Groups
Groups
Sign in
Groups
Groups
Technical - Security
Conversations
About
Send feedback
Help
Technical - Security
1–30 of 15221
Mark all as read
Report group
0 selected
Eyal Estrin
Dec 15
AI is accelerating cyberattacks. Is your network prepared?
https://www.bleepingcomputer.com/news/security/ai-is-accelerating-cyberattacks-is-your-network-
unread,
AI is accelerating cyberattacks. Is your network prepared?
https://www.bleepingcomputer.com/news/security/ai-is-accelerating-cyberattacks-is-your-network-
Dec 15
Eyal Estrin
Dec 14
5 Critical Situations Where You Should Never Rely on ChatGPT
https://www.cysecurity.news/2025/12/5-critical-situations-where-you-should.html Eyal Estrin CISSP,
unread,
5 Critical Situations Where You Should Never Rely on ChatGPT
https://www.cysecurity.news/2025/12/5-critical-situations-where-you-should.html Eyal Estrin CISSP,
Dec 14
Eyal Estrin
Dec 14
Securing Battery Energy Storage Systems from Cyberthreats: Best Practices and Trends for Protecting Critical Energy Infrastructure
https://www.brattle.com/wp-content/uploads/2025/12/Securing-Battery-Energy-Storage-Systems-from-
unread,
Securing Battery Energy Storage Systems from Cyberthreats: Best Practices and Trends for Protecting Critical Energy Infrastructure
https://www.brattle.com/wp-content/uploads/2025/12/Securing-Battery-Energy-Storage-Systems-from-
Dec 14
Eyal Estrin
Dec 13
How private is your VPN?
https://www.malwarebytes.com/blog/inside-malwarebytes/2025/12/how-private-is-your-vpn Eyal Estrin
unread,
How private is your VPN?
https://www.malwarebytes.com/blog/inside-malwarebytes/2025/12/how-private-is-your-vpn Eyal Estrin
Dec 13
Eyal Estrin
Dec 13
How identity fraud is changing in the age of AI
https://www.weforum.org/stories/2025/12/how-identity-fraud-is-increasing-in-the-age-of-ai/ Eyal
unread,
How identity fraud is changing in the age of AI
https://www.weforum.org/stories/2025/12/how-identity-fraud-is-increasing-in-the-age-of-ai/ Eyal
Dec 13
Eyal Estrin
Dec 13
Cloud CISO Perspectives: Our 2026 Cybersecurity Forecast report
https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-2026-
unread,
Cloud CISO Perspectives: Our 2026 Cybersecurity Forecast report
https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-2026-
Dec 13
Eyal Estrin
Dec 12
Changing the physics of cyber defense
https://www.microsoft.com/en-us/security/blog/2025/12/09/changing-the-physics-of-cyber-defense/ Eyal
unread,
Changing the physics of cyber defense
https://www.microsoft.com/en-us/security/blog/2025/12/09/changing-the-physics-of-cyber-defense/ Eyal
Dec 12
Eyal Estrin
Dec 12
Imposter for hire: How fake people can gain very real access
https://www.microsoft.com/en-us/security/blog/2025/12/11/imposter-for-hire-how-fake-people-can-gain-
unread,
Imposter for hire: How fake people can gain very real access
https://www.microsoft.com/en-us/security/blog/2025/12/11/imposter-for-hire-how-fake-people-can-gain-
Dec 12
Eyal Estrin
Dec 12
Evolving our approach to coordinated security research: In scope by default
https://www.microsoft.com/en-us/msrc/blog/2025/12/in-scope-by-default Eyal Estrin CISSP, CCSP, CISM,
unread,
Evolving our approach to coordinated security research: In scope by default
https://www.microsoft.com/en-us/msrc/blog/2025/12/in-scope-by-default Eyal Estrin CISSP, CCSP, CISM,
Dec 12
Eyal Estrin
Dec 12
Agentic AI Will Change The Way We Use Cybersecurity Tools
https://cloudsecurityguy.substack.com/p/agentic-ai-will-change-the-way-we Eyal Estrin CISSP, CCSP,
unread,
Agentic AI Will Change The Way We Use Cybersecurity Tools
https://cloudsecurityguy.substack.com/p/agentic-ai-will-change-the-way-we Eyal Estrin CISSP, CCSP,
Dec 12
Eyal Estrin
Dec 12
NSA - Guidance for Managing UEFI Secure Boot
https://media.defense.gov/2025/Dec/11/2003841096/-1/-1/0/CSI_UEFI_SECURE_BOOT.PDF Eyal Estrin CISSP,
unread,
NSA - Guidance for Managing UEFI Secure Boot
https://media.defense.gov/2025/Dec/11/2003841096/-1/-1/0/CSI_UEFI_SECURE_BOOT.PDF Eyal Estrin CISSP,
