Advertisement ยท 728 ร— 90

Posts by Ben Rothke

Preview
Stop the SOC Burnout: Fixing the Alert Fatigue Crisis | XM Cyber Alert fatigue is one of the most persistent and costly problems in security operations - and it's getting worse. According to Cybersecurity Insiders, 76% of SOC teams cite alert fatigue as a top opera...

Alert fatigue is one of the most persistent & costly problems in #SecOps & itโ€™s getting worse. @Cybersecinsider reports 76% of SOC teams cite alert fatigue as a top operational challenge & 73% report analyst burnout. Important @XMCyber_ analysis & advice.
cybersec.xmcyber.com/s/stop-the-s...

14 hours ago 1 0 0 0
Preview
Top 10 Password Security Myths Debunked Debunk the top 10 password security myths and learn how to protect your online accounts with actionable tips for stronger, safer passwords.

Informative piece from Psono that debunks the top 10 password security myths. Even without a password manager, strong passwords can protect online accounts. #infosec #cybersecurity
api.cyfluencer.com/s/top-10-pas...

15 hours ago 1 0 0 0
CyberCanon's Review of Thinking, Fast and Slow

CyberCanon's Review of Thinking, Fast and Slow

๐—™๐—ฟ๐—ฒ๐˜€๐—ต ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—Ÿ๐—ฎ๐—ป๐—ฑ๐—ฒ๐—ฑ ๐Ÿค”๐Ÿ‘Ÿ๐ŸŒ

This week, 2 committee members are independently recommending Daniel Kahneman's ๐™๐™๐™ž๐™ฃ๐™ ๐™ž๐™ฃ๐™œ, ๐™๐™–๐™จ๐™ฉ ๐™–๐™ฃ๐™™ ๐™Ž๐™ก๐™ค๐™ฌ for the CyberCanonHoF.

๐Ÿ“ Read why it's valuable for cyber pros -> cybercanon.org/thinking-fas...

#CybersecurityBooks #Cyberpsychology #CyberCanonHoFCandidate

1/3...

15 hours ago 2 1 1 0
Preview
The State of Ransomware: March 2026 | BlackFog BlackFog's state of ransomwareย March 2026 report measures publicly disclosed and non-disclosed attacks globally.

March had 90 publicly disclosed #ransomware attacks, 2nd month this year incidents exceeded 90. Orgs in US accounted for 60% of all reported attacks. Ransomware groups like #DragonForce & #Anubis still making a massive amount of $$. HT @blackfogprivacy. api.cyfluencer.com/s/the-state-...

1 week ago 1 0 0 0
CyberCanon Review of Hacks, Leaks, and Revelations

CyberCanon Review of Hacks, Leaks, and Revelations

๐Ÿ”“ Review Drop: Hacks, Leaks, and Revelations

This week, be sure to read Meghan Jacquot's CyberCanon Review of Micah Lee's ๐™ƒ๐™–๐™˜๐™ ๐™จ, ๐™‡๐™š๐™–๐™ ๐™จ, ๐™–๐™ฃ๐™™ ๐™๐™š๐™ซ๐™š๐™ก๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™จ ๐Ÿ‘‡

cybercanon.org/hacks-leaks-...

#CybersecurityBooks #Databreach | @micahflee.com

1 week ago 6 3 1 0
Preview
CamoLeak: How GitHub Copilot Became An Exfiltration Channel | BlackFog CamoLeak turned GitHub Copilot into a silent data exfiltration channel via prompt injection and GitHub's own image proxy. CVSS 9.6.

#CamoLeak is a high-severity #vuln in #GitHub #Copilot Chat (CVE-2025-59145, CVSS 9.6) that gives attackers the ability to silently steal source code, API keys & secrets from private repos w/o executing any malicious code. Good overview from @blackfogprivacy. api.cyfluencer.com/s/camoleak-h...

1 week ago 3 0 0 0
Ben's Book of The Month: Speak Security With A Business Accent: How to communicate Cybersecurity Concepts Clearly, Ease Friction with Stakeholders, and Influence Decisions RSAC Cybersecurity News: Ben's Book of The Month: Speak Security With A Business Accent: How to communicate Cybersecurity Concepts Clearly, Ease Friction with Stakeholders, and Influence Decisions

My @OneRSAC information security book of the month review: Speak Security With A Business Accent: How to Communicate Cybersecurity Concepts Clearly, Ease Friction with Stakeholders & Influence Decisionโ€™ by Joshua Mason. Sage advice for #infosec pros. #RSAC www.rsaconference.com/library/blog...

