Cyber Threats Xposed (@cybersauna) 's Twitter Profile
Cyber Threats Xposed

@cybersauna

Join Tim and Steve for Cyber Threats Xposed, a monthly podcast that explores the intersections of technology, techniques employed by attackers, and the tactics

ID: 935457438089797633

linkhttps://www.withsecure.com/en/expertise/podcasts/cyberthreats-xposed-march2024 calendar_today28-11-2017 10:36:48

1,1K Tweet

1,1K Followers

48 Following

Disobey (@disobey_fi) 's Twitter Profile Photo

Psst! The CfP for Disobey 2024 is still open for about a week! If you are brimming with ideas, there is still a week to go! Submit your program item proposal at latest on Nov 30th by 23:00 (Finnish time, EET). To submit a program item proposal, go to: cfp.disobey.fi/disobey2024/

Psst! The CfP for Disobey 2024 is still open for about a week! If you are brimming with ideas, there is still a week to go! Submit your program item proposal at latest on Nov 30th by 23:00 (Finnish time, EET). To submit a program item proposal, go to: cfp.disobey.fi/disobey2024/
Cyber Threats Xposed (@cybersauna) 's Twitter Profile Photo

What's the gist of NIST? V.2 of this #CyberSecurity Framework is coming. And it’s not just for big companies. Who better to go over its potential benefits and pitfalls than Cybersecurity Strategist Matthew Rosenquist and WithSecure CISO Chris Bejerasco>> cybersecuritysauna.libsyn.com

WithSecure™ (@withsecure) 's Twitter Profile Photo

NEW TOOL: IceKube gives you a cool edge over attackers. This new tool from Mohit Gupta generates a graph database of a Kubernetes cluster & analyzes the relationships to identify potential attack paths. Get it now on GitHub>> labs.withsecure.com/tools/icekube-… #CyberSecurity #cyberattacks

NEW TOOL: IceKube gives you a cool edge over attackers.

This new tool from <a href="/_skybound/">Mohit Gupta</a> generates a graph database of a Kubernetes cluster &amp; analyzes the relationships to identify potential attack paths.

Get it now on GitHub&gt;&gt; labs.withsecure.com/tools/icekube-…

#CyberSecurity #cyberattacks
Tom Van de Wiele (@0xtosh) 's Twitter Profile Photo

When I ask corps about their security architecture and use of e.g. SaaS services the answer is usually: “That’s their problem” . 3rd party supplier associated risk is still underplayed. It requires a specific threat model, detection/response strategy and a continuity plan.

WithSecure™ (@withsecure) 's Twitter Profile Photo

We’ve got 5 tickets to giveaway for #BSidesLDN2023 on 9th December. To enter: reply to this tweet to let us know how many Security BSides events you’ve been to? We’ll select 5 lucky winners. We’ll DM you to confirm if you’ve won. Entries close 14:00 GMT, 1st December.

We’ve got 5 tickets to giveaway for #BSidesLDN2023 on 9th December.

To enter: reply to this tweet to let us know how many <a href="/SecurityBSides/">Security BSides</a> events you’ve been to? 

We’ll select 5 lucky winners. We’ll DM you to confirm if you’ve won. Entries close 14:00 GMT, 1st December.
WithSecure™ (@withsecure) 's Twitter Profile Photo

RESEARCH: New DarkGate targets like Ducktail with a far different payload. Our Hoddy looks at the malware first identified this summer. See the infection chain, detection methods & what we learned from a proactive threat hunting of our user base> labs.withsecure.com/publications/d…

RESEARCH: New DarkGate targets like Ducktail with a far different payload.

Our <a href="/FiresideNomad/">Hoddy</a> looks at the malware first identified this summer. See the infection chain, detection methods &amp; what we learned from a proactive threat hunting of our user base&gt; labs.withsecure.com/publications/d…
WithSecure™ (@withsecure) 's Twitter Profile Photo

The IoT boom makes "smart locks" a tempting proposition. But how good are they actually? In their talk at #BSidesLDN, Miłosz Gaczkowski and Alex Pettifer looked at a popular line of smart locks. And demonstrated a little lock picking. Watch the whole talk>> youtube.com/watch?v=1JDqhz…

Cyber Threats Xposed (@cybersauna) 's Twitter Profile Photo

The better we do, the harder it is to justify our budgets. In #CyberSauna 086, Matthew Rosenquist talked about the "cliff" that CISOs face when it comes to dealing with the C-suite. Find why showing the value of #cybersecurity matter more than ever>> cybersecuritysauna.libsyn.com

@mikko (@mikko) 's Twitter Profile Photo

My lecture at the UCL Faculty of Laws in London has been rescheduled due to air traffic strikes in Finland. The new date for "AI-enabled Crime" is the 19th of March 2024. The lecture is open for all, but you need to register at: ucl.ac.uk/laws/events/20…

My lecture at the <a href="/UCL/">UCL</a> Faculty of Laws in London has been rescheduled due to air traffic strikes in Finland. The new date for "AI-enabled Crime" is the 19th of March 2024. The lecture is open for all, but you need to register at: ucl.ac.uk/laws/events/20…
Cyber Threats Xposed (@cybersauna) 's Twitter Profile Photo

CyberSauna is now Cyber Threats Xposed! Listen to the first episode, as Tim and Steve unpick the major threats uncovered over the past month. 🎧:withsecure.com/en/expertise/p… #Xposed #Podcast

CyberSauna is now Cyber Threats Xposed! Listen to the first episode, as Tim and Steve unpick the major threats uncovered over the past month. 

🎧:withsecure.com/en/expertise/p…

#Xposed #Podcast
Cyber Threats Xposed (@cybersauna) 's Twitter Profile Photo

🎙️Episode 2 of Xposed is now live🎙️ Tune in for all the latest cyber threat news from across Europe and beyond over the past month - this time with added puns, extra sarcasm and more than a little innuendo! Available here, or where you get your pods: withsecure.com/en/expertise/p…