Dec 12
Eyal Estrin
Dec 12
Risky Bulletin: EU has a problem attracting and retaining cyber talent
https://news.risky.biz/risky-bulletin-eu-has-a-problem-attracting-and-retaining-cyber-talent/ Eyal
unread,
Risky Bulletin: EU has a problem attracting and retaining cyber talent
https://news.risky.biz/risky-bulletin-eu-has-a-problem-attracting-and-retaining-cyber-talent/ Eyal
Dec 12
Eyal Estrin
Dec 12
Key cybersecurity takeaways from the 2026 NDAA
https://www.csoonline.com/article/4103754/key-cybersecurity-takeaways-from-the-2026-ndaa.html Eyal
unread,
Key cybersecurity takeaways from the 2026 NDAA
https://www.csoonline.com/article/4103754/key-cybersecurity-takeaways-from-the-2026-ndaa.html Eyal
Dec 12
Eyal Estrin
Dec 12
When Your AI Provider Goes Bankrupt: 6 CISO Insights to Stay Ahead of AI Vendor Failure
https://www.netspi.com/blog/executive-blog/ai-ml-pentesting/when-your-ai-provider-goes-bankrupt-6-
unread,
When Your AI Provider Goes Bankrupt: 6 CISO Insights to Stay Ahead of AI Vendor Failure
https://www.netspi.com/blog/executive-blog/ai-ml-pentesting/when-your-ai-provider-goes-bankrupt-6-
Dec 12
Eyal Estrin
Dec 12
Cybersecurity Performance Goals 2.0 (CPG 2.0)
https://www.cisa.gov/cybersecurity-performance-goals-2-0-cpg-2-0 Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
Cybersecurity Performance Goals 2.0 (CPG 2.0)
https://www.cisa.gov/cybersecurity-performance-goals-2-0-cpg-2-0 Eyal Estrin CISSP, CCSP, CISM, CISA,
Dec 12
Eyal Estrin
Dec 11
Cybersecurity Trends in 2026: New Benchmark Insights From 250+ Companies
https://secureframe.com/blog/2026-cybersecurity-and-compliance-benchmark-report Eyal Estrin CISSP,
unread,
Cybersecurity Trends in 2026: New Benchmark Insights From 250+ Companies
https://secureframe.com/blog/2026-cybersecurity-and-compliance-benchmark-report Eyal Estrin CISSP,
Dec 11
Eyal Estrin
Dec 11
AI security cameras are collecting data they don't need
https://betanews.com/2025/12/09/ai-security-cameras-are-collecting-data-they-dont-need/ Eyal Estrin
unread,
AI security cameras are collecting data they don't need
https://betanews.com/2025/12/09/ai-security-cameras-are-collecting-data-they-dont-need/ Eyal Estrin
Dec 11
Eyal Estrin
Dec 11
HTTPS certificate industry phasing out less secure domain validation methods
https://security.googleblog.com/2025/12/https-certificate-industry-phasing-out.html Eyal Estrin CISSP
unread,
HTTPS certificate industry phasing out less secure domain validation methods
https://security.googleblog.com/2025/12/https-certificate-industry-phasing-out.html Eyal Estrin CISSP
Dec 11
Eyal Estrin
Dec 11
Aeroflot hack explained: report says infrastructure was nearly destroyed
https://cybernews.com/security/russia-aeroflot-airline-ukraine-hack/ Eyal Estrin CISSP, CCSP, CISM,
unread,
Aeroflot hack explained: report says infrastructure was nearly destroyed
https://cybernews.com/security/russia-aeroflot-airline-ukraine-hack/ Eyal Estrin CISSP, CCSP, CISM,
Dec 11
Eyal Estrin
Dec 11
Teams Social Engineering Attack: Threat Actors Impersonate IT to Steal Credentials via Quick Assist
https://www.cyberproof.com/blog/teams-social-engineering-attack-threat-actors-impersonate-it-to-steal
unread,
Teams Social Engineering Attack: Threat Actors Impersonate IT to Steal Credentials via Quick Assist
https://www.cyberproof.com/blog/teams-social-engineering-attack-threat-actors-impersonate-it-to-steal
Dec 11
Eyal Estrin
Dec 11
How Google Does It: Securing production services, servers, and workloads
https://cloud.google.com/transform/how-google-does-it-securing-production-services-servers-workloads
unread,
How Google Does It: Securing production services, servers, and workloads
https://cloud.google.com/transform/how-google-does-it-securing-production-services-servers-workloads
Dec 11
Eyal Estrin
Dec 10
Vulnerabilities identified in PCIe Integrity and Data Encryption (IDE) protocol specification
https://kb.cert.org/vuls/id/404544 https://pcisig.com/PCIeIDEStandardVulnerabilities https://www.
unread,
Vulnerabilities identified in PCIe Integrity and Data Encryption (IDE) protocol specification
https://kb.cert.org/vuls/id/404544 https://pcisig.com/PCIeIDEStandardVulnerabilities https://www.
Dec 10
Eyal Estrin
Dec 10
Stop Breaking TLS
https://www.markround.com/blog/2025/12/09/stop-breaking-tls/ Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
Stop Breaking TLS
https://www.markround.com/blog/2025/12/09/stop-breaking-tls/ Eyal Estrin CISSP, CCSP, CISM, CISA,
Dec 10
Eyal Estrin
Dec 10
Ignoring AI in the threat chain could be a costly mistake, experts warn
https://www.csoonline.com/article/4101936/ignoring-ai-in-the-threat-chain-could-be-a-costly-mistake-
unread,
Ignoring AI in the threat chain could be a costly mistake, experts warn
https://www.csoonline.com/article/4101936/ignoring-ai-in-the-threat-chain-could-be-a-costly-mistake-
Dec 10
Eyal Estrin
Dec 10
Threats to the Homeland: Cyber Operations Targeting US Government and Critical Infrastructure
https://2034462.fs1.hubspotusercontent-na1.net/hubfs/2034462/Cyber%20Operations%20Targeting%20US%
unread,
Threats to the Homeland: Cyber Operations Targeting US Government and Critical Infrastructure
https://2034462.fs1.hubspotusercontent-na1.net/hubfs/2034462/Cyber%20Operations%20Targeting%20US%
Dec 10
Eyal Estrin
Dec 10
How to answer the door when the AI agents come knocking
https://www.theregister.com/2025/12/09/okta_agent_control/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE
unread,
How to answer the door when the AI agents come knocking
https://www.theregister.com/2025/12/09/okta_agent_control/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE
Dec 10
Eyal Estrin
Dec 10
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure (AA25-343A)
https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a Eyal Estrin CISSP, CCSP, CISM,
unread,
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure (AA25-343A)
https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a Eyal Estrin CISSP, CCSP, CISM,
Dec 10
Eyal Estrin
Dec 9
Zero Trust for OT in Manufacturing: A Practical Path to Modern Industrial Security
https://cloudsecurityalliance.org/blog/2025/12/08/zero-trust-for-ot-in-manufacturing-a-practical-path
unread,
Zero Trust for OT in Manufacturing: A Practical Path to Modern Industrial Security
https://cloudsecurityalliance.org/blog/2025/12/08/zero-trust-for-ot-in-manufacturing-a-practical-path
Dec 9
Eyal Estrin
Dec 9
When it comes to security resilience, cheaper isn’t always better
https://www.csoonline.com/article/4101863/when-it-comes-to-security-resilience-cheaper-isnt-always-
unread,
When it comes to security resilience, cheaper isn’t always better
https://www.csoonline.com/article/4101863/when-it-comes-to-security-resilience-cheaper-isnt-always-
Dec 9
Eyal Estrin
Dec 9
Oracle EBS zero-day used by Clop to breach Barts Health NHS
https://securityaffairs.com/185447/data-breach/oracle-ebs-zero-day-used-by-clop-to-breach-barts-
unread,
Oracle EBS zero-day used by Clop to breach Barts Health NHS
https://securityaffairs.com/185447/data-breach/oracle-ebs-zero-day-used-by-clop-to-breach-barts-
Dec 9