1 week ago 0 0 0 0
Advertisement
Mallory goes GA: Introducing our AI-Native Threat Intelligence Platform Today, we're launching Mallory, our AI-Native Threat Intelligence Platform built for exposure investigation. Here's why we built it, what it does, and what's ne

Built by a veteran #cybersecurity team & led by former @Google and @Mandiant execs, Mallory AI is a new #AI intelligence platform & now in GA. Itโ€™s built for exposure investigation & intel workflows. Important for #infosec.
api.cyfluencer.com/s/mallory-go... #MalloryAI #Mallory

1 week ago 1 0 0 0
CyberCanon's Review of The AI Conundrum

CyberCanon's Review of The AI Conundrum

๐—”๐—œ ๐˜„๐—ถ๐˜๐—ต๐—ผ๐˜‚๐˜ ๐˜๐—ต๐—ฒ ๐—›๐˜†๐—ฝ๐—ฒ (๐—ผ๐—ฟ ๐—•๐—น๐—ถ๐—ป๐—ฑ ๐—ฆ๐—ฝ๐—ผ๐˜๐˜€) ๐Ÿฆพโš–๏ธ

For this week's review, Yisehak Lemma examines ๐™๐™๐™š ๐˜ผ๐™„ ๐˜พ๐™ค๐™ฃ๐™ช๐™ฃ๐™™๐™ง๐™ช๐™ข, written by the father-son duo of Caleb and Rex Briggs.

๐Ÿ”Ž Full review: cybercanon.org/the-ai-conun...

#CybersecurityBooks #AISecurity #AIGovernance

2 weeks ago 2 2 1 0
CyberCanon Review of Stepping Through Cybersecurity Risk Management

CyberCanon Review of Stepping Through Cybersecurity Risk Management

๐Ÿ›๏ธ ๐—›๐—ฎ๐—น๐—น ๐—ผ๐—ณ ๐—™๐—ฎ๐—บ๐—ฒ ๐—ฅ๐—ฒ๐—ฐ๐—ผ ๐—œ๐—ป๐—ฐ๐—ผ๐—บ๐—ถ๐—ป๐—ด!

Jack Freund, a man who knows a thing or two about cyber risk (author of the FAIR HoF book), provides a Hall of Fame nomination for ๐™Ž๐™ฉ๐™š๐™ฅ๐™ฅ๐™ž๐™ฃ๐™œ ๐™๐™๐™ง๐™ค๐™ช๐™œ๐™ ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™๐™ž๐™จ๐™  ๐™ˆ๐™–๐™ฃ๐™–๐™œ๐™š๐™ข๐™š๐™ฃ๐™ฉ by Jennifer Bayuk.

๐Ÿ“ Read Jack's thorough assessment: cybercanon.org/stepping-thr...

3 weeks ago 3 3 1 0
Preview
RSAC 2026: What AI Agent Security Looks Like Now - AGAT Software: Compliance, Security & Productivity For UC AI agent security reached a turning point at RSAC 2026. Here is what enterprises learned about the execution layer gap and what security teams must fix now.

The @OneRSAC Conference just wrapped & headline underneath every announcement is the same: Enterprises are deploying AI agents faster than #infosec teams can track them. This @AGATSoftware piece details #AI implementation work that needs to be done. api.cyfluencer.com/s/rsac-2026-... #RSAC

3 weeks ago 1 0 0 0
Preview
Scammers reply to President Trumpโ€™s Cyber Strategy for America โ€” bring it on! Trumpโ€™s Executive Order

Last week, @realDonaldTrump established a task force to eliminate fraud via executive order. However, like information risk, fraud canโ€™t be eliminated. What the Trump order doesnโ€™t deal with is clueless users vulnerable to financial fraudsters & scammers.
brothke.medium.com/scammers-rep...

4 weeks ago 0 0 0 0
CyberCanon's Review of Behavioral AI

CyberCanon's Review of Behavioral AI

โš› Review Day! โš›

Thomas Laugle provides a "niche" recommendation for Dr. Rogayeh Tabrizi's ๐˜ฝ๐™š๐™๐™–๐™ซ๐™ž๐™ค๐™ง๐™–๐™ก ๐˜ผ๐™„: ๐™๐™ฃ๐™ก๐™š๐™–๐™จ๐™ ๐˜ฟ๐™š๐™˜๐™ž๐™จ๐™ž๐™ค๐™ฃ ๐™ˆ๐™–๐™ ๐™ž๐™ฃ๐™œ ๐™ฌ๐™ž๐™ฉ๐™ ๐˜ฟ๐™–๐™ฉ๐™–

โœ๏ธ Read Thomas' thorough analysis: cybercanon.org/behavioral-a...

