Groups
Groups
Sign in
Groups
Groups
Technical - Security
Conversations
About
Send feedback
Help
Technical - Security
1–30 of 15244
Mark all as read
Report group
0 selected
Eyal Estrin
Dec 22
Hackers breach internal servers of tech provider for Britain’s health service
https://therecord.media/uk-nhs-tech-provider-dxs-discloses-hack Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
Hackers breach internal servers of tech provider for Britain’s health service
https://therecord.media/uk-nhs-tech-provider-dxs-discloses-hack Eyal Estrin CISSP, CCSP, CISM, CISA,
Dec 22
Eyal Estrin
Dec 22
Pa. high court rules that police can access Google searches without a warrant
https://therecord.media/google-searches-police-access-without-warrant-pennsylvania-court-ruling Eyal
unread,
Pa. high court rules that police can access Google searches without a warrant
https://therecord.media/google-searches-police-access-without-warrant-pennsylvania-court-ruling Eyal
Dec 22
Eyal Estrin
Dec 22
Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation
https://research.checkpoint.com/2025/ink-dragons-relay-network-and-offensive-operation/ Eyal Estrin
unread,
Inside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive Operation
https://research.checkpoint.com/2025/ink-dragons-relay-network-and-offensive-operation/ Eyal Estrin
Dec 22
Eyal Estrin
Dec 22
The ‘Hidden’ Microphone Inside The Sipeed NanoKVM
https://hackaday.com/2025/12/20/the-hidden-microphone-inside-the-sipeed-nanokvm/ Eyal Estrin CISSP,
unread,
The ‘Hidden’ Microphone Inside The Sipeed NanoKVM
https://hackaday.com/2025/12/20/the-hidden-microphone-inside-the-sipeed-nanokvm/ Eyal Estrin CISSP,
Dec 22
Eyal Estrin
Dec 22
NIST tried to pull the pin on NTP servers after blackout caused atomic clock drift
https://www.theregister.com/2025/12/21/nist_ntp_outage_warning/ Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
NIST tried to pull the pin on NTP servers after blackout caused atomic clock drift
https://www.theregister.com/2025/12/21/nist_ntp_outage_warning/ Eyal Estrin CISSP, CCSP, CISM, CISA,
Dec 22
Eyal Estrin
Dec 22
Chrome among the worst browsers when it comes to user privacy
https://www.neowin.net/news/report-chrome-among-the-worst-browsers-when-it-comes-to-user-privacy/
unread,
Chrome among the worst browsers when it comes to user privacy
https://www.neowin.net/news/report-chrome-among-the-worst-browsers-when-it-comes-to-user-privacy/
Dec 22
Eyal Estrin
Dec 20
Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks
https://cybersecuritynews.com/cybersecurity-professionals-plead-guilty-ransomware-attacks/ Eyal
unread,
Cybersecurity Professionals Plead Guilty to Launching Ransomware Attacks
https://cybersecuritynews.com/cybersecurity-professionals-plead-guilty-ransomware-attacks/ Eyal
Dec 20
Eyal Estrin
Dec 20
GhostPairing Attacks: from phone number to full access in WhatsApp
https://www.gendigital.com/blog/insights/research/ghostpairing-whatsapp-attack Eyal Estrin CISSP,
unread,
GhostPairing Attacks: from phone number to full access in WhatsApp
https://www.gendigital.com/blog/insights/research/ghostpairing-whatsapp-attack Eyal Estrin CISSP,
Dec 20
Eyal Estrin
Dec 20
Investigating the Infrastructure Behind DDoSia's Attacks
https://censys.com/blog/ddosia-infrastructure Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog:
unread,
Investigating the Infrastructure Behind DDoSia's Attacks
https://censys.com/blog/ddosia-infrastructure Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog:
Dec 20
Eyal Estrin
Dec 20
The innovative CISO’s bucket list: Human-led transformation at the core
https://www.csoonline.com/article/4108133/the-innovative-cisos-bucket-list-human-led-transformation-
unread,
