Ben Rothke's Avatar

Ben Rothke

@benrothke

I do information security, risk management and other tech stuff. Co-author of new book: The Definitive Guide to PCI DSS Version 4: Documentation, Compliance, and Management. https://amzn.to/3WhEfh1

660
Followers
64
Following
52
Posts
04.07.2023
Joined
Posts Following

Latest posts by Ben Rothke @benrothke

Preview
The LinkedIn recruiter seek-and-hide scam Yet another sneaky LinkedIn recruiter job scam

Anyone using #LinkedIn may find more scammers reaching out to them than recruiters, especially if using the #OpenToWork tag. I write of the LinkedIn seek-and-hide scam, which is yet another sneaky LinkedIn recruiter job #scam. Get a job, donโ€™t get scammed.
medium.com/@brothke/the...

09.03.2026 17:51 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
The DocuSign Email That Wasn't - A Three-Redirect Credential Harvest Attackers used a redirect chain via Google Maps and Amazon S3 to bypass scanners and harvest credentials from a fake DocuSign email.

As @Docusign is used to digitally sign sensitive & confidential documents, you know itโ€™s a prime target for attackers. @Ironscales details a very crafty & convincing #Docusign attack. It used a redirect-chain attack designed to dodge scanners. #infosec
cybersec.ironscales.com/s/the-docusi...

05.03.2026 17:38 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
The Emails Hitting K-12 Right Now Real phishing attacks targeting schools โ€” vendor fraud, payroll theft, fake HR emails. What K-12 IT leaders are actually dealing with in 2026.

Vendor payment fraud remains the most expensive attack type in education. When it comes to K-12, they have very little to spend on #cybersecurity & that makes them prime attack targets. Good @Ironscales piece details the #infosec schools need to consider. cybersec.ironscales.com/s/the-emails...

04.03.2026 18:11 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Ben's Book of the Month: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility

My @OneRSAC book review of: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility. Excellent resource to prepare for the inevitability of #quantum #cryptography, from @WileyTech. #RSAC #infosec www.rsaconference.com/library/blog...

04.03.2026 17:07 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
What Is Preemptive Security? The Future of Cyber Defense Preemptive security prevents cyberattacks before they happen by validating controls and managing exposure. Learn how it strengthens defenses and reduces risk.

As @knash99 of @WSJ wrote: #Iran cyber retaliation would probably target US utility providers & include #DDoS attacks on high-profile websites. This necessitates preemptive security, which stops/deters #cyberattacks before they succeed. HT @PicusSecurity cybersec.picussecurity.com/s/what-is-pr...

02.03.2026 21:14 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
How NetSupport RAT Abuses Legitimate Remote Admin Tool Analyze NetSupport RAT malware: fake update vectors like ClickFix, persistence mechanisms, and surveillance. See how Picus simulates it.

How NetSupport RAT abuses a legitimate remote admin tool. #NetSupport RAT is a malicious repurposing of the legitimate remote administration tool, NetSupport Manager, which has been available for over 30 years. cybersec.picussecurity.com/s/how-netsup...

01.03.2026 02:00 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Sensitive Data at Risk: Managing Exposure & Governance During M&A Mergers, acquisitions, and divestitures are high-stakes inflection points for financial institutions โ€“ and for their data. Sensitive information is often duplicated, exposed, or fragmented across lega...

Interesting webinar: Sensitive Data at Risk: Managing Exposure & Governance During M&A. With Constantin Stanca of @Snowflake, @kenowens12 of @Fiserv & Jeff Weber of @bigidsecure. M&A are high-stakes inflection points for financial institutions & data. api.cyfluencer.com/s/sensitive-...

27.02.2026 16:41 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
YouTube Share your videos with friends, family, and the world

Secrets in the Machine: Preventing Sensitive Data Leaks Through LLM APIs

cybersec.gitguardian.com/s/secrets-in...

26.02.2026 21:25 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
5 Critical Data Sovereignty Challenges for Banks in Qatar Explore 5 critical data sovereignty challenges for banks in Qatar, from localization to encryption control. Learn actionable solutions and ensure compliance. Schedule a demo now!

Banks operating in Qatar face distinct obligations when securing customer data, managing cross-border transfers & maintaining regulatory compliance. This @Kiteworks piece details 5 critical data sovereignty challenges for banks in #Qatar. cybersec.kiteworks.com/s/5-critical...

24.02.2026 16:15 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CyberCanon's Review of CyBOK

CyberCanon's Review of CyBOK

๐Ÿ“ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐—œ๐—ป๐—ฐ๐—ผ๐—บ๐—ถ๐—ป๐—ด!

This week, Jeff Sauntry provides a Hall of Fame Recommendation for ๐—–๐˜†๐—•๐—ข๐—ž (Cyber Security Body of Knowledge), a free community-driven resource.

