Groups
Sign in
Groups
Technical - Security
Conversations
About
Send feedback
Help
Technical - Security
Contact owners and managers
1–30 of 14009
Mark all as read
Report group
0 selected
Eyal Estrin
2:13 PM
2024 Data Breach Investigations Report
https://www.verizon.com/business/resources/reports/dbir/ https://www.verizon.com/business/resources/
unread,
2024 Data Breach Investigations Report
https://www.verizon.com/business/resources/reports/dbir/ https://www.verizon.com/business/resources/
2:13 PM
Eyal Estrin
2:13 PM
The Dangerous Rise of GPS Attacks
https://www.wired.com/story/the-dangerous-rise-of-gps-attacks/ https://rntfnd.org/wp-content/uploads/
unread,
The Dangerous Rise of GPS Attacks
https://www.wired.com/story/the-dangerous-rise-of-gps-attacks/ https://rntfnd.org/wp-content/uploads/
2:13 PM
Eyal Estrin
1:33 PM
Q1 2024 Internet disruption summary
https://blog.cloudflare.com/q1-2024-internet-disruption-summary Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
Q1 2024 Internet disruption summary
https://blog.cloudflare.com/q1-2024-internet-disruption-summary Eyal Estrin CISSP, CCSP, CISM, CISA,
1:33 PM
Eyal Estrin
May 2
Uncharmed: Untangling Iran's APT42 Operations
https://cloud.google.com/blog/topics/threat-intelligence/untangling-iran-apt42-operations Eyal Estrin
unread,
Uncharmed: Untangling Iran's APT42 Operations
https://cloud.google.com/blog/topics/threat-intelligence/untangling-iran-apt42-operations Eyal Estrin
May 2
Eyal Estrin
May 2
What the EU AI act means for cybersecurity teams and organizational leaders
https://betanews.com/2024/05/01/what-the-eu-ai-act-means-for-cybersecurity-teams-and-organizational-
unread,
What the EU AI act means for cybersecurity teams and organizational leaders
https://betanews.com/2024/05/01/what-the-eu-ai-act-means-for-cybersecurity-teams-and-organizational-
May 2
Eyal Estrin
May 2
Threat Spotlight: The remote desktop tools most targeted by attackers in the last year
https://blog.barracuda.com/2024/05/01/threat-spotlight-remote-desktop-tools-most-targeted Eyal Estrin
unread,
Threat Spotlight: The remote desktop tools most targeted by attackers in the last year
https://blog.barracuda.com/2024/05/01/threat-spotlight-remote-desktop-tools-most-targeted Eyal Estrin
May 2
Eyal Estrin
May 2
95% of Organizations Revamped Their Cybersecurity Strategies in the Last Year
https://logrhythm.com/press-releases/95-of-organizations-revamped-their-cybersecurity-strategies-in-
unread,
95% of Organizations Revamped Their Cybersecurity Strategies in the Last Year
https://logrhythm.com/press-releases/95-of-organizations-revamped-their-cybersecurity-strategies-in-
May 2
Eyal Estrin
May 2
State of Security 2024 Report Reveals Growing Impact of Generative AI on Cybersecurity Landscape
https://www.splunk.com/en_us/newsroom/press-releases/2024/state-of-security-2024-report-reveals-
unread,
State of Security 2024 Report Reveals Growing Impact of Generative AI on Cybersecurity Landscape
https://www.splunk.com/en_us/newsroom/press-releases/2024/state-of-security-2024-report-reveals-
May 2
Eyal Estrin
May 2
Unveiling DataGrail’s 2024 Data Privacy Trends Report: The Time Data Subject Requests Surged 246% in Two Years
https://www.datagrail.io/blog/privacy-trends/privacy-trends-2024/ Eyal Estrin CISSP, CCSP, CISM, CISA
unread,
Unveiling DataGrail’s 2024 Data Privacy Trends Report: The Time Data Subject Requests Surged 246% in Two Years
https://www.datagrail.io/blog/privacy-trends/privacy-trends-2024/ Eyal Estrin CISSP, CCSP, CISM, CISA
May 2
Eyal Estrin
May 2
LastPass - SMB Cybersecurity Disconnect
https://www.lastpass.com/-/media/295a25e7080c4cba992d66d4c9746bc9.pdf Eyal Estrin CISSP, CCSP, CISM,
unread,
LastPass - SMB Cybersecurity Disconnect
