Riskigy(@riskigy) 's Twitter Profile Photo

Toyota Motor Corporation has discovered two additional misconfigured cloud services that leaked car owners' personal information for over seven years. buff.ly/43Bm48a Riskigy

Toyota Motor Corporation has discovered two additional misconfigured cloud services that leaked car owners' personal information for over seven years. buff.ly/43Bm48a @riskigy #cybersecurity #riskigy #security #psa #knowledgeshare #cyberawareness #riskalert #vciso
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

Barracuda, email and network security solutions, warned customers that some of their Email Gateway (ESG) appliances were breached by targeting a now-patched zero-day vulnerability in the attachment scanning module. buff.ly/45sZxMN Riskigy

Barracuda, email and network security solutions, warned customers that some of their Email #Security Gateway (ESG) appliances were breached by targeting a now-patched zero-day vulnerability in the #email attachment scanning module. buff.ly/45sZxMN @riskigy #esg #riskigy
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

A new security flaw has been disclosed in the Cloud Platform's (GCP) Cloud SQL service that could be potentially exploited to obtain access to confidential data. buff.ly/3MZH6Ii Riskigy

A new security flaw has been disclosed in the #Google Cloud Platform's (GCP) Cloud SQL service that could be potentially exploited to obtain access to confidential data. buff.ly/3MZH6Ii @riskigy #cybersecurity #riskigy #security #knowledgeshare #cyberawareness #vciso
account_circle
SuperCISO(@SuperCiso) 's Twitter Profile Photo

Microsoft is adding native support for RAR, 7-Zip, and GZ archives to an upcoming version of Windows 11. Having native support for these file formats will be very useful for Windows users. buff.ly/3ICCXrn @superciso

Microsoft is adding native support for RAR, 7-Zip, and GZ archives to an upcoming version of Windows 11. Having native support for these file formats will be very useful for Windows users. buff.ly/3ICCXrn @superciso #ciso #cybersecurity #security #infosec #riskigy #vciso
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

Swiss tech multinational and U.S. government contractor ABB has confirmed that some of its systems were impacted by a ransomware attack, previously described by the company as 'an IT security incident.' buff.ly/43nPEOo Riskigy

Swiss tech multinational and U.S. government contractor ABB has confirmed that some of its systems were impacted by a ransomware attack, previously described by the company as 'an IT security incident.' buff.ly/43nPEOo @riskigy #cybersecurity #riskigy #knowledgeshare
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

Enterprise security firm on Tuesday disclosed that a recently patched zero-day flaw in its Email Security Gateway (ESG) appliances had been abused by threat actors since October 2022 to backdoor the devices. buff.ly/3C3k9O5 Riskigy

Enterprise security firm #Barracuda on Tuesday disclosed that a recently patched zero-day flaw in its Email Security Gateway (ESG) appliances had been abused by threat actors since October 2022 to backdoor the devices. buff.ly/3C3k9O5 @riskigy #cybersecurity #riskigy
account_circle
Bettermanly.com(@BettermanlyCom) 's Twitter Profile Photo

The ocean is a mysterious and fascinating place, but it's also full of danger. Check out these 40 scary facts about shipwrecks, deep sea creatures, and more that will make you want to stay on land.

account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

AV Terminator is allegedly capable of bypassing 24 different antivirus (AV), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR) security, including Windows Defender. buff.ly/43dR2DN Riskigy

AV Terminator is allegedly capable of bypassing 24 different antivirus (AV), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR) security, including Windows Defender. buff.ly/43dR2DN @riskigy #riskigy #security #cyberawareness #vciso
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

Google has removed a screen recording app named 'iRecorder - Screen Recorder' from the Play Store after it was found to sneak in information stealing capabilities nearly a year after the app was published as an app. buff.ly/3Cbyd8x Riskigy

