Groups
Groups
Sign in
Groups
Groups
Technical - Security
Conversations
About
Send feedback
Help
Technical - Security
1–30 of 15259
Mark all as read
Report group
0 selected
Eyal Estrin
Jan 10
Illicit Crypto Economy Surges as Nation-States Join in the Fray
https://www.darkreading.com/cyber-risk/illicit-crypto-economy-surges-nation-states Eyal Estrin CISSP,
unread,
Illicit Crypto Economy Surges as Nation-States Join in the Fray
https://www.darkreading.com/cyber-risk/illicit-crypto-economy-surges-nation-states Eyal Estrin CISSP,
Jan 10
Eyal Estrin
Jan 10
The Mind of the CISO: The Future of Cyber Resilience
https://www.trellix.com/assets/ebooks/trellix-mind-of-the-ciso-future-resilience-ebook.pdf Eyal
unread,
The Mind of the CISO: The Future of Cyber Resilience
https://www.trellix.com/assets/ebooks/trellix-mind-of-the-ciso-future-resilience-ebook.pdf Eyal
Jan 10
Eyal Estrin
Jan 9
Preparing for Post-Quantum Cryptography
https://www.wiz.io/blog/preparing-for-post-quantum-cryptography Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
Preparing for Post-Quantum Cryptography
https://www.wiz.io/blog/preparing-for-post-quantum-cryptography Eyal Estrin CISSP, CCSP, CISM, CISA,
Jan 9
Eyal Estrin
Jan 9
New Study: Only 1% of Organizations Have Fully Adopted Just-in-Time Privileged Access as AI-Driven Identities Rapidly Increase
https://www.cyberark.com/press/new-study-only-1-of-organizations-have-fully-adopted-just-in-time-
unread,
New Study: Only 1% of Organizations Have Fully Adopted Just-in-Time Privileged Access as AI-Driven Identities Rapidly Increase
https://www.cyberark.com/press/new-study-only-1-of-organizations-have-fully-adopted-just-in-time-
Jan 9
Eyal Estrin
Jan 8
What European security teams are struggling to operationalize
https://www.helpnetsecurity.com/2026/01/07/security-teams-european-compliance-operations-gap/ Eyal
unread,
What European security teams are struggling to operationalize
https://www.helpnetsecurity.com/2026/01/07/security-teams-european-compliance-operations-gap/ Eyal
Jan 8
Eyal Estrin
Jan 8
Hackers Exploit Zero-Day in Discontinued D-Link Devices
https://www.securityweek.com/hackers-exploit-zero-day-in-discontinued-d-link-devices/ Eyal Estrin
unread,
Hackers Exploit Zero-Day in Discontinued D-Link Devices
https://www.securityweek.com/hackers-exploit-zero-day-in-discontinued-d-link-devices/ Eyal Estrin
Jan 8
Eyal Estrin
Jan 7
Why many existing medical devices fall short of the FDA's new cybersecurity standards
https://www.todaysmedicaldevelopments.com/news/why-many-existing-medical-devices-fall-short-fda-new-
unread,
Why many existing medical devices fall short of the FDA's new cybersecurity standards
https://www.todaysmedicaldevelopments.com/news/why-many-existing-medical-devices-fall-short-fda-new-
Jan 7
Eyal Estrin
Jan 7
6 strategies for building a high-performance cybersecurity team
https://www.csoonline.com/article/4110690/6-strategies-for-building-a-high-performance-cybersecurity-
unread,
6 strategies for building a high-performance cybersecurity team
https://www.csoonline.com/article/4110690/6-strategies-for-building-a-high-performance-cybersecurity-
Jan 7
Eyal Estrin
Jan 7
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk
https://www.infostealers.com/article/dozens-of-global-companies-hacked-via-cloud-credentials-from-
unread,
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk
https://www.infostealers.com/article/dozens-of-global-companies-hacked-via-cloud-credentials-from-
Jan 7
Eyal Estrin
Jan 6
Agentic AI Is an Identity Problem and CISOs Will Be Accountable for the Outcome
https://www.bleepingcomputer.com/news/security/agentic-ai-is-an-identity-problem-and-cisos-will-be-
unread,
Agentic AI Is an Identity Problem and CISOs Will Be Accountable for the Outcome
https://www.bleepingcomputer.com/news/security/agentic-ai-is-an-identity-problem-and-cisos-will-be-
Jan 6
Eyal Estrin
Jan 1
How to Integrate AI into Modern SOC Workflows
https://thehackernews.com/2025/12/how-to-integrate-ai-into-modern-soc.html Eyal Estrin CISSP, CCSP,
unread,
How to Integrate AI into Modern SOC Workflows
https://thehackernews.com/2025/12/how-to-integrate-ai-into-modern-soc.html Eyal Estrin CISSP, CCSP,
Jan 1
Eyal Estrin
Jan 1
Who Decides When Security Levels Are “Enough”?
