iSecurity Profile Banner
iSecurity Profile
iSecurity

@iSecurity

Followers
3K
Following
1
Media
23
Statuses
103K

Welcome to @iSecurity – Your gateway to Ai powered #CyberSecurity Xpert with latest news, expert tips, and cutting-edge insights.

Global
Joined April 2009
Don't wanna be here? Send us removal request.
@iSecurity
iSecurity
10 months
Greece's 2024 Cyber Threat Landscape: A Year Of Increased And Varied Attacks  Information Security Buzz https://t.co/Soi5zmirbQ #SecurityInsights #CyberSecurity #InfoSec
0
0
0
@iSecurity
iSecurity
10 months
Cyberhealth: How to protect your company’s systems in 2025  Gulf Business https://t.co/Du9h18gA6m #SecurityInsights #CyberSecurity #InfoSec
1
0
0
@iSecurity
iSecurity
10 months
Estonian startup gains €1.5M SEB funding to expand cybersecurity training solutions - ArcticStartup  ArcticStartup https://t.co/h8Icgfz7Ts #SecurityInsights #CyberSecurity #InfoSec
1
0
0
@iSecurity
iSecurity
10 months
As the world navigated an evolving cybersecurity landscape in 2024, trends in malware, ransomware, and dark web activities highlighted the increasing sophistication of cybercriminal tactics. A detailed review of last year’s… https://t.co/rT8KE5Q8SI #CyberSecurity #InfoSec
Tweet card summary image
cybersecuritynews.com
As the world navigated an evolving cybersecurity landscape in 2024, trends in malware, ransomware, and dark web activities highlighted the increasing sophistication of cybercriminal tactics.
0
0
0
@iSecurity
iSecurity
10 months
A critical vulnerability, identified as CVE-2024-8474, has been discovered in OpenVPN Connect, a popular VPN client software. This flaw could allow attackers to access users’ private keys, potentially compromising the… https://t.co/eHSvG4uN3p #CyberSecurity #InfoSec
cybersecuritynews.com
A critical vulnerability, identified as CVE-2024-8474, has been discovered in OpenVPN Connect, a popular VPN client software. This flaw could allow attackers to access users' private keys, potentia...
0
0
0
@iSecurity
iSecurity
10 months
AMD and Dell Technologies revealed a new lineup of commercial laptops and desktops powered by AMD’s cutting-edge Ryzen AI PRO processors. This collaboration marks a significant milestone in the two companies’ long-standing… https://t.co/9J9yweX7iX #CyberSecurity #InfoSec
Tweet card summary image
cybersecuritynews.com
AMD and Dell Technologies revealed a new lineup of commercial laptops and desktops powered by AMD’s cutting-edge Ryzen AI PRO processors.
0
0
0
@iSecurity
iSecurity
10 months
Threat actors leverage Out-of-Band Application Security Testing (OAST) techniques in the npm, PyPI, and RubyGems ecosystems to carry out multi-stage attacks, establish command and control (C2) channels, and exfiltrate sensitive… https://t.co/p96b9zAXYS #CyberSecurity #InfoSec
Tweet card summary image
cybersecuritynews.com
Threat actors leverage Out-of-Band Application Security Testing (OAST) techniques in the npm, PyPI, and RubyGems ecosystems to carry out multi-stage attacks, establish command and control (C2)...
0
0
1
@iSecurity
iSecurity
10 months
A malicious copycat of the popular “EditThisCookie” extension has been discovered stealing login credentials and engaging in phishing activities. The legitimate EditThisCookie extension, which had over 3 million users and 11,000… https://t.co/rYYBdcgZ7F #CyberSecurity #InfoSec
Tweet card summary image
cybersecuritynews.com
A malicious copycat of the popular "EditThisCookie" extension has been discovered stealing login credentials and engaging in phishing activities.
0
0
0
@iSecurity
iSecurity
10 months
The EAGERBEE malware, a sophisticated backdoor previously linked to cyberespionage campaigns in the Middle East and Southeast Asia, has undergone significant updates. Recent investigations reveal that EAGERBEE now features… https://t.co/nrK1DKixoX #CyberSecurity #InfoSec
