Fredrik L. Andersen (@ifredriks) 's Twitter Profile
Fredrik L. Andersen

@ifredriks

When wireless is perfectly applied the whole earth will be converted into a huge brain - All tweets are my own - Sr Major Account Manager - Palo Alto Networks

ID: 293224201

linkhttp://www.linkedin.com/in/fandersen calendar_today04-05-2011 23:59:39

10,10K Tweet

1,1K Followers

2,2K Following

Palo Alto Networks (@paloaltontwks) 's Twitter Profile Photo

Prompt-based attacks like Guardrail Bypass and Goal Hijacking are evolving fast, with success rates as high as 88%. Our new framework helps you stay ahead with smarter, AI-driven defense. Here's where to start. bit.ly/4lCm1Dc

Tib3rius (@0xtib3rius) 's Twitter Profile Photo

BREAKING. From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.

BREAKING.

From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.
Cyber Detective💙💛 (@cyb_detective) 's Twitter Profile Photo

Digital Forensic StartMe page - getting started guides - VM/distros - decoding tools - mobile forensics - network analysis - metadata tools - SANS posters/cheatsheets start.me/p/m60j2v/digit… #dfir

Digital Forensic StartMe page

- getting started guides
- VM/distros
- decoding tools
- mobile forensics
- network analysis
- metadata tools
- SANS posters/cheatsheets

start.me/p/m60j2v/digit…

#dfir
Evan Kirstel #B2B #TechFluencer (@evankirstel) 's Twitter Profile Photo

The future of #cybersecurity (and AI) is going LIVE! 🚨 I’ll be LIVE at Palo Alto Networks big cybersecurity + AI event April 29! 🚀 Join on LinkedIn Live to hear how AI is redefining security, SecOps, and the browser-first world. Don’t miss it. 🔒 📅 April 29 | 2:30PM PT

Palo Alto Networks (@paloaltontwks) 's Twitter Profile Photo

The countdown to cyber's biggest week is here! Join Nikesh Arora, Lee Klarich & Anand Oswal on April 29 at 2:30 PM PT for a live look at the innovations securing AI, and what’s coming next. 💡 Tools to take action 🧠 Big ideas 👀 A few surprises 🔗 Save your seat

Bloomberg TV (@bloombergtv) 's Twitter Profile Photo

It’s still unclear how you make AI agents work safely, says Palo Alto Networks CEO Nikesh Arora. He joins “Bloomberg Technology” as the RSA conference kicks off bloom.bg/4iy7Dcd

Palo Alto Networks (@paloaltontwks) 's Twitter Profile Photo

When innovation meets partnership, the future gets secured ​​✨ ICYMI: We’re excited to announce Palo Alto Networks is partnering with AT&T Business to secure connectivity solutions tailored to address the complex security needs of businesses. Details 👉 bit.ly/42HPUck

When innovation meets partnership, the future gets secured ​​✨

ICYMI: We’re excited to announce Palo Alto Networks is partnering with <a href="/ATTBusiness/">AT&T Business</a> to secure connectivity solutions tailored to address the complex security needs of businesses. 

Details 👉 bit.ly/42HPUck
Six Five Media (@thesixfivemedia) 's Twitter Profile Photo

The future of AI security isn’t more tools—it’s smart unification. 🔐 At #RSAC2025, Palo Alto Networks CEO Nikesh Arora shared his vision with Patrick Moorhead and Daniel Newman: “If we bring the data together, we can double effectiveness at half the cost.” youtu.be/wDaYw1UqTm8?si…

Arda Büyükkaya (@whichbufferarda) 's Twitter Profile Photo

Multiple Chinese 🇨🇳 nation-state APT groups have gained initial access to critical infrastructure networks through SAP NetWeaver intrusions, aiming to conduct cyber-enabled espionage and maintain persistent remote access. blog.eclecticiq.com/china-nexus-na…

Multiple Chinese 🇨🇳 nation-state APT groups have gained initial access to critical infrastructure networks through SAP NetWeaver intrusions, aiming to conduct cyber-enabled espionage and maintain persistent remote access. blog.eclecticiq.com/china-nexus-na…
Mark Nelson (@energybants) 's Twitter Profile Photo

BREAKING: DENMARK REPEALS 1985 BAN ON NUCLEAR ENERGY The vote came and went in a matter of moments, with a murmer of astonishment across the gathered representatives. 71 for, 34 against Nuclear will now be explored by the Danish state. Incredible to be here for this.

BREAKING: DENMARK REPEALS 1985 BAN ON NUCLEAR ENERGY

The vote came and went in a matter of moments, with a murmer of astonishment across the gathered representatives.

71 for, 34 against

Nuclear will now be explored by the Danish state. 

Incredible to be here for this.
Palo Alto Networks (@paloaltontwks) 's Twitter Profile Photo

🚨 This just in: Cortex Cloud has earned FedRAMP High and Moderate Authorization. As the only CNAPP with both authorizations, Cortex Cloud is uniquely positioned to meet the stringent security requirements to secure the U.S. government’s mission-critical infrastructure.

Palo Alto Networks (@paloaltontwks) 's Twitter Profile Photo

Count on AI to stop attacks before they even happen. When human instincts inform machine learning, threat detection and response go from hours to MINUTES. Fast, smart, and secure. ⏱️

Palo Alto Networks (@paloaltontwks) 's Twitter Profile Photo

Think you know Palo Alto Networks? You might need to think again. Don’t miss these conversations and more at the upcoming AWS Summit in D.C. June 10-11. bit.ly/446G1XD

Palo Alto Networks (@paloaltontwks) 's Twitter Profile Photo

Security doesn’t come with a GPS. At InterSECT 2025, hear from the experts mapping the smartest route through today’s toughest threats. ⚡Smarter strategies ⚡ Real-world insights ⚡Stronger outcomes This is the path forward, join us. bit.ly/3GW3aTw

@DoD_CIO (@dod_cio) 's Twitter Profile Photo

With current Global activities, the DIB continues to be under a heightened level of attack. All DIB organizations, regardless of size, should consider raising their #cyber posture. For more, see this statement from #DoDOCIO.

With current Global activities, the DIB continues to be under a heightened level of attack. All DIB organizations, regardless of size, should consider raising their #cyber posture. For more, see this statement from #DoDOCIO.
Unit 42 (@unit42_intel) 's Twitter Profile Photo

Attackers are leveraging over 500 newly registered .shop domains, likely generated via DGA, to launch #phishing campaigns impersonating Microsoft login pages. Domain infrastructure changes post-registration. Details at: bit.ly/4en8Anc

Attackers are leveraging over 500 newly registered .shop domains, likely generated via DGA, to launch #phishing campaigns impersonating Microsoft login pages. Domain infrastructure changes post-registration. Details at: bit.ly/4en8Anc
Unit 42 (@unit42_intel) 's Twitter Profile Photo

We found a gap between Azure OpenAI’s UI and API: the UI blocked duplicate domains, but the API didn’t. The result? Tenants unknowingly sharing domains – pointed to a public IP address. Read how we caught it before attackers did: bit.ly/3HEaUtN

We found a gap between Azure OpenAI’s UI and API: the UI blocked duplicate domains, but the API didn’t. The result? Tenants unknowingly sharing domains – pointed to a public IP address. Read how we caught it before attackers did: bit.ly/3HEaUtN