techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.8K
active users

#threatlandscape

0 posts0 participants0 posts today
kcarruthers<p>Just in case your <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/threatlandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatlandscape</span></a> wasn’t busy enough self replicating <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> is here 😱</p><p><a href="https://arxiv.org/abs/2412.12140" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2412.12140</span><span class="invisible"></span></a></p>
UK<p><a href="https://www.europesays.com/uk/37917/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/uk/37917/</span><span class="invisible"></span></a> Live Webinar I Mitigate Risks from Quantum Computing and Comply with the Latest Compliance Requirements for FSIWebinar. <a href="https://pubeurope.com/tags/compliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compliance</span></a> <a href="https://pubeurope.com/tags/Computing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Computing</span></a> <a href="https://pubeurope.com/tags/QuantumComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QuantumComputing</span></a> <a href="https://pubeurope.com/tags/RiskMitigation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RiskMitigation</span></a> <a href="https://pubeurope.com/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://pubeurope.com/tags/thales" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thales</span></a> <a href="https://pubeurope.com/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatLandscape</span></a> <a href="https://pubeurope.com/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://pubeurope.com/tags/UnitedKingdom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnitedKingdom</span></a></p>
Europe Says<p><a href="https://www.europesays.com/1790285/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/1790285/</span><span class="invisible"></span></a> Forescout reports growth in US federal business, with 38% rise in DoD sector and NIAP certification for OT solution <a href="https://pubeurope.com/tags/america" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>america</span></a> <a href="https://pubeurope.com/tags/business" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>business</span></a> <a href="https://pubeurope.com/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalInfrastructure</span></a> <a href="https://pubeurope.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://pubeurope.com/tags/Forescout" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forescout</span></a> <a href="https://pubeurope.com/tags/OT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OT</span></a> <a href="https://pubeurope.com/tags/OTCyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTCyber</span></a> <a href="https://pubeurope.com/tags/OTCybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTCybersecurity</span></a> <a href="https://pubeurope.com/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatLandscape</span></a> <a href="https://pubeurope.com/tags/UnitedStates" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnitedStates</span></a> <a href="https://pubeurope.com/tags/UnitedStatesOfAmerica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UnitedStatesOfAmerica</span></a> <a href="https://pubeurope.com/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> <a href="https://pubeurope.com/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a></p>
Hunt & Hackett<p>Sector Threat Profile: <a href="https://mastodon.social/tags/Energy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Energy</span></a> </p><p>Discover the energy <a href="https://mastodon.social/tags/threatlandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatlandscape</span></a>, where innovation meets risk. As the sector transitions from fossil fuels to renewable energy, it has become a prime target for cyber threats. Learn about the key motivations driving these attacks, practical steps to protect your business, and insights into past incidents like SolarWinds</p><p>Access the full report through our Member's Portal: <a href="https://www.huntandhackett.com/members/register" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">huntandhackett.com/members/reg</span><span class="invisible">ister</span></a></p>
Niel Harper<p>'The 10 biggest issues CISOs and cyber teams face today' Security leaders - What are the challenges keeping you up at night? Myself and other experts discuss the problems we're grappling with: <a href="https://bit.ly/3OFZDtb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3OFZDtb</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/threatlandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatlandscape</span></a> <a href="https://mastodon.social/tags/regulations" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>regulations</span></a> <a href="https://mastodon.social/tags/supplychainrisks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>supplychainrisks</span></a> <a href="https://mastodon.social/tags/legalliability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>legalliability</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/tightbudgets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tightbudgets</span></a></p>
