Groups
Groups
Sign in
Groups
Groups
Technical - Security
Conversations
About
Send feedback
Help
Technical - Security
1–30 of 14997
Mark all as read
Report group
0 selected
Eyal Estrin
11:48 AM
DOD to cut back on mandatory cybersecurity training
https://defensescoop.com/2025/10/03/dod-cybersecurity-training-us-miitary-hegseth-memo/ Eyal Estrin
unread,
DOD to cut back on mandatory cybersecurity training
https://defensescoop.com/2025/10/03/dod-cybersecurity-training-us-miitary-hegseth-memo/ Eyal Estrin
11:48 AM
Eyal Estrin
11:48 AM
Subpoena tracking platform blames outage on AWS social engineering attack
https://www.theregister.com/2025/10/02/subpoena_tracking_platform_outage_blamed/ Eyal Estrin CISSP,
unread,
Subpoena tracking platform blames outage on AWS social engineering attack
https://www.theregister.com/2025/10/02/subpoena_tracking_platform_outage_blamed/ Eyal Estrin CISSP,
11:48 AM
Eyal Estrin
11:48 AM
LinkedIn sues ProAPIs for using 1M fake accounts to scrape user data
https://www.bleepingcomputer.com/news/legal/linkedin-sues-proapis-for-using-1m-fake-accounts-to-
unread,
LinkedIn sues ProAPIs for using 1M fake accounts to scrape user data
https://www.bleepingcomputer.com/news/legal/linkedin-sues-proapis-for-using-1m-fake-accounts-to-
11:48 AM
Eyal Estrin
2:10 AM
Discord customer service data breach leaks user info and scanned photo IDs
https://www.theverge.com/news/792032/discord-customer-service-data-breach-hack https://www.pcgamer.
unread,
Discord customer service data breach leaks user info and scanned photo IDs
https://www.theverge.com/news/792032/discord-customer-service-data-breach-hack https://www.pcgamer.
2:10 AM
Eyal Estrin
Oct 4
Microsoft's Voice Clone Becomes Scary & Unsalvageable
https://www.darkreading.com/application-security/microsoft-voice-clone-scary-unsalvageable Eyal
unread,
Microsoft's Voice Clone Becomes Scary & Unsalvageable
https://www.darkreading.com/application-security/microsoft-voice-clone-scary-unsalvageable Eyal
Oct 4
Eyal Estrin
Oct 4
Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks
https://www.securityweek.com/oracle-says-known-vulnerabilities-possibly-exploited-in-recent-extortion
unread,
Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks
https://www.securityweek.com/oracle-says-known-vulnerabilities-possibly-exploited-in-recent-extortion
Oct 4
Eyal Estrin
Oct 4
Palo Alto Scanning Surges ~500% in 48 Hours, Marking 90-Day High
https://www.greynoise.io/blog/palo-alto-scanning-surges Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE,
unread,
Palo Alto Scanning Surges ~500% in 48 Hours, Marking 90-Day High
https://www.greynoise.io/blog/palo-alto-scanning-surges Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE,
Oct 4
Eyal Estrin
Oct 4
Signal adds new cryptographic defense against quantum attacks
https://www.bleepingcomputer.com/news/security/signal-adds-new-cryptographic-defense-against-quantum-
unread,
Signal adds new cryptographic defense against quantum attacks
https://www.bleepingcomputer.com/news/security/signal-adds-new-cryptographic-defense-against-quantum-
Oct 4
Eyal Estrin
Oct 4
OnePlus Users Face Security Risks from OxygenOS Vulnerability
https://www.cysecurity.news/2025/10/oneplus-users-face-security-risks-from.html Eyal Estrin CISSP,
unread,
OnePlus Users Face Security Risks from OxygenOS Vulnerability
https://www.cysecurity.news/2025/10/oneplus-users-face-security-risks-from.html Eyal Estrin CISSP,
Oct 4
Eyal Estrin
Oct 2
Cloud CISO Perspectives: Boards should be ‘bilingual’ in AI, security to gain advantage
https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-boards-should-be-
unread,
Cloud CISO Perspectives: Boards should be ‘bilingual’ in AI, security to gain advantage
https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-boards-should-be-
Oct 2
Eyal Estrin
Oct 2
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-hardening-recommendations
unread,
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-hardening-recommendations
Oct 2
Eyal Estrin
Oct 2
New NowSecure Research Targets Mobile App Privacy Risks: What You Don’t See Is Hurting You
https://www.nowsecure.com/blog/2025/09/29/new-nowsecure-research-targets-mobile-app-privacy-risks-
unread,
New NowSecure Research Targets Mobile App Privacy Risks: What You Don’t See Is Hurting You
https://www.nowsecure.com/blog/2025/09/29/new-nowsecure-research-targets-mobile-app-privacy-risks-
Oct 2
Eyal Estrin
Oct 2
6 Key Takeaways from the AI in SOC Survey Report
https://www.prophetsecurity.ai/blog/6-key-takeaways-from-the-ai-in-soc-survey-report Eyal Estrin
unread,
6 Key Takeaways from the AI in SOC Survey Report
https://www.prophetsecurity.ai/blog/6-key-takeaways-from-the-ai-in-soc-survey-report Eyal Estrin
Oct 2
Eyal Estrin
Oct 2
Global State of Authentication Survey 2025
https://resources.yubico.com/53ZDUYE6/at/p88p3wptgxjm77bbqkjrjbvf/
unread,
Global State of Authentication Survey 2025
https://resources.yubico.com/53ZDUYE6/at/p88p3wptgxjm77bbqkjrjbvf/
Oct 2
Eyal Estrin
Oct 2
Air Force admits SharePoint privacy issue as reports trickle out of possible breach
https://www.theregister.com/2025/10/01/us_air_force_investigates_breach/ Eyal Estrin CISSP, CCSP,
unread,
Air Force admits SharePoint privacy issue as reports trickle out of possible breach
https://www.theregister.com/2025/10/01/us_air_force_investigates_breach/ Eyal Estrin CISSP, CCSP,
Oct 2
Eyal Estrin
Oct 2
HackerOne Report Finds 210% Spike in AI Vulnerability Reports Amid Rise of AI Autonomy
https://www.hackerone.com/press-release/hackerone-report-finds-210-spike-ai-vulnerability-reports-
unread,
HackerOne Report Finds 210% Spike in AI Vulnerability Reports Amid Rise of AI Autonomy
https://www.hackerone.com/press-release/hackerone-report-finds-210-spike-ai-vulnerability-reports-
Oct 2
Eyal Estrin
Oct 2
Tile’s lack of encryption could make tracker owners vulnerable to stalking
https://www.theverge.com/news/787836/tile-trackers-stalking-research-unencrypted Eyal Estrin CISSP,
unread,
Tile’s lack of encryption could make tracker owners vulnerable to stalking
https://www.theverge.com/news/787836/tile-trackers-stalking-research-unencrypted Eyal Estrin CISSP,
Oct 2
Eyal Estrin
Oct 2
UK once again demands backdoor to Apple’s encrypted cloud storage
https://arstechnica.com/tech-policy/2025/10/uk-once-again-demands-backdoor-to-apples-encrypted-cloud-
unread,
UK once again demands backdoor to Apple’s encrypted cloud storage
https://arstechnica.com/tech-policy/2025/10/uk-once-again-demands-backdoor-to-apples-encrypted-cloud-
Oct 2
Eyal Estrin
Oct 2
ISACA - State of Cybersecurity 2025
https://www.isaca.org/-/media/files/isacadp/project/isaca/resources/infographics/isaca-state-of-
unread,
ISACA - State of Cybersecurity 2025
https://www.isaca.org/-/media/files/isacadp/project/isaca/resources/infographics/isaca-state-of-
Oct 2
Eyal Estrin
Sep 30
Creating and Maintaining a Definitive View of Your Operational Technology (OT) Architecture
https://www.ncsc.gov.uk/collection/operational-technology/definitive-architecture-view Eyal Estrin
unread,
Creating and Maintaining a Definitive View of Your Operational Technology (OT) Architecture
https://www.ncsc.gov.uk/collection/operational-technology/definitive-architecture-view Eyal Estrin
Sep 30
Eyal Estrin
Sep 27
Cybersecurity Training Programs Don’t Prevent Employees from Falling for Phishing Scams
https://today.ucsd.edu/story/cybersecurity-training-programs-dont-prevent-employees-from-falling-for-
unread,
Cybersecurity Training Programs Don’t Prevent Employees from Falling for Phishing Scams
https://today.ucsd.edu/story/cybersecurity-training-programs-dont-prevent-employees-from-falling-for-
Sep 27
Eyal Estrin
Sep 26
Proofpoint - The Human Factor 2025 vol. 2 - Phishing and URL-Based Threats
https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-2025-human-factor-phishing.
unread,
Proofpoint - The Human Factor 2025 vol. 2 - Phishing and URL-Based Threats
https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-2025-human-factor-phishing.
Sep 26
Eyal Estrin
Sep 25
2025 SPYCLOUD IDENTITY THREAT REPORT
https://spycloud.com/resource/report/identity-threat-report-2025/ Eyal Estrin CISSP, CCSP, CISM, CISA
unread,
2025 SPYCLOUD IDENTITY THREAT REPORT
https://spycloud.com/resource/report/identity-threat-report-2025/ Eyal Estrin CISSP, CCSP, CISM, CISA
Sep 25
Eyal Estrin
Sep 25
Retail at risk: How one alert uncovered a persistent cyberthreat
https://www.microsoft.com/en-us/security/blog/2025/09/24/retail-at-risk-how-one-alert-uncovered-a-
unread,
Retail at risk: How one alert uncovered a persistent cyberthreat
https://www.microsoft.com/en-us/security/blog/2025/09/24/retail-at-risk-how-one-alert-uncovered-a-
Sep 25
Eyal Estrin
Sep 25
Ontinue - 1H 2025 Threat Intelligence Report
https://www.ontinue.com/wp-content/uploads/2025/09/2025_1H-Threat-Intelligence-Report.pdf Eyal Estrin
unread,
Ontinue - 1H 2025 Threat Intelligence Report
https://www.ontinue.com/wp-content/uploads/2025/09/2025_1H-Threat-Intelligence-Report.pdf Eyal Estrin
Sep 25
Eyal Estrin
Sep 25
NIST SP 800-90C - Recommendation for Random Bit Generator (RBG) Constructions
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90C.pdf Eyal Estrin CISSP, CCSP,
unread,
NIST SP 800-90C - Recommendation for Random Bit Generator (RBG) Constructions
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-90C.pdf Eyal Estrin CISSP, CCSP,
Sep 25
Eyal Estrin
Sep 25
XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventory
https://www.microsoft.com/en-us/security/blog/2025/09/25/xcsset-evolves-again-analyzing-the-latest-
unread,
XCSSET evolves again: Analyzing the latest updates to XCSSET’s inventory
https://www.microsoft.com/en-us/security/blog/2025/09/25/xcsset-evolves-again-analyzing-the-latest-
Sep 25
Eyal Estrin
Sep 25
CISA Directs Federal Agencies to Identify and Mitigate Potential Compromise of Cisco Devices
https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco
unread,
CISA Directs Federal Agencies to Identify and Mitigate Potential Compromise of Cisco Devices
https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco
Sep 25
Eyal Estrin
Sep 24
ShadowV2: An emerging DDoS for hire botnet
https://www.darktrace.com/blog/shadowv2-an-emerging-ddos-for-hire-botnet Eyal Estrin CISSP, CCSP,
unread,
ShadowV2: An emerging DDoS for hire botnet
https://www.darktrace.com/blog/shadowv2-an-emerging-ddos-for-hire-botnet Eyal Estrin CISSP, CCSP,
Sep 24
Eyal Estrin
Sep 24
CISA Shares Lessons Learned from an Incident Response Engagement (AA25-266A)
https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-266a Eyal Estrin CISSP, CCSP, CISM,
unread,
CISA Shares Lessons Learned from an Incident Response Engagement (AA25-266A)
https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-266a Eyal Estrin CISSP, CCSP, CISM,
Sep 24