Groups
Groups
Sign in
Groups
Groups
Technical - Security
Conversations
About
Send feedback
Help
Technical - Security
1–30 of 15178
Mark all as read
Report group
0 selected
Eyal Estrin
1:42 AM
Cybersecurity strategies to prioritize now
https://www.microsoft.com/en-us/security/blog/2025/12/04/cybersecurity-strategies-to-prioritize-now/
unread,
Cybersecurity strategies to prioritize now
https://www.microsoft.com/en-us/security/blog/2025/12/04/cybersecurity-strategies-to-prioritize-now/
1:42 AM
Eyal Estrin
1:42 AM
To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware
https://securitylab.amnesty.org/latest/2025/12/intellexa-leaks-predator-spyware-operations-exposed/
unread,
To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware
https://securitylab.amnesty.org/latest/2025/12/intellexa-leaks-predator-spyware-operations-exposed/
1:42 AM
Eyal Estrin
1:42 AM
In comedy of errors, men accused of wiping gov databases turned to an AI tool
https://arstechnica.com/information-technology/2025/12/previously-convicted-contractors-wiped-gov-
unread,
In comedy of errors, men accused of wiping gov databases turned to an AI tool
https://arstechnica.com/information-technology/2025/12/previously-convicted-contractors-wiped-gov-
1:42 AM
Eyal Estrin
Dec 4
Cloudflare's 2025 Q3 DDoS threat report - including Aisuru, the apex of botnets
https://blog.cloudflare.com/ddos-threat-report-2025-q3/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE,
unread,
Cloudflare's 2025 Q3 DDoS threat report - including Aisuru, the apex of botnets
https://blog.cloudflare.com/ddos-threat-report-2025-q3/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE,
Dec 4
Eyal Estrin
Dec 4
Sanctioned but Still Spying: Intellexa’s Prolific Zero-Day Exploits Continue
https://cloud.google.com/blog/topics/threat-intelligence/intellexa-zero-day-exploits-continue Eyal
unread,
Sanctioned but Still Spying: Intellexa’s Prolific Zero-Day Exploits Continue
https://cloud.google.com/blog/topics/threat-intelligence/intellexa-zero-day-exploits-continue Eyal
Dec 4
Eyal Estrin
Dec 3
DNS Uncovers Infrastructure Used in SSO Attacks
https://blogs.infoblox.com/threat-intelligence/dns-uncovers-infrastructure-used-in-sso-attacks/ Eyal
unread,
DNS Uncovers Infrastructure Used in SSO Attacks
https://blogs.infoblox.com/threat-intelligence/dns-uncovers-infrastructure-used-in-sso-attacks/ Eyal
Dec 3
Eyal Estrin
Dec 2
MuddyWater: Snakes by the riverbank
https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/ Eyal Estrin CISSP, CCSP,
unread,
MuddyWater: Snakes by the riverbank
https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/ Eyal Estrin CISSP, CCSP,
Dec 2
Eyal Estrin
Dec 2
Key questions CISOs must ask before adopting AI-enabled cyber solutions
https://www.csoonline.com/article/4094763/key-questions-cisos-must-ask-before-adopting-ai-enabled-
unread,
Key questions CISOs must ask before adopting AI-enabled cyber solutions
https://www.csoonline.com/article/4094763/key-questions-cisos-must-ask-before-adopting-ai-enabled-
Dec 2
Eyal Estrin
Dec 2
AI models block 87% of single attacks, but just 8% when attackers persist
https://venturebeat.com/security/ai-models-block-87-of-single-attacks-but-just-8-when-attackers-
unread,
AI models block 87% of single attacks, but just 8% when attackers persist
https://venturebeat.com/security/ai-models-block-87-of-single-attacks-but-just-8-when-attackers-
Dec 2
Eyal Estrin
Dec 2
Why Modern SOCs Need To Move Beyond Tiered Analyst Models
https://www.cybersecurityintelligence.com/blog/why-modern-socs-need-to-move-beyond-tiered-analyst-
unread,
Why Modern SOCs Need To Move Beyond Tiered Analyst Models
https://www.cybersecurityintelligence.com/blog/why-modern-socs-need-to-move-beyond-tiered-analyst-
Dec 2
Eyal Estrin
Dec 2
12 signs the CISO-CIO relationship is broken — and steps to fix it
https://www.csoonline.com/article/4094754/12-signs-the-ciso-cio-relationship-is-broken-and-steps-to-
unread,
12 signs the CISO-CIO relationship is broken — and steps to fix it
https://www.csoonline.com/article/4094754/12-signs-the-ciso-cio-relationship-is-broken-and-steps-to-
Dec 2
Eyal Estrin
Nov 29
Enterprises Aren't Confident They Can Secure Non-Human Identities (NHIs)
https://www.darkreading.com/identity-access-management-security/enterprise-not-confident-secure-non-
unread,
Enterprises Aren't Confident They Can Secure Non-Human Identities (NHIs)
https://www.darkreading.com/identity-access-management-security/enterprise-not-confident-secure-non-
Nov 29
Eyal Estrin
Nov 29
The hidden costs of illegal streaming and modded Amazon Fire TV Sticks
https://www.malwarebytes.com/blog/news/2025/11/illegal-streaming-is-costing-people-real-money-
unread,
The hidden costs of illegal streaming and modded Amazon Fire TV Sticks
https://www.malwarebytes.com/blog/news/2025/11/illegal-streaming-is-costing-people-real-money-
Nov 29
Eyal Estrin
Nov 28
Empathetic policy engineering: The secret to better security behavior and awareness
https://www.csoonline.com/article/4092639/empathy-meets-it-security-the-path-to-active-compliance.
unread,
Empathetic policy engineering: The secret to better security behavior and awareness
https://www.csoonline.com/article/4092639/empathy-meets-it-security-the-path-to-active-compliance.
Nov 28
Eyal Estrin
Nov 28
Under Siege: The Mounting Pressures Driving CISOs Out Of UK Cybersecurity Leadership
https://www.infosecurity-magazine.com/opinions/mounting-pressures-driving-cisos Eyal Estrin CISSP,
unread,
Under Siege: The Mounting Pressures Driving CISOs Out Of UK Cybersecurity Leadership
https://www.infosecurity-magazine.com/opinions/mounting-pressures-driving-cisos Eyal Estrin CISSP,
Nov 28
Eyal Estrin
Nov 27
OpenAI reveals analytics data breach, notifies affected users
https://cybernews.com/security/openai-mixpanel-cybersecurity-incident-breach/ https://openai.com/
unread,
OpenAI reveals analytics data breach, notifies affected users
https://cybernews.com/security/openai-mixpanel-cybersecurity-incident-breach/ https://openai.com/
Nov 27
Eyal Estrin
Nov 27
ShadowV2 Casts a Shadow Over IoT Devices
https://www.fortinet.com/blog/threat-research/shadowv2-casts-a-shadow-over-iot-devices https://www.
unread,
ShadowV2 Casts a Shadow Over IoT Devices
https://www.fortinet.com/blog/threat-research/shadowv2-casts-a-shadow-over-iot-devices https://www.
