Joe Pettit's Avatar

Joe Pettit

@jpettit

Director at Bora Cybersecurity & Marketing

370
Followers
119
Following
23
Posts
23.06.2023
Joined
Posts Following

Latest posts by Joe Pettit @jpettit

Preview
CyberAlerts Known Exploited Vulnerabilities (KEV) Since November 3rd, 2021, Cybersecurity and Infrastructure Security Agency (CISA) have published a public list of Known Exploited Vulnerabilities (KEV). Over that time, at the time of writing (April 9...

Since we started collecting data (around 4 months ago), the CyberAlerts KEV includes 6 vulnerabilities exploited in the wild, not listed in CISA KEV.

We expect this to be around 12 or more by the end of the year.

blog.cyberalerts.io/cyberalerts-...

09.04.2025 09:10 πŸ‘ 3 πŸ” 2 πŸ’¬ 2 πŸ“Œ 1
Post image Post image

Our CEO Ivan Novikov spoke at GISEC Global 2025! πŸ™Œ

Proud to bring the Wallarm voice to one of the industry’s key stages.

#CyberSecurity #APISecurity #GISEC

09.05.2025 13:55 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Medusa Ransomware: FBI and CISA Urge Organizations to Act Now to Mitigate Threat FBI & CISA warn of Medusa ransomware targeting critical infrastructure. Learn key mitigation steps to protect your organization.

The FBI, CISA, and MS-ISAC have issued a joint advisory warning about the Medusa ransomware gang, which has targeted over 300 organizations across critical infrastructure sectors, including healthcare, education, and technology.

Learn more from @grahamcluley.com: www.tripwire.com/state-of-sec...

13.03.2025 15:41 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Medusa Ransomware: What You Need To Know Learn about Medusa ransomware: how it operates, its targets, and steps to protect your organization from this evolving cyber threat.

Initial access brokers and ransomware-as-a-service platforms like Medusa are reshaping the cyber threat landscape.

@grahamcluley.com explains how Medusa operates and why prevention is critical: www.tripwire.com/state-of-sec...

#DataSecurity #ThreatIntelligence #Malware #Ransomware

21.01.2025 12:33 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Space Bears Ransomware: What You Need To Know Learn about Space Bears ransomware, its unique corporate-like tactics, and how to protect your organization from its threats.

What makes Space Bears stand out in the crowded ransomware scene?

A corporate-style image with devastating impact. Read @grahamcluley.com's analysis and tips to safeguard your organization: www.tripwire.com/state-of-sec...

#CyberCrime #Ransomware #CyberSecurity

09.01.2025 17:14 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
SOC Scalability: How AI Supports Growth Without Overloading Analysts Scaling up a security operations center (SOC) is inevitable for many organizations. How AI supports growth without overloading analysts.

SOC Scalability: How AI Supports Growth Without Overloading Analysts

securityaffairs.com/172831/secur...

#SecurityAffairs #Hacking #SOC

09.01.2025 13:32 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The 7 Stages NERC CIP Audit Preparation Simplify NERC CIP audit prep with Tripwire’s tools. Learn the 7 stages to ensure compliance and protect critical infrastructure.

Compliance is more than avoiding penaltiesβ€”it's about safeguarding critical infrastructure. Jim Whiting explains the seven key steps to NERC CIP audit readiness.

Learn more: www.tripwire.com/state-of-sec...

#NERC #Compliance #Cybersecurity

07.01.2025 12:20 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Understanding AI in Network Security AI transforms network security by detecting threats faster. Learn how to pair AI with best practices for robust defenses.

AI is vital for modern network security, offering lightning-fast data analysis, anomaly detection, and adaptability.

Bob Erdman of Fortra shows how combining AI with core security practices keeps you ahead of threats.

www.tripwire.com/state-of-sec...

#NetSec #Cybersecurity

02.01.2025 15:34 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Advice for Exponential Organizations: Intersecting Agile and Incident Align Agile & incident response to improve adaptability, scale cybersecurity, & drive exponential organizational growth.

Cyber threats don’t wait, and neither should your response.

Chester Avey explores how combining Agile practices with incident response enables Exponential Organizations to adapt quickly and grow confidently.

www.tripwire.com/state-of-sec...

#CyberThreats #CyberSecurity #IncidentReponse

02.01.2025 15:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
What's Next for Cybersecurity in 2025 and Beyond? Fortra Experts Weigh From AI to geopolitics, learn what’s next for cybersecurity in 2025 with insights from Fortra’s experts. Stay ahead of the trends.

What does the future hold for cybersecurity? πŸ€”

Fortra experts discuss disruption prevention, threat prioritization, and AI-driven innovation. πŸ—£οΈ

www.tripwire.com/state-of-sec...

#Cybersecurity #DLP #EmailSecurity

30.12.2024 09:49 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The Future of AI Regulation: Balancing Innovation and Safety in Silicon Explore the debate over AI innovation vs. regulation in California. How should we balance safety and technological progress?

