Groups
Groups
Sign in
Groups
Groups
Technical - Security
Conversations
About
Send feedback
Help
Technical - Security
1–30 of 15534
Mark all as read
Report group
0 selected
Eyal Estrin
1:12 AM
Medical data of 500,000 UK volunteers listed for sale on Alibaba
https://www.malwarebytes.com/blog/news/2026/04/medical-data-of-500000-uk-volunteers-listed-for-sale-
unread,
Medical data of 500,000 UK volunteers listed for sale on Alibaba
https://www.malwarebytes.com/blog/news/2026/04/medical-data-of-500000-uk-volunteers-listed-for-sale-
1:12 AM
Eyal Estrin
1:12 AM
Hazy Hawk Hijacked Subdomains at MIT, Harvard, Stanford, and 30+ Other US Universities
https://www.sh.consulting/blog/hazy-hawk-hijacked-subdomains-mit-harvard-stanford-us-universities
unread,
Hazy Hawk Hijacked Subdomains at MIT, Harvard, Stanford, and 30+ Other US Universities
https://www.sh.consulting/blog/hazy-hawk-hijacked-subdomains-mit-harvard-stanford-us-universities
1:12 AM
Eyal Estrin
Apr 23
Device code phishing is on the rise with 7 million attacks in four weeks
https://blog.barracuda.com/2026/04/23/threat-spotlight-device-code-phishing Eyal Estrin Author |
unread,
Device code phishing is on the rise with 7 million attacks in four weeks
https://blog.barracuda.com/2026/04/23/threat-spotlight-device-code-phishing Eyal Estrin Author |
Apr 23
Eyal Estrin
Apr 23
Cisco Talos - 2025 Year in Review
https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/files/2026/03/2025YiR-
unread,
Cisco Talos - 2025 Year in Review
https://storage.ghost.io/c/af/a0/afa04ee3-414f-4481-8d23-7e7c146f192e/content/files/2026/03/2025YiR-
Apr 23
Eyal Estrin
Apr 23
2026 Attack Landscape Report: BEC Tactics Adapt to Your Operations
https://abnormal.ai/blog/2026-attack-landscape-report-bec Eyal Estrin Author | Cloud Architect | AWS
unread,
2026 Attack Landscape Report: BEC Tactics Adapt to Your Operations
https://abnormal.ai/blog/2026-attack-landscape-report-bec Eyal Estrin Author | Cloud Architect | AWS
Apr 23
Eyal Estrin
Apr 23
Defending Against China-Nexus Covert Networks of Compromised Devices (AA26-113A)
https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-113a Eyal Estrin Author | Cloud
unread,
Defending Against China-Nexus Covert Networks of Compromised Devices (AA26-113A)
https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-113a Eyal Estrin Author | Cloud
Apr 23
Eyal Estrin
Apr 23
When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks
https://unit42.paloaltonetworks.com/air-snitch-enterprise-wireless-attacks/ Eyal Estrin Author |
unread,
When Wi-Fi Encryption Fails: Protecting Your Enterprise from AirSnitch Attacks
https://unit42.paloaltonetworks.com/air-snitch-enterprise-wireless-attacks/ Eyal Estrin Author |
Apr 23
Eyal Estrin
Apr 22
Contrary to popular superstition, AES 128 is just fine in a post-quantum world
https://arstechnica.com/security/2026/04/contrary-to-popular-superstition-aes-128-is-just-fine-in-a-
unread,
Contrary to popular superstition, AES 128 is just fine in a post-quantum world
https://arstechnica.com/security/2026/04/contrary-to-popular-superstition-aes-128-is-just-fine-in-a-
Apr 22
Eyal Estrin
Apr 21
FTP Exposure Brief: Examining the 55-Year-Old Protocol Used by Millions
https://censys.com/blog/ftp-exposure-brief/ Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP
unread,
FTP Exposure Brief: Examining the 55-Year-Old Protocol Used by Millions
https://censys.com/blog/ftp-exposure-brief/ Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP
Apr 21
Eyal Estrin
Apr 21
APT28 exploit routers to enable DNS hijacking operations
https://www.ncsc.gov.uk/news/apt28-exploit-routers-to-enable-dns-hijacking-operations Eyal Estrin
unread,