https://www.lastpass.com/-/media/295a25e7080c4cba992d66d4c9746bc9.pdf Eyal Estrin CISSP, CCSP, CISM,
May 2
Eyal Estrin
May 2
Good Security Is About Iteration, Not Perfection
https://www.cyberdefensemagazine.com/good-security-is-about-iteration-not-perfection/ Eyal Estrin
unread,
Good Security Is About Iteration, Not Perfection
https://www.cyberdefensemagazine.com/good-security-is-about-iteration-not-perfection/ Eyal Estrin
May 2
Eyal Estrin
May 2
Human risk management automation can help beat burnout
https://betanews.com/2024/04/26/human-risk-management-automation-can-help-beat-burnout/ Eyal Estrin
unread,
Human risk management automation can help beat burnout
https://betanews.com/2024/04/26/human-risk-management-automation-can-help-beat-burnout/ Eyal Estrin
May 2
Eyal Estrin
May 2
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks
https://www.trendmicro.com/en_us/research/24/e/router-roulette.html Eyal Estrin CISSP, CCSP, CISM,
unread,
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks
https://www.trendmicro.com/en_us/research/24/e/router-roulette.html Eyal Estrin CISSP, CCSP, CISM,
May 2
Eyal Estrin
May 2
Dropbox dropped the ball on security, haemorrhaging customer and third-party info
https://www.theregister.com/2024/05/02/dropbox_sign_attack/ https://sign.dropbox.com/blog/a-recent-
unread,
Dropbox dropped the ball on security, haemorrhaging customer and third-party info
https://www.theregister.com/2024/05/02/dropbox_sign_attack/ https://sign.dropbox.com/blog/a-recent-
May 2
Eyal Estrin
May 2
Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity
https://www.cisa.gov/sites/default/files/2024-05/defending-ot-operations-against-ongoing-pro-russia-
unread,
Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity
https://www.cisa.gov/sites/default/files/2024-05/defending-ot-operations-against-ongoing-pro-russia-
May 2
Eyal Estrin
May 1
Cyber Security for Consumer Internet of Things: Baseline Requirements
https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf Eyal
unread,
Cyber Security for Consumer Internet of Things: Baseline Requirements
https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf Eyal
May 1
Eyal Estrin
May 1
The dark side of the moon: demystifying cybersecurity business management for CISOs and security practitioners
https://ventureinsecurity.net/p/the-dark-side-of-the-moon-demystifying Eyal Estrin CISSP, CCSP, CISM,
unread,
The dark side of the moon: demystifying cybersecurity business management for CISOs and security practitioners
https://ventureinsecurity.net/p/the-dark-side-of-the-moon-demystifying Eyal Estrin CISSP, CCSP, CISM,
May 1
Eyal Estrin
May 1
Google Chrome's new post-quantum cryptography may break TLS connections
https://www.bleepingcomputer.com/news/security/google-chromes-new-post-quantum-cryptography-may-break
unread,
Google Chrome's new post-quantum cryptography may break TLS connections
https://www.bleepingcomputer.com/news/security/google-chromes-new-post-quantum-cryptography-may-break
May 1
Eyal Estrin
May 1
Iran surges cyber-enabled influence operations in support of Hamas
https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/iran-surges-cyber-
unread,
Iran surges cyber-enabled influence operations in support of Hamas
https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/iran-surges-cyber-
May 1
Eyal Estrin
Apr 29
Microsoft is a national security threat, says ex-White House cyber policy director
https://www.theregister.com/2024/04/21/microsoft_national_security_risk/ Eyal Estrin CISSP, CCSP,
unread,
Microsoft is a national security threat, says ex-White House cyber policy director
https://www.theregister.com/2024/04/21/microsoft_national_security_risk/ Eyal Estrin CISSP, CCSP,
Apr 29
