cyb3r_dan Profile Banner
Dan Profile
Dan

@cyb3r_dan

Followers
79
Following
23
Media
4
Statuses
60

IT Information Security Specialist | M.S. | CASP+ | CySA+ | Sec+ | Net+ | CCENT

Joined December 2017
Don't wanna be here? Send us removal request.
@cyb3r_dan
Dan
4 years
Interesting read on the discussion of possible threat vectors in the new 5G systems architecture and why it’s a huge concern #cybersecurity.
@NSACyber
NSA Cyber
4 years
Today, we released our Potential Threat Vectors to 5G Infrastructure analysis paper with our partners @ODNIgov, @CISAgov & industry to enhance understanding of risks introduced by #5G. Learn more here:
1
0
3
@cyb3r_dan
Dan
4 years
Very unethical. Not sure how they though this would be a good idea.
@TheHackersNews
The Hacker News
4 years
Researchers from University of Minnesota apologized to #Linux Kernel Project maintainers for intentionally introducing insecure code, which led to the school being banned from further contributing to the open-source project. Read: #infosec #cybersecurity.
0
1
1
@cyb3r_dan
Dan
4 years
Public facing and a convenient entry point #cybersecurity #vpn #vulnerabilities.
@DarkReading
Dark Reading
4 years
Attackers Heavily Targeting VPN Vulnerabilities by @jaivijayan #VPN #cyberattack #vulnerabilities.
0
0
1
@cyb3r_dan
Dan
4 years
Imagine going to the kitchen to air fry some food and now you have to pay a ransom. RCE vulnerabilities uncovered in smart air fryer #cybersecurity
Tweet card summary image
zdnet.com
Updated: The impacted vendor has not responded or fixed the security issues.
0
0
0
@cyb3r_dan
Dan
4 years
Zero Trust Networks (ZTNs) are invaluable. They address the biggest flaw in the perimeter security model: hosts aren’t protected from each other. Lateral movement and privesc are engrained in a hacker’s methodology. But in ZTNs, hosts are protected from each other #cybersecurity.
@CyberScoopNews
CyberScoop - @cyberscoop.bsky.social
4 years
Cyber adversaries are getting more organized in their attacks. CIOs and CISOs need a defense strategy which embraces #zerotrust and #SOC modernization, and @splunk's Yassir Abousselham discusses using #data to defend against modern threats.
Tweet media one
0
0
0
@cyb3r_dan
Dan
4 years
“The recent weather-related outages in Texas, while not the result of a cyber-attack, were a stark demonstration of the potential for devastation.” #cybersecurity.
0
0
0
@cyb3r_dan
Dan
4 years
This career pathway tool helps you explore specific cybersec roles and it identifies their core tasks, knowledge, skills, and abilities. It also recommends specific training, certifications, and degree programs related to that role. #cybersecurity #infosec.
@CISACyber
CISA Cyber
4 years
👩‍💻 Are you a current #cybersecurity professional looking to advance your career? Check out @CISAgov's updated Cyber Career Pathways Tool for opportunities to excel in the #infosec industry! .#Careers #CyberWorkforce #IT #Jobs #Skills #NICCS #NetSec
Tweet media one
0
0
2
@cyb3r_dan
Dan
4 years
Cozy Bear is conducting widespread scanning and exploitation against U.S. government networks to obtain authentication credentials to allow further access. The five, fixed bugs under active attack affect Citrix, Fortinet, Pulse Secure, Synacor and VMware #cybersecurity #infosec.
@threatpost
Threatpost
4 years
Spies and more spies: 5 bugs known to be favorites with the #APT crowd are still unpatched in large numbers of organizations. If you want to be low-hanging fruit for data theft, keep on ignoring #security bugs I guess. #cybersecurity @NSAGov.
0
1
3
@cyb3r_dan
Dan
4 years
Been seeing a big uptick in this on @reddit.
@CyberScoopNews
CyberScoop - @cyberscoop.bsky.social
4 years
Hackers are abusing Discord, Slack file-sharing to distribute malware. Here's what to be on the watch for —> .
Tweet media one
0
0
0
@cyb3r_dan
Dan
4 years
RT @TheHackersNews: There are a lot of jobs in #cybersecurity, depending not only on your skill level and experience, but also what you lik….
Tweet card summary image
thehackernews.com
Find out which jobs are the best and most in demand in cybersecurity.
0
89
0
@cyb3r_dan
Dan
4 years
RT @FBI: #DYK Chinese companies must share information and data with the Chinese government upon request? Before you share your businesses’….
0
462
0
@cyb3r_dan
Dan
7 years
RT @TheHackersNews: A Hacker Tried Selling Stolen U.S. Military Drone Documents On #DarkWeb For Just $200 —by @Swati_THN. .
0
164
0
@cyb3r_dan
Dan
7 years
RT @threatpost: Deceased patient data is being sold on the Dark Web:
0
27
0
@cyb3r_dan
Dan
7 years
RT @TheHackersNews: Hacker Puts RDP Access to a Major International Airport’s Security System On Dark Web Sale For Just $10. .
0
219
0
@cyb3r_dan
Dan
7 years
RT @threatpost: Researchers have discovered two new #Spectre variants - earning them a $100,000 #BugBounty reward from Intel: https://t.co/….
0
27
0
@cyb3r_dan
Dan
7 years
RT @threatpost: Here are the biggest #cybercrime developments in 2018, so far: #ThreatList.
0
7
0
@cyb3r_dan
Dan
7 years
RT @threatpost: Users complained online that their #Galaxy devices are randomly sending photos to contacts - but #Samsung said it isn’t a h….
threatpost.com
After users complained online that their Galaxy devices are randomly sending photos to contacts, Samsung said it isn’t a hardware or software issue.
0
15
0