Groups
Groups
Sign in
Groups
Groups
Technical - Security
Conversations
About
Send feedback
Help
Technical - Security
1–30 of 15345
Mark all as read
Report group
0 selected
Eyal Estrin
12:48 AM
CISA Helps Johnny Secure Operational Technology: New Guidance Addresses Cyber Risks from Legacy Protocols
https://www.cisa.gov/sites/default/files/2026-02/Barriers-to-Secure-Communication-Why-OT-Johnny-Cant-
unread,
CISA Helps Johnny Secure Operational Technology: New Guidance Addresses Cyber Risks from Legacy Protocols
https://www.cisa.gov/sites/default/files/2026-02/Barriers-to-Secure-Communication-Why-OT-Johnny-Cant-
12:48 AM
Eyal Estrin
12:48 AM
Stay in control of your personal information online
https://blog.google/products-and-platforms/products/search/results-about-you-government-id-numbers/
unread,
Stay in control of your personal information online
https://blog.google/products-and-platforms/products/search/results-about-you-government-id-numbers/
12:48 AM
Eyal Estrin
Feb 10
Never settle: How CISOs can go beyond compliance standards to better protect their organizations
https://www.csoonline.com/article/4128920/never-settle-how-cisos-can-go-beyond-compliance-standards-
unread,
Never settle: How CISOs can go beyond compliance standards to better protect their organizations
https://www.csoonline.com/article/4128920/never-settle-how-cisos-can-go-beyond-compliance-standards-
Feb 10
Eyal Estrin
Feb 10
AI chat app leak exposes 300 million messages tied to 25 million users
https://www.malwarebytes.com/blog/news/2026/02/ai-chat-app-leak-exposes-300-million-messages-tied-to-
unread,
AI chat app leak exposes 300 million messages tied to 25 million users
https://www.malwarebytes.com/blog/news/2026/02/ai-chat-app-leak-exposes-300-million-messages-tied-to-
Feb 10
Eyal Estrin
Feb 10
Summary of SmarterTools Breach and SmarterMail CVEs
https://portal.smartertools.com/community/a97747/summary-of-smartertools-breach-and-smartermail-cves.
unread,
Summary of SmarterTools Breach and SmarterMail CVEs
https://portal.smartertools.com/community/a97747/summary-of-smartertools-breach-and-smartermail-cves.
Feb 10
Eyal Estrin
Feb 10
Hackers Use Signal QR Codes to Spy on Military and Political Leaders
https://hackread.com/hackers-signal-qr-codes-spy-on-military-political-leaders/ Eyal Estrin Author |
unread,
Hackers Use Signal QR Codes to Spy on Military and Political Leaders
https://hackread.com/hackers-signal-qr-codes-spy-on-military-political-leaders/ Eyal Estrin Author |
Feb 10
Eyal Estrin
Feb 10
Largest Multi-Agency Cyber Operation Mounted to Counter Threat Posed by Advanced Persistent Threat (APT) Actor UNC3886 to Singapore’s Telecommunications Sector
https://www.csa.gov.sg/news-events/press-releases/largest-multi-agency-cyber-operation-mounted-to-
unread,
Largest Multi-Agency Cyber Operation Mounted to Counter Threat Posed by Advanced Persistent Threat (APT) Actor UNC3886 to Singapore’s Telecommunications Sector
https://www.csa.gov.sg/news-events/press-releases/largest-multi-agency-cyber-operation-mounted-to-
Feb 10
Eyal Estrin
Feb 9
Building trust with the board through evidence-based proof
https://www.csoonline.com/article/4127327/building-trust-with-the-board-through-evidence-based-proof.
unread,
Building trust with the board through evidence-based proof
https://www.csoonline.com/article/4127327/building-trust-with-the-board-through-evidence-based-proof.
