Filter
Exclude
Time range
-
Near
The Washington Post reportedly confirmed that it was one of the victims in the wave of Oracle E-Business Suite (EBS) zero-day attacks. #cybersecurity #infosec #ITsecurity #CISO bit.ly/4hOCLW1
valkrider retweeted
New @CheckPointSW research shows attackers exploiting Microsoft Teams flaws to impersonate execs, alter messages, and spoof alerts. Patch fast, verify devices, and train users to detect spoofed messages. #cybersecurity #infosec #CISO #ITsecurity bit.ly/4nLGuoW
3
𝙈𝙞𝙆𝙚 𝙈𝙘𝘿𝙤𝙣𝙤𝙪𝙜𝙝 🍥 retweeted
.@Microsoft reported finding malware abusing OpenAI Assistants API as a C2 channel by hiding commands in assistant fields, dubbed "SesameOp." It avoids infra and blends with legit API traffic. #cybersecurity #AI #infosec #CISO #ITsecurity bit.ly/47DOW3q
1
2
Is your IT closet a jungle? 🌪️ Organize for: ➡️ Reliability ➡️ Easy Troubleshooting ➡️ Strong Security ➡️ Simple Upgrades ➡️ Fire Safety #VertexSecurity #ITSecurity #CableManagement #NYCSecurity #CommercialProperty #SystemIntegrity #Infrastructure
valkrider retweeted
An authentication bypass flaw that makes it possible for attackers to run past standard authentication and access administrative user accounts was exploited in the JobMonster theme for WordPress. #cybersecurity #infosec #CISO #ITsecurity bit.ly/4oTRfGq
1
1
Juanjo Mora retweeted
#AI agents can phish, impersonate, and steal credentials at scale. Defend by securing mobile endpoints, monitoring agentic signals, and automating detection, says @Lookout's Jim Dolce in this commentary. #cybersecurity #CISO #infosec #ITsecurity bit.ly/3Lp7TPY
1
2
📩 Malware attacks often start with phishing emails. Don’t fall for crafted urgency—learn to detect threats before it’s too late. Save our infographic today! #ITsecurity #phishing