Arnav Sharma ๐ฆ๐บ
@arnavsharma
Followers
2K
Following
2K
Media
631
Statuses
14K
Author | Cybersecurity Insights & Tips | Mentor | @Microsoft MVP & MCT | @HashiCorp Ambassador โ๏ธ | Blogs on https://t.co/An8PLNVADG | https://t.co/F643b4tmdX
Joined October 2009
CISA warns U.S. after Poland energy grid cyberattack A destructive attack in Poland used vulnerable internet-facing edge devices to deploy wiper malware, underscoring OT/ICS and edge-security risks for U.S. critical infrastructure. https://t.co/0QhWNpT8HD
#CyberSecurity #InfoSeโฆ
cyberscoop.com
A recent attempt at a destructive cyberattack on Polandโs power grid has prompted the Cybersecurity and Infrastructure Security Agency to publish a warning for U.S. critical infrastructure owners and...
0
0
0
SolarWinds WHD zero-days from January are under attack
csoonline.com
Analysis of real-world incidents reveals that attackers are chaining multiple flaws to compromise the ticketing and support application.
0
0
0
Microsoft 365 outage blocks admins in North America from accessing the admin center; investigation underway. Expect disruption to daily management tasks and tenant configuration. #Microsoft365 #Outage #AdminCenter
bleepingcomputer.com
Microsoft is investigating an outage that blocks some administrators with business or enterprise subscriptions from accessing the Microsoft 365 admin center.
0
0
0
OT Attacks Get Scary With 'Living-off-the-Plant' Techniques
darkreading.com
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.
0
0
0
Which is a clear sign of phishing? A) Urgent request from an unknown sender to click a link B) Email from your IT team with a verified domain and no odd requests C) A polite note from a known contact with no links #CyberSecurity
0
0
0
Automate AWS incident investigations with Tines and AI: automated agents pull AWS CLI data directly into cases, slashing MTTR and cutting manual hunting. #AWS #IncidentResponse #Automation #CloudSecurity #Tines
bleepingcomputer.com
Cloud incidents drag on when analysts have to leave cases to hunt through AWS consoles and CLIs. Tines shows how automated agents pull AWS CLI data directly into cases, reducing MTTR and manual...
0
0
0
Windows 11 adopts mobile-style app permissions: apps must ask for consent before accessing files, cameras, or mics. A privacy-first shift for PC users. #Windows11 #Security #Privacy #Microsoft
bleepingcomputer.com
Microsoft wants to introduce smartphone-style app permission prompts in Windows 11 to request user consent before apps can access sensitive resources such as files, cameras, and microphones.
0
0
0
TransUnion's Real Networks Deal Focuses on Robocall Blocking
darkreading.com
The acquisition allows the credit reporting agency to add SMS spam and scam prevention to its robocall blocking capabilities.
0
0
0
What practice best protects your passwords online? A) Sharing your password with friends or family B) Reusing the same password for all sites C) Using unique, long passwords generated by a password manager #CyberSecurity
0
0
0
ZeroDayRAT emerges: a commercial mobile spyware pitched on Telegram that promises full remote control of compromised Android and iOS devices. A stark reminder that mobile endpoints remain a critical attack surface. #CyberSecurity #MobileSecurity
bleepingcomputer.com
A new commercial mobile spyware platform dubbed ZeroDayRAT is being advertised to cybercriminals on Telegram as a tool that provides full remote control over compromised Android and iOS devices.
0
0
0
What Organizations Need to Change When Managing Printers
darkreading.com
Ask the Expert: Organizations need to close the ownership vacuum and establish durable security controls to ensure printers are protected.
0
0
0
Windows shortcut weaponized in Phorpiex-linked ransomware campaign
csoonline.com
Researchers revealed a Phorpiex-distributed phishing campaign using malicious LNK files to deploy Global Group ransomware designed to operate entirely offline.
0
0
0
Single prompt breaks AI safety in 15 major language models
csoonline.com
The GRPโObliteration technique reveals that even mild prompts can reshape internal safety mechanisms, raising oversight concerns as enterprises increasingly fineโtune openโweight models with privil...
0
0
0
Which practice best protects your online passwords? A) Reuse a simple password across sites B) Use a unique, long password stored in a password manager C) Write it on a sticky note by your monitor #CyberSecurity
0
0
0
Which practice makes passwords stronger? A) Using a short, common word from a dictionary B) A long, random mix of upper/lowercase letters, numbers, and symbols C) Reusing the same password for multiple sites #CyberSecurity
0
0
0
20 years in prison in absentia for a $73M pig-butchering/romance-baiting crypto scam. A dual Chinese/St. Kitts & Nevis national shows cross-border fraud carries severe penalties. #CryptoCrime #PigButchering #RomanceBaiting
bleepingcomputer.com
A dual Chinese and St. Kitts and Nevis national was sentenced to 20 years in prison in absentia for his role in an international cryptocurrency investment scheme (also known as pig butchering or...
0
0
0
How to govern agentic AI so as not to lose control
csoonline.com
The debate should no longer be whether or not to use AI, but rather how to deploy it without losing perspective and control in real-world applications.
0
0
0
Daily Cybersecurity News Roundup โ February 09, 2026
0
0
0
โ ๏ธ Threat briefing: UNC3886 targets Singaporeโs telecom sector; Notepad++ supply-chain hack hits SE Asia ๐ฅ. Why care: espionage risk and fragile supply chains. Enable MFA, patch fast. #CyberSecurity #ThreatIntel #DailyRoundup #InfoSec Full roundup โ
0
1
0