Google has removed a screen recording app named 'iRecorder - Screen Recorder' from the Play Store after it was found to sneak in information stealing capabilities nearly a year after the app was published as an app. buff.ly/3Cbyd8x @riskigy #cybersecurity #riskigy #psa
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

Kali Linux 2023.2, the second version of 2023, is now available with a pre-built Hyper-V image and thirteen new tools, including the Evilginx framework for stealing credentials and session cookies. buff.ly/3IMBdLW Riskigy

Kali Linux 2023.2, the second version of 2023, is now available with a pre-built Hyper-V image and thirteen new tools, including the Evilginx framework for stealing credentials and session cookies. buff.ly/3IMBdLW @riskigy #cybersecurity #riskigy #security #cyberawareness
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

New malware enables the operators to take control of the victim's Gmail, Outlook, Hotmail, or Yahoo email accounts, steal email data and 2FA codes arriving in the inbox, and send emails from the compromised accounts. buff.ly/3N8cwfB Riskigy

New malware enables the operators to take control of the victim's Gmail, Outlook, Hotmail, or Yahoo email accounts, steal email data and 2FA codes arriving in the inbox, and send #phishing emails from the compromised accounts. buff.ly/3N8cwfB @riskigy #cybersecurity
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

Google announced the Beta version of GUAC (short for Graph for Understanding Artifact Composition) for organizations to secure their software supply chains. 'GUAC ingests software security metadata, like SBOMs buff.ly/3IEwyeZ
Riskigy

Google announced the Beta version of GUAC (short for Graph for Understanding Artifact Composition) for organizations to secure their software supply chains. 'GUAC ingests software security metadata, like SBOMs buff.ly/3IEwyeZ 
@riskigy #cybersecurity #riskigy #security
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

An updated version of the commodity malware called Legion comes with expanded features to compromise SSH servers and Amazon Web Services credentials associated with DynamoDB and CloudWatch. buff.ly/3BUAgxk Riskigy

An updated version of the commodity malware called Legion comes with expanded features to compromise SSH servers and Amazon Web Services #AWS credentials associated with DynamoDB and CloudWatch. buff.ly/3BUAgxk @riskigy #cybersecurity #riskigy #security #cyberawareness
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

Improperly deactivated and abandoned Salesforce Sites and Communities (aka Experience Cloud) could pose severe risks to organizations, leading to unauthorized access to sensitive data. buff.ly/45BpycP Riskigy

Improperly deactivated and abandoned Salesforce Sites and Communities (aka Experience Cloud) could pose severe risks to organizations, leading to unauthorized access to sensitive data. buff.ly/45BpycP @riskigy #cybersecurity #riskigy #security #knowledgeshare #riskalert
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

Apple has recently addressed a vulnerability that lets attackers with root privileges bypass System Integrity Protection (SIP) to install 'undeletable' malware. buff.ly/3oD1WUA@riskigy

Apple has recently addressed a vulnerability that lets attackers with root privileges bypass System Integrity Protection (SIP) to install 'undeletable' malware. buff.ly/3oD1WUA@riskigy #cybersecurity #riskigy #security #knowledgeshare #cyberawareness #riskalert #vciso
account_circle
Riskigy(@riskigy) 's Twitter Profile Photo

Hackers hold city of Augusta hostage in a attack and released 10GB of sample data from the on the US city of Augusta and claimed they have a lot more data available. buff.ly/3N3vtjA Riskigy

Hackers hold city of Augusta hostage in a #ransomware attack and released 10GB of sample data from the #cyberattack on the US city of Augusta and claimed they have a lot more data available. buff.ly/3N3vtjA @riskigy #cybersecurity #riskigy #security #psa #knowledgeshare
account_circle
TEAM CYMRU(@teamcymru) 's Twitter Profile Photo

What you don’t know about your attack surface could lead to your next breach! Take The first step toward clarity, visibility, and reducing external asset risk
with our free Attack Surface Assessment Report, submit a domain you own - and we’ll do the rest.
ow.ly/LG7n50M70Su

account_circle