Nov 27
Eyal Estrin
Nov 27
Building a Threat-Led Cybersecurity Program with Cyberthreat Intelligence
https://www.isaca.org/resources/white-papers/2025/building-a-threat-led-cybersecurity-program Eyal
unread,
Building a Threat-Led Cybersecurity Program with Cyberthreat Intelligence
https://www.isaca.org/resources/white-papers/2025/building-a-threat-led-cybersecurity-program Eyal
Nov 27
Eyal Estrin
Nov 27
Report: Missing 88% of Exploits: Rethinking KEV in the AI Era
https://www.miggo.io/post/report-missing-88-of-exploits-rethinking-kev-in-the-ai-era Eyal Estrin
unread,
Report: Missing 88% of Exploits: Rethinking KEV in the AI Era
https://www.miggo.io/post/report-missing-88-of-exploits-rethinking-kev-in-the-ai-era Eyal Estrin
Nov 27
Eyal Estrin
Nov 27
B2B Guest Access Creates an Unprotected Attack Vector
https://www.ontinue.com/resource/blog-microsoft-chat-with-anyone-understanding-phishing-risk/ Eyal
unread,
B2B Guest Access Creates an Unprotected Attack Vector
https://www.ontinue.com/resource/blog-microsoft-chat-with-anyone-understanding-phishing-risk/ Eyal
Nov 27
Eyal Estrin
Nov 27
What You Don’t Know: The Role of Threat Intelligence in Driving Cybersecurity Awareness
https://www.threatq.com/blog/what-you-dont-know-the-role-of-threat-intelligence-in-driving-
unread,
What You Don’t Know: The Role of Threat Intelligence in Driving Cybersecurity Awareness
https://www.threatq.com/blog/what-you-dont-know-the-role-of-threat-intelligence-in-driving-
Nov 27
Eyal Estrin
Nov 27
New BlueVoyant Report Reveals Increased Investment in Third-Party Risk Management, Yet Major Gaps and Breaches Still Persist
https://www.bluevoyant.com/press-releases/new-report-reveals-increased-investment-in-third-party-risk
unread,
New BlueVoyant Report Reveals Increased Investment in Third-Party Risk Management, Yet Major Gaps and Breaches Still Persist
https://www.bluevoyant.com/press-releases/new-report-reveals-increased-investment-in-third-party-risk
Nov 27
Eyal Estrin
Nov 27
When trust turns toxic: Lessons from the Salesloft Drift incident
https://cyberscoop.com/saas-ai-integration-breaches-identity-trust-insane-risks-op-ed/ Eyal Estrin
unread,
When trust turns toxic: Lessons from the Salesloft Drift incident
https://cyberscoop.com/saas-ai-integration-breaches-identity-trust-insane-risks-op-ed/ Eyal Estrin
Nov 27
Eyal Estrin
Nov 26
Old tech, new vulnerabilities: NTLM abuse, ongoing exploitation in 2025
https://securelist.com/ntlm-abuse-in-2025/118132/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK
unread,
Old tech, new vulnerabilities: NTLM abuse, ongoing exploitation in 2025
https://securelist.com/ntlm-abuse-in-2025/118132/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK
Nov 26
Eyal Estrin
Nov 26
Small Language Models for Phishing Website Detection: Cost, Performance, and Privacy Trade-Offs
https://arxiv.org/pdf/2511.15434 Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog: https://
unread,
Small Language Models for Phishing Website Detection: Cost, Performance, and Privacy Trade-Offs
https://arxiv.org/pdf/2511.15434 Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog: https://
Nov 26
Eyal Estrin
Nov 26
CISOs Get Real About Hiring in the Age of AI
https://www.darkreading.com/cybersecurity-operations/ciscos-get-real-about-hiring-age-ai Eyal Estrin
unread,
CISOs Get Real About Hiring in the Age of AI
https://www.darkreading.com/cybersecurity-operations/ciscos-get-real-about-hiring-age-ai Eyal Estrin
Nov 26
Eyal Estrin
Nov 26
An Open Letter
https://www.hacklore.org/letter Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog: https://
unread,
An Open Letter
https://www.hacklore.org/letter Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog: https://
Nov 26
Eyal Estrin
Nov 26
THE AI-FICATION OF CYBERTHREATS
https://documents.trendmicro.com/assets/research-reports/the-ai-fication-of-cyberthreats-trend-micro-
unread,
THE AI-FICATION OF CYBERTHREATS
https://documents.trendmicro.com/assets/research-reports/the-ai-fication-of-cyberthreats-trend-micro-
Nov 26
Eyal Estrin
Nov 26
As AI redraws threat landscape, cybersecurity training faces reality check on what future defenders truly need
https://industrialcyber.co/reports/as-ai-redraws-threat-landscape-cybersecurity-training-faces-
unread,
As AI redraws threat landscape, cybersecurity training faces reality check on what future defenders truly need
https://industrialcyber.co/reports/as-ai-redraws-threat-landscape-cybersecurity-training-faces-
Nov 26
Eyal Estrin
Nov 26
Counter Galois Onion: Improved encryption for Tor circuit traffic
https://blog.torproject.org/introducing-cgo/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog:
unread,
Counter Galois Onion: Improved encryption for Tor circuit traffic
https://blog.torproject.org/introducing-cgo/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog:
Nov 26