Europe Says<p><a href="https://www.europesays.com/1554912/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/1554912/</span><span class="invisible"></span></a> Cyprus critical infrastructure targeted in series of cyberattacks, as authorities stress on readiness <a href="https://pubeurope.com/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalInfrastructure</span></a> <a href="https://pubeurope.com/tags/cyberattacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberattacks</span></a> <a href="https://pubeurope.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://pubeurope.com/tags/cyprus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyprus</span></a> <a href="https://pubeurope.com/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://pubeurope.com/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://pubeurope.com/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://pubeurope.com/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatLandscape</span></a></p>
Guardians Of Cyber<p>🚨 Did you know 66% of cybersecurity professionals are facing unprecedented stress levels due to increasingly complex threats? 🚨<br>As cyberattacks grow more sophisticated, it's essential to stay ahead of the curve. 💡 Tip: Prioritize continuous training to combat the complexity of today's threat landscape. It could be the difference between prevention and disaster.</p><p>🔐 How does your team handle the stress of an evolving cyber threat environment?</p><p>Read more insights in our latest post: <a href="https://guardiansofcyber.com/cybersecurity-news/66-of-cybersecurity-professionals-face-unprecedented-stress-levels-due-to-complex-threats/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">guardiansofcyber.com/cybersecu</span><span class="invisible">rity-news/66-of-cybersecurity-professionals-face-unprecedented-stress-levels-due-to-complex-threats/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/GuardiansOfCyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GuardiansOfCyber</span></a> <a href="https://infosec.exchange/tags/Guardians" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Guardians</span></a> <a href="https://infosec.exchange/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatLandscape</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/CyberRisk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberRisk</span></a> <a href="https://infosec.exchange/tags/AIinCybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIinCybersecurity</span></a> <a href="https://infosec.exchange/tags/StressManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StressManagement</span></a> <a href="https://infosec.exchange/tags/CybersecurityTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersecurityTips</span></a> <a href="https://infosec.exchange/tags/WorkforceDevelopment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WorkforceDevelopment</span></a></p>
IntelSoup :donor:<p>Hello hive mind! I am looking for some good examples and write ups on how to complete a threat landscape assessment. Any good recommendations out there? </p><p><a href="https://infosec.exchange/tags/CTI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTI</span></a> <a href="https://infosec.exchange/tags/threatlandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatlandscape</span></a> <a href="https://infosec.exchange/tags/strategicthreatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>strategicthreatintel</span></a> <a href="https://infosec.exchange/tags/threatassessment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatassessment</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cyberthreatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberthreatintelligence</span></a></p>
Koen Van Impe<p>Happy to have contributed to the <span class="h-card" translate="no"><a href="https://respublicae.eu/@enisa_eu" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>enisa_eu</span></a></span> Threat Landscape 2024. Explore the threats and trends observed during the latest reporting period on threat actors activity, ransomware, malware, social engineering and more. <a href="https://www.enisa.europa.eu/publications/enisa-threat-landscape-2024" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">enisa.europa.eu/publications/e</span><span class="invisible">nisa-threat-landscape-2024</span></a> <a href="https://infosec.exchange/tags/ETL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ETL</span></a> <a href="https://infosec.exchange/tags/CTI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTI</span></a> <a href="https://infosec.exchange/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatLandscape</span></a></p>
Pyrzout :vm:<p>Unveiling the CISO Checklist for 2024: 10 Steps to Cybersecurity Success <a href="https://thecyberexpress.com/ciso-checklist-for-2024-10-steps-to-success/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thecyberexpress.com/ciso-check</span><span class="invisible">list-for-2024-10-steps-to-success/</span></a> <a href="https://social.skynetcloud.site/tags/authenticationandaccessmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authenticationandaccessmanagement</span></a> <a href="https://social.skynetcloud.site/tags/employeetrainingincybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>employeetrainingincybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/vulnerabilityassessments" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilityassessments</span></a> <a href="https://social.skynetcloud.site/tags/ThreatIntelligenceNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligenceNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecuritystrategy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritystrategy</span></a> <a href="https://social.skynetcloud.site/tags/cybersecuritysuccess" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritysuccess</span></a> <a href="https://social.skynetcloud.site/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/CybersecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/VulnerabilityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VulnerabilityNews</span></a> <a href="https://social.skynetcloud.site/tags/CISOChecklist2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISOChecklist2024</span></a> <a