Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Cyber
780th Military Intelligence Brigade (Cyber)
780thC
Joint Statement by the Cyber Unified Coordination Group (UCG), composed of the FBI, CISA, and ODNI with support from NSA: "This work indicates that an APT actor, likely Russian in
Read more
Krisztina 🇪🇺
YellowBrickC
"TDD is not the same as unit testing" David Farley on @virtualDDD "The 5 principles to measure quality in code: modular, cohesive, good SoC, good abstraction and coupled with the
Read more
Eric Geller
ericgeller
.@MiekeEoyang will be the new deputy assistant secretary of defense for cyber policy, according to documents obtained by @KatieBoWill. https://www.defenseone.com/policy/2021/01/list-heres-bidens-day-one-pentagon-team/171471/Check another po
Read more
Rachel Tobac
RachelTobac
According to people who claim they worked at Twitter this year, over 1000 employees/contractors at Twitter had admin level access to make the admin panel changes from the Twitter hack.
Read more
Amy Ertan
AmyErtan
I'll be tweeting about the @ccdcoe Virtual Book Launch: 'Cyber Threats and NATO 2030: Horizon Scanning and Analysis' - happening now! #Cycon2020 will be online, confirms @ccdcoe director @JTarien Keynote
Read more
Robert J. DeNault
robertjdenault
Major story here. Foreign government has hacked Treasury; Trump removed the entire leadership at the Cyber and Infrastructure Agency weeks ago and there is a bevy of inexperienced folks having
Read more
Rohit in Exile
RohitInExile
President @realDonaldTrump has just categorized Twitter as a Publisher. HUGE! But, what does this mean? Twitter wanted to be seen as a platform for the sole purpose of avoiding legal
Read more
Raphael Satter
razhael
A Xinhua reporter asks @MFA_China spokesman Wang Wenbin about my Dec. 16 report that suspected Chinese hackers had penetrated the African Union.He claims it's "fake news" and that China-Africa relations
Read more
Natalie E. Dean, PhD
nataliexdean
Tuning in now to hear about retrospective contact tracing. The goal -- interrupting chains of *clusters*!w/ Hitoshi Oshitani, @kj_seung, @zeynep https://cyber.harvard.edu/events/retrospective-contact-tracing-how-states-can-investigate-covid
Read more
Alex C
AlexC_EMHS
#EMGTwitter, NTAS bulletins are typically too general to be actionable, but I’d say DHS is leaning more forward on this one than they ever have before. In my exp most
Read more
The Analysis
teamanalysis_
Govt. of India is all set to launch yet another contentious program - Cyber Crime Volunteers. Under this, citizens can sign up as cyber volunteers to identify, flag, & report
Read more
MONITORING_SPIRIT
Sonjoe_Kutuh
Since this Hushpuppi issue is on cyber crime, let’s take a look at the cyber crime laws in Nigeria, under the Nigeria Cybercrime Act.If you can see this, help retweet
Read more
Katiascylife
katiascylife
Hello New Followers! Allow me to introduce myself. I'm Katia. System Engineer| Cybersecurity Techincal Resume Writer| Author| Mentor| Your Comic Relief | Inspiration through a rough storm| Cybersecurity Career Developer
Read more
File411
File411
JFC ”received a sealed envelope from the White House on January 5, 2021 at 5:05 p.m., said to contain a message from the President regarding additional steps addressing the threat
Read more
MindFu¢ked🕳️#TTP
gal_suburban
So you wanna be a Hero? Let's go ahead & break down this hero-complex of "I found it first" leading to people becoming so incredibly self-serving they can't allow themselves
Read more
Ryan Goodman
rgoodlaw
Good piece by @jacklgoldsmith on #SolarWindsHackI agree with his main points.But I disagree with some of his analysis, which conflates espionage with far more malicious cyber operations. Vital distinctions in
Read more
‹
1
2
3
4
5
6
7
8
...
66
67
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree