FSecure_Consult Profile Banner
F-Secure Consulting Profile
F-Secure Consulting

@FSecure_Consult

Followers
9K
Following
1K
Media
940
Statuses
3K

Technical research and business insights for the intellectually curious. #cybersecurity #infosec

Global
Joined November 2009
Don't wanna be here? Send us removal request.
@WithSecure
WithSecure™
4 years
Are you unwittingly leaving sensitive information unprotected? Confusion over who’s responsible for data security in the cloud could have potentially ruinous consequences for your organization. Download our report and learn how to keep prying eyes out. https://t.co/nTacNvF3xp
0
7
5
@FSecure_Consult
F-Secure Consulting
4 years
Sometimes what looks like an attack by a sophisticated threat actor is anything but. Yet this doesn’t make an incident any less dangerous or damaging. What makes the difference is #firstresponse. James Dorgan explains in the full video >> https://t.co/26IgeCf10T #cyberdefense
0
2
4
@WithSecure
WithSecure™
4 years
With separate security operations for cloud and on-premise IT, you risk leaving cracks in your defences that hackers can’t wait to exploit. Don’t give them the chance. Download our report and discover how to unify your security for optimum protection. https://t.co/nTacNvF3xp
0
3
3
@FSecure_Consult
F-Secure Consulting
4 years
How well do you know your perimeter? Establish the truth about your organization’s #vulnerabilities and mitigate #risk. Read more in our latest article >> https://t.co/XHPUTImVcf #attacksurface #cybersecurity
0
4
4
@countercept
F-Secure Countercept
4 years
There is more than meets the eye when you secure your organization's data in the cloud. Identify the 7 Hidden Truths of #Cloud #Security by reading our report: https://t.co/Tw3wPbwxu0
0
4
3
@AbertayHackers
Abertay Hackers
4 years
It's with great pleasure that we announce our first sponsor for #SecuriTayX 🎉🥳 Thank you to @FSecure_Consult for sponsoring the afterparty and the continued support you provide to Securi-Tay over the last few years.❤️
0
5
41
@WithSecure
WithSecure™
4 years
Securing your Cloud systems also means securing any devices used to access them. Endpoint detection and response (EDR) remains an essential starting point. Read our report to find out how it fits in to the wider picture. https://t.co/nTacNvF3xp
0
3
3
@FSecure_Consult
F-Secure Consulting
4 years
Paying a fortune in bug #bounties? There could be a better approach to improve your #cybersecurity posture. Find out how >> https://t.co/WaFzcko480 #attacksurface
0
3
3
@WithSecure
WithSecure™
4 years
With myriad users and devices logging in to #cloud systems remotely, how do you know they are who – or what – they purport to be? Identity-based attacks are exploding, so you can’t rely on credentials alone. To learn how to stop them, download our report. https://t.co/nTacNvF3xp
0
5
4
@WithSecure
WithSecure™
4 years
Can you be sure all your #cloud settings are securely configured? In a multi-cloud world, misconfiguration is everywhere, leaving gleeful attackers primed to exploit any errors. Get a firm grip on the controls by downloading our latest report today. https://t.co/nTacNvF3xp
0
2
3
@WithSecure
WithSecure™
4 years
It’s impossible to secure what you can’t see. To stop attackers slipping in unnoticed, you need complete #visibility of your #cloud estate. It’s time to open your eyes and shore up your defenses. For the full picture, download our new report now https://t.co/nTacNvF3xp
0
6
6
@FSecure_Consult
F-Secure Consulting
4 years
In the latest @FSecureLabs publication, find out how @j1gst4k3r discovered an XSS vulnerability (CVE-2022-23599) through cache poisoning in CMS Plone, with guidance steps to work around the vulnerability if patching isn’t available >>
@FSecureLabs
WithSecure Labs
4 years
@j1gst4k3r the Plone ranger caching his way to XSS https://t.co/WM2lq78Sn1 @FSecure_Consult @FSecure CVE-2022-23599
0
4
6
@WithSecure
WithSecure™
4 years
Cyber attacks are growing at an alarming pace, but too many organizations still have their heads in the sand when it comes to the need for more effective cloud security strategies. Download our latest expert report to ensure you’re not among them. https://t.co/nTacNvF3xp
0
5
6
@WithSecure
WithSecure™
4 years
"What we're seeing now is a wave of attacks where attackers are targeting technology rather than people, with the most recent notable example being the #Log4Shell attacks." -Jordan LaRose, F-Secure director of incident response https://t.co/5xhpLlV0F0 #cybersecurity #CyberAttack
0
12
10
@CyberSauna
Cyber Threats Xposed
4 years
NEW #CYBERSAUNA: Log4j Zero Day: What It Means for Your Org Episode 62 with F-Secure's CISO @ekoivune>> https://t.co/ZBBcZA7aft #log4jshell #CyberSecurity #ThreatHunting #infosec #vulnerabilities
1
16
8
@FSecure_Consult
F-Secure Consulting
4 years
What do #cybersecurity threats look like in the world of #deeplearning #tech? Find out in this article on the trustworthiness of deep learning models and the challenges of testing projects—designed for real-world application—in a lab >> https://t.co/VxjYkhLjJG #infosec #AI
0
4
4
@Yogehi
Ken Gannon (伊藤 剣)
4 years
I'm excited to finally publicly talk about Boops Boops, a re-skinned Drozer application lol The story behind this application is that for Pwn2Own, I found a way to one-tap install a malicious application that gets uploaded to the Galaxy Store (1/?)
2
12
14
@FSecure_Consult
F-Secure Consulting
4 years
Transparency and robustness are 2 facets of trust within #deeplearning #tech. Neither are impossible to achieve, but there are challenges. @KastaSedo’s article looks at how we might get there and why it’s so important from an #infosec perspective >> https://t.co/uoUkSSRKht
0
3
0
@FSecure_Consult
F-Secure Consulting
4 years
When do #vulnerability scoring systems work best and when do they just add complexity and #cyberrisk? This article explores the benefits, limitations, and nuances of #CVSS and help you decide if it’s the framework you need >> https://t.co/VcmUPey487 #InfoSecurity #CyberSecurity
0
10
5
@FSecure_Consult
F-Secure Consulting
4 years
Misapplications of #vulnerability scoring systems like #CVSS are an opportunity to discuss how it should be used. Decide if CVSS is the right framework for your requirements and learn how get the most out of it in our latest article >> https://t.co/aIT4oTE4j1 #InfoSecurity
0
0
1