href="https://social.skynetcloud.site/tags/Incidentresponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Incidentresponse</span></a> <a href="https://social.skynetcloud.site/tags/patchmanagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>patchmanagement</span></a> <a href="https://social.skynetcloud.site/tags/threatlandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatlandscape</span></a> <a href="https://social.skynetcloud.site/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RiskManagement</span></a> <a href="https://social.skynetcloud.site/tags/FirewallDaily" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FirewallDaily</span></a> <a href="https://social.skynetcloud.site/tags/BusinessNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BusinessNews</span></a> <a href="https://social.skynetcloud.site/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a></p>
Hunt & Hackett<p>To learn more about the Chinese <a href="https://mastodon.social/tags/threatlandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatlandscape</span></a>, explore our China threat profile at the following link:</p><p><a href="https://www.huntandhackett.com/threats/china" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">huntandhackett.com/threats/chi</span><span class="invisible">na</span></a></p><p>4/🧵</p>
_Veronica_<p>Extremely grateful for having the opportunity to contribute to the latest ENISA Threat Landscape for DoS Attacks. It is an important report from ENISA that gives useful insights into a cybersecurity threat that is often understudied. Read here: <a href="https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-dos-attacks" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">enisa.europa.eu/publications/e</span><span class="invisible">nisa-threat-landscape-for-dos-attacks</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatResearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatResearch</span></a> <a href="https://infosec.exchange/tags/DoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DoS</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttacks</span></a> <a href="https://infosec.exchange/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatLandscape</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/DenialOfService" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DenialOfService</span></a> <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/ENISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ENISA</span></a></p>
Corelight<p>Attackers are constantly evolving to find your security vulnerabilities. Is your team equipped to defend your organization’s infrastructure, reputation, and bottom line from the next sophisticated attack? Join <span class="h-card" translate="no"><a href="https://infosec.exchange/@corelight" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>corelight</span></a></span> and <span class="h-card" translate="no"><a href="https://twtr.plus/users/crowdstrike" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>crowdstrike</span></a></span> on December 12 at 10 a.m. GMT/ 11 a.m. CET to hear what elite incident responders use to mitigate vulnerabilities such as log4j.</p><p>🚨 Save your seat for this exclusive webinar today ➡️ <a href="https://go.corelight.com/supercharge-secops-crowdstrike-emea" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.corelight.com/supercharge-s</span><span class="invisible">ecops-crowdstrike-emea</span></a></p><p><a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatLandscape</span></a> <a href="https://infosec.exchange/tags/CyberRisk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberRisk</span></a> <a href="https://infosec.exchange/tags/SecurityStrategy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityStrategy</span></a></p>
Sophos<p>Our team recently attended <a href="https://infosec.exchange/tags/CYBERWARCON" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CYBERWARCON</span></a> to discuss new laws in China that require companies to report vulnerability information. The session explored how these new terms shift the global <a href="https://infosec.exchange/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatLandscape</span></a>. Learn more: <a href="https://wapo.st/3QyuZ5H" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">wapo.st/3QyuZ5H</span><span class="invisible"></span></a></p>
Christina Lekati<p>🚨The ENISA Threat Landscape Report 2023 was released today!</p><p>It includes the top threats, major trends observed with respect to threats, threat actors &amp; attack techniques, impact and motivation analysis. </p><p>It also describes relevant mitigation measures.</p><p>The top 3 threats that were identified and analyzed were:</p><p>🔹 Ransomware<br>🔹 Malware<br>🔹 Social Engineering</p><p>The report is a very insightful resource, especially for those who seek to make informed decisions for their cybersecurity strategy the coming year. </p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatlandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatlandscape</span></a> <a href="https://infosec.exchange/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://infosec.exchange/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://infosec.exchange/tags/socialengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socialengineering</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/enisa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>enisa</span></a> </p><p><a href="https://www.enisa.europa.eu/topics/cyber-threats/threats-and-trends" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">enisa.europa.eu/topics/cyber-t</span><span class="invisible">hreats/threats-and-trends</span></a></p>