APT28 exploit routers to enable DNS hijacking operations
https://www.ncsc.gov.uk/news/apt28-exploit-routers-to-enable-dns-hijacking-operations Eyal Estrin
Apr 21
Eyal Estrin
Apr 21
Hackers Fail to Exploit Flaw in Discontinued TP-Link Routers (CVE-2023-33538)
https://www.securityweek.com/hackers-fail-to-exploit-flaw-in-discontinued-tp-link-routers/ https://
unread,
Hackers Fail to Exploit Flaw in Discontinued TP-Link Routers (CVE-2023-33538)
https://www.securityweek.com/hackers-fail-to-exploit-flaw-in-discontinued-tp-link-routers/ https://
Apr 21
Eyal Estrin
Apr 19
Boosting user privacy and business protection with updated Play policies
https://android-developers.googleblog.com/2026/04/giving-users-clearer-choice-and-everyone-a-safer-
unread,
Boosting user privacy and business protection with updated Play policies
https://android-developers.googleblog.com/2026/04/giving-users-clearer-choice-and-everyone-a-safer-
Apr 19
Eyal Estrin
Apr 18
Social Engineering the AI Way – Defeating Automated Attacks
https://www.cyberdefensemagazine.com/social-engineering-the-ai-way-defeating-automated-attacks/ Eyal
unread,
Social Engineering the AI Way – Defeating Automated Attacks
https://www.cyberdefensemagazine.com/social-engineering-the-ai-way-defeating-automated-attacks/ Eyal
Apr 18
Eyal Estrin
Apr 18
All Hands-on Deck: The USCG Just Made Cybersecurity Non-Negotiable
https://www.dragos.com/blog/maritime-cybersecurity-uscg-mtsa-requirements Eyal Estrin Author | Cloud
unread,
All Hands-on Deck: The USCG Just Made Cybersecurity Non-Negotiable
https://www.dragos.com/blog/maritime-cybersecurity-uscg-mtsa-requirements Eyal Estrin Author | Cloud
Apr 18
Eyal Estrin
Apr 18
AI isn’t replacing SOC teams. It’s elevating them
https://www.tines.com/blog/ai-impact-soc-careers/ Eyal Estrin Author | Cloud Architect | AWS • Azure
unread,
AI isn’t replacing SOC teams. It’s elevating them
https://www.tines.com/blog/ai-impact-soc-careers/ Eyal Estrin Author | Cloud Architect | AWS • Azure
Apr 18
Eyal Estrin
Apr 18
Are Former Black Basta Affiliates Automating Executive Targeting?
https://reliaquest.com/blog/threat-spotlight-are-former-black-basta-affiliates-automating-executive-
unread,
Are Former Black Basta Affiliates Automating Executive Targeting?
https://reliaquest.com/blog/threat-spotlight-are-former-black-basta-affiliates-automating-executive-
Apr 18
Eyal Estrin
Apr 18
Why Attackers Are Bypassing Phishing Emails and Targeting Identity Instead
https://www.levelblue.com/blogs/spiderlabs-blog/why-attackers-are-bypassing-phishing-emails-and-
unread,
Why Attackers Are Bypassing Phishing Emails and Targeting Identity Instead
https://www.levelblue.com/blogs/spiderlabs-blog/why-attackers-are-bypassing-phishing-emails-and-
Apr 18
Eyal Estrin
Apr 18
The end of encrypted DMs? Why Instagram is rolling back its biggest security feature
https://www.techradar.com/vpn/vpn-privacy-security/the-end-of-encrypted-dms-why-instagram-is-rolling-
unread,
The end of encrypted DMs? Why Instagram is rolling back its biggest security feature
https://www.techradar.com/vpn/vpn-privacy-security/the-end-of-encrypted-dms-why-instagram-is-rolling-
Apr 18
Eyal Estrin
Apr 16
Cloud CISO Perspectives: How CISOs can pursue technical and cultural resilience (Q&A)
https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-how-cisos-can-pursue
unread,
Cloud CISO Perspectives: How CISOs can pursue technical and cultural resilience (Q&A)
https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-how-cisos-can-pursue
Apr 16
Eyal Estrin
Apr 16
AI discovers bugs faster than teams can respond
https://www.developer-tech.com/news/ai-is-accelerating-bug-discovery-faster-than-teams-can-respond/
unread,