#CybersecurityBooks #AISecurity #GRC #SecurityAwareness

4 weeks ago 2 2 1 0
Preview
Top 5 insights on modern password security as we head into 2026 Discover the 5 key password security insights from our recent webinar and how security teams should respond in 2026.

That passwords aren't going away, or that they ever will, isnโ€™t a novel idea. But interesting insights from this @specopssoftware piece are that traditional complexity rules create predictable behavior. Such as Password2 following Password 1. api.cyfluencer.com/s/top-5-insi...

4 weeks ago 1 0 0 0
Preview
Delve - Fake Compliance as a Service - Part I How Delve managed to falsely convince hundreds of customers they were compliant and then lied about it when exposed and called out

#Delve claims โ€˜Compliance in daysโ€™. But #DeepDelver #AICPNAY tells very different story, claiming โ€œ@getdelve built a machine designed to make clients complicit w/o their knowledge, to manufacture plausible deniability while producing exactly the oppositeโ€. substack.com/home/post/p-...

1 month ago 0 0 0 0
Preview
Agent Access Management (AAM): Why Governing AI and Non-Human Identities Requires a Data-First Security Model Learn about agent access management and how it governs non-human identities to protect sensitive enterprise data.

#AI agents, service accounts, automation workflows & machine-to-machine processes are rapidly becoming leading characters in the enterprise. That leads to a new #infosec acronym - Agent Access Management (AAM). api.cyfluencer.com/s/agent-acce...

1 month ago 1 0 0 0
Advertisement
Post image

Not so fun fact. Any call, voicemail, text, or email you get about a vacation or cruise is from a scammer. I challenge you to find a single person who has received a voicemail, call, text, or email about a vacation that was not a #scam. brothke.medium.com/how-to-tell-...

1 month ago 0 0 0 0
Preview
Sandbox at Sunset: Innovation Finalist Happy Hour Cruise ยท Luma Join us for a private yacht happy hour during RSAC week โ€” featuring FOUR Innovation Sandbox finalists and senior cybersecurity leaders. Cruise the Sanโ€ฆ

If you are going to be at RSA #infosec Conference @OneRSAC next week, @TheTokenSec is having a private yacht happy hour with #RSAC innovation sandbox finalists Fig Security, Geordie, @ZeroPathAI & senior cybersecurity leaders. api.cyfluencer.com/s/sandbox-at... #RSA

1 month ago 1 0 0 0
CyberCanon's Review of The Cybersecurity Guide to Governance, Risk, and Compliance

CyberCanon's Review of The Cybersecurity Guide to Governance, Risk, and Compliance

๐Ÿ“Review Incoming...

This week, we dive into GRC. Andrew Chrostowski provides a Hall of Fame Rec for ๐™๐™๐™š ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™‚๐™ช๐™ž๐™™๐™š ๐™ฉ๐™ค ๐™‚๐™ค๐™ซ๐™š๐™ง๐™ฃ๐™–๐™ฃ๐™˜๐™š, ๐™๐™ž๐™จ๐™ , ๐™–๐™ฃ๐™™ ๐˜พ๐™ค๐™ข๐™ฅ๐™ก๐™ž๐™–๐™ฃ๐™˜๐™š by Jason Edwards and Griffin Weaver.

Andrew's review ๐Ÿ‘‰ cybercanon.org/the-cybersec...

#CybersecurityBooks #GRC #CyberCanonHoFCandidate

1 month ago 3 3 1 0
Preview
Board-Level Cybersecurity Risk Communication Certification for CISOs | XM Cyber Equip yourself with the ultimate skill for today's CISO: board-level cyber risk communication. This certification course empowers security leaders to translate Exposure Management insights into compel...

Valuable @XMCyber_ free course: โ€˜Board-Level Cybersecurity Risk Communication Certification for CISOsโ€™ led by @Gerald_Auger. Learn about risk communication, executive presence & boardroom influence to drive security investments & informed decision-making. cybersec.xmcyber.com/s/board-leve...

1 month ago 1 1 0 0
T1059.006 Python in MITRE ATT&CK Explained Learn what T1059.006 Python is in MITRE ATT&CK, how attackers abuse Python for cross-platform malware, persistence, and real-world execution techniques.

T1059.006 Python is a sub-technique of Command and Scripting Interpreter (T1059) in the MITRE ATT&CK framework, under the Execution tactic. It refers to adversaries using Python to execute code and automate actions on compromised systems.
cybersec.picussecurity.com/s/t1059-006-...

