The LinkedIn recruiter seek-and-hide scam
Yet another sneaky LinkedIn recruiter job scam
Anyone using #LinkedIn may find more scammers reaching out to them than recruiters, especially if using the #OpenToWork tag. I write of the LinkedIn seek-and-hide scam, which is yet another sneaky LinkedIn recruiter job #scam. Get a job, donโt get scammed.
medium.com/@brothke/the...
09.03.2026 17:51
๐ 0
๐ 0
๐ฌ 0
๐ 0
The DocuSign Email That Wasn't - A Three-Redirect Credential Harvest
Attackers used a redirect chain via Google Maps and Amazon S3 to bypass scanners and harvest credentials from a fake DocuSign email.
As @Docusign is used to digitally sign sensitive & confidential documents, you know itโs a prime target for attackers. @Ironscales details a very crafty & convincing #Docusign attack. It used a redirect-chain attack designed to dodge scanners. #infosec
cybersec.ironscales.com/s/the-docusi...
05.03.2026 17:38
๐ 0
๐ 0
๐ฌ 0
๐ 0
The Emails Hitting K-12 Right Now
Real phishing attacks targeting schools โ vendor fraud, payroll theft, fake HR emails. What K-12 IT leaders are actually dealing with in 2026.
Vendor payment fraud remains the most expensive attack type in education. When it comes to K-12, they have very little to spend on #cybersecurity & that makes them prime attack targets. Good @Ironscales piece details the #infosec schools need to consider. cybersec.ironscales.com/s/the-emails...
04.03.2026 18:11
๐ 0
๐ 0
๐ฌ 0
๐ 0
Ben's Book of the Month: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility
My @OneRSAC book review of: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility. Excellent resource to prepare for the inevitability of #quantum #cryptography, from @WileyTech. #RSAC #infosec www.rsaconference.com/library/blog...
04.03.2026 17:07
๐ 0
๐ 0
๐ฌ 0
๐ 0
What Is Preemptive Security? The Future of Cyber Defense
Preemptive security prevents cyberattacks before they happen by validating controls and managing exposure. Learn how it strengthens defenses and reduces risk.
As @knash99 of @WSJ wrote: #Iran cyber retaliation would probably target US utility providers & include #DDoS attacks on high-profile websites. This necessitates preemptive security, which stops/deters #cyberattacks before they succeed. HT @PicusSecurity cybersec.picussecurity.com/s/what-is-pr...
02.03.2026 21:14
๐ 0
๐ 0
๐ฌ 0
๐ 0
How NetSupport RAT Abuses Legitimate Remote Admin Tool
Analyze NetSupport RAT malware: fake update vectors like ClickFix, persistence mechanisms, and surveillance. See how Picus simulates it.
How NetSupport RAT abuses a legitimate remote admin tool. #NetSupport RAT is a malicious repurposing of the legitimate remote administration tool, NetSupport Manager, which has been available for over 30 years. cybersec.picussecurity.com/s/how-netsup...
01.03.2026 02:00
๐ 0
๐ 0
๐ฌ 0
๐ 0
YouTube
Share your videos with friends, family, and the world
Secrets in the Machine: Preventing Sensitive Data Leaks Through LLM APIs
cybersec.gitguardian.com/s/secrets-in...
26.02.2026 21:25
๐ 0
๐ 0
๐ฌ 0
๐ 0
5 Critical Data Sovereignty Challenges for Banks in Qatar
Explore 5 critical data sovereignty challenges for banks in Qatar, from localization to encryption control. Learn actionable solutions and ensure compliance. Schedule a demo now!
Banks operating in Qatar face distinct obligations when securing customer data, managing cross-border transfers & maintaining regulatory compliance. This @Kiteworks piece details 5 critical data sovereignty challenges for banks in #Qatar. cybersec.kiteworks.com/s/5-critical...
24.02.2026 16:15
๐ 0
๐ 0
๐ฌ 0
๐ 0
CyberCanon's Review of CyBOK
๐ ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ป๐ฐ๐ผ๐บ๐ถ๐ป๐ด!
This week, Jeff Sauntry provides a Hall of Fame Recommendation for ๐๐๐๐ข๐ (Cyber Security Body of Knowledge), a free community-driven resource.
โ๏ธ Jeff's assessment of #๐๐๐๐ข๐: cybercanon.org/cybok-the-cy...
๐ซ Visit ๐๐๐๐ข๐ and download the PDF: www.cybok.org
@cybok.bsky.social
24.02.2026 14:03
๐ 2
๐ 2
๐ฌ 1
๐ 0
Critical FreePBX Vulnerabilities: CVE-2025-66039, CVE-2025-61675, CVE-2025-61675
Discover critical FreePBX flaws CVE-2025-66039 & CVE-2025-61678. Learn how auth bypass and RCE vulnerabilities expose VoIP networks.
