Groups
Groups
Sign in
Groups
Groups
Technical - Security
Conversations
About
Send feedback
Help
Technical - Security
1–30 of 15404
Mark all as read
Report group
0 selected
Eyal Estrin
6:40 AM
An Investigation Into Years of Undetected Operations Targeting High-Value Sectors
https://unit42.paloaltonetworks.com/cl-unk-1068-targets-critical-sectors/ Eyal Estrin Author | Cloud
unread,
An Investigation Into Years of Undetected Operations Targeting High-Value Sectors
https://unit42.paloaltonetworks.com/cl-unk-1068-targets-critical-sectors/ Eyal Estrin Author | Cloud
6:40 AM
Eyal Estrin
Mar 7
Proactive Preparation and Hardening Against Destructive Attacks: 2026 Edition
https://cloud.google.com/blog/topics/threat-intelligence/preparation-hardening-destructive-attacks
unread,
Proactive Preparation and Hardening Against Destructive Attacks: 2026 Edition
https://cloud.google.com/blog/topics/threat-intelligence/preparation-hardening-destructive-attacks
Mar 7
Eyal Estrin
Mar 6
Health-ISAC - 2026 Global Health Sector Threat Landscape
https://health-isac.org/wp-content/uploads/2026-Annual-Threat-Report_Proof-4.pdf Eyal Estrin Author |
unread,
Health-ISAC - 2026 Global Health Sector Threat Landscape
https://health-isac.org/wp-content/uploads/2026-Annual-Threat-Report_Proof-4.pdf Eyal Estrin Author |
Mar 6
Eyal Estrin
Mar 6
Look What You Made Us Patch: 2025 Zero-Days in Review
https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review Eyal Estrin Author |
unread,
Look What You Made Us Patch: 2025 Zero-Days in Review
https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review Eyal Estrin Author |
Mar 6
Eyal Estrin
Mar 6
Demystifying Key Exchange: From Classical Elliptic Curve Cryptography to a Post-Quantum Future
https://thehackernews.com/expert-insights/2026/03/demystifying-key-exchange-from.html Eyal Estrin
unread,
Demystifying Key Exchange: From Classical Elliptic Curve Cryptography to a Post-Quantum Future
https://thehackernews.com/expert-insights/2026/03/demystifying-key-exchange-from.html Eyal Estrin
Mar 6
Eyal Estrin
Mar 6
Stop hiring like it's 2025: AI-augmented cybersecurity performance data every CISO needs
https://www.hackthebox.com/blog/ai-vs-human-cybersecurity-benchmark Eyal Estrin Author | Cloud
unread,
Stop hiring like it's 2025: AI-augmented cybersecurity performance data every CISO needs
https://www.hackthebox.com/blog/ai-vs-human-cybersecurity-benchmark Eyal Estrin Author | Cloud
Mar 6
Eyal Estrin
Mar 5
2026 Third-Party Breach Report: Managing Risk Concentration in the Era of Cascading Failures
https://assets.foleon.com/eu-central-1/de-uploads-7e3kk3/50219/
unread,
2026 Third-Party Breach Report: Managing Risk Concentration in the Era of Cascading Failures
https://assets.foleon.com/eu-central-1/de-uploads-7e3kk3/50219/
Mar 5
Eyal Estrin
Mar 5
Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East
https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-
unread,
Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East
https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-
Mar 5
Eyal Estrin
Mar 5
Netskope Threat Labs Report: Healthcare 2026
https://www.netskope.com/resources/threat-labs-reports/threat-labs-report-healthcare-2026 Eyal Estrin
unread,
Netskope Threat Labs Report: Healthcare 2026
https://www.netskope.com/resources/threat-labs-reports/threat-labs-report-healthcare-2026 Eyal Estrin
Mar 5
Eyal Estrin
Mar 5
Retaliatory Hacktivist DDoS Activity Following Operation Epic Fury/Roaring Lion
https://www.radware.com/security/threat-advisories-and-attack-reports/ddos-activity-following-
unread,