Eyal Estrin
Apr 28
Okta warns of "unprecedented" credential stuffing attacks on customers
https://www.bleepingcomputer.com/news/security/okta-warns-of-unprecedented-credential-stuffing-
unread,
Okta warns of "unprecedented" credential stuffing attacks on customers
https://www.bleepingcomputer.com/news/security/okta-warns-of-unprecedented-credential-stuffing-
Apr 28
Eyal Estrin
Apr 27
Stop Using Your Face or Thumb to Unlock Your Phone
https://gizmodo.com/stop-using-your-face-or-thumb-to-unlock-your-phone-1851438205 Eyal Estrin CISSP,
unread,
Stop Using Your Face or Thumb to Unlock Your Phone
https://gizmodo.com/stop-using-your-face-or-thumb-to-unlock-your-phone-1851438205 Eyal Estrin CISSP,
Apr 27
Eyal Estrin
Apr 27
Fifth of CISOs Admit Staff Leaked Data Via GenAI
https://www.infosecurity-magazine.com/news/fifth-cisos-staff-leaked-data-genai/ Eyal Estrin CISSP,
unread,
Fifth of CISOs Admit Staff Leaked Data Via GenAI
https://www.infosecurity-magazine.com/news/fifth-cisos-staff-leaked-data-genai/ Eyal Estrin CISSP,
Apr 27
Eyal Estrin
Apr 25
Cyber resilience needs leaders who can manage risk – CIO report and checklist
https://blog.barracuda.com/2024/04/24/cyber-resilience-manage-risk-checklist Eyal Estrin CISSP, CCSP,
unread,
Cyber resilience needs leaders who can manage risk – CIO report and checklist
https://blog.barracuda.com/2024/04/24/cyber-resilience-manage-risk-checklist Eyal Estrin CISSP, CCSP,
Apr 25
Eyal Estrin
Apr 25
MEF’s 9th Annual Global Trust Study
https://mobileecosystemforum.com/mefs-9th-annual-trust-study/ Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
MEF’s 9th Annual Global Trust Study
https://mobileecosystemforum.com/mefs-9th-annual-trust-study/ Eyal Estrin CISSP, CCSP, CISM, CISA,
Apr 25
Eyal Estrin
Apr 25
Microsoft must stop selling security as a premium offering
https://www.directionsonmicrosoft.com/members/blog/2024-04-23/microsoft-must-stop-selling-security-
unread,
Microsoft must stop selling security as a premium offering
https://www.directionsonmicrosoft.com/members/blog/2024-04-23/microsoft-must-stop-selling-security-
Apr 25
Eyal Estrin
Apr 25
Geopolitical Unrest Generates an Onslaught of DDoS Attacks, According to the Latest NETSCOUT Threat Intelligence Report
https://ir.netscout.com/investors/press-releases/press-release-details/2024/Geopolitical-Unrest-
unread,
Geopolitical Unrest Generates an Onslaught of DDoS Attacks, According to the Latest NETSCOUT Threat Intelligence Report
https://ir.netscout.com/investors/press-releases/press-release-details/2024/Geopolitical-Unrest-
Apr 25
Eyal Estrin
Apr 25
Microsoft’s mea culpa moment: how it should face up to the CSRB’s critical report
https://www.csoonline.com/article/2094186/microsofts-mea-culpa-moment-how-it-should-face-up-to-the-
unread,
Microsoft’s mea culpa moment: how it should face up to the CSRB’s critical report
https://www.csoonline.com/article/2094186/microsofts-mea-culpa-moment-how-it-should-face-up-to-the-
Apr 25
Eyal Estrin
Apr 24
UK data watchdog questions how private Google's Privacy Sandbox is
https://www.theregister.com/2024/04/22/ico_google_privacy_sandbox/ https://www.wsj.com/tech/google-
unread,
UK data watchdog questions how private Google's Privacy Sandbox is
https://www.theregister.com/2024/04/22/ico_google_privacy_sandbox/ https://www.wsj.com/tech/google-
Apr 24
Eyal Estrin
Apr 24
New Microsoft Incident Response guide helps simplify cyberthreat investigations
https://www.microsoft.com/en-us/security/blog/2024/04/23/new-microsoft-incident-response-guide-helps-
unread,
New Microsoft Incident Response guide helps simplify cyberthreat investigations
https://www.microsoft.com/en-us/security/blog/2024/04/23/new-microsoft-incident-response-guide-helps-
Apr 24