arnavsharma Profile Banner
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ Profile
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ

@arnavsharma

Followers
2K
Following
2K
Media
631
Statuses
14K

Author | Cybersecurity Insights & Tips | Mentor | @Microsoft MVP & MCT | @HashiCorp Ambassador โ˜๏ธ | Blogs on https://t.co/An8PLNVADG | https://t.co/F643b4tmdX

Joined October 2009
Don't wanna be here? Send us removal request.
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
30 minutes
CISA warns U.S. after Poland energy grid cyberattack A destructive attack in Poland used vulnerable internet-facing edge devices to deploy wiper malware, underscoring OT/ICS and edge-security risks for U.S. critical infrastructure. https://t.co/0QhWNpT8HD #CyberSecurity #InfoSeโ€ฆ
Tweet card summary image
cyberscoop.com
A recent attempt at a destructive cyberattack on Polandโ€™s power grid has prompted the Cybersecurity and Infrastructure Security Agency to publish a warning for U.S. critical infrastructure owners and...
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
40 minutes
Microsoft 365 outage blocks admins in North America from accessing the admin center; investigation underway. Expect disruption to daily management tasks and tenant configuration. #Microsoft365 #Outage #AdminCenter
Tweet card summary image
bleepingcomputer.com
Microsoft is investigating an outage that blocks some administrators with business or enterprise subscriptions from accessing the Microsoft 365 admin center.
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
1 hour
OT Attacks Get Scary With 'Living-off-the-Plant' Techniques
Tweet card summary image
darkreading.com
Ironically, security by obscurity has helped prevent dangerous OT attacks in recent years. It won't be that way forever.
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
1 hour
Which is a clear sign of phishing? A) Urgent request from an unknown sender to click a link B) Email from your IT team with a verified domain and no odd requests C) A polite note from a known contact with no links #CyberSecurity
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
1 hour
Automate AWS incident investigations with Tines and AI: automated agents pull AWS CLI data directly into cases, slashing MTTR and cutting manual hunting. #AWS #IncidentResponse #Automation #CloudSecurity #Tines
Tweet card summary image
bleepingcomputer.com
Cloud incidents drag on when analysts have to leave cases to hunt through AWS consoles and CLIs. Tines shows how automated agents pull AWS CLI data directly into cases, reducing MTTR and manual...
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
3 hours
Windows 11 adopts mobile-style app permissions: apps must ask for consent before accessing files, cameras, or mics. A privacy-first shift for PC users. #Windows11 #Security #Privacy #Microsoft
Tweet card summary image
bleepingcomputer.com
Microsoft wants to introduce smartphone-style app permission prompts in Windows 11 to request user consent before apps can access sensitive resources such as files, cameras, and microphones.
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
3 hours
TransUnion's Real Networks Deal Focuses on Robocall Blocking
Tweet card summary image
darkreading.com
The acquisition allows the credit reporting agency to add SMS spam and scam prevention to its robocall blocking capabilities.
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
3 hours
What practice best protects your passwords online? A) Sharing your password with friends or family B) Reusing the same password for all sites C) Using unique, long passwords generated by a password manager #CyberSecurity
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
3 hours
ZeroDayRAT emerges: a commercial mobile spyware pitched on Telegram that promises full remote control of compromised Android and iOS devices. A stark reminder that mobile endpoints remain a critical attack surface. #CyberSecurity #MobileSecurity
Tweet card summary image
bleepingcomputer.com
A new commercial mobile spyware platform dubbed ZeroDayRAT is being advertised to cybercriminals on Telegram as a tool that provides full remote control over compromised Android and iOS devices.
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
5 hours
Which practice best protects your online passwords? A) Reuse a simple password across sites B) Use a unique, long password stored in a password manager C) Write it on a sticky note by your monitor #CyberSecurity
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
7 hours
Which practice makes passwords stronger? A) Using a short, common word from a dictionary B) A long, random mix of upper/lowercase letters, numbers, and symbols C) Reusing the same password for multiple sites #CyberSecurity
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
8 hours
20 years in prison in absentia for a $73M pig-butchering/romance-baiting crypto scam. A dual Chinese/St. Kitts & Nevis national shows cross-border fraud carries severe penalties. #CryptoCrime #PigButchering #RomanceBaiting
Tweet card summary image
bleepingcomputer.com
A dual Chinese and St. Kitts and Nevis national was sentenced to 20 years in prison in absentia for his role in an international cryptocurrency investment scheme (also known as pig butchering or...
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
9 hours
Daily Cybersecurity News Roundup โ€“ February 09, 2026
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
9 hours
Skip โ€“ not relevant.
0
0
0
@arnavsharma
Arnav Sharma ๐Ÿ‡ฆ๐Ÿ‡บ
9 hours
โš ๏ธ Threat briefing: UNC3886 targets Singaporeโ€™s telecom sector; Notepad++ supply-chain hack hits SE Asia ๐Ÿ”ฅ. Why care: espionage risk and fragile supply chains. Enable MFA, patch fast. #CyberSecurity #ThreatIntel #DailyRoundup #InfoSec Full roundup โ†’
0
1
0