Groups
Groups
Sign in
Groups
Groups
Technical - Security
Conversations
About
Send feedback
Help
Technical - Security
1–30 of 15092
Mark all as read
Report group
0 selected
Eyal Estrin
Nov 9
ID verification laws are fueling the next wave of breaches
https://www.bleepingcomputer.com/news/security/id-verification-laws-are-fueling-the-next-wave-of-
unread,
ID verification laws are fueling the next wave of breaches
https://www.bleepingcomputer.com/news/security/id-verification-laws-are-fueling-the-next-wave-of-
Nov 9
Eyal Estrin
Nov 9
The AI Security Absorption Has Begun
https://www.returnonsecurity.com/p/ai-security-absorption-2023-2025 Eyal Estrin CISSP, CCSP, CISM,
unread,
The AI Security Absorption Has Begun
https://www.returnonsecurity.com/p/ai-security-absorption-2023-2025 Eyal Estrin CISSP, CCSP, CISM,
Nov 9
Eyal Estrin
Nov 8
Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline
https://www.tomshardware.com/tech-industry/big-tech/manufacturer-issues-remote-kill-command-to-nuke-
unread,
Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline
https://www.tomshardware.com/tech-industry/big-tech/manufacturer-issues-remote-kill-command-to-nuke-
Nov 8
Eyal Estrin
Nov 8
Defending digital identity from computer-using agents (CUAs)
https://www.csoonline.com/article/4086141/defending-digital-identity-from-computer-using-agents-cuas.
unread,
Defending digital identity from computer-using agents (CUAs)
https://www.csoonline.com/article/4086141/defending-digital-identity-from-computer-using-agents-cuas.
Nov 8
Eyal Estrin
Nov 7
Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts
https://blog.google/technology/safety-security/fraud-and-scams-advisory-november-2025/ Eyal Estrin
unread,
Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts
https://blog.google/technology/safety-security/fraud-and-scams-advisory-november-2025/ Eyal Estrin
Nov 7
Eyal Estrin
Nov 7
Old privacy laws create new risks for businesses
https://www.helpnetsecurity.com/2025/11/07/businesses-web-privacy-lawsuits/ Eyal Estrin CISSP, CCSP,
unread,
Old privacy laws create new risks for businesses
https://www.helpnetsecurity.com/2025/11/07/businesses-web-privacy-lawsuits/ Eyal Estrin CISSP, CCSP,
Nov 7
Eyal Estrin
Nov 7
What keeps phishing training from fading over time
https://www.helpnetsecurity.com/2025/11/07/research-phishing-training-effectiveness/ https://arxiv.
unread,
What keeps phishing training from fading over time
https://www.helpnetsecurity.com/2025/11/07/research-phishing-training-effectiveness/ https://arxiv.
Nov 7
Eyal Estrin
Nov 7
Enterprise Credentials at Risk – Same Old, Same Old?
https://thehackernews.com/2025/11/enterprise-credentials-at-risk-same-old.html Eyal Estrin CISSP,
unread,
Enterprise Credentials at Risk – Same Old, Same Old?