The innovative CISO’s bucket list: Human-led transformation at the core
https://www.csoonline.com/article/4108133/the-innovative-cisos-bucket-list-human-led-transformation-
Dec 20
Eyal Estrin
Dec 20
LG TVs’ unremovable Copilot shortcut is the least of smart TVs’ AI problems
https://arstechnica.com/gadgets/2025/12/lg-tvs-unremovable-copilot-shortcut-is-the-least-of-smart-tvs
unread,
LG TVs’ unremovable Copilot shortcut is the least of smart TVs’ AI problems
https://arstechnica.com/gadgets/2025/12/lg-tvs-unremovable-copilot-shortcut-is-the-least-of-smart-tvs
Dec 20
Eyal Estrin
Dec 20
New UEFI flaw enables pre-boot attacks on motherboards from Gigabyte, MSI, ASUS, ASRock
https://www.bleepingcomputer.com/news/security/new-uefi-flaw-enables-pre-boot-attacks-on-motherboards
unread,
New UEFI flaw enables pre-boot attacks on motherboards from Gigabyte, MSI, ASUS, ASRock
https://www.bleepingcomputer.com/news/security/new-uefi-flaw-enables-pre-boot-attacks-on-motherboards
Dec 20
Eyal Estrin
Dec 19
Cybersecurity leaders’ top seven takeaways from 2025
https://www.csoonline.com/article/4102893/cybersecurity-leaders-top-seven-takeaways-from-2025.html
unread,
Cybersecurity leaders’ top seven takeaways from 2025
https://www.csoonline.com/article/4102893/cybersecurity-leaders-top-seven-takeaways-from-2025.html
Dec 19
Eyal Estrin
Dec 19
Beat the Bypass: Why 52% of Vulnerabilities Slip Past the WAF (and How AI Augmentation Fixes It)
https://www.miggo.io/post/new-report-beat-the-bypass-why-52-of-vulnerabilities-slip-past-the-waf-and-
unread,
Beat the Bypass: Why 52% of Vulnerabilities Slip Past the WAF (and How AI Augmentation Fixes It)
https://www.miggo.io/post/new-report-beat-the-bypass-why-52-of-vulnerabilities-slip-past-the-waf-and-
Dec 19
Eyal Estrin
Dec 19
The Evolving Blueprint of TDIR Architecture
https://blog.securitybalance.com/p/the-evolving-blueprint-of-tdir-architecture Eyal Estrin CISSP,
unread,
The Evolving Blueprint of TDIR Architecture
https://blog.securitybalance.com/p/the-evolving-blueprint-of-tdir-architecture Eyal Estrin CISSP,
Dec 19
Eyal Estrin
Dec 19
Why Venture Capital Is Betting Against Traditional SIEMs
https://raffy.ch/blog/2025/12/17/why-venture-capital-is-betting-against-traditional-siems/ Eyal
unread,
Why Venture Capital Is Betting Against Traditional SIEMs
https://raffy.ch/blog/2025/12/17/why-venture-capital-is-betting-against-traditional-siems/ Eyal
Dec 19
Eyal Estrin
Dec 19
8 Million Users' AI Conversations Sold for Profit by "Privacy" Extensions
https://www.koi.ai/blog/urban-vpn-browser-extension-ai-conversations-data-collection Eyal Estrin
unread,
8 Million Users' AI Conversations Sold for Profit by "Privacy" Extensions
https://www.koi.ai/blog/urban-vpn-browser-extension-ai-conversations-data-collection Eyal Estrin
Dec 19
Eyal Estrin
Dec 19
Microsoft Defender Experts Disrupt Jasper Sleet’s Insider Access Campaign
https://techcommunity.microsoft.com/blog/microsoftsecurityexperts/microsoft-defender-experts-disrupt-
unread,
Microsoft Defender Experts Disrupt Jasper Sleet’s Insider Access Campaign
https://techcommunity.microsoft.com/blog/microsoftsecurityexperts/microsoft-defender-experts-disrupt-
Dec 19
Eyal Estrin
Dec 19
The Case for Dynamic AI-SaaS Security as Copilots Scale
https://thehackernews.com/2025/12/the-case-for-dynamic-ai-saas-security.html Eyal Estrin CISSP, CCSP,
unread,
The Case for Dynamic AI-SaaS Security as Copilots Scale
https://thehackernews.com/2025/12/the-case-for-dynamic-ai-saas-security.html Eyal Estrin CISSP, CCSP,
Dec 19
Eyal Estrin
Dec 18
How Mandiant can help test and strengthen your cyber resilience
https://cloud.google.com/blog/products/identity-security/how-mandiant-can-help-test-and-strengthen-
unread,