Sean D. Mack<p>Mandiant&#39;s latest M-Trends report reveals that 63% of organizations were notified of breaches by external entities. </p><p>Staying ahead of the bad guys requires understanding the threat landscape. It was great to be in Seattle with Mandiant to speak with cybersecurity leaders about the latest trends and what they&#39;re doing to protect their organizations.</p><p>What new threats are you seeing? What are you doing to keep your organization safe today?<br /><a href="https://techhub.social/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://techhub.social/tags/threatlandscape" class="mention hashtag" rel="tag">#<span>threatlandscape</span></a> <a href="https://techhub.social/tags/incidentresponse" class="mention hashtag" rel="tag">#<span>incidentresponse</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 Juniper Firewalls Under Siege: Over 12,000 Vulnerable Devices Exposed! 🔥"</p><p>New research reveals nearly 12,000 internet-facing Juniper firewall devices are susceptible to a recently disclosed remote code execution flaw. The vulnerability, identified as CVE-2023-36845, allows an unauthenticated remote attacker to execute arbitrary code without creating a file on the system. This medium-severity flaw in the J-Web component of Junos OS can be weaponized by adversaries to control certain environment variables. Juniper Networks patched this alongside other vulnerabilities last month. A proof-of-concept (PoC) exploit by watchTowr combined CVE-2023-36846 and CVE-2023-36845 to upload malicious PHP files and achieve code execution. Jacob Baines points out, "Firewalls are interesting targets to APT as they help bridge into the protected network and can serve as useful hosts for C2 infrastructure." Juniper has acknowledged the vulnerability but is unaware of any successful exploits against its customers. However, they've detected exploitation attempts in the wild, urging users to apply necessary patches. 🛡️</p><p>Source: <a href="https://thehackernews.com/2023/09/over-12000-juniper-firewalls-found.html" rel="nofollow noopener noreferrer" target="_blank">The Hacker News</a></p><p>Tags: <a href="https://infosec.exchange/tags/Juniper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Juniper</span></a> <a href="https://infosec.exchange/tags/Firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firewall</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/CVE202336845" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202336845</span></a> <a href="https://infosec.exchange/tags/RemoteCodeExecution" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemoteCodeExecution</span></a> <a href="https://infosec.exchange/tags/JunosOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JunosOS</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatLandscape</span></a> 🌐🔐🔍</p>
Sean D. Mack<p>Seattle friends and cybersecurity leaders: I&#39;ll be in the <a href="https://techhub.social/tags/Seattle" class="mention hashtag" rel="tag">#<span>Seattle</span></a> area to host an iSMG <a href="https://techhub.social/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> roundtable next Tuesday, September 19th. </p><p>We&#39;ll be discussing the Mandiant M-Trends report and learning from each other about the most pressing cybersecurity risks today. </p><p>If you are a cybersecurity leader in the Seattle area join me for great food and great conversation at El Gaucho restaurant in Bellevue, WA. : <br /><a href="https://ismg.events/roundtable-event/seattle-state-of-cybersecurity/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">ismg.events/roundtable-event/s</span><span class="invisible">eattle-state-of-cybersecurity/</span></a> <br /><a href="https://techhub.social/tags/threatlandscape" class="mention hashtag" rel="tag">#<span>threatlandscape</span></a> <a href="https://techhub.social/tags/events" class="mention hashtag" rel="tag">#<span>events</span></a> <a href="https://techhub.social/tags/community" class="mention hashtag" rel="tag">#<span>community</span></a></p>
acrypthash👨🏻‍💻<p>I am reading a few threat landscape and semi annual security recap reports and came across a section in one that mentioned that GandCrab was starting to become active again.<br>I've personally had to deal with GandCrab during an IR event in the past, so this naturally peaked my interest. In the rabbit hole that ensued, I found this awesome analysis that I wish I had 4 years ago. Happy hacking!</p><p><a href="https://www.taintedbits.com/2018/10/18/gandcrab-detail-analysis-of-js-delivery-payload/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">taintedbits.com/2018/10/18/gan</span><span class="invisible">dcrab-detail-analysis-of-js-delivery-payload/</span></a></p><p><a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/reports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reports</span></a> <a href="https://infosec.exchange/tags/threatlandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatlandscape</span></a> <a href="https://infosec.exchange/tags/Gandcrab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gandcrab</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a></p>
Gareth Emslie 🇿🇦 🇪🇦 🇨🇭<p>The macro issues shaping the threat landscape can help security pros reset their priorities and reformulate strategy.. <a href="https://www.darkreading.com/microsoft/cisos-are-focused-on-these-3-trends-are-you-" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/microsoft/ciso</span><span class="invisible">s-are-focused-on-these-3-trends-are-you-</span></a> <a href="https://hachyderm.io/tags/ThreatLandscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatLandscape</span></a> <a href="https://hachyderm.io/tags/SecurityStrategy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityStrategy</span></a></p>