Can AI innovation and regulation coexist? Antonio Sanchez explores California’s recent veto of an AI safety bill, the implications for tech companies, and principles for effective oversight

www.tripwire.com/state-of-sec...

#AI #Cybersecurity #ITsecurity

30.12.2024 09:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Very cool, Tanya!! Hope you're doing well.

17.12.2024 18:01 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
London’s CNI is Under Threat London’s critical infrastructure is at risk. Learn how evolving cyber threats demand modern defenses and resilience.

London’s digital infrastructure powers the city, but outdated systems and rising nation-state threats leave its critical infrastructure vulnerable to chaos.

Learn more in Darren Gale's blog: www.tripwire.com/state-of-sec...

#CyberSecurity #CNI #CriticalInfrastructure #CyberThreats

17.12.2024 10:55 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Safe travels, Lisa!

16.12.2024 13:44 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CIS Control 12: Network Infrastructure Management Discover essential steps for secure network infrastructure with CIS Control 12, including secure architecture, protocols, and device management.

Network security goes beyond devicesβ€”it's about processes, documentation, and growth. CIS Control 12 provides a guide to building a resilient foundation.

Read more: www.tripwire.com/state-of-sec...

20.11.2024 10:08 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
ShrinkLocker Ransomware: What You Need To Know Discover how ShrinkLocker ransomware uses BitLocker to encrypt data, demanding ransom payments and challenging security defenses.

When ransomware meets BitLocker, it creates a new kind of challenge. ShrinkLocker is using familiar tools to lock down dataβ€”leaving organizations in need of specialized solutions.

@grahamcluley.com has more details: www.tripwire.com/state-of-sec...

#CyberSecurity #Ransomware

14.11.2024 15:25 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

CherryBlos is Android malware that steals sensitive information from photos such as screenshots of crypto wallet account recovery phrases, putting accounts at risk if the device is infected.

@grahamcluley.com has more information. ‡️

www.tripwire.com/state-of-sec...

10.11.2023 10:22 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Classiscam is a criminal organization that employs low-level phishers to carry out site scams and takes a cut from their profits.

Katrina Thompson explains how the scam works and looks at some stats. ‡️

www.tripwire.com/state-of-sec...

06.11.2023 09:32 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Phishing is a common tactic used by cybercriminals. Companies must educate employees and deploy anti-phishing solutions to safeguard against attacks.

Here are 6 common types of phishing attacks and tips to protect yourself. ‡️

www.tripwire.com/state-of-sec...

#Cybersecurity #Phishing

30.10.2023 10:14 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Looking amazing, @rosesec.bsky.social!!

27.10.2023 14:15 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

For anyone who is interested (from a technical malware-level) about what is going on with all these Booking[dot]com scams, here's a good analysis by Akamai:

www.akamai.com/blog/securit...

26.10.2023 13:41 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Packet sniffing is the act of monitoring data packets on a network using software or hardware device

Read Dilki Rathnayake's introduction to the benefits and risks of Packet Sniffing to learn more: https://www.tripwire.com/state-of-security/introduction-benefits-and-risks-packet-sniffing

13.07.2023 09:45 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Rogue IT security worker who impersonated ransomware gang is sentenced to jail A British IT worker who exploited a ransomware attack against the company he worked for, in an attempt to extort money from them for himself, has been sentenced to jail for three years and seven…

Rogue IT security worker who impersonated ransomware gang is sentenced to jail.

https://grahamcluley.com/rogue-it-security-worker-who-impersonated-ransomware-gang-sentenced-to-jail/

#cybersecurity #insiderthreat #ransomware

12.07.2023 16:35 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

What happens when a vulnerability stops being discussed, but is never fixed?

Tyler Reguly looks at why patch management and vulnerability management are different beasts.

https://www.tripwire.com/state-of-security/value-vulnerability-management

#vulnerabilitymanagement #cybersecurity

12.07.2023 08:41 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Start preparing for NIS2 implementation now to avoid last-minute stress. Don't wait to disclose control information, begin the process ASAP.

Gary Hibberd explains how this directive will impact you and your organization.

https://www.tripwire.com/state-of-security/how-nis2-directive-will-impact-you

11.07.2023 08:22 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Decryption tool for Akira ransomware available for free Security researchers at an anti-virus company have developed a free decryption tool for files that have been encrypted since the Akira ransomware first emerged in March 2023.

Decryption tool for Akira ransomware available for free.

Read more in my article on the Tripwire blog:

https://www.tripwire.com/state-of-security/free-akira-ransomware-decryptor-released-victims-who-wish-recover-their-data

#cybersecurity #ransomware #malware

06.07.2023 12:51 πŸ‘ 3 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

Security researchers have developed a free decryption tool for files that have been encrypted since the Akira ransomware first emerged in March 2023.

https://www.tripwire.com/state-of-security/free-akira-ransomware-decryptor-released-victims-who-wish-recover-their-data

cc @grahamcluley.com

06.07.2023 12:48 πŸ‘ 4 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Thanks @rosesec.bsky.social!!!

04.07.2023 12:15 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0