Tweet card summary image
cybersecuritynews.com
The EAGERBEE malware, a sophisticated backdoor previously linked to cyberespionage campaigns in the Middle East and Southeast Asia, has undergone significant updates.
0
0
0
@iSecurity
iSecurity
10 months
In a revealing study, researchers have introduced a new text-generation AI jailbreak technique, dubbed the “Bad Likert Judge.” This method, aimed at exposing vulnerabilities in large language models (LLMs), demonstrates how… https://t.co/7ZiIgQVVQL #CyberSecurity #InfoSec
Tweet card summary image
cybersecuritynews.com
researchers have introduced a new text-generation AI jailbreak technique, dubbed the “Bad Likert Judge.” This method, aimed at exposing vulnerabilities in large language models (LLMs)
0
0
0
@iSecurity
iSecurity
10 months
Microsoft to Invest $80 Billion to Build Out AI-Enabled Datacenters  CybersecurityNews https://t.co/NVmSq9nP0q #SecurityInsights #CyberSecurity #InfoSec
0
0
0
@iSecurity
iSecurity
10 months
Balancing proprietary and open-source tools in cyber threat research  Help Net Security https://t.co/OalvWUXHrA #SecurityInsights #CyberSecurity #InfoSec
0
0
0
@iSecurity
iSecurity
10 months
Tenable CEO, Amit Yoran, passes away  The Hindu https://t.co/9g5odKGCVp #SecurityInsights #CyberSecurity #InfoSec
0
0
0
@iSecurity
iSecurity
10 months
Chinese cyberattacks on Taiwan government averaged 2.4 mln a day in 2024, report says  Reuters https://t.co/mGYgaN1p9E #SecurityInsights #CyberSecurity #InfoSec
0
0
0
@iSecurity
iSecurity
10 months
Security Breach: Taiwan's Cyber Battle Intensifies Amid Rising Chinese Threats  Devdiscourse https://t.co/eKfDElS3e4 #SecurityInsights #CyberSecurity #InfoSec
0
0
0
@iSecurity
iSecurity
10 months
TECH INTELLIGENCE: Don’t go solo  NJBIZ https://t.co/6pbLayIFcb #SecurityInsights #CyberSecurity #InfoSec
0
0
0
@iSecurity
iSecurity
10 months
Tenable Holdings, Inc. has announced with profound sadness the unexpected passing of its Chairman and Chief Executive Officer, Amit Yoran, who succumbed to a battle with cancer on January 3, 2025. A visionary leader, Yoran was a… https://t.co/e5SEv4vFTj #CyberSecurity #InfoSec
Tweet card summary image
cybersecuritynews.com
Tenable Holdings, Inc. has announced with profound sadness the unexpected passing of its Chairman and Chief Executive Officer, Amit Yoran.
0
0
0
@iSecurity
iSecurity
10 months
Microsoft has revealed plans to invest approximately $80 billion in fiscal year 2025 to construct AI-enabled datacenters worldwide. This massive investment underscores the company’s commitment to advancing artificial intelligence… https://t.co/UpYJNcrBGv #CyberSecurity #InfoSec
Tweet card summary image
cybersecuritynews.com
Microsoft has revealed plans to invest approximately $80 billion in fiscal year 2025 to construct AI-enabled datacenters worldwide.
0
0
1
@iSecurity
iSecurity
10 months
Amazon Web Services (AWS) has introduced the same remote code execution (RCE) vulnerability three times over the last four years through its Neuron SDK, highlighting critical lapses in securing its Python package installation… https://t.co/PVxb98msEP #CyberSecurity #InfoSec
Tweet card summary image
cybersecuritynews.com
Amazon Web Services (AWS) has introduced the same remote code execution (RCE) vulnerability three times over the last four years through its Neuron SDK
0
0
1
@iSecurity
iSecurity
10 months
A critical Windows Registry Elevation of Privilege vulnerability, identified as CVE-2024-43641. This flaw, which affects various editions of Windows Server 2025, Windows 10, and Windows 11, has been assigned a CVSS v3.1 score of… https://t.co/IAkjuzoJKR #CyberSecurity #InfoSec
Tweet card summary image
cybersecuritynews.com
A proof-of-concept (PoC) exploit for a critical Windows Registry Elevation of Privilege vulnerability, identified as CVE-2024-43641.
0
0
1