Feb 9
Eyal Estrin
Feb 9
Introducing Encrypt It Already
https://www.eff.org/deeplinks/2026/01/introducing-encrypt-it-already Eyal Estrin Author | Cloud
unread,
Introducing Encrypt It Already
https://www.eff.org/deeplinks/2026/01/introducing-encrypt-it-already Eyal Estrin Author | Cloud
Feb 9
Eyal Estrin
Feb 7
Germany warns of Signal account hijacking targeting senior figures
https://www.bleepingcomputer.com/news/security/germany-warns-of-signal-account-hijacking-targeting-
unread,
Germany warns of Signal account hijacking targeting senior figures
https://www.bleepingcomputer.com/news/security/germany-warns-of-signal-account-hijacking-targeting-
Feb 7
Eyal Estrin
Feb 7
EDR, Email, and SASE Miss This Entire Class of Browser Attacks
https://www.bleepingcomputer.com/news/security/edr-email-and-sase-miss-this-entire-class-of-browser-
unread,
EDR, Email, and SASE Miss This Entire Class of Browser Attacks
https://www.bleepingcomputer.com/news/security/edr-email-and-sase-miss-this-entire-class-of-browser-
Feb 7
Eyal Estrin
Feb 7
Analysis of active exploitation of SolarWinds Web Help Desk
https://www.microsoft.com/en-us/security/blog/2026/02/06/active-exploitation-solarwinds-web-help-desk
unread,
Analysis of active exploitation of SolarWinds Web Help Desk
https://www.microsoft.com/en-us/security/blog/2026/02/06/active-exploitation-solarwinds-web-help-desk
Feb 7
Eyal Estrin
Feb 7
Ten career-ending mistakes CISOs make and how to avoid them
https://www.csoonline.com/article/4128090/ten-career-ending-mistakes-cisos-make-and-how-to-avoid-them
unread,
Ten career-ending mistakes CISOs make and how to avoid them
https://www.csoonline.com/article/4128090/ten-career-ending-mistakes-cisos-make-and-how-to-avoid-them
Feb 7
Eyal Estrin
Feb 6
We moved fast and broke things. It’s time for a change
https://cyberscoop.com/move-fast-break-things-cybersecurity-supply-chain-security-op-ed/ Eyal Estrin
unread,
We moved fast and broke things. It’s time for a change
https://cyberscoop.com/move-fast-break-things-cybersecurity-supply-chain-security-op-ed/ Eyal Estrin
Feb 6
Eyal Estrin
Feb 6
The silent security gap in enterprise AI adoption
https://www.csoonline.com/article/4127334/the-silent-security-gap-in-enterprise-ai-adoption.html Eyal
unread,
The silent security gap in enterprise AI adoption
https://www.csoonline.com/article/4127334/the-silent-security-gap-in-enterprise-ai-adoption.html Eyal
Feb 6
Eyal Estrin
Feb 5
CISA Releases Binding Operational Directive 26-02 on Mitigating Risks from End-of-Support Edge Devices
https://www.cisa.gov/news-events/directives/bod-26-02-mitigating-risk-end-support-edge-devices Eyal
unread,
CISA Releases Binding Operational Directive 26-02 on Mitigating Risks from End-of-Support Edge Devices
https://www.cisa.gov/news-events/directives/bod-26-02-mitigating-risk-end-support-edge-devices Eyal
Feb 5
Eyal Estrin
Feb 5
2025 Q4 DDoS threat report: A record-setting 31.4 Tbps attack caps a year of massive DDoS assaults
https://blog.cloudflare.com/ddos-threat-report-2025-q4/ Eyal Estrin Author | Cloud Architect | AWS •
unread,
2025 Q4 DDoS threat report: A record-setting 31.4 Tbps attack caps a year of massive DDoS assaults
https://blog.cloudflare.com/ddos-threat-report-2025-q4/ Eyal Estrin Author | Cloud Architect | AWS •
Feb 5
Eyal Estrin
Feb 5
Scam-checking just got easier: Malwarebytes is now in ChatGPT
https://www.malwarebytes.com/blog/product/2026/01/scam-checking-just-got-easier-malwarebytes-is-now-
unread,
Scam-checking just got easier: Malwarebytes is now in ChatGPT
https://www.malwarebytes.com/blog/product/2026/01/scam-checking-just-got-easier-malwarebytes-is-now-
Feb 5
Eyal Estrin
Feb 5
The security implementation gap: Why Microsoft is supporting Operation Winter SHIELD
https://www.microsoft.com/en-us/security/blog/2026/02/05/the-security-implementation-gap-why-
unread,
The security implementation gap: Why Microsoft is supporting Operation Winter SHIELD
https://www.microsoft.com/en-us/security/blog/2026/02/05/the-security-implementation-gap-why-
Feb 5
Eyal Estrin
Feb 5
Should I stay or should I go?
https://www.csoonline.com/article/4125356/should-i-stay-or-should-i-go-2.html Eyal Estrin Author |
unread,
Should I stay or should I go?