Retaliatory Hacktivist DDoS Activity Following Operation Epic Fury/Roaring Lion
https://www.radware.com/security/threat-advisories-and-attack-reports/ddos-activity-following-
Mar 5
Eyal Estrin
Mar 5
Introducing the 2026 Cloudflare Threat Report
https://blog.cloudflare.com/2026-threat-report/ Eyal Estrin Author | Cloud Architect | AWS • Azure •
unread,
Introducing the 2026 Cloudflare Threat Report
https://blog.cloudflare.com/2026-threat-report/ Eyal Estrin Author | Cloud Architect | AWS • Azure •
Mar 5
Eyal Estrin
Mar 5
HP Wolf Security Threat Insights Report: March 2026
https://threatresearch.ext.hp.com/wp-content/uploads/2026/03/
unread,
HP Wolf Security Threat Insights Report: March 2026
https://threatresearch.ext.hp.com/wp-content/uploads/2026/03/
Mar 5
Eyal Estrin
Mar 5
The state of human risk in 2026
https://www.mimecast.com/blog/the-state-of-human-risk-in-2026/ Eyal Estrin Author | Cloud Architect |
unread,
The state of human risk in 2026
https://www.mimecast.com/blog/the-state-of-human-risk-in-2026/ Eyal Estrin Author | Cloud Architect |
Mar 5
Eyal Estrin
Mar 5
The business risks of pirate software
https://blog.barracuda.com/2026/03/04/threat-spotlight-business-risks-pirate-software Eyal Estrin
unread,
The business risks of pirate software
https://blog.barracuda.com/2026/03/04/threat-spotlight-business-risks-pirate-software Eyal Estrin
Mar 5
Eyal Estrin
Mar 5
Why workforce identity is still a vulnerability, and what to do about it
https://www.helpnetsecurity.com/2026/03/04/workforce-identity-assurance/ Eyal Estrin Author | Cloud
unread,
Why workforce identity is still a vulnerability, and what to do about it
https://www.helpnetsecurity.com/2026/03/04/workforce-identity-assurance/ Eyal Estrin Author | Cloud
Mar 5
Eyal Estrin
Mar 5
The 2026 State of the Cybersecurity Workforce Report
https://seemplicity.io/papers/2026-state-cybersecurity-workforce-report/ Eyal Estrin Author | Cloud
unread,
The 2026 State of the Cybersecurity Workforce Report
https://seemplicity.io/papers/2026-state-cybersecurity-workforce-report/ Eyal Estrin Author | Cloud
Mar 5
Eyal Estrin
Mar 5
Defending the gates: How a global coalition disrupted Tycoon 2FA, a major driver of initial access and large-scale online impersonation
https://blogs.microsoft.com/on-the-issues/2026/03/04/how-a-global-coalition-disrupted-tycoon/ Eyal
unread,
Defending the gates: How a global coalition disrupted Tycoon 2FA, a major driver of initial access and large-scale online impersonation
https://blogs.microsoft.com/on-the-issues/2026/03/04/how-a-global-coalition-disrupted-tycoon/ Eyal
Mar 5
Eyal Estrin
Mar 4
Can’t Hide Your Stride: Inferring Car Movement Patterns from Passive TPMS Measurements
https://dspace.networks.imdea.org/bitstream/handle/20.500.12761/2011/Can%E2%80%99t%20Hide%20Your%
unread,
Can’t Hide Your Stride: Inferring Car Movement Patterns from Passive TPMS Measurements
https://dspace.networks.imdea.org/bitstream/handle/20.500.12761/2011/Can%E2%80%99t%20Hide%20Your%
Mar 4
Eyal Estrin
Mar 3
Vulnerability monitoring service secures public-sector websites faster
https://www.csoonline.com/article/4139509/vulnerability-monitoring-service-secures-public-sector-
unread,
Vulnerability monitoring service secures public-sector websites faster
https://www.csoonline.com/article/4139509/vulnerability-monitoring-service-secures-public-sector-
Mar 3
Eyal Estrin
Mar 3
Millions of Publicly Exposed .env Files Put Internet Services at Risk: A Mysterium VPN Research
https://www.mysteriumvpn.com/blog/news/millions-exposed-env-files Eyal Estrin Author | Cloud
unread,
