F-Secure Consulting
@FSecure_Consult
Followers
9K
Following
1K
Media
940
Statuses
3K
Technical research and business insights for the intellectually curious. #cybersecurity #infosec
Global
Joined November 2009
Are you unwittingly leaving sensitive information unprotected? Confusion over who’s responsible for data security in the cloud could have potentially ruinous consequences for your organization. Download our report and learn how to keep prying eyes out. https://t.co/nTacNvF3xp
0
7
5
Sometimes what looks like an attack by a sophisticated threat actor is anything but. Yet this doesn’t make an incident any less dangerous or damaging. What makes the difference is #firstresponse. James Dorgan explains in the full video >> https://t.co/26IgeCf10T
#cyberdefense
0
2
4
With separate security operations for cloud and on-premise IT, you risk leaving cracks in your defences that hackers can’t wait to exploit. Don’t give them the chance. Download our report and discover how to unify your security for optimum protection. https://t.co/nTacNvF3xp
0
3
3
How well do you know your perimeter? Establish the truth about your organization’s #vulnerabilities and mitigate #risk. Read more in our latest article >> https://t.co/XHPUTImVcf
#attacksurface #cybersecurity
0
4
4
There is more than meets the eye when you secure your organization's data in the cloud. Identify the 7 Hidden Truths of #Cloud #Security by reading our report: https://t.co/Tw3wPbwxu0
0
4
3
It's with great pleasure that we announce our first sponsor for #SecuriTayX 🎉🥳 Thank you to @FSecure_Consult for sponsoring the afterparty and the continued support you provide to Securi-Tay over the last few years.❤️
0
5
41
Securing your Cloud systems also means securing any devices used to access them. Endpoint detection and response (EDR) remains an essential starting point. Read our report to find out how it fits in to the wider picture. https://t.co/nTacNvF3xp
0
3
3
Paying a fortune in bug #bounties? There could be a better approach to improve your #cybersecurity posture. Find out how >> https://t.co/WaFzcko480
#attacksurface
0
3
3
With myriad users and devices logging in to #cloud systems remotely, how do you know they are who – or what – they purport to be? Identity-based attacks are exploding, so you can’t rely on credentials alone. To learn how to stop them, download our report. https://t.co/nTacNvF3xp
0
5
4
Can you be sure all your #cloud settings are securely configured? In a multi-cloud world, misconfiguration is everywhere, leaving gleeful attackers primed to exploit any errors. Get a firm grip on the controls by downloading our latest report today. https://t.co/nTacNvF3xp
0
2
3
It’s impossible to secure what you can’t see. To stop attackers slipping in unnoticed, you need complete #visibility of your #cloud estate. It’s time to open your eyes and shore up your defenses. For the full picture, download our new report now https://t.co/nTacNvF3xp
0
6
6
In the latest @FSecureLabs publication, find out how @j1gst4k3r discovered an XSS vulnerability (CVE-2022-23599) through cache poisoning in CMS Plone, with guidance steps to work around the vulnerability if patching isn’t available >>
@j1gst4k3r the Plone ranger caching his way to XSS https://t.co/WM2lq78Sn1
@FSecure_Consult @FSecure CVE-2022-23599
0
4
6
Cyber attacks are growing at an alarming pace, but too many organizations still have their heads in the sand when it comes to the need for more effective cloud security strategies. Download our latest expert report to ensure you’re not among them. https://t.co/nTacNvF3xp
0
5
6
"What we're seeing now is a wave of attacks where attackers are targeting technology rather than people, with the most recent notable example being the #Log4Shell attacks." -Jordan LaRose, F-Secure director of incident response https://t.co/5xhpLlV0F0
#cybersecurity #CyberAttack
0
12
10
NEW #CYBERSAUNA: Log4j Zero Day: What It Means for Your Org Episode 62 with F-Secure's CISO @ekoivune>> https://t.co/ZBBcZA7aft
#log4jshell #CyberSecurity
#ThreatHunting #infosec #vulnerabilities
1
16
8
What do #cybersecurity threats look like in the world of #deeplearning #tech? Find out in this article on the trustworthiness of deep learning models and the challenges of testing projects—designed for real-world application—in a lab >> https://t.co/VxjYkhLjJG
#infosec #AI
0
4
4
I'm excited to finally publicly talk about Boops Boops, a re-skinned Drozer application lol The story behind this application is that for Pwn2Own, I found a way to one-tap install a malicious application that gets uploaded to the Galaxy Store (1/?)
2
12
14
Transparency and robustness are 2 facets of trust within #deeplearning #tech. Neither are impossible to achieve, but there are challenges. @KastaSedo’s article looks at how we might get there and why it’s so important from an #infosec perspective >> https://t.co/uoUkSSRKht
0
3
0
When do #vulnerability scoring systems work best and when do they just add complexity and #cyberrisk? This article explores the benefits, limitations, and nuances of #CVSS and help you decide if it’s the framework you need >> https://t.co/VcmUPey487
#InfoSecurity #CyberSecurity
0
10
5
Misapplications of #vulnerability scoring systems like #CVSS are an opportunity to discuss how it should be used. Decide if CVSS is the right framework for your requirements and learn how get the most out of it in our latest article >> https://t.co/aIT4oTE4j1
#InfoSecurity
0
0
1