text
stringlengths
23
304
label
int64
0
1
The latest in our #WorldCup series looks at cybersecurity training for squads at the tournament.... and also something known as 'Moscow Tummy' 🤷‍♂️https://t.co/hAWXP2Op8g
0
Dridex/Locky Operator Uses New RAT in Recent Campaigns: https://t.co/diwbgcWAll #cybercrime #malware
0
RT @CyberX_Labs: Phil Neray (@rdecker) and Neil Peterson (Emerson), on building trust between security vendors and automation makers. Live…
0
Retailers: Avoid the Hackable Holidaze https://t.co/VQVdUaTzDR by @fred_kneip #POS #socialmedia #apps
0
TeamViewer Confirms It Was Hacked in 2016 - https://t.co/Ekg0tf7VIA
0
The developer-only iPhones that help hackers dig into Apple's secret security sauce https://t.co/Ulf4JYMO7b
0
Side-Channel Attacks Against #ICS Put Critical Infrastructure at Risk - https://t.co/kR1JvmHTeJ #SCADA #IIoT
0
The new General Data Protection Regulation: pros and cons https://t.co/mUpeG1J2jq #privacy
0
Microsoft Open Sources Windows File Manager (WinFile.exe) https://t.co/Q9VHJ7tQgp It runs on all currently supported version of Windows, including Windows 10.
0
Gov Committee Raises Concerns Over UK Critical Infrastructure Security - https://t.co/7mjZFHISKD
0
#BlackEnergy and the Ukrainian power outage: what we really know: https://t.co/IhPSyjnCRY https://t.co/URUWkxjeRT
0
Time is running out for FogCam.https://t.co/1DE3ZaG9K3
0
RT @thecyberwire: #CWCoverage of 2018 #ICS Cyber Security Conference, organized by @SecurityWeek: TRISIS/TRITON & the rise of #malware buil…
0
Alleged SWATter will plead guilty to dozens of serious new federal charges https://t.co/kirThmQTRy
0
⛈☔️🔥💨 ➡️ 🌈☀️👏🏽‼️https://t.co/D9o7qId31f https://t.co/ea7oHLypXv
0
RT @TheHackersNews: Google's latest #Android July 2019 security update patches 33 new vulnerabilities, the most critical of which resides i…
0
North Korea Cyber Experts Raised Up to $2 Billion, UN Report Says: https://t.co/8cZXJ6I7WS
0
Hope you all enjoyed the long weekend? Now it's back to work with a round up of the top #infosec stories of the past week. From potential borking of Windows 10 to hackers hacking hackers...https://t.co/QF1lVzGUlY
0
Cyberattack exposes travelers’ photos, says @CBP #facialrecognition #privacy #cybersecurity #infosec https://t.co/brsOK2Thk8
0
RT @TheHackersNews: Trustjacking Attack – Apple's "iTunes Wi-Fi Sync" Feature Could Let Attackers Hijack Your iPhone, iPad Remotelyhttps:…
0
Baltimore Says It Will Not Pay Ransom After Cyberattack - https://t.co/FdhglHQCp7 #ransomware
0
How to configure #WinDbg for kernel debugging: https://t.co/Ou04XuubtL https://t.co/7suGTK6NBB
0
#Ransomware: Expert advice on how to keep safe and secure by @LysaMyers (updated): https://t.co/X1yIJz96G8 https://t.co/EzmF3y7ZOR
0
How one small island of just 4,000 people can learn from our #OnlineSafety mistakes: https://t.co/X9f544tTHw
0
RT @TheHackersNews: France Won the Extradition Tug-of-War Between United States and Russia 🤨🤪https://t.co/zplxTUgpjZGreek Court Approve…
0
Pablo Bruer & David Perlman talking to @sarapeters about their talk about #BHUSA19 #Hack10M @misinfosec @CoPsyCon @Ngree_H0bit #drnewsdesk #darkreading https://t.co/Twr5bgqsRu
0
One way to make something go viral is to trigger the deep, primal urge inside parents to protect their children. Over the last week or so, that’s exactly what the #MomoChallenge has been preying upon.https://t.co/JKlf36D3jU
0
Here's what you missed last week https://t.co/bvAeWUDjVL
0
Google Chrome PDFium OpenJPEG Heap-based Buffer Overflow Vulnerability (CVE-2017-15408)https://t.co/y0AiOFuOpV
0
Vote now! Which web browser do you trust the most? https://t.co/354SzSidwK
0
Having an incident response plan isn't enough. Lack of exec involvement, compliance issues, and failure to review/update plans prevent orgs from responding to #security incidents. Only 36% feel prepared to handle incidents involving confidential #data: https://t.co/QMTTe8RV1K
0
JP Morgan Hacker Pleads Guiltyhttps://t.co/3VQE8pklgQ
0
BlitzCTF001 — A collection of easy CTF challenges that covers Crypto, SQLi, Broken Access Control, Cookie Manipulation and Stegano. https://t.co/KtfnwLoCHH
0
The ABCs of Hacking a Voting Machine https://t.co/c7MgxOKckY #DEFCON
0
Credential Leaking Vulnerabilities Impact Comba, D-Link Routers https://t.co/5I3jDnO60L
0
Guilty! Court sinks children’s hospital attacker who was found stranded on a boat. https://t.co/iIMHTwvhb4
0
Open Source Network #Security Tools for Beginners https://t.co/OXfIvNd0GlWith so many tools available to help with #network security, it can be tricky to figure out where to start. This guide from @AlienVault experts explains how to get started with network security tools. https://t.co/2u8MDN34oV
0
The Votes Are In: Election Security Matters https://t.co/ZQYVruWLPg #election #security #hacking
0
⚡Wi-Fi password #hacking becomes easier with a new attack on WPA/WPA2 wireless network protocolshttps://t.co/d1bMeekuO3Here's how to hack Wi-Fi 📡#password (step-by-step) using PMKID that no longer requires attacker to wait for a complete 4-way handshake. https://t.co/MaZWa79qIv
0
RT @OndrashMachula: If I'm lucky this is how my office will look in a few years.:) @ESET #SiliconValleyBratislava https://t.co/UBNtvwXxCN
0
The FTC said the crackdown is just a “a drop in the bucket.”https://t.co/ulHhVwhrqV
0
If you know someone with an Amcrest security camera - let them know they should update it now!https://t.co/5EFWvSWavz
0
Cybersecurity and commitment: issues in the fight against cybercrime http://t.co/NSOuEyLxdg http://t.co/Zml0iYbKpP
0
18 years of Googling: #Malware can still be just one click away: https://t.co/m8BGsZHNIQ https://t.co/U5jz0InVOZ
0
ICS security training via Gamification! :) https://t.co/3iq3pHWaMS
0
How to Reduce False Positives and Move Faster on What Matters - https://t.co/UCmm1OesYe
0
#Shamoon 3 Targets Energy Sector in Middle East - https://t.co/ucZMqwYaC7
0
North Carolina county falls for BEC scam, to the tune of $1,728,083 https://t.co/Y1txN6roRc
0
Scapy, a powerful packet manipulation tool used by #cybersecurity researchers and network engineers, is susceptible to a Denial of Service (#DoS) vulnerability https://t.co/LmQTD2MwmC https://t.co/V8J9Vg6lxx
0
Forget Passwords! Here's a fastest way to “Verify It's You”Chrome for #Android users can now securely log-in to certain #Google services using their FINGERPRINT👍or other device unlock methods, including pins, pattern or passwordLearn more ➤ https://t.co/qYreWn4qYW#infosec https://t.co/PqF0kMCu0X
0
RT @TheHackersNews: Hypertext Transfer Protocol (HTTP) over QUIC will officially become HTTP/3HTTP/QUIC → #H3 → https://t.co/AezIFGIhgF…
0
Good Read>> Ten years in, nobody has come up with a use for blockchain https://t.co/QYlRGJddj3
0
Why AI Raises Your Risk of Cybercrime – And What to do About It https://t.co/E7NfkAIx7w via @CISOForum’s CISO Journal
0
Malware Isolation Firm Menlo Security Raises $75 Million https://t.co/CpmqA6yJ1h
0
Leveraging the Power of your End-Users’ Human Cognition: @LennyLiebmann interviews CEO Rohyt Belani at #BHUSA #DRNewsDesk https://t.co/8GAbiTxlfP
0
Valentine's Emails Laced with Gandcrab Ransomware https://t.co/C38haJlza3 by @kellymsheridan #ransomware #cyberattack #valentinesday
0