https://industrialcyber.co/expert/who-decides-when-security-levels-are-enough/ Eyal Estrin CISSP,
unread,
Who Decides When Security Levels Are “Enough”?
https://industrialcyber.co/expert/who-decides-when-security-levels-are-enough/ Eyal Estrin CISSP,
Jan 1
Eyal Estrin
12/26/25
State CIO Top Ten Policy and Technology Priorities for 2026
https://www.nascio.org/wp-content/uploads/2025/12/NASCIO-2026-State-Top-10-Priorities_a11y.pdf Eyal
unread,
State CIO Top Ten Policy and Technology Priorities for 2026
https://www.nascio.org/wp-content/uploads/2025/12/NASCIO-2026-State-Top-10-Priorities_a11y.pdf Eyal
12/26/25
Eyal Estrin
12/24/25
A Cybersecurity Playbook for AI Adoption
https://www.darkreading.com/cyber-risk/cybersecurity-playbook-ai-adoption Eyal Estrin CISSP, CCSP,
unread,
A Cybersecurity Playbook for AI Adoption
https://www.darkreading.com/cyber-risk/cybersecurity-playbook-ai-adoption Eyal Estrin CISSP, CCSP,
12/24/25
Eyal Estrin
12/23/25
Agentic AI already hinting at cybersecurity’s pending identity crisis
https://www.csoonline.com/article/4109999/agentic-ai-already-hinting-at-cybersecuritys-pending-
unread,
Agentic AI already hinting at cybersecurity’s pending identity crisis
https://www.csoonline.com/article/4109999/agentic-ai-already-hinting-at-cybersecuritys-pending-
12/23/25
Eyal Estrin
12/22/25
Hackers breach internal servers of tech provider for Britain’s health service
https://therecord.media/uk-nhs-tech-provider-dxs-discloses-hack Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
Hackers breach internal servers of tech provider for Britain’s health service
https://therecord.media/uk-nhs-tech-provider-dxs-discloses-hack Eyal Estrin CISSP, CCSP, CISM, CISA,
12/22/25
Eyal Estrin
12/22/25
Pa. high court rules that police can access Google searches without a warrant
https://therecord.media/google-searches-police-access-without-warrant-pennsylvania-court-ruling Eyal
unread,
Pa. high court rules that police can access Google searches without a warrant
https://therecord.media/google-searches-police-access-without-warrant-pennsylvania-court-ruling Eyal
12/22/25
Eyal Estrin
12/22/25
Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation
https://research.checkpoint.com/2025/ink-dragons-relay-network-and-offensive-operation/ Eyal Estrin
unread,
Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation
https://research.checkpoint.com/2025/ink-dragons-relay-network-and-offensive-operation/ Eyal Estrin
12/22/25
Eyal Estrin
12/22/25
The ‘Hidden’ Microphone Inside The Sipeed NanoKVM
https://hackaday.com/2025/12/20/the-hidden-microphone-inside-the-sipeed-nanokvm/ Eyal Estrin CISSP,
unread,
The ‘Hidden’ Microphone Inside The Sipeed NanoKVM
https://hackaday.com/2025/12/20/the-hidden-microphone-inside-the-sipeed-nanokvm/ Eyal Estrin CISSP,
12/22/25
Eyal Estrin
12/22/25
NIST tried to pull the pin on NTP servers after blackout caused atomic clock drift
https://www.theregister.com/2025/12/21/nist_ntp_outage_warning/ Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
NIST tried to pull the pin on NTP servers after blackout caused atomic clock drift
https://www.theregister.com/2025/12/21/nist_ntp_outage_warning/ Eyal Estrin CISSP, CCSP, CISM, CISA,
12/22/25
Eyal Estrin
12/22/25
Chrome among the worst browsers when it comes to user privacy
https://www.neowin.net/news/report-chrome-among-the-worst-browsers-when-it-comes-to-user-privacy/
unread,
Chrome among the worst browsers when it comes to user privacy