Millions of Publicly Exposed .env Files Put Internet Services at Risk: A Mysterium VPN Research
https://www.mysteriumvpn.com/blog/news/millions-exposed-env-files Eyal Estrin Author | Cloud
Mar 3
Eyal Estrin
Mar 3
A scorecard for cyber and risk culture
https://www.csoonline.com/article/4138709/a-scorecard-for-cyber-and-risk-culture.html Eyal Estrin
unread,
A scorecard for cyber and risk culture
https://www.csoonline.com/article/4138709/a-scorecard-for-cyber-and-risk-culture.html Eyal Estrin
Mar 3
Eyal Estrin
Feb 28
The future of agentic AI in cybersecurity: Hype vs. reality
https://www.scworld.com/perspective/the-future-of-agentic-ai-in-cybersecurity-hype-vs-reality Eyal
unread,
The future of agentic AI in cybersecurity: Hype vs. reality
https://www.scworld.com/perspective/the-future-of-agentic-ai-in-cybersecurity-hype-vs-reality Eyal
Feb 28
Eyal Estrin
Feb 28
Cultivating a robust and efficient quantum-safe HTTPS
https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html Eyal Estrin Author |
unread,
Cultivating a robust and efficient quantum-safe HTTPS
https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html Eyal Estrin Author |
Feb 28
Eyal Estrin
Feb 28
Oops, AI did it again? Claude goes rogue and helps hack Mexico
https://cybernews.com/security/claude-ai-mexico-government-hack/ Eyal Estrin Author | Cloud Architect
unread,
Oops, AI did it again? Claude goes rogue and helps hack Mexico
https://cybernews.com/security/claude-ai-mexico-government-hack/ Eyal Estrin Author | Cloud Architect
Feb 28
Eyal Estrin
Feb 28
The Top Ten MITRE ATT&CK Techniques
https://www.picussecurity.com/resource/the-top-ten-mitre-attack-techniques Eyal Estrin Author | Cloud
unread,
The Top Ten MITRE ATT&CK Techniques
https://www.picussecurity.com/resource/the-top-ten-mitre-attack-techniques Eyal Estrin Author | Cloud
Feb 28
Eyal Estrin
Feb 27
Vectra AI 2026 Report Reveals Persistent Gap Between Security Investment and Cyber Resilience
https://techintelpro.com/news/cybersecurity/threat-detection-and-incident-response/vectra-ai-2026-
unread,
Vectra AI 2026 Report Reveals Persistent Gap Between Security Investment and Cyber Resilience
https://techintelpro.com/news/cybersecurity/threat-detection-and-incident-response/vectra-ai-2026-
Feb 27
Eyal Estrin
Feb 27
Nowhere, man: The 2026 Active Adversary Report
https://www.sophos.com/en-us/blog/2026-sophos-active-adversary-report Eyal Estrin Author | Cloud
unread,
Nowhere, man: The 2026 Active Adversary Report
https://www.sophos.com/en-us/blog/2026-sophos-active-adversary-report Eyal Estrin Author | Cloud
Feb 27
Eyal Estrin
Feb 27
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign
https://cloud.google.com/blog/topics/threat-intelligence/disrupting-gridtide-global-espionage-
unread,
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign
https://cloud.google.com/blog/topics/threat-intelligence/disrupting-gridtide-global-espionage-
Feb 27
Eyal Estrin
Feb 27
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-
unread,
New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises
https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-
Feb 27
Eyal Estrin
Feb 27
GreyNoise Releases 2026 State of the Edge Report: More Than Half of Remote Code Execution Attempts Originate From Previously Unseen IPs
https://www.greynoise.io/press/greynoise-releases-2026-state-of-the-edge-report Eyal Estrin Author |
unread,
GreyNoise Releases 2026 State of the Edge Report: More Than Half of Remote Code Execution Attempts Originate From Previously Unseen IPs
https://www.greynoise.io/press/greynoise-releases-2026-state-of-the-edge-report Eyal Estrin Author |
Feb 27