#FreePBX is a popular open-source IP PBX management tool. @FreePBX manages #VoIP communications & requires high availability & relatively open access, making it a very attractive target for threat actors. It now has serious CVE vulns. HT @PicusSecurity cybersec.picussecurity.com/s/critical-f...
20.02.2026 17:30
๐ 0
๐ 0
๐ฌ 0
๐ 0
If you are looking for a job, scammers posing as recruiters are targeting you
Job seekers and scam recruitersโโโa match made in Nigeria
Looking for a new job? Scammers posing as recruiters are targeting you, impersonating legitimate recruiters from @Insightglobal, @Coinbase, @RandstadUSA, @Raytheon & others. The signs are obvious, but job seekers desperate for work miss them & get scammed. brothke.medium.com/if-you-are-l...
19.02.2026 18:22
๐ 0
๐ 0
๐ฌ 0
๐ 0
If itโs tax season, itโs scam season
Got a call about tax debt relief? Itโs a scammer calling
Itโs tax season & there's already plenty of #IRS #scams. @IRSnews will never call you out of the blue & threaten arrest. Many believe that & lose their savings. Be aware of โfresh startโ programs that sucker people into losing lots of $$ w/ no tax relief. medium.com/@brothke/if-...
19.02.2026 17:48
๐ 0
๐ 0
๐ฌ 0
๐ 0
Anthropic Disruption of an AI-Run Attack and What It Means for Agentic Identity
A clear look at how an AI system carried out most steps of a state-sponsored intrusion attempt and the identity weaknesses that made the activity possible.
Anthropic stopped AI-driven espionage campaign. Shows an autonomous system can sustain once it is given ability to interpret its surroundings & act on that understanding. @AnthropicAI noted the dangers of autonomous systems conducting cyber operations.
go.aembit.io/s/anthropic-...
19.02.2026 02:37
๐ 0
๐ 0
๐ฌ 0
๐ 0
Voice of the Customer for Network Security Microsegmentation
Why pay for a #Gartner report when you can get it for free? The @Gartner_inc Peer Insights report โVoice of the Customer for Network Security Microsegmentationโ courtesy of @ZeroNetworks. Details about those who implemented #ZTN microsegmentation. api.cyfluencer.com/s/gartner-vo...
18.02.2026 16:20
๐ 0
๐ 0
๐ฌ 0
๐ 0
2026 Malware Trends: Hunting the Digital Parasite
Join this webinar to learn how digital parasites use evasion and persistence to stay hidden and how to detect threats already logged into your network.
Traditional defenses are failing as adversaries evolve into "Digital Parasites" that prioritize silent persistence over loud encryption. This webinar provides the research-led map you need to stay ahead of the latest adversary techniques. cybersec.picussecurity.com/s/2026-malwa...
18.02.2026 16:11
๐ 0
๐ 0
๐ฌ 0
๐ 0
CyberCanon's review of A CISO Guide to Resilience
๐ก๏ธ ๐ง๐ผ๐ฑ๐ฎ๐'๐ ๐ฅ๐ฒ๐๐ถ๐ฒ๐! ๐งฑ
This week, our #CyberCanon Committee provides you with Debra Baker's ๐ผ ๐พ๐๐๐ ๐๐ช๐๐๐ ๐ฉ๐ค ๐พ๐ฎ๐๐๐ง ๐๐๐จ๐๐ก๐๐๐ฃ๐๐.
Read Jack Freund, Ph.D.'s assessment ๐ lnkd.in/ezhBCVAs
#CybersecurityBooks #CISO #CyberResilience
17.02.2026 18:56
๐ 2
๐ 2
๐ฌ 0
๐ 0
AI-Driven Threat Detection: How AI Is Reshaping Cybersecurity
Hear Fortinetโs Aamir Lakhani explain the role of AI in cybersecurity and how AI-driven threat detection is reshaping modern threat intelligence.
The cybercrime landscape is large, ranging from low-sophistication attackers who use pre-packaged tools to advanced persistent threat (APT) groups. This range in sophistication meant that certain groups were significantly more dangerous than others. api.cyfluencer.com/s/how-ai-dri...
17.02.2026 16:38
๐ 0
๐ 0
๐ฌ 0
๐ 0
APT Attacks in Singapore Telecom: UNC3886 ORB Tracking Explained
APT attacks by UNC3886 target Singapore telecom using ORB networks. Learn practical ORB tracking techniques to uncover hidden infrastructure with Scout.
While not new, Operational Relay Box (ORB) networks, AKA covert, mesh or obfuscated networks, are becoming increasingly prevalent as threat actors continuously refine their evasion techniques. @teamcymru details why ORBs are a significant #infosec threat. api.cyfluencer.com/s/tracking-o...