https://www.neowin.net/news/report-chrome-among-the-worst-browsers-when-it-comes-to-user-privacy/
12/22/25
Eyal Estrin
12/20/25
Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks
https://cybersecuritynews.com/cybersecurity-professionals-plead-guilty-ransomware-attacks/ Eyal
unread,
Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks
https://cybersecuritynews.com/cybersecurity-professionals-plead-guilty-ransomware-attacks/ Eyal
12/20/25
Eyal Estrin
12/20/25
GhostPairing Attacks: from phone number to full access in WhatsApp
https://www.gendigital.com/blog/insights/research/ghostpairing-whatsapp-attack Eyal Estrin CISSP,
unread,
GhostPairing Attacks: from phone number to full access in WhatsApp
https://www.gendigital.com/blog/insights/research/ghostpairing-whatsapp-attack Eyal Estrin CISSP,
12/20/25
Eyal Estrin
12/20/25
Investigating the Infrastructure Behind DDoSia's Attacks
https://censys.com/blog/ddosia-infrastructure Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog:
unread,
Investigating the Infrastructure Behind DDoSia's Attacks
https://censys.com/blog/ddosia-infrastructure Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog:
12/20/25
Eyal Estrin
12/20/25
The innovative CISO’s bucket list: Human-led transformation at the core
https://www.csoonline.com/article/4108133/the-innovative-cisos-bucket-list-human-led-transformation-
unread,
The innovative CISO’s bucket list: Human-led transformation at the core
https://www.csoonline.com/article/4108133/the-innovative-cisos-bucket-list-human-led-transformation-
12/20/25
Eyal Estrin
12/20/25
LG TVs’ unremovable Copilot shortcut is the least of smart TVs’ AI problems
https://arstechnica.com/gadgets/2025/12/lg-tvs-unremovable-copilot-shortcut-is-the-least-of-smart-tvs
unread,
LG TVs’ unremovable Copilot shortcut is the least of smart TVs’ AI problems
https://arstechnica.com/gadgets/2025/12/lg-tvs-unremovable-copilot-shortcut-is-the-least-of-smart-tvs
12/20/25
Eyal Estrin
12/20/25
New UEFI flaw enables pre-boot attacks on motherboards from Gigabyte, MSI, ASUS, ASRock
https://www.bleepingcomputer.com/news/security/new-uefi-flaw-enables-pre-boot-attacks-on-motherboards
unread,
New UEFI flaw enables pre-boot attacks on motherboards from Gigabyte, MSI, ASUS, ASRock
https://www.bleepingcomputer.com/news/security/new-uefi-flaw-enables-pre-boot-attacks-on-motherboards
12/20/25
Eyal Estrin
12/19/25
Cybersecurity leaders’ top seven takeaways from 2025
https://www.csoonline.com/article/4102893/cybersecurity-leaders-top-seven-takeaways-from-2025.html
unread,
Cybersecurity leaders’ top seven takeaways from 2025
https://www.csoonline.com/article/4102893/cybersecurity-leaders-top-seven-takeaways-from-2025.html
12/19/25
Eyal Estrin
12/19/25
Beat the Bypass: Why 52% of Vulnerabilities Slip Past the WAF (and How AI Augmentation Fixes It)
https://www.miggo.io/post/new-report-beat-the-bypass-why-52-of-vulnerabilities-slip-past-the-waf-and-
unread,
Beat the Bypass: Why 52% of Vulnerabilities Slip Past the WAF (and How AI Augmentation Fixes It)
https://www.miggo.io/post/new-report-beat-the-bypass-why-52-of-vulnerabilities-slip-past-the-waf-and-
12/19/25
Eyal Estrin
12/19/25
The Evolving Blueprint of TDIR Architecture
https://blog.securitybalance.com/p/the-evolving-blueprint-of-tdir-architecture Eyal Estrin CISSP,
unread,
The Evolving Blueprint of TDIR Architecture
https://blog.securitybalance.com/p/the-evolving-blueprint-of-tdir-architecture Eyal Estrin CISSP,
12/19/25