SS-Consulting (@ss_consulting_) 's Twitter Profile
SS-Consulting

@ss_consulting_

We specialise in strategic and technical consulting, in the field of Information security, Governance, Risk and Compliance.

ID: 1711675489067073536

linkhttps://ss-consulting.co.za/ calendar_today10-10-2023 09:32:30

390 Tweet

39 Followers

114 Following

ITWeb (@itweb) 's Twitter Profile Photo

Taking place from 3-5 June at the Sandton Convention Centre, ITWeb's annual Security Summit continued to build on its legacy as the must-attend gathering for every IT, security and business decision-maker. Watch me: itweb.co.za/videos/mQwkoM6… #itwebss2025

KnowBe4 (@knowbe4) 's Twitter Profile Photo

Hackers want backstage passes to your network. Don’t grant their phish wish. 🙅 Get a front-row seat to our free #cybersecurity tools—like RanSim and the Domain Spoof Test. Tighter defenses than a sold-out arena. ow.ly/YFy950W5Cv9 Drop your dream "band" below. 🎸👇

Hackers want backstage passes to your network. Don’t grant their phish wish. 🙅

Get a front-row seat to our free #cybersecurity tools—like RanSim and the Domain Spoof Test.
Tighter defenses than a sold-out arena. ow.ly/YFy950W5Cv9

Drop your dream "band" below. 🎸👇
SS-Consulting (@ss_consulting_) 's Twitter Profile Photo

With AI tools now being used to craft perfectly worded phishing emails, fake voices, and tailored lures, phishing is no longer about poorly written scams—it’s sleek, believable, and much harder to spot. #SSConsulting #ThreatThursday #AIBasedPhishing #SocialEngineering #CyberSec

With AI tools now being used to craft perfectly worded phishing emails, fake voices, and tailored lures, phishing is no longer about poorly written scams—it’s sleek, believable, and much harder to spot. #SSConsulting #ThreatThursday #AIBasedPhishing #SocialEngineering #CyberSec
SS-Consulting (@ss_consulting_) 's Twitter Profile Photo

Today we honour the brave youth of 1976 and remind the next generation that the future is digital, and knowledge is power. Lead. Learn. Defend. #SSConsulting #YouthDay2025 #DigitalFuture #EmpoweredYouth #YouthMonth2025

Today we honour the brave youth of 1976 and remind the next generation that the future is digital, and knowledge is power.
 Lead. Learn. Defend.
#SSConsulting #YouthDay2025 #DigitalFuture #EmpoweredYouth #YouthMonth2025
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

North Korean hackers deepfake execs in Zoom call to spread Mac malware - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

SS-Consulting (@ss_consulting_) 's Twitter Profile Photo

It’s clean, quiet, and deadly effective. Because the access is “granted” by the user, even security systems may not see it as a threat—until it’s too late. #SSConsulting #ThreatThursday #ConsentPhishing #CloudSecurity #CyberSecurityAwareness #PhishingEvolved

It’s clean, quiet, and deadly effective. Because the access is “granted” by the user, even security systems may not see it as a threat—until it’s too late.
#SSConsulting #ThreatThursday #ConsentPhishing #CloudSecurity #CyberSecurityAwareness #PhishingEvolved
The Cyber Security Hub™ (@thecybersechub) 's Twitter Profile Photo

SparkKitty, SparkCat’s little brother: A new Trojan spy found in the App Store and Google Play securelist.com/sparkkitty-ios…

ITWeb (@itweb) 's Twitter Profile Photo

Northern Cape High Court dismisses man’s urgent application after he accused police of leaking his personal details online, putting his life in danger. #SAPS #Informati itweb.co.za/article/court-…

Infosecurity Magazine (@infosecuritymag) 's Twitter Profile Photo

Leading at the Speed of Algorithms: Immediate AI Priorities for Cybersecurity Leaders infosecurity-magazine.com/opinions/ai-pr…

SS-Consulting (@ss_consulting_) 's Twitter Profile Photo

Can you solve the riddles that expose how attackers manipulate people and data? Drop your answers in the comments! #SSConsulting #CyberChallengeTuesday #CyberAwareness #DataTampering #InsiderThreat #SocialEngineering #InfoSec #CyberResilience #HumanFirewall #StaySecure