https://thehackernews.com/2025/11/enterprise-credentials-at-risk-same-old.html Eyal Estrin CISSP,
Nov 7
Eyal Estrin
Nov 6
Survey: Holiday scammers are getting bolder with AI, and Americans are taking the bait
https://1password.com/blog/holiday-phishing-scams Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK
unread,
Survey: Holiday scammers are getting bolder with AI, and Americans are taking the bait
https://1password.com/blog/holiday-phishing-scams Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK
Nov 6
Eyal Estrin
Nov 6
An X-ray of Modern Networks: Understanding and Mitigating IoT Security Risks
https://www.forescout.com/blog/an-x-ray-of-modern-networks-understanding-and-mitigating-iot-security-
unread,
An X-ray of Modern Networks: Understanding and Mitigating IoT Security Risks
https://www.forescout.com/blog/an-x-ray-of-modern-networks-understanding-and-mitigating-iot-security-
Nov 6
Eyal Estrin
Nov 6
Risk 'Comparable' to SolarWinds Incident Lurks in Popular Software Update Tool
https://www.darkreading.com/application-security/risk-solarwinds-popular-software-tool-update Eyal
unread,
Risk 'Comparable' to SolarWinds Incident Lurks in Popular Software Update Tool
https://www.darkreading.com/application-security/risk-solarwinds-popular-software-tool-update Eyal
Nov 6
Eyal Estrin
Nov 6
1Password - 2025 annual report - The Access-Trust Gap
https://1password.com/reports/annual-report-2025 https://downloads.ctfassets.net/2h488pz7kgfv/
unread,
1Password - 2025 annual report - The Access-Trust Gap
https://1password.com/reports/annual-report-2025 https://downloads.ctfassets.net/2h488pz7kgfv/
Nov 6
Eyal Estrin
Nov 6
Turning Regulation into a Resilience Advantage: 6 Top Pentesting Tips for CISOs
https://www.netspi.com/blog/executive-blog/compliance/turning-regulation-into-a-resilience-advantage-
unread,
Turning Regulation into a Resilience Advantage: 6 Top Pentesting Tips for CISOs
https://www.netspi.com/blog/executive-blog/compliance/turning-regulation-into-a-resilience-advantage-
Nov 6
Eyal Estrin
Nov 6
The 2026 State of Product Security for the AI Era
https://cycode.com/state-of-product-security-ai-era-2026/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE,
unread,
The 2026 State of Product Security for the AI Era
https://cycode.com/state-of-product-security-ai-era-2026/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE,
Nov 6
Eyal Estrin
Nov 6
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools https://
unread,
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools https://
Nov 6
Eyal Estrin
Nov 6
Abnormal AI Reveals the Growing Risk of Human Error in Enterprise Email
https://abnormal.ai/about/news/misdirected-email-prevention-survey Eyal Estrin CISSP, CCSP, CISM,
unread,
Abnormal AI Reveals the Growing Risk of Human Error in Enterprise Email
https://abnormal.ai/about/news/misdirected-email-prevention-survey Eyal Estrin CISSP, CCSP, CISM,
Nov 6
Eyal Estrin
Nov 5
SesameOp: Novel backdoor uses OpenAI Assistants API for command and control
https://www.microsoft.com/en-us/security/blog/2025/11/03/sesameop-novel-backdoor-uses-openai-
unread,
SesameOp: Novel backdoor uses OpenAI Assistants API for command and control
https://www.microsoft.com/en-us/security/blog/2025/11/03/sesameop-novel-backdoor-uses-openai-
Nov 5
Eyal Estrin
Nov 5
Preparing for Threats to Come: Cybersecurity Forecast 2026
https://cloud.google.com/blog/topics/threat-intelligence/cybersecurity-forecast-2026/ Eyal Estrin
unread,
Preparing for Threats to Come: Cybersecurity Forecast 2026
https://cloud.google.com/blog/topics/threat-intelligence/cybersecurity-forecast-2026/ Eyal Estrin
Nov 5
Eyal Estrin
Nov 5
Louvre delayed Windows security updates ahead of burglary
https://www.csoonline.com/article/4084007/louvre-delayed-windows-security-updates-ahead-of-burglary.
unread,
Louvre delayed Windows security updates ahead of burglary
https://www.csoonline.com/article/4084007/louvre-delayed-windows-security-updates-ahead-of-burglary.
Nov 5
Eyal Estrin
Nov 5
Exploiting Microsoft Teams: Impersonation and Spoofing Vulnerabilities Exposed
https://research.checkpoint.com/2025/microsoft-teams-impersonation-and-spoofing-vulnerabilities-
unread,
Exploiting Microsoft Teams: Impersonation and Spoofing Vulnerabilities Exposed
https://research.checkpoint.com/2025/microsoft-teams-impersonation-and-spoofing-vulnerabilities-
Nov 5
Eyal Estrin
Nov 4
Behind every successful security company is a software engineer you’ve never heard of
https://ventureinsecurity.net/p/behind-every-successful-security Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
Behind every successful security company is a software engineer you’ve never heard of
https://ventureinsecurity.net/p/behind-every-successful-security Eyal Estrin CISSP, CCSP, CISM, CISA,
Nov 4
Eyal Estrin
Nov 4
CISO Burnout – Epidemic, Endemic, or Simply Inevitable?
