Advertisement · 728 × 90
#
Hashtag
#cybsersecurity
Advertisement · 728 × 90
Build trust with professional pentest reports - Pentest-Tools.com

Build trust with professional pentest reports - Pentest-Tools.com

Are your pentest reports DDoS-ing your stakeholders with huge reports they don't have time to read?

It's 2026, AI is everywhere, but reporting is still a grind. Here's how we help:

#offensivesecurity #cybsersecurity #infosec

0 0 1 0
Preview
How to prioritize cyber security in an effective Board meeting If you are a Chief Information Security Officer (CISO), your role in safeguarding the organization against an ever-evolving threat landscape is more critical than ever. As the second half of 2025 is u...

The #CISOs role in protecting a business against threats is critical & a reminder that board meetings present chances to talk #cybsersecurity posture & ensure alignment with business objectives. The talk should be a strategic dialogue that informs & engages the Board www.linkedin.com/pulse/how-pr...

0 0 0 0
Preview
SecPod launches Saner Cloud: A Revolutionary CNAPP For Preventive Cybersecurity Moving Beyond Detection to Real-Time, Automated Security Across Workloads, Cloud, and Infrastructure.

#SecPod announces the General Availability of Saner #Cloud, a #CloudNative Application Protection Platform designed to provide automated remediation and workload security across #multicloud environments.

#cybsersecurity #threatdetection #AI https://opsmtrs.com/4hE2NKh

0 0 0 0
Post image

Complexity is the enemy of Security. Why can this be true when Defense in depth is a big thing? Well, complexity allows for more bugs/vulns. Defense layers do not need to be complex. Each layer should be simple.
Am I wrong?
#infosec #cybsersecurity

1 0 0 0
Post image Post image

Cross Cache Attack exploitation CheetSheet

u1f383.github.io/linux/2025/0...

#Linux #cybsersecurity

3 2 0 0
Post image Post image

Analysis of capabilities and communication channels used by IOCONTROL IoT/OT malware

claroty.com/team82/resea...

Credits @Claroty

#cybsersecurity

5 3 0 0
Preview
Smartphone scareware: cracked screen as a result of virus This new technique mimics a cracked screen that is a result of a fake virus infection as visible in the video below

www.mobile-hacker.com/2024/11/27/s...

#cybsersecurity #mobile

11 3 4 0
Preview
Exclusive | T-Mobile Hacked in Massive Chinese Breach of Telecom Networks The carrier joins a growing list of known victims, including AT&T and Verizon, of the major Chinese spying operation.

Headline: T-Mobile Hacked in Massive Chinese Breach of Telecom Networks

Subtitle: Carrier joins growing list of known victims, including AT&T and Verizon, of the major Chinese spying operation

Source: www.wsj.com/politics/nat...

#TMobile #Hack #Security #CybserSecurity #Privacy

0 0 0 0
Preview
A US Navy chief who wanted WiFi on her warship secretly ran an illegal Starlink network that she named 'STINKY': report Grisel Marrero installed a Starlink network on the USS Manchester and named it "STINKY," sharing it with only the chief's mess while on deployment.

A US Navy chief who wanted WiFi on her warship secretly ran an illegal Starlink network that she named 'STINKY': report https://buff.ly/4dQiJaZ #Cybsersecurity

2 1 0 0
Preview
Cybersecurity in Focus: Finance Get ahead of cyber threats targeting the financial sector with our latest ebook.

Attn: #Banks, investment firms & #insurance companies—The #finserv industry is particularly vulnerable when it comes to #cyberrisk. 😰

Take a deep dive into the #cybsersecurity threats that affect your industry every day. 🔍

Download this new eBook!👇 hubs.ly/Q02pVzhj0 #financialservices

1 1 1 0
whoami_ A quick whoami and Cyber Security and Information Security blog by th4ntis.

Well I revamped my website. Just a simple "About me" but I've added a blog to it! Check it out! It also links to my gitbook of notes. th4ntis.com | cybersec.th4ntis.com

#cybersec #infosec #cybsersecurity #informationsecurity

0 0 0 0
Post image Post image Post image Post image

Very cool series on IoT devices reverse engineering

Part 1: security.humanativaspa.it/a-journey-in...
Part 2: security.humanativaspa.it/a-journey-in...
Part 3: security.humanativaspa.it/a-journey-in...
Part 4: security.humanativaspa.it/a-journey-in...

#embedded #cybsersecurity

3 0 0 0
Post image Post image Post image Post image

DJI RM500 Smart Controller reverse engineer and exploitation

icanhack.nl/blog/dji-rm5...

#cybsersecurity #dji

3 1 0 0
Preview
Museum World Hit by Cyberattack on Widely Used Software Hackers targeted software that many museums use to show their collections online and to manage sensitive information.

The service provider, Gallery Systems noticed a problem on Dec. 28, when computers running its software became encrypted and could no longer operate

#museums #eMuseum #cyberattack #art #ransomware #malware #securty #cybsersecurity #hacking #hackers #hacked

www.nytimes.com/2024/01/03/a...

1 0 0 0
Post image Post image Post image Post image

MikroTik routers reverse engineering and exploitation. Excellent research work.

Blog post: margin.re/2022/06/pull...

Slides (RECon): github.com/MarginResear...

#mikrotik #cybsersecurity

1 1 0 0