AI discovers bugs faster than teams can respond
https://www.developer-tech.com/news/ai-is-accelerating-bug-discovery-faster-than-teams-can-respond/
Apr 16
Eyal Estrin
Apr 16
2026 State of Exposure Management
https://seemplicity.io/papers/2026-state-exposure-management-report/ Eyal Estrin Author | Cloud
unread,
2026 State of Exposure Management
https://seemplicity.io/papers/2026-state-exposure-management-report/ Eyal Estrin Author | Cloud
Apr 16
Eyal Estrin
Apr 16
2026 Cybersecurity Talent Report
https://www.iansresearch.com/resources/press-releases/detail/new-ians-and-artico-search-report-finds-
unread,
2026 Cybersecurity Talent Report
https://www.iansresearch.com/resources/press-releases/detail/new-ians-and-artico-search-report-finds-
Apr 16
Eyal Estrin
Apr 16
The "IT Issue" Myth: How Treating Cyber Security as a Cost Center Destroys Brands
https://www.linkedin.com/pulse/issue-myth-how-treating-cyber-security-cost-center-brands-das-neves-
unread,
The "IT Issue" Myth: How Treating Cyber Security as a Cost Center Destroys Brands
https://www.linkedin.com/pulse/issue-myth-how-treating-cyber-security-cost-center-brands-das-neves-
Apr 16
Eyal Estrin
Apr 14
New Booking.com data breach forces reservation PIN resets
https://www.bleepingcomputer.com/news/security/new-bookingcom-data-breach-forces-reservation-pin-
unread,
New Booking.com data breach forces reservation PIN resets
https://www.bleepingcomputer.com/news/security/new-bookingcom-data-breach-forces-reservation-pin-
Apr 14
Eyal Estrin
Apr 13
LLM-generated passwords are indefensible. Your codebase may already prove it
https://www.csoonline.com/article/4155166/llm-generated-passwords-are-indefensible-your-codebase-may-
unread,
LLM-generated passwords are indefensible. Your codebase may already prove it
https://www.csoonline.com/article/4155166/llm-generated-passwords-are-indefensible-your-codebase-may-
Apr 13
Eyal Estrin
Apr 12
Understanding Data Collection, Brokerage, and Spam in the Lead Marketing Ecosystem
https://arxiv.org/pdf/2604.06759 Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP Insights
unread,
Understanding Data Collection, Brokerage, and Spam in the Lead Marketing Ecosystem
https://arxiv.org/pdf/2604.06759 Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP Insights
Apr 12
Eyal Estrin
Apr 12
Mythos Is Likely Not As Great As Claimed But That Doesn’t Matter
https://www.linkedin.com/pulse/mythos-likely-great-claimed-doesnt-matter-roger-grimes-ymy0c/ Eyal
unread,
Mythos Is Likely Not As Great As Claimed But That Doesn’t Matter
https://www.linkedin.com/pulse/mythos-likely-great-claimed-doesnt-matter-roger-grimes-ymy0c/ Eyal
Apr 12
Eyal Estrin
Apr 12
MITRE Releases Fight Fraud Framework
https://www.securityweek.com/mitre-releases-fight-fraud-framework/ https://ctid.mitre.org/fraud/#/
unread,
MITRE Releases Fight Fraud Framework
https://www.securityweek.com/mitre-releases-fight-fraud-framework/ https://ctid.mitre.org/fraud/#/
Apr 12
Eyal Estrin
Apr 12
Uncovering Webloc - An Analysis of Penlink’s Ad-based Geolocation Surveillance Tech
https://citizenlab.ca/research/analysis-of-penlinks-ad-based-geolocation-surveillance-tech/ Eyal
unread,
Uncovering Webloc - An Analysis of Penlink’s Ad-based Geolocation Surveillance Tech
https://citizenlab.ca/research/analysis-of-penlinks-ad-based-geolocation-surveillance-tech/ Eyal
Apr 12
Eyal Estrin
Apr 11
Internet-Exposed ICS Devices Raise Alarm for Critical Sectors
https://securityaffairs.com/190525/ics-scada/internet-exposed-ics-devices-raise-alarm-for-critical-
unread,
Internet-Exposed ICS Devices Raise Alarm for Critical Sectors
https://securityaffairs.com/190525/ics-scada/internet-exposed-ics-devices-raise-alarm-for-critical-
Apr 11