โœ๏ธ Jeff's assessment of #๐—–๐˜†๐—•๐—ข๐—ž: cybercanon.org/cybok-the-cy...
๐Ÿซ Visit ๐—–๐˜†๐—•๐—ข๐—ž and download the PDF: www.cybok.org

@cybok.bsky.social

24.02.2026 14:03 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Critical FreePBX Vulnerabilities: CVE-2025-66039, CVE-2025-61675, CVE-2025-61675 Discover critical FreePBX flaws CVE-2025-66039 & CVE-2025-61678. Learn how auth bypass and RCE vulnerabilities expose VoIP networks.

#FreePBX is a popular open-source IP PBX management tool. @FreePBX manages #VoIP communications & requires high availability & relatively open access, making it a very attractive target for threat actors. It now has serious CVE vulns. HT @PicusSecurity cybersec.picussecurity.com/s/critical-f...

20.02.2026 17:30 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
If you are looking for a job, scammers posing as recruiters are targeting you Job seekers and scam recruitersโ€Šโ€”โ€Ša match made in Nigeria

Looking for a new job? Scammers posing as recruiters are targeting you, impersonating legitimate recruiters from @Insightglobal, @Coinbase, @RandstadUSA, @Raytheon & others. The signs are obvious, but job seekers desperate for work miss them & get scammed. brothke.medium.com/if-you-are-l...

19.02.2026 18:22 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
If itโ€™s tax season, itโ€™s scam season Got a call about tax debt relief? Itโ€™s a scammer calling

Itโ€™s tax season & there's already plenty of #IRS #scams. @IRSnews will never call you out of the blue & threaten arrest. Many believe that & lose their savings. Be aware of โ€œfresh startโ€ programs that sucker people into losing lots of $$ w/ no tax relief. medium.com/@brothke/if-...

19.02.2026 17:48 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Anthropic Disruption of an AI-Run Attack and What It Means for Agentic Identity A clear look at how an AI system carried out most steps of a state-sponsored intrusion attempt and the identity weaknesses that made the activity possible.

Anthropic stopped AI-driven espionage campaign. Shows an autonomous system can sustain once it is given ability to interpret its surroundings & act on that understanding. @AnthropicAI noted the dangers of autonomous systems conducting cyber operations.
go.aembit.io/s/anthropic-...

19.02.2026 02:37 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Voice of the Customer for Network Security Microsegmentation

Why pay for a #Gartner report when you can get it for free? The @Gartner_inc Peer Insights report โ€˜Voice of the Customer for Network Security Microsegmentationโ€™ courtesy of @ZeroNetworks. Details about those who implemented #ZTN microsegmentation. api.cyfluencer.com/s/gartner-vo...

18.02.2026 16:20 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
2026 Malware Trends: Hunting the Digital Parasite Join this webinar to learn how digital parasites use evasion and persistence to stay hidden and how to detect threats already logged into your network.

Traditional defenses are failing as adversaries evolve into "Digital Parasites" that prioritize silent persistence over loud encryption. This webinar provides the research-led map you need to stay ahead of the latest adversary techniques. cybersec.picussecurity.com/s/2026-malwa...

18.02.2026 16:11 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CyberCanon's review of A CISO Guide to Resilience

CyberCanon's review of A CISO Guide to Resilience

๐Ÿ›ก๏ธ ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜†'๐˜€ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„! ๐Ÿงฑ

This week, our #CyberCanon Committee provides you with Debra Baker's ๐˜ผ ๐˜พ๐™„๐™Ž๐™Š ๐™‚๐™ช๐™ž๐™™๐™š ๐™ฉ๐™ค ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™๐™š๐™จ๐™ž๐™ก๐™ž๐™š๐™ฃ๐™˜๐™š.

Read Jack Freund, Ph.D.'s assessment ๐Ÿ‘‰ lnkd.in/ezhBCVAs

#CybersecurityBooks #CISO #CyberResilience

17.02.2026 18:56 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
AI-Driven Threat Detection: How AI Is Reshaping Cybersecurity Hear Fortinetโ€™s Aamir Lakhani explain the role of AI in cybersecurity and how AI-driven threat detection is reshaping modern threat intelligence.

The cybercrime landscape is large, ranging from low-sophistication attackers who use pre-packaged tools to advanced persistent threat (APT) groups. This range in sophistication meant that certain groups were significantly more dangerous than others. api.cyfluencer.com/s/how-ai-dri...

17.02.2026 16:38 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
APT Attacks in Singapore Telecom: UNC3886 ORB Tracking Explained APT attacks by UNC3886 target Singapore telecom using ORB networks. Learn practical ORB tracking techniques to uncover hidden infrastructure with Scout.

While not new, Operational Relay Box (ORB) networks, AKA covert, mesh or obfuscated networks, are becoming increasingly prevalent as threat actors continuously refine their evasion techniques. @teamcymru details why ORBs are a significant #infosec threat. api.cyfluencer.com/s/tracking-o...

13.02.2026 17:06 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Red Report 2026 Red Report 2026 analyzes 1.1M+ files and 15.5M adversarial actions to show how attackers shift from noisy breaches to long-term residency.