Can you solve the riddles that expose how attackers manipulate people and data? Drop your answers in the comments!
#SSConsulting #CyberChallengeTuesday #CyberAwareness #DataTampering #InsiderThreat #SocialEngineering #InfoSec #CyberResilience #HumanFirewall #StaySecure
SS-Consulting (@ss_consulting_) 's Twitter Profile Photo

From security tools that ignore real attacks to financial models that miscalculate risks, the impact of poisoned data can be massive, and often goes unnoticed until the damage is done. #SSConsulting #ThreatThursday #DataPoisoning #SecureAI #MachineLearningThreats #CyberSecurity

From security tools that ignore real attacks to financial models that miscalculate risks, the impact of poisoned data can be massive, and often goes unnoticed until the damage is done.
#SSConsulting #ThreatThursday #DataPoisoning #SecureAI #MachineLearningThreats #CyberSecurity
SS-Consulting (@ss_consulting_) 's Twitter Profile Photo

This week’s riddles reveal the silent ways attackers gain and maintain access to your systems. Can you guess all 3? #CyberChallengeTuesday #CyberAwareness #StolenCredentials #Backdoor #RAT #SSConsulting #CyberResilience #InfoSec #StaySecure #ThinkBeforeYouClick

This week’s riddles reveal the silent ways attackers gain and maintain access to your systems. Can you guess all 3?
#CyberChallengeTuesday #CyberAwareness #StolenCredentials #Backdoor #RAT #SSConsulting #CyberResilience #InfoSec #StaySecure #ThinkBeforeYouClick
ITWeb (@itweb) 's Twitter Profile Photo

The cyber security breach that rendered the ICT systems of the South African Weather Service (SAWS) unusable led to “uncharacteristically poor” performance in the fourth quarter of the 2024/25 financial year. itweb.co.za/article/cyber-… #cybersecurity #breach #ict

The cyber security breach that rendered the ICT systems of the South African Weather Service (SAWS) unusable led to “uncharacteristically poor” performance in the fourth quarter of the 2024/25 financial year.
itweb.co.za/article/cyber-…
#cybersecurity #breach #ict
SS-Consulting (@ss_consulting_) 's Twitter Profile Photo

Sometimes, the threat isn’t in the file - it’s in what the file builds. Stay sharp, stay protected! #SSConsulting #ThreatThursday #HTMLSmuggling #PhishingEvolved #CyberAwareness #MalwarePrevention

Sometimes, the threat isn’t in the file - it’s in what the file builds. Stay sharp, stay protected!
#SSConsulting #ThreatThursday #HTMLSmuggling #PhishingEvolved #CyberAwareness #MalwarePrevention
KnowBe4 (@knowbe4) 's Twitter Profile Photo

80% of hacking-related breaches involve stolen or weak #passwords. ⚠️ Our Weak Password Test helps you spot password risks early, so you can stay a step ahead of cyber criminals. Don't be a target, try it out today: ow.ly/c24v50WkucJ #Cybersecurity

80% of hacking-related breaches involve stolen or weak #passwords. ⚠️

Our Weak Password Test helps you spot password risks early, so you can stay a step ahead of cyber criminals.

Don't be a target, try it out today: ow.ly/c24v50WkucJ

#Cybersecurity
SS-Consulting (@ss_consulting_) 's Twitter Profile Photo

This week, we’re tackling threats that blur identity and misuse trust. Can you crack all three? Drop your answers below and tag someone to take the challenge.  #SSConsulting #CyberChallengeTuesday #CyberAwareness #ImpersonationAttack #IdentityTheft #CyberResilience

This week, we’re tackling threats that blur identity and misuse trust. Can you crack all three? Drop your answers below and tag someone to take the challenge.  #SSConsulting #CyberChallengeTuesday #CyberAwareness #ImpersonationAttack #IdentityTheft  #CyberResilience
SS-Consulting (@ss_consulting_) 's Twitter Profile Photo

Not every ad is what it seems. Just visiting the wrong page could be enough. Stay sharp! #SSConsulting #ThreatThursday #Malvertising #CyberSecurity #ThinkBeforeYouClick #OnlineSafety #HiddenThreats

Not every ad is what it seems. Just visiting the wrong page could be enough. Stay sharp! #SSConsulting #ThreatThursday #Malvertising #CyberSecurity #ThinkBeforeYouClick #OnlineSafety #HiddenThreats