Between The Hacks
@BetweenTheHacks
Followers
168
Following
29
Media
115
Statuses
171
A Cybersecurity Blog and News
Joined April 2020
https://t.co/LnVIZwEP99 confirmed threat actors accessed a legacy system that wasn’t decommissioned properly. It’s a reminder that old systems can become unmonitored entry points when they’re not retired or secured. 👉 https://t.co/QOyHVSmZgi
#Cybersecurity #LegacySystems
0
0
0
Legacy systems don’t just age. They accumulate risk. ✅ Identify ✅ Contain ✅ Harden ✅ Monitor ✅ Add to a risk register Modernize before your own systems make the news. Full story → https://t.co/QOyHVSmZgi
#Cybersecurity #ZeroTrust #RiskManagement
betweenthehacks.com
What came after a dramatic Louvre heist highlights the risks of leaving legacy technology untreated in your enterprise, and how to mitigate them before they make the news.
0
0
0
The only camera near the break-in faced the wrong way. Some systems ran on Windows 2000. And the password? “Louvre.” Audits warned about these gaps a decade ago, but the risks never got fixed. Many orgs are in the same position today.
1
0
0
Thieves stole $100M in jewels from the Louvre, but the bigger story wasn’t the heist. It was the outdated cameras, weak passwords, and legacy systems behind them. Here’s what every enterprise can learn from it. 👇 #Cybersecurity #ZeroTrust #CISO
1
0
1
Venmo makes your payments public by default. Who you paid. When. And why. This is a privacy problem with an easy, 30 second fix! 🔗 https://t.co/Kr0yQrKwFU
#Venmo #PrivacyMatters #CyberSecurity #VenmoPrivacy #AppSecurity #DataProtection #DigitalSafety #FixItFast
0
0
0
Your Venmo feed is probably public. So is that payment for “🤫 questionable decisions 💸.” Fix it in 30 seconds: 👉 https://t.co/Kr0yQrKwFU
0
0
0
June is National Internet Safety Month. But where did it come from? 🕵️♂️ Spoiler: It started in 2005, way back in the MySpace era. Read the quick origin story 👉 https://t.co/u0CWhnz2q3
#Cybersecurity #Infosec #InternetSafetyMonth
0
0
1
You don't need to be a CISO to protect yourself online. This 10-minute weekend security checkup covers 7 things anyone can do—from updates to MFA to backups. Read it here: 👉 https://t.co/GzpaKUqBHr
#CyberSecurity #WeekendWin #MFA
0
0
1
A guy named “Steven” applied for a remote dev job. Said he lived in Houston. Couldn’t name a single restaurant & never heard of Halloween. He wasn’t a dev, he was a North Korean spy. Read about this! 👉 https://t.co/0m8s1ZhAu9
#Cybersecurity #SocialEngineering #RemoteWork
0
0
1
Still using 123456? It’s World Password Day—time to fix that. Learn how to level up your logins and why passkeys > passwords. 👉 https://t.co/LXDF6Zc5Dv
#WorldPasswordDay #Cybersecurity #Infosec
0
0
1
🚨 New from Between The Hacks: Quishing = Phishing + QR Codes Attackers are hijacking the codes we trust every day. 😬 Parking meters 🍔 Menus 📧 Invoices Learn how quishing works — and how to avoid it. 🔗 https://t.co/p16gG6zd2m
#cybersecurity #phishing #quishing #infosec
0
0
1
I blocked my smart thermostat from the Internet. Support said, “Just put it in the DMZ.” That’s not Zero Trust. That’s zero security. So I built NetBOM. It’s like SBOM—but for network behavior. 🔗 https://t.co/DINEUc4a45
#NetBOM #IoTSecurity #CyberSecurity #ZeroTrust
0
2
2
NetBOM v2.0 is out! 🔐 Smarter and more secure. It’s a new way to think about securing IoT + OT, software and apps on your network! NetBOM turns “plug and play” into “plug and protect.” 📖 https://t.co/ITjSDOS9wF
#NetBOM #IoTSecurity #PlugAndProtect #Infosec
0
2
3
“Nice files you got there. Shame if something happened to them.” Ransomware is big business. How it works, who gets hit, and how to stay safe—plus a printer with attitude. 👉 https://t.co/rHOb7Z1Y75
#ransomware #cybersecurity
0
0
3
Big changes! Between The Hacks now lives at https://t.co/1tAtIueQkh. Same content, just a new home. Have a look: https://t.co/4MRTajpqKL
0
0
1
🔐 Say goodbye to passwords. Say hello to passkeys. No phishing. No reusing. No typing. Just tap and go. More: https://t.co/DRTD4rkmK3
#Passkeys #Cybersecurity #Authentication #Infosec
betweenthehacks.com
Passkeys are the simple, secure alternative to passwords. Learn how they work, why they’re phishing-resistant, and how to start using them today.
0
0
1
I finally segmented my network. ✂️ I cut the Ethernet cable. 🧊 The printer lives in the freezer. 📡 SSID rotates every 60 seconds. Welcome to Physical Zero Trust™. https://t.co/mdFdfS1fsK
#infosec #cybersecurity #infosechumor
0
1
1
Every device on your network can talk to the entire Internet—and probably to each other too. My latest blog explores why segmentation isn’t enough anymore: 🔗 https://t.co/MklvukVRqP
#cybersecurity #iot #infosec #networksecurity
0
0
0
Even Troy Hunt got phished. It wasn’t carelessness—it was timing, fatigue, and a really good scam. I wrote about what happened and what we can all learn from it. 🔗 https://t.co/Up2RM7RSWl
#phishing #infosec #cybersecurity
betweenthehacks.com
Cybersecurity expert Troy Hunt fell for a phishing attack. Learn what happened, how phishing tactics have evolved, and how to protect yourself in 2025.
0
0
0
Maastricht University paid a €200k ransom in 2019. Some of the funds were recovered in 2020 and returned to the university - but, due to the increased value of BTC, it actually got €500k back. https://t.co/BjyYEgxGp2
14
84
285