13.02.2026 17:06
๐ 0
๐ 0
๐ฌ 0
๐ 0
Red Report 2026
Red Report 2026 analyzes 1.1M+ files and 15.5M adversarial actions to show how attackers shift from noisy breaches to long-term residency.
The @PicusSecurity Red Report 2026 analysis of >1M malicious files. It's a detailed list of global cyber risks. Interesting insight: they found that despite widespread speculation about AI transforming the #malwarelandscape, there was no notable uptick. cybersec.picussecurity.com/s/red-report...
11.02.2026 17:32
๐ 0
๐ 0
๐ฌ 0
๐ 0
Benโs Book of The Month: Measuring and Managing Information Risk: A FAIR Approach โ 2nd edition
My @OneRSAC book review of: Measuring and Managing Information Risk: A FAIR Approach.
www.rsaconference.com/library/blog... #RSAC
10.02.2026 14:48
๐ 0
๐ 0
๐ฌ 0
๐ 0
CyberCanon's review of Chip War
โ๏ธ ๐ฅ๐ฒ๐๐ถ๐ฒ๐ ๐๐ฟ๐ผ๐ฝ๐ฝ๐ฒ๐ฑ ๐ช
We have back-to-back reviews from Larry Pesce. Today, Larry offers his insights on Chris Miller's widely well-regarded book, ๐พ๐๐๐ฅ ๐๐๐ง, from a cyber pro's perspective:
๐ You'll want to read this review cybercanon.org/chip-war-the...
#CybersecurityBooks | @haxorthematrix
10.02.2026 14:11
๐ 3
๐ 3
๐ฌ 2
๐ 0
The 2025 Phishing Surge Proved One Thing: Chasing Doesn't Work
Phishing evolved into a profession in 2025. Discover how defenders must shift from reactive to preemptive strategies to now combat this threat.
Bruce Schneier observed: attacks always get better; they never get worse. @schneierblog highlights that crypto & cybersecurity threats consistently improve, become easier, faster & cheaper to execute. And nothing proves that like #phishing. HT @Ironscales. cybersec.ironscales.com/s/the-2025-p...
04.02.2026 15:52
๐ 0
๐ 0
๐ฌ 0
๐ 0
Operationalizing MITRE ATT&CK: From Raw Intel to Validation
Stop siloing roles. Learn how to operationalize MITRE ATT&CK at a granular level to deprioritize vulnerabilities and build smarter, AI-assisted CTI workflows.
Will Baxter of @teamcymru speaks with Scott Small of @TidalCyber. He emphasizes the importance of using @MITREcorp #ATT&CK. As the sheer volume of threat intelligence continues to grow, the community needs a system like MITRE ATT&CK to which to refer.
api.cyfluencer.com/s/from-raw-i...
03.02.2026 17:01
๐ 0
๐ 0
๐ฌ 0
๐ 0
CyberCanon's Review of The Nvidia Way
โ๏ธ ๐๐ฎ๐๐ฒ๐๐ ๐ฅ๐ฒ๐๐ถ๐ฒ๐!
Read Larry Pesce's full review of Tae Kim's ๐๐๐ ๐๐ซ๐๐๐๐ ๐๐๐ฎ ๐ cybercanon.org/the-nvidia-w...
If interested, you can snag a copy and support the Canon using the Amazon or Bookshop links on our review page above.
@haxorthematrix | @firstadopter
#CybersecurityBooks
03.02.2026 15:40
๐ 2
๐ 2
๐ฌ 1
๐ 0
If you are looking for a job, scammers posing as recruiters are targeting you
Job seekers and scam recruitersโโโa match made in Nigeria
If you are looking for a job, scammers posing as recruiters are targeting you. They impersonate legitimate recruiters from @RandstadUSA, @Insightglobal, @workwithburnett & other firms. Signs are obvious, but job seekers desperate for work are oblivious. brothke.medium.com/if-you-are-l...
28.01.2026 17:04
๐ 0
๐ 1
๐ฌ 0
๐ 0
In the race to standardize agentic commerce, #Google Universal Commerce Protocol (UCP) is positioning itself as the connective tissue between fragmented agent frameworks & payment systems. But if it can solve agent trust management is TBD. api.cyfluencer.com/s/google-s-u...
28.01.2026 15:08
๐ 0
๐ 0
๐ฌ 0
๐ 0
SLMs, LLMs, and the Real Difference That Matters in DSPM
Since OpenAI released ChatGPT 3.5 in late 2022, language models have advanced at a remarkable pace. What began as tools for text generation have quickly evolved into systems โฆ
A new debate: Small Language Models (SLM) vs. Large Language Models (LLM). While the framing is common, it misses a more important point. The real difference in DSPM isnโt simply about size. Itโs about how models think & what theyโre capable of understanding. api.cyfluencer.com/s/slms-llms-...
28.01.2026 13:36
๐ 0
๐ 0
๐ฌ 0
๐ 0