How Mandiant can help test and strengthen your cyber resilience
https://cloud.google.com/blog/products/identity-security/how-mandiant-can-help-test-and-strengthen-
Dec 18
Eyal Estrin
Dec 18
Amazon Threat Intelligence identifies Russian cyber threat group targeting Western critical infrastructure
https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-
unread,
Amazon Threat Intelligence identifies Russian cyber threat group targeting Western critical infrastructure
https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-
Dec 18
Eyal Estrin
Dec 18
Microsoft will finally kill obsolete cipher that has wreaked decades of havoc
https://arstechnica.com/security/2025/12/microsoft-will-finally-kill-obsolete-cipher-that-has-wreaked
unread,
Microsoft will finally kill obsolete cipher that has wreaked decades of havoc
https://arstechnica.com/security/2025/12/microsoft-will-finally-kill-obsolete-cipher-that-has-wreaked
Dec 18
Eyal Estrin
Dec 18
Let's Encrypt launches 'Generation Y,' shortens cert lifetimes to 45 Days
https://www.neowin.net/news/lets-encrypt-launches-generation-y-shortens-cert-lifetimes-to-45-days/
unread,
Let's Encrypt launches 'Generation Y,' shortens cert lifetimes to 45 Days
https://www.neowin.net/news/lets-encrypt-launches-generation-y-shortens-cert-lifetimes-to-45-days/
Dec 18
Eyal Estrin
Dec 15
AI is accelerating cyberattacks. Is your network prepared?
https://www.bleepingcomputer.com/news/security/ai-is-accelerating-cyberattacks-is-your-network-
unread,
AI is accelerating cyberattacks. Is your network prepared?
https://www.bleepingcomputer.com/news/security/ai-is-accelerating-cyberattacks-is-your-network-
Dec 15
Eyal Estrin
Dec 14
5 Critical Situations Where You Should Never Rely on ChatGPT
https://www.cysecurity.news/2025/12/5-critical-situations-where-you-should.html Eyal Estrin CISSP,
unread,
5 Critical Situations Where You Should Never Rely on ChatGPT
https://www.cysecurity.news/2025/12/5-critical-situations-where-you-should.html Eyal Estrin CISSP,
Dec 14
Eyal Estrin
Dec 14
Securing Battery Energy Storage Systems from Cyberthreats: Best Practices and Trends for Protecting Critical Energy Infrastructure
https://www.brattle.com/wp-content/uploads/2025/12/Securing-Battery-Energy-Storage-Systems-from-
unread,
Securing Battery Energy Storage Systems from Cyberthreats: Best Practices and Trends for Protecting Critical Energy Infrastructure
https://www.brattle.com/wp-content/uploads/2025/12/Securing-Battery-Energy-Storage-Systems-from-
Dec 14
Eyal Estrin
Dec 13
How private is your VPN?
https://www.malwarebytes.com/blog/inside-malwarebytes/2025/12/how-private-is-your-vpn Eyal Estrin
unread,
How private is your VPN?
https://www.malwarebytes.com/blog/inside-malwarebytes/2025/12/how-private-is-your-vpn Eyal Estrin
Dec 13
Eyal Estrin
Dec 13
How identity fraud is changing in the age of AI
https://www.weforum.org/stories/2025/12/how-identity-fraud-is-increasing-in-the-age-of-ai/ Eyal
unread,
How identity fraud is changing in the age of AI
https://www.weforum.org/stories/2025/12/how-identity-fraud-is-increasing-in-the-age-of-ai/ Eyal
Dec 13
Eyal Estrin
Dec 13
Cloud CISO Perspectives: Our 2026 Cybersecurity Forecast report
https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-2026-
unread,
Cloud CISO Perspectives: Our 2026 Cybersecurity Forecast report
https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-2026-
Dec 13
Eyal Estrin
Dec 12
Changing the physics of cyber defense
https://www.microsoft.com/en-us/security/blog/2025/12/09/changing-the-physics-of-cyber-defense/ Eyal
unread,
Changing the physics of cyber defense
https://www.microsoft.com/en-us/security/blog/2025/12/09/changing-the-physics-of-cyber-defense/ Eyal
Dec 12