
#SecurityAffairs #Hacking #SOC
Compliance is more than avoiding penalties—it's about safeguarding critical infrastructure. Jim Whiting explains the seven key steps to NERC CIP audit readiness.
Learn more: www.tripwire.com/state-of-sec...
#NERC #Compliance #Cybersecurity
AI is vital for modern network security, offering lightning-fast data analysis, anomaly detection, and adaptability.
Bob Erdman of Fortra shows how combining AI with core security practices keeps you ahead of threats.
www.tripwire.com/state-of-sec...
#NetSec #Cybersecurity
Cyber threats don’t wait, and neither should your response.
Chester Avey explores how combining Agile practices with incident response enables Exponential Organizations to adapt quickly and grow confidently.
www.tripwire.com/state-of-sec...
#CyberThreats #CyberSecurity #IncidentReponse
What does the future hold for cybersecurity? 🤔
Fortra experts discuss disruption prevention, threat prioritization, and AI-driven innovation. 🗣️
www.tripwire.com/state-of-sec...
#Cybersecurity #DLP #EmailSecurity
Can AI innovation and regulation coexist? Antonio Sanchez explores California’s recent veto of an AI safety bill, the implications for tech companies, and principles for effective oversight
www.tripwire.com/state-of-sec...
#AI #Cybersecurity #ITsecurity
Very cool, Tanya!! Hope you're doing well.
London’s digital infrastructure powers the city, but outdated systems and rising nation-state threats leave its critical infrastructure vulnerable to chaos.
Learn more in Darren Gale's blog: www.tripwire.com/state-of-sec...
#CyberSecurity #CNI #CriticalInfrastructure #CyberThreats
Safe travels, Lisa!
Network security goes beyond devices—it's about processes, documentation, and growth. CIS Control 12 provides a guide to building a resilient foundation.
Read more: www.tripwire.com/state-of-sec...
When ransomware meets BitLocker, it creates a new kind of challenge. ShrinkLocker is using familiar tools to lock down data—leaving organizations in need of specialized solutions.
@grahamcluley.com has more details: www.tripwire.com/state-of-sec...
#CyberSecurity #Ransomware
CherryBlos is Android malware that steals sensitive information from photos such as screenshots of crypto wallet account recovery phrases, putting accounts at risk if the device is infected.
@grahamcluley.com has more information. ⤵️
www.tripwire.com/state-of-sec...
Classiscam is a criminal organization that employs low-level phishers to carry out site scams and takes a cut from their profits.
Katrina Thompson explains how the scam works and looks at some stats. ⤵️
www.tripwire.com/state-of-sec...
Phishing is a common tactic used by cybercriminals. Companies must educate employees and deploy anti-phishing solutions to safeguard against attacks.
Here are 6 common types of phishing attacks and tips to protect yourself. ⤵️
www.tripwire.com/state-of-sec...
#Cybersecurity #Phishing
Looking amazing, @rosesec.bsky.social!!
For anyone who is interested (from a technical malware-level) about what is going on with all these Booking[dot]com scams, here's a good analysis by Akamai:
www.akamai.com/blog/securit...
Packet sniffing is the act of monitoring data packets on a network using software or hardware device
Read Dilki Rathnayake's introduction to the benefits and risks of Packet Sniffing to learn more: www.tripwire.com/state-of-security/introd...
Rogue IT security worker who impersonated ransomware gang is sentenced to jail.
grahamcluley.com/rogue-it-security-worker...
#cybersecurity #insiderthreat #ransomware
What happens when a vulnerability stops being discussed, but is never fixed?
Tyler Reguly looks at why patch management and vulnerability management are different beasts.
www.tripwire.com/state-of-security/value-...
#vulnerabilitymanagement #cybersecurity
Start preparing for NIS2 implementation now to avoid last-minute stress. Don't wait to disclose control information, begin the process ASAP.
Gary Hibberd explains how this directive will impact you and your organization.
www.tripwire.com/state-of-security/how-ni...
Decryption tool for Akira ransomware available for free.
Read more in my article on the Tripwire blog:
www.tripwire.com/state-of-security/free-a...
#cybersecurity #ransomware #malware
Security researchers have developed a free decryption tool for files that have been encrypted since the Akira ransomware first emerged in March 2023.
www.tripwire.com/state-of-security/free-a...
cc @grahamcluley.com
Thanks @rosesec.bsky.social!!!