https://www.csoonline.com/article/4125356/should-i-stay-or-should-i-go-2.html Eyal Estrin Author |
Feb 5
Eyal Estrin
Feb 5
Dual-Mode Citrix Gateway Reconnaissance: When Residential Proxies Meet Version Hunting
https://www.labs.greynoise.io/grimoire/2026-02-02-citrix-recon-residential-proxies/index.html Eyal
unread,
Dual-Mode Citrix Gateway Reconnaissance: When Residential Proxies Meet Version Hunting
https://www.labs.greynoise.io/grimoire/2026-02-02-citrix-recon-residential-proxies/index.html Eyal
Feb 5
Eyal Estrin
Feb 5
Forescout’s 2025 Threat Roundup Report Finds 84% More Cyberattacks Using Operational Technology Protocols
https://www.forescout.com/press-releases/forescout-2025-threat-roundup-report-finds-84-more-
unread,
Forescout’s 2025 Threat Roundup Report Finds 84% More Cyberattacks Using Operational Technology Protocols
https://www.forescout.com/press-releases/forescout-2025-threat-roundup-report-finds-84-more-
Feb 5
Eyal Estrin
Feb 3
The lazy myth that CISOs “don’t understand the business” has to go
https://ventureinsecurity.net/p/the-lazy-myth-that-cisos-dont-understand Eyal Estrin Author | Cloud
unread,
The lazy myth that CISOs “don’t understand the business” has to go
https://ventureinsecurity.net/p/the-lazy-myth-that-cisos-dont-understand Eyal Estrin Author | Cloud
Feb 3
Eyal Estrin
Feb 3
FraudWear - Inside the Cyber Threat of Brand-Impersonating Online Stores
https://www.ctm360.com/reports/fraudwear-brand-impersonating-online-stores Eyal Estrin Author | Cloud
unread,
FraudWear - Inside the Cyber Threat of Brand-Impersonating Online Stores
https://www.ctm360.com/reports/fraudwear-brand-impersonating-online-stores Eyal Estrin Author | Cloud
Feb 3
Eyal Estrin
Feb 3
AI controls are coming to Firefox
https://blog.mozilla.org/en/firefox/ai-controls/ Eyal Estrin Author | Cloud Architect | AWS • Azure •
unread,
AI controls are coming to Firefox
https://blog.mozilla.org/en/firefox/ai-controls/ Eyal Estrin Author | Cloud Architect | AWS • Azure •
Feb 3
Eyal Estrin
Feb 3
How risk culture turns cyber teams predictive
https://www.csoonline.com/article/4125172/how-risk-culture-turns-cyber-teams-predictive.html Eyal
unread,
How risk culture turns cyber teams predictive
https://www.csoonline.com/article/4125172/how-risk-culture-turns-cyber-teams-predictive.html Eyal
Feb 3
Eyal Estrin
Feb 3
Why DNS TXT Records Deserve Governance in Security Programs
https://checkred.com/resources/blog/why-dns-txt-records-deserve-governance-in-security-programs/ Eyal
unread,
Why DNS TXT Records Deserve Governance in Security Programs
https://checkred.com/resources/blog/why-dns-txt-records-deserve-governance-in-security-programs/ Eyal
Feb 3
Eyal Estrin
Feb 2
New Apple privacy feature limits location tracking on iPhones, iPads
https://www.bleepingcomputer.com/news/apple/new-apple-privacy-feature-limits-location-tracking-on-
unread,
New Apple privacy feature limits location tracking on iPhones, iPads
https://www.bleepingcomputer.com/news/apple/new-apple-privacy-feature-limits-location-tracking-on-
Feb 2
Eyal Estrin
Feb 2
OpenClaw in the Wild: Mapping the Public Exposure of a Viral AI Assistant
https://censys.com/blog/openclaw-in-the-wild-mapping-the-public-exposure-of-a-viral-ai-assistant Eyal
unread,
OpenClaw in the Wild: Mapping the Public Exposure of a Viral AI Assistant
https://censys.com/blog/openclaw-in-the-wild-mapping-the-public-exposure-of-a-viral-ai-assistant Eyal
Feb 2
Eyal Estrin
Feb 2
What the first 24 hours of a cyber incident should look like
https://www.information-age.com/what-the-first-24-hours-of-a-cyber-incident-should-look-like-
unread,
What the first 24 hours of a cyber incident should look like
https://www.information-age.com/what-the-first-24-hours-of-a-cyber-incident-should-look-like-
Feb 2