Kudelski Security (@kudelskisec) 's Twitter Profile
Kudelski Security

@kudelskisec

Swiss provider of tailored #cybersecurity solutions, services & incident response 70+ years of innovation $200m invested in R&D yearly #IntelligentCybersecurity

ID: 906029628

linkhttps://www.kudelskisecurity.com/ calendar_today26-10-2012 13:48:04

2,2K Tweet

8,8K Followers

1,1K Following

Kudelski Security (@kudelskisec) 's Twitter Profile Photo

Read Naveen's post on Kudelski Security research 'New IT Support in Town' for an explanation of the Blackbasta registration bombing attack, with some new detection queries research.kudelskisecurity.com/new-it-support…

Kudelski Security (@kudelskisec) 's Twitter Profile Photo

📢🔒 New Security Advisories published today on Kudelski Security Research blog: Adobe Commerce CVE-2024-34102 CosmicSting, Cleo File Transfer CVE-2024-50623, Windows LDAP CVE-2024-49112 kdlski.co/4iy8SJM #CyberSecurity #VulnerabilityManagement #InfoSec

📢🔒 New Security Advisories published today on <a href="/KudelskiSec/">Kudelski Security</a> Research blog: Adobe Commerce CVE-2024-34102 CosmicSting, Cleo File Transfer CVE-2024-50623, Windows LDAP CVE-2024-49112
kdlski.co/4iy8SJM
 
#CyberSecurity #VulnerabilityManagement #InfoSec
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

Deepfakes are more than just tech buzz—they're tools for scams, harassment, & social engineering. Kudelski Security’s Nathan Hamiel reveals what CISOs need to know—and how to fight back—in his latest WEF article. 🔗 kdlski.co/4jdZLOz #AI #Deepfakes #Cybersecurity #CISOs

Kudelski Security (@kudelskisec) 's Twitter Profile Photo

🚨 Critical Alert for FortiOS & FortiProxy Users 🚨 A critical security issue is being actively exploited, allowing attackers to bypass authentication. Take steps to understand the risks and protect your organization. 👉 Read our latest blog for key insights:

🚨 Critical Alert for FortiOS &amp; FortiProxy Users 🚨

A critical security issue is being actively exploited, allowing attackers to bypass authentication. Take steps to understand the risks and protect your organization.

👉 Read our latest blog for key insights:
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

🔒 Securing OT Environments is Critical 🔒 Cyber threats targeting OT systems in energy, healthcare, & transportation are growing. Traditional security approaches no longer suffice. Discover practical steps to strengthen OT defenses and safeguard critical operations in our

🔒 Securing OT Environments is Critical 🔒

Cyber threats targeting OT systems in energy, healthcare, &amp; transportation are growing. Traditional security approaches no longer suffice.

Discover practical steps to strengthen OT defenses and safeguard critical operations in our
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

The TikTok ban isn’t just a headline—it’s a game-changer for tech, data, and geopolitics. - Who owns your data? - Is your security strategy ready for global scrutiny? - Can tech survive as a political battleground? Dive into our latest blog to uncover the lessons that CISOs

The TikTok ban isn’t just a headline—it’s a game-changer for tech, data, and geopolitics.

- Who owns your data?
- Is your security strategy ready for global scrutiny?
- Can tech survive as a political battleground?

Dive into our latest blog to uncover the lessons that CISOs
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

🔹 Cybersecurity Maturity: A Journey, Not a Destination 🔹 Maturity isn’t a box to check—it’s incremental progress. The best CISOs focus on getting 1% better every day. Michael Robbins of Kudelski Security shares a risk-based approach to building resilient, adaptable security.

🔹 Cybersecurity Maturity: A Journey, Not a Destination 🔹

Maturity isn’t a box to check—it’s incremental progress. The best CISOs focus on getting 1% better every day.

Michael Robbins of Kudelski Security shares a risk-based approach to building resilient, adaptable security.
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

Critical Palo Alto PAN-OS bug severity upgraded and actively exploited. Stay informed and read more on our blog: kdlski.co/3XjReQP #CyberSecurity #PaloAlto #PANOS #Vulnerability #ThreatIntel #InfoSec #CISO #NetworkSecurity #RiskManagement #ZeroTrust

Kudelski Security (@kudelskisec) 's Twitter Profile Photo

Cyber threats don’t wait. That’s why Pernod Ricard trusts Kudelski Security’s MDR ONE Resolute for 24/7 protection. CTO Xavier Gaubert shares how this partnership has strengthened their security and reduced risk. Watch now: kdlski.co/4i2Dv9l #CyberSecurity #MDR #CISO

Kudelski Security (@kudelskisec) 's Twitter Profile Photo

🔐 Is your company truly secure? Boost your cybersecurity by mastering Pentesting basics: ✅ Pentesting explained ✅ Pentesting types ✅ Red Team vs Pentesting ✅ Red vs Blue Teams Get the answers ➡️ kdlski.co/4iBvvMN #Cybersecurity #Pentesting #RedTeam #BlueTeam

🔐 Is your company truly secure? Boost your cybersecurity by mastering Pentesting basics:

✅ Pentesting explained
✅ Pentesting types
✅ Red Team vs Pentesting
✅ Red vs Blue Teams

Get the answers ➡️ kdlski.co/4iBvvMN

#Cybersecurity #Pentesting #RedTeam #BlueTeam
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

How does Pernod Ricard scale cyber resilience across 160+ countries? With Kudelski Security’s MDR ONE Resolute, they cut false positives, sped up response times & gained 24/7 threat coverage. Read our case study: kdlski.co/4je38UV #CyberSecurity #MDR #XDR #PernodRicard

How does Pernod Ricard scale cyber resilience across 160+ countries?