1 month ago 1 0 0 0
Preview
The LinkedIn recruiter seek-and-hide scam Yet another sneaky LinkedIn recruiter job scam

Anyone using LinkedIn may find more scammers reaching out to them than legitimate recruiters, especially if using the #OpenToWork tag. I write about the LinkedIn seek-and-hide scam. One of them poorly impersonated @Hyundai @Hyundai_Global. medium.com/@brothke/the... #scam #scams #fraud

1 month ago 0 0 0 0
CyberCanon's Review of Battlefield Cyber

CyberCanon's Review of Battlefield Cyber

๐Ÿช– It's Review Day! ๐Ÿช–

Rick Howard reviews ๐˜ฝ๐™–๐™ฉ๐™ฉ๐™ก๐™š๐™›๐™ž๐™š๐™ก๐™™ ๐˜พ๐™ฎ๐™—๐™š๐™ง, by William Holstein and Michael McLaughlin...

๐Ÿ“ tinyurl.com/k624nsb8

#CybersecurityBooks #CyberWarfare

1 month ago 2 2 1 0
Preview
The LinkedIn recruiter seek-and-hide scam Yet another sneaky LinkedIn recruiter job scam

Anyone using #LinkedIn may find more scammers reaching out to them than recruiters, especially if using the #OpenToWork tag. I write of the LinkedIn seek-and-hide scam, which is yet another sneaky LinkedIn recruiter job #scam. Get a job, donโ€™t get scammed.
medium.com/@brothke/the...

1 month ago 0 0 0 0
Preview
The DocuSign Email That Wasn't - A Three-Redirect Credential Harvest Attackers used a redirect chain via Google Maps and Amazon S3 to bypass scanners and harvest credentials from a fake DocuSign email.

As @Docusign is used to digitally sign sensitive & confidential documents, you know itโ€™s a prime target for attackers. @Ironscales details a very crafty & convincing #Docusign attack. It used a redirect-chain attack designed to dodge scanners. #infosec
cybersec.ironscales.com/s/the-docusi...

1 month ago 1 0 0 0
Advertisement
Preview
The Emails Hitting K-12 Right Now Real phishing attacks targeting schools โ€” vendor fraud, payroll theft, fake HR emails. What K-12 IT leaders are actually dealing with in 2026.

Vendor payment fraud remains the most expensive attack type in education. When it comes to K-12, they have very little to spend on #cybersecurity & that makes them prime attack targets. Good @Ironscales piece details the #infosec schools need to consider. cybersec.ironscales.com/s/the-emails...

1 month ago 1 0 0 0
Preview
Ben's Book of the Month: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility

My @OneRSAC book review of: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility. Excellent resource to prepare for the inevitability of #quantum #cryptography, from @WileyTech. #RSAC #infosec www.rsaconference.com/library/blog...

1 month ago 0 0 0 0
What Is Preemptive Security? The Future of Cyber Defense Preemptive security prevents cyberattacks before they happen by validating controls and managing exposure. Learn how it strengthens defenses and reduces risk.

As @knash99 of @WSJ wrote: #Iran cyber retaliation would probably target US utility providers & include #DDoS attacks on high-profile websites. This necessitates preemptive security, which stops/deters #cyberattacks before they succeed. HT @PicusSecurity cybersec.picussecurity.com/s/what-is-pr...

1 month ago 1 0 0 0
How NetSupport RAT Abuses Legitimate Remote Admin Tool Analyze NetSupport RAT malware: fake update vectors like ClickFix, persistence mechanisms, and surveillance. See how Picus simulates it.

How NetSupport RAT abuses a legitimate remote admin tool. #NetSupport RAT is a malicious repurposing of the legitimate remote administration tool, NetSupport Manager, which has been available for over 30 years. cybersec.picussecurity.com/s/how-netsup...

1 month ago 1 0 0 0
Preview
Sensitive Data at Risk: Managing Exposure & Governance During M&A Mergers, acquisitions, and divestitures are high-stakes inflection points for financial institutions โ€“ and for their data. Sensitive information is often duplicated, exposed, or fragmented across lega...

Interesting webinar: Sensitive Data at Risk: Managing Exposure & Governance During M&A. With Constantin Stanca of @Snowflake, @kenowens12 of @Fiserv & Jeff Weber of @bigidsecure. M&A are high-stakes inflection points for financial institutions & data. api.cyfluencer.com/s/sensitive-...

1 month ago 0 0 0 0