The @PicusSecurity Red Report 2026 analysis of >1M malicious files. It's a detailed list of global cyber risks. Interesting insight: they found that despite widespread speculation about AI transforming the #malwarelandscape, there was no notable uptick. cybersec.picussecurity.com/s/red-report...

11.02.2026 17:32 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Benโ€™s Book of The Month: Measuring and Managing Information Risk: A FAIR Approach โ€“ 2nd edition

My @OneRSAC book review of: Measuring and Managing Information Risk: A FAIR Approach.

www.rsaconference.com/library/blog... #RSAC

10.02.2026 14:48 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CyberCanon's review of Chip War

CyberCanon's review of Chip War

โœ๏ธ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„ ๐——๐—ฟ๐—ผ๐—ฝ๐—ฝ๐—ฒ๐—ฑ ๐Ÿช–

We have back-to-back reviews from Larry Pesce. Today, Larry offers his insights on Chris Miller's widely well-regarded book, ๐˜พ๐™๐™ž๐™ฅ ๐™’๐™–๐™ง, from a cyber pro's perspective:

๐Ÿ“ You'll want to read this review cybercanon.org/chip-war-the...

#CybersecurityBooks | @haxorthematrix

10.02.2026 14:11 ๐Ÿ‘ 3 ๐Ÿ” 3 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0
Preview
The 2025 Phishing Surge Proved One Thing: Chasing Doesn't Work Phishing evolved into a profession in 2025. Discover how defenders must shift from reactive to preemptive strategies to now combat this threat.

Bruce Schneier observed: attacks always get better; they never get worse. @schneierblog highlights that crypto & cybersecurity threats consistently improve, become easier, faster & cheaper to execute. And nothing proves that like #phishing. HT @Ironscales. cybersec.ironscales.com/s/the-2025-p...

04.02.2026 15:52 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Operationalizing MITRE ATT&CK: From Raw Intel to Validation Stop siloing roles. Learn how to operationalize MITRE ATT&CK at a granular level to deprioritize vulnerabilities and build smarter, AI-assisted CTI workflows.

Will Baxter of @teamcymru speaks with Scott Small of @TidalCyber. He emphasizes the importance of using @MITREcorp #ATT&CK. As the sheer volume of threat intelligence continues to grow, the community needs a system like MITRE ATT&CK to which to refer.
api.cyfluencer.com/s/from-raw-i...

03.02.2026 17:01 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CyberCanon's Review of The Nvidia Way

CyberCanon's Review of The Nvidia Way

โœ๏ธ ๐—Ÿ๐—ฎ๐˜๐—ฒ๐˜€๐˜ ๐—ฅ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„!

Read Larry Pesce's full review of Tae Kim's ๐™๐™๐™š ๐™‰๐™ซ๐™ž๐™™๐™ž๐™– ๐™’๐™–๐™ฎ ๐Ÿ‘‰ cybercanon.org/the-nvidia-w...

If interested, you can snag a copy and support the Canon using the Amazon or Bookshop links on our review page above.

@haxorthematrix | @firstadopter

#CybersecurityBooks

03.02.2026 15:40 ๐Ÿ‘ 2 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Scattered Spider Attacks | Infrastructure and TTP Analysis An in-depth analysis of Scattered Spider attacks, detailing the groupโ€™s infrastructure usage and TTPs to help defenders detect and disrupt activity earlier.

Throughout 2024 & 2025, #ScatteredSpider has been a prolific English-speaking cybercriminal threat group. Good @teamcymru scattered spider & TTP analysis. api.cyfluencer.com/s/scattered-...

29.01.2026 13:51 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
If you are looking for a job, scammers posing as recruiters are targeting you Job seekers and scam recruitersโ€Šโ€”โ€Ša match made in Nigeria

If you are looking for a job, scammers posing as recruiters are targeting you. They impersonate legitimate recruiters from @RandstadUSA, @Insightglobal, @workwithburnett & other firms. Signs are obvious, but job seekers desperate for work are oblivious. brothke.medium.com/if-you-are-l...

28.01.2026 17:04 ๐Ÿ‘ 0 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

In the race to standardize agentic commerce, #Google Universal Commerce Protocol (UCP) is positioning itself as the connective tissue between fragmented agent frameworks & payment systems. But if it can solve agent trust management is TBD. api.cyfluencer.com/s/google-s-u...

28.01.2026 15:08 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
SLMs, LLMs, and the Real Difference That Matters in DSPM Since OpenAI released ChatGPT 3.5 in late 2022, language models have advanced at a remarkable pace. What began as tools for text generation have quickly evolved into systems โ€ฆ

A new debate: Small Language Models (SLM) vs. Large Language Models (LLM). While the framing is common, it misses a more important point. The real difference in DSPM isnโ€™t simply about size. Itโ€™s about how models think & what theyโ€™re capable of understanding. api.cyfluencer.com/s/slms-llms-...

28.01.2026 13:36 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0