With Kudelski Security’s MDR ONE Resolute, they cut false positives, sped up response times &amp; gained 24/7 threat coverage.

Read our case study: kdlski.co/4je38UV

#CyberSecurity #MDR #XDR #PernodRicard
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

In today's fast-paced industrial environments, a single misstep can trigger a major crisis in seconds. 🔗 Read the full article here: kdlski.co/45GyBeT #CyberSecurity #OTResilience #CrisisManagement #IndustrialOperations #Governance #ITOTConvergence

In today's fast-paced industrial environments, a single misstep can trigger a major crisis in seconds.
🔗 Read the full article here: kdlski.co/45GyBeT
#CyberSecurity #OTResilience #CrisisManagement #IndustrialOperations #Governance #ITOTConvergence
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

Blockchain is transforming business, but it’s not secure by default. Smart contract bugs, governance attacks, and hidden risks can cost millions. In our latest ModernCISO blog, we show how to protect your blockchain investments. 🔗 kdlski.co/3TEuqt7 #BlockchainSecurity

Blockchain is transforming business, but it’s not secure by default.
Smart contract bugs, governance attacks, and hidden risks can cost millions.
In our latest ModernCISO blog, we show how to protect your blockchain investments.
🔗 kdlski.co/3TEuqt7

#BlockchainSecurity
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

Hackers are hitting ASP . Net apps, exploiting exposed MachineKeys for RCE and stealthy webshells like Godzilla. They’re pivoting fast to tools like Cobalt Strike and chasing privilege escalation. Scan, patch, stay ahead. kdlski.co/4koAJMh #CyberSecurity #KudelskiSecurity

Hackers are hitting ASP . Net apps, exploiting exposed MachineKeys for RCE and stealthy webshells like Godzilla. They’re pivoting fast to tools like Cobalt Strike and chasing privilege escalation.
Scan, patch, stay ahead.
kdlski.co/4koAJMh
#CyberSecurity #KudelskiSecurity
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

ICYMI: Scattered Spider uses social engineering to bypass MFA, breach clouds, and launch ransomware. Learn how to defend against this human-layer attack. 🔗 kdlski.co/460IWm9 #CyberSecurity #Ransomware #ZeroTrust #MFA #KudelskiSecurity

ICYMI: Scattered Spider uses social engineering to bypass MFA, breach clouds, and launch ransomware.

Learn how to defend against this human-layer attack.

🔗 kdlski.co/460IWm9

#CyberSecurity #Ransomware #ZeroTrust #MFA #KudelskiSecurity
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

🚨 Big SAP Security Warning 🚨 Hackers are hitting a new SAP NetWeaver flaw (CVE-2025-31324) to sneak in webshells and Cobalt Strike tools. It’s serious and could lead to ransomware attacks. Learn what to watch for: kdlski.co/4eRcCVe #CyberSecurity #SAP #ZeroDay

🚨 Big SAP Security Warning 🚨

Hackers are hitting a new SAP NetWeaver flaw (CVE-2025-31324) to sneak in webshells and Cobalt Strike tools. It’s serious and could lead to ransomware attacks.

Learn what to watch for: kdlski.co/4eRcCVe

#CyberSecurity #SAP #ZeroDay
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

🚨 CVE-2025-53770 is under active exploitation. If you're running Microsoft SharePoint on-prem, your environment could be exposed. Get the technical breakdown and mitigation steps: 🔗 kdlski.co/4kWiYUN #CyberSecurity #CVE202553770 #SharePoint #Infosec #ZeroDay

🚨 CVE-2025-53770 is under active exploitation.
If you're running Microsoft SharePoint on-prem, your environment could be exposed.
Get the technical breakdown and mitigation steps:
🔗 kdlski.co/4kWiYUN

#CyberSecurity #CVE202553770 #SharePoint #Infosec #ZeroDay
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

🚨 Akira ransomware is exploiting a likely zero day in SonicWall Gen 7 SSL-VPNs, bypassing MFA and hitting fully patched devices. Kudelski Security’s IR team has confirmed multiple intrusions. Read the full advisory 👉 kdlski.co/41sLrdK #CyberSecurity #KudelskiSecurity

🚨 Akira ransomware is exploiting a likely zero day in SonicWall Gen 7 SSL-VPNs, bypassing MFA and hitting fully patched devices.

Kudelski Security’s IR team has confirmed multiple intrusions.

Read the full advisory 👉 kdlski.co/41sLrdK

#CyberSecurity #KudelskiSecurity
Kudelski Security (@kudelskisec) 's Twitter Profile Photo

In this cautionary tale of averting a large-scale supply chain attack, a follow-up to Kudelski Security researchers tmlxs and Nathan Hamiel’s Black Hat USA presentation, we detail our RCE on CodeRabbit’s production servers and write access to 1m repos. kdlski.co/4oIvuKs

In this cautionary tale of averting a large-scale supply chain attack, a follow-up to Kudelski Security researchers <a href="/tmlxs/">tmlxs</a> and <a href="/nathanhamiel/">Nathan Hamiel</a>’s Black Hat USA presentation, we detail our RCE on CodeRabbit’s production servers and write access to 1m repos.
kdlski.co/4oIvuKs