Advertisement · 728 × 90

Posts by Joe Pettit

Preview
CyberAlerts Known Exploited Vulnerabilities (KEV) Since November 3rd, 2021, Cybersecurity and Infrastructure Security Agency (CISA) have published a public list of Known Exploited Vulnerabilities (KEV). Over that time, at the time of writing (April 9...

Since we started collecting data (around 4 months ago), the CyberAlerts KEV includes 6 vulnerabilities exploited in the wild, not listed in CISA KEV.

We expect this to be around 12 or more by the end of the year.

blog.cyberalerts.io/cyberalerts-...

1 year ago 3 2 2 1
Post image Post image

Our CEO Ivan Novikov spoke at GISEC Global 2025! 🙌

Proud to bring the Wallarm voice to one of the industry’s key stages.

#CyberSecurity #APISecurity #GISEC

11 months ago 1 1 0 0
Preview
Medusa Ransomware: FBI and CISA Urge Organizations to Act Now to Mitigate Threat FBI & CISA warn of Medusa ransomware targeting critical infrastructure. Learn key mitigation steps to protect your organization.

The FBI, CISA, and MS-ISAC have issued a joint advisory warning about the Medusa ransomware gang, which has targeted over 300 organizations across critical infrastructure sectors, including healthcare, education, and technology.

Learn more from @grahamcluley.com: www.tripwire.com/state-of-sec...

1 year ago 0 0 0 0
Preview
Medusa Ransomware: What You Need To Know Learn about Medusa ransomware: how it operates, its targets, and steps to protect your organization from this evolving cyber threat.

Initial access brokers and ransomware-as-a-service platforms like Medusa are reshaping the cyber threat landscape.

@grahamcluley.com explains how Medusa operates and why prevention is critical: www.tripwire.com/state-of-sec...

#DataSecurity #ThreatIntelligence #Malware #Ransomware

1 year ago 1 0 0 0
Preview
Space Bears Ransomware: What You Need To Know Learn about Space Bears ransomware, its unique corporate-like tactics, and how to protect your organization from its threats.

What makes Space Bears stand out in the crowded ransomware scene?

A corporate-style image with devastating impact. Read @grahamcluley.com's analysis and tips to safeguard your organization: www.tripwire.com/state-of-sec...

#CyberCrime #Ransomware #CyberSecurity

1 year ago 2 0 0 0
Preview
SOC Scalability: How AI Supports Growth Without Overloading Analysts Scaling up a security operations center (SOC) is inevitable for many organizations. How AI supports growth without overloading analysts.

SOC Scalability: How AI Supports Growth Without Overloading Analysts

securityaffairs.com/172831/secur...

#SecurityAffairs #Hacking #SOC

1 year ago 0 0 0 0
Preview
The 7 Stages NERC CIP Audit Preparation Simplify NERC CIP audit prep with Tripwire’s tools. Learn the 7 stages to ensure compliance and protect critical infrastructure.

Compliance is more than avoiding penalties—it's about safeguarding critical infrastructure. Jim Whiting explains the seven key steps to NERC CIP audit readiness.

Learn more: www.tripwire.com/state-of-sec...

#NERC #Compliance #Cybersecurity

1 year ago 0 0 0 0
Preview
Understanding AI in Network Security AI transforms network security by detecting threats faster. Learn how to pair AI with best practices for robust defenses.

AI is vital for modern network security, offering lightning-fast data analysis, anomaly detection, and adaptability.

Bob Erdman of Fortra shows how combining AI with core security practices keeps you ahead of threats.

www.tripwire.com/state-of-sec...

#NetSec #Cybersecurity

1 year ago 0 0 0 0
Preview
Advice for Exponential Organizations: Intersecting Agile and Incident Align Agile & incident response to improve adaptability, scale cybersecurity, & drive exponential organizational growth.

Cyber threats don’t wait, and neither should your response.

Chester Avey explores how combining Agile practices with incident response enables Exponential Organizations to adapt quickly and grow confidently.

www.tripwire.com/state-of-sec...

#CyberThreats #CyberSecurity #IncidentReponse

1 year ago 0 0 0 0
Preview
What's Next for Cybersecurity in 2025 and Beyond? Fortra Experts Weigh From AI to geopolitics, learn what’s next for cybersecurity in 2025 with insights from Fortra’s experts. Stay ahead of the trends.

What does the future hold for cybersecurity? 🤔

Fortra experts discuss disruption prevention, threat prioritization, and AI-driven innovation. 🗣️

www.tripwire.com/state-of-sec...

#Cybersecurity #DLP #EmailSecurity

1 year ago 0 0 0 0
Advertisement
Preview
The Future of AI Regulation: Balancing Innovation and Safety in Silicon Explore the debate over AI innovation vs. regulation in California. How should we balance safety and technological progress?

Can AI innovation and regulation coexist? Antonio Sanchez explores California’s recent veto of an AI safety bill, the implications for tech companies, and principles for effective oversight

www.tripwire.com/state-of-sec...

#AI #Cybersecurity #ITsecurity

1 year ago 0 0 0 0

Very cool, Tanya!! Hope you're doing well.

1 year ago 1 0 0 0
Preview
London’s CNI is Under Threat London’s critical infrastructure is at risk. Learn how evolving cyber threats demand modern defenses and resilience.

London’s digital infrastructure powers the city, but outdated systems and rising nation-state threats leave its critical infrastructure vulnerable to chaos.

Learn more in Darren Gale's blog: www.tripwire.com/state-of-sec...

#CyberSecurity #CNI #CriticalInfrastructure #CyberThreats

1 year ago 1 0 0 0

Safe travels, Lisa!

1 year ago 1 0 0 0
Preview
CIS Control 12: Network Infrastructure Management Discover essential steps for secure network infrastructure with CIS Control 12, including secure architecture, protocols, and device management.

Network security goes beyond devices—it's about processes, documentation, and growth. CIS Control 12 provides a guide to building a resilient foundation.

Read more: www.tripwire.com/state-of-sec...

1 year ago 2 1 0 0
Preview
ShrinkLocker Ransomware: What You Need To Know Discover how ShrinkLocker ransomware uses BitLocker to encrypt data, demanding ransom payments and challenging security defenses.

When ransomware meets BitLocker, it creates a new kind of challenge. ShrinkLocker is using familiar tools to lock down data—leaving organizations in need of specialized solutions.

@grahamcluley.com has more details: www.tripwire.com/state-of-sec...

#CyberSecurity #Ransomware

1 year ago 1 0 0 0

CherryBlos is Android malware that steals sensitive information from photos such as screenshots of crypto wallet account recovery phrases, putting accounts at risk if the device is infected.

@grahamcluley.com has more information. ⤵️

www.tripwire.com/state-of-sec...

2 years ago 0 0 0 0

Classiscam is a criminal organization that employs low-level phishers to carry out site scams and takes a cut from their profits.

Katrina Thompson explains how the scam works and looks at some stats. ⤵️

www.tripwire.com/state-of-sec...

2 years ago 0 0 0 0

Phishing is a common tactic used by cybercriminals. Companies must educate employees and deploy anti-phishing solutions to safeguard against attacks.

Here are 6 common types of phishing attacks and tips to protect yourself. ⤵️

www.tripwire.com/state-of-sec...

#Cybersecurity #Phishing

2 years ago 0 0 0 0
Advertisement

Looking amazing, @rosesec.bsky.social!!

2 years ago 1 0 1 0

For anyone who is interested (from a technical malware-level) about what is going on with all these Booking[dot]com scams, here's a good analysis by Akamai:

www.akamai.com/blog/securit...

2 years ago 3 1 0 0

Packet sniffing is the act of monitoring data packets on a network using software or hardware device

Read Dilki Rathnayake's introduction to the benefits and risks of Packet Sniffing to learn more: www.tripwire.com/state-of-security/introd...

2 years ago 0 0 0 0
Preview
Rogue IT security worker who impersonated ransomware gang is sentenced to jail A British IT worker who exploited a ransomware attack against the company he worked for, in an attempt to extort money from them for himself, has been sentenced to jail for three years and seven…

Rogue IT security worker who impersonated ransomware gang is sentenced to jail.

grahamcluley.com/rogue-it-security-worker...

#cybersecurity #insiderthreat #ransomware

2 years ago 1 1 0 0

What happens when a vulnerability stops being discussed, but is never fixed?

Tyler Reguly looks at why patch management and vulnerability management are different beasts.

www.tripwire.com/state-of-security/value-...

#vulnerabilitymanagement #cybersecurity

2 years ago 2 0 0 0

Start preparing for NIS2 implementation now to avoid last-minute stress. Don't wait to disclose control information, begin the process ASAP.

Gary Hibberd explains how this directive will impact you and your organization.

www.tripwire.com/state-of-security/how-ni...

2 years ago 0 0 0 0
Preview
Decryption tool for Akira ransomware available for free Security researchers at an anti-virus company have developed a free decryption tool for files that have been encrypted since the Akira ransomware first emerged in March 2023.

Decryption tool for Akira ransomware available for free.

Read more in my article on the Tripwire blog:

www.tripwire.com/state-of-security/free-a...

#cybersecurity #ransomware #malware

2 years ago 3 3 0 0

Security researchers have developed a free decryption tool for files that have been encrypted since the Akira ransomware first emerged in March 2023.

www.tripwire.com/state-of-security/free-a...

cc @grahamcluley.com

2 years ago 4 1 0 0

Thanks @rosesec.bsky.social!!!

2 years ago 1 0 0 0