Alert fatigue is one of the most persistent & costly problems in #SecOps & itโs getting worse. @Cybersecinsider reports 76% of SOC teams cite alert fatigue as a top operational challenge & 73% report analyst burnout. Important @XMCyber_ analysis & advice.
cybersec.xmcyber.com/s/stop-the-s...
Posts by Ben Rothke
Informative piece from Psono that debunks the top 10 password security myths. Even without a password manager, strong passwords can protect online accounts. #infosec #cybersecurity
api.cyfluencer.com/s/top-10-pas...
CyberCanon's Review of Thinking, Fast and Slow
๐๐ฟ๐ฒ๐๐ต ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฎ๐ป๐ฑ๐ฒ๐ฑ ๐ค๐๐
This week, 2 committee members are independently recommending Daniel Kahneman's ๐๐๐๐ฃ๐ ๐๐ฃ๐, ๐๐๐จ๐ฉ ๐๐ฃ๐ ๐๐ก๐ค๐ฌ for the CyberCanonHoF.
๐ Read why it's valuable for cyber pros -> cybercanon.org/thinking-fas...
#CybersecurityBooks #Cyberpsychology #CyberCanonHoFCandidate
1/3...
March had 90 publicly disclosed #ransomware attacks, 2nd month this year incidents exceeded 90. Orgs in US accounted for 60% of all reported attacks. Ransomware groups like #DragonForce & #Anubis still making a massive amount of $$. HT @blackfogprivacy. api.cyfluencer.com/s/the-state-...
CyberCanon Review of Hacks, Leaks, and Revelations
๐ Review Drop: Hacks, Leaks, and Revelations
This week, be sure to read Meghan Jacquot's CyberCanon Review of Micah Lee's ๐๐๐๐ ๐จ, ๐๐๐๐ ๐จ, ๐๐ฃ๐ ๐๐๐ซ๐๐ก๐๐ฉ๐๐ค๐ฃ๐จ ๐
cybercanon.org/hacks-leaks-...
#CybersecurityBooks #Databreach | @micahflee.com
#CamoLeak is a high-severity #vuln in #GitHub #Copilot Chat (CVE-2025-59145, CVSS 9.6) that gives attackers the ability to silently steal source code, API keys & secrets from private repos w/o executing any malicious code. Good overview from @blackfogprivacy. api.cyfluencer.com/s/camoleak-h...
My @OneRSAC information security book of the month review: Speak Security With A Business Accent: How to Communicate Cybersecurity Concepts Clearly, Ease Friction with Stakeholders & Influence Decisionโ by Joshua Mason. Sage advice for #infosec pros. #RSAC www.rsaconference.com/library/blog...
Built by a veteran #cybersecurity team & led by former @Google and @Mandiant execs, Mallory AI is a new #AI intelligence platform & now in GA. Itโs built for exposure investigation & intel workflows. Important for #infosec.
api.cyfluencer.com/s/mallory-go... #MalloryAI #Mallory
CyberCanon's Review of The AI Conundrum
๐๐ ๐๐ถ๐๐ต๐ผ๐๐ ๐๐ต๐ฒ ๐๐๐ฝ๐ฒ (๐ผ๐ฟ ๐๐น๐ถ๐ป๐ฑ ๐ฆ๐ฝ๐ผ๐๐) ๐ฆพโ๏ธ
For this week's review, Yisehak Lemma examines ๐๐๐ ๐ผ๐ ๐พ๐ค๐ฃ๐ช๐ฃ๐๐ง๐ช๐ข, written by the father-son duo of Caleb and Rex Briggs.
๐ Full review: cybercanon.org/the-ai-conun...
#CybersecurityBooks #AISecurity #AIGovernance
CyberCanon Review of Stepping Through Cybersecurity Risk Management
๐๏ธ ๐๐ฎ๐น๐น ๐ผ๐ณ ๐๐ฎ๐บ๐ฒ ๐ฅ๐ฒ๐ฐ๐ผ ๐๐ป๐ฐ๐ผ๐บ๐ถ๐ป๐ด!
Jack Freund, a man who knows a thing or two about cyber risk (author of the FAIR HoF book), provides a Hall of Fame nomination for ๐๐ฉ๐๐ฅ๐ฅ๐๐ฃ๐ ๐๐๐ง๐ค๐ช๐๐ ๐พ๐ฎ๐๐๐ง๐จ๐๐๐ช๐ง๐๐ฉ๐ฎ ๐๐๐จ๐ ๐๐๐ฃ๐๐๐๐ข๐๐ฃ๐ฉ by Jennifer Bayuk.
๐ Read Jack's thorough assessment: cybercanon.org/stepping-thr...
The @OneRSAC Conference just wrapped & headline underneath every announcement is the same: Enterprises are deploying AI agents faster than #infosec teams can track them. This @AGATSoftware piece details #AI implementation work that needs to be done. api.cyfluencer.com/s/rsac-2026-... #RSAC
Last week, @realDonaldTrump established a task force to eliminate fraud via executive order. However, like information risk, fraud canโt be eliminated. What the Trump order doesnโt deal with is clueless users vulnerable to financial fraudsters & scammers.
brothke.medium.com/scammers-rep...
CyberCanon's Review of Behavioral AI
โ Review Day! โ
Thomas Laugle provides a "niche" recommendation for Dr. Rogayeh Tabrizi's ๐ฝ๐๐๐๐ซ๐๐ค๐ง๐๐ก ๐ผ๐: ๐๐ฃ๐ก๐๐๐จ๐ ๐ฟ๐๐๐๐จ๐๐ค๐ฃ ๐๐๐ ๐๐ฃ๐ ๐ฌ๐๐ฉ๐ ๐ฟ๐๐ฉ๐
โ๏ธ Read Thomas' thorough analysis: cybercanon.org/behavioral-a...
#CybersecurityBooks #AISecurity #GRC #SecurityAwareness
That passwords aren't going away, or that they ever will, isnโt a novel idea. But interesting insights from this @specopssoftware piece are that traditional complexity rules create predictable behavior. Such as Password2 following Password 1. api.cyfluencer.com/s/top-5-insi...
#Delve claims โCompliance in daysโ. But #DeepDelver #AICPNAY tells very different story, claiming โ@getdelve built a machine designed to make clients complicit w/o their knowledge, to manufacture plausible deniability while producing exactly the oppositeโ. substack.com/home/post/p-...
#AI agents, service accounts, automation workflows & machine-to-machine processes are rapidly becoming leading characters in the enterprise. That leads to a new #infosec acronym - Agent Access Management (AAM). api.cyfluencer.com/s/agent-acce...
Not so fun fact. Any call, voicemail, text, or email you get about a vacation or cruise is from a scammer. I challenge you to find a single person who has received a voicemail, call, text, or email about a vacation that was not a #scam. brothke.medium.com/how-to-tell-...
If you are going to be at RSA #infosec Conference @OneRSAC next week, @TheTokenSec is having a private yacht happy hour with #RSAC innovation sandbox finalists Fig Security, Geordie, @ZeroPathAI & senior cybersecurity leaders. api.cyfluencer.com/s/sandbox-at... #RSA
CyberCanon's Review of The Cybersecurity Guide to Governance, Risk, and Compliance
๐Review Incoming...
This week, we dive into GRC. Andrew Chrostowski provides a Hall of Fame Rec for ๐๐๐ ๐พ๐ฎ๐๐๐ง๐จ๐๐๐ช๐ง๐๐ฉ๐ฎ ๐๐ช๐๐๐ ๐ฉ๐ค ๐๐ค๐ซ๐๐ง๐ฃ๐๐ฃ๐๐, ๐๐๐จ๐ , ๐๐ฃ๐ ๐พ๐ค๐ข๐ฅ๐ก๐๐๐ฃ๐๐ by Jason Edwards and Griffin Weaver.
Andrew's review ๐ cybercanon.org/the-cybersec...
#CybersecurityBooks #GRC #CyberCanonHoFCandidate
Valuable @XMCyber_ free course: โBoard-Level Cybersecurity Risk Communication Certification for CISOsโ led by @Gerald_Auger. Learn about risk communication, executive presence & boardroom influence to drive security investments & informed decision-making. cybersec.xmcyber.com/s/board-leve...
T1059.006 Python is a sub-technique of Command and Scripting Interpreter (T1059) in the MITRE ATT&CK framework, under the Execution tactic. It refers to adversaries using Python to execute code and automate actions on compromised systems.
cybersec.picussecurity.com/s/t1059-006-...
Anyone using LinkedIn may find more scammers reaching out to them than legitimate recruiters, especially if using the #OpenToWork tag. I write about the LinkedIn seek-and-hide scam. One of them poorly impersonated @Hyundai @Hyundai_Global. medium.com/@brothke/the... #scam #scams #fraud
CyberCanon's Review of Battlefield Cyber
๐ช It's Review Day! ๐ช
Rick Howard reviews ๐ฝ๐๐ฉ๐ฉ๐ก๐๐๐๐๐ก๐ ๐พ๐ฎ๐๐๐ง, by William Holstein and Michael McLaughlin...
๐ tinyurl.com/k624nsb8
#CybersecurityBooks #CyberWarfare
Anyone using #LinkedIn may find more scammers reaching out to them than recruiters, especially if using the #OpenToWork tag. I write of the LinkedIn seek-and-hide scam, which is yet another sneaky LinkedIn recruiter job #scam. Get a job, donโt get scammed.
medium.com/@brothke/the...
As @Docusign is used to digitally sign sensitive & confidential documents, you know itโs a prime target for attackers. @Ironscales details a very crafty & convincing #Docusign attack. It used a redirect-chain attack designed to dodge scanners. #infosec
cybersec.ironscales.com/s/the-docusi...
Vendor payment fraud remains the most expensive attack type in education. When it comes to K-12, they have very little to spend on #cybersecurity & that makes them prime attack targets. Good @Ironscales piece details the #infosec schools need to consider. cybersec.ironscales.com/s/the-emails...
My @OneRSAC book review of: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility. Excellent resource to prepare for the inevitability of #quantum #cryptography, from @WileyTech. #RSAC #infosec www.rsaconference.com/library/blog...
As @knash99 of @WSJ wrote: #Iran cyber retaliation would probably target US utility providers & include #DDoS attacks on high-profile websites. This necessitates preemptive security, which stops/deters #cyberattacks before they succeed. HT @PicusSecurity cybersec.picussecurity.com/s/what-is-pr...
How NetSupport RAT abuses a legitimate remote admin tool. #NetSupport RAT is a malicious repurposing of the legitimate remote administration tool, NetSupport Manager, which has been available for over 30 years. cybersec.picussecurity.com/s/how-netsup...
Interesting webinar: Sensitive Data at Risk: Managing Exposure & Governance During M&A. With Constantin Stanca of @Snowflake, @kenowens12 of @Fiserv & Jeff Weber of @bigidsecure. M&A are high-stakes inflection points for financial institutions & data. api.cyfluencer.com/s/sensitive-...