https://www.securityweek.com/ciso-burnout-epidemic-endemic-or-simply-inevitable/ Eyal Estrin CISSP,
unread,
CISO Burnout – Epidemic, Endemic, or Simply Inevitable?
https://www.securityweek.com/ciso-burnout-epidemic-endemic-or-simply-inevitable/ Eyal Estrin CISSP,
Nov 4
Eyal Estrin
Nov 3
Attackers targeting unpatched Cisco kit notice malware implant removal, install it again
https://www.theregister.com/2025/11/02/cyber_exec_pleads_guilty_to/ Eyal Estrin CISSP, CCSP, CISM,
unread,
Attackers targeting unpatched Cisco kit notice malware implant removal, install it again
https://www.theregister.com/2025/11/02/cyber_exec_pleads_guilty_to/ Eyal Estrin CISSP, CCSP, CISM,
Nov 3
Eyal Estrin
Nov 3
CrowdStrike 2025 European Threat Landscape Report: Extortion Rises, Nation-State Activity Intensifies
https://www.crowdstrike.com/en-us/blog/2025-european-threat-landscape-report-key-highlights/ Eyal
unread,
CrowdStrike 2025 European Threat Landscape Report: Extortion Rises, Nation-State Activity Intensifies
https://www.crowdstrike.com/en-us/blog/2025-european-threat-landscape-report-key-highlights/ Eyal
Nov 3
Eyal Estrin
Nov 3
Security concerns over system at heart of digital ID
https://www.bbc.co.uk/news/articles/c5y930x81wpo Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK
unread,
Security concerns over system at heart of digital ID
https://www.bbc.co.uk/news/articles/c5y930x81wpo Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK
Nov 3
Eyal Estrin
Nov 3
The enterprise AI crisis: Unsanctioned tools and unenforced policies
https://blog.1password.com/the-enterprise-ai-crisis-unsanctioned-tools-and-unenforced-policies/ Eyal
unread,
The enterprise AI crisis: Unsanctioned tools and unenforced policies
https://blog.1password.com/the-enterprise-ai-crisis-unsanctioned-tools-and-unenforced-policies/ Eyal
Nov 3
Eyal Estrin
Nov 1
Shadow AI: One In Four Employees Use Unapproved AI Tools, Research Finds
https://www.infosecurity-magazine.com/news/shadow-ai-employees-use-unapproved/ Eyal Estrin CISSP,
unread,
Shadow AI: One In Four Employees Use Unapproved AI Tools, Research Finds
https://www.infosecurity-magazine.com/news/shadow-ai-employees-use-unapproved/ Eyal Estrin CISSP,
Nov 1
Eyal Estrin
Nov 1
Japan Issues OT Security Guidance for Semiconductor Factories
https://www.securityweek.com/japan-issues-ot-security-guidance-for-semiconductor-factories/ https://
unread,
Japan Issues OT Security Guidance for Semiconductor Factories
https://www.securityweek.com/japan-issues-ot-security-guidance-for-semiconductor-factories/ https://
Nov 1
Eyal Estrin
Oct 31
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking
https://arstechnica.com/gadgets/2025/10/leaker-reveals-which-pixels-are-vulnerable-to-cellebrite-
unread,
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking
https://arstechnica.com/gadgets/2025/10/leaker-reveals-which-pixels-are-vulnerable-to-cellebrite-
Oct 31
Eyal Estrin
Oct 31
How Android provides the most effective protection to keep you safe from mobile scams
https://security.googleblog.com/2025/10/how-android-protects-you-from-scams.html Eyal Estrin CISSP,
unread,
How Android provides the most effective protection to keep you safe from mobile scams
https://security.googleblog.com/2025/10/how-android-protects-you-from-scams.html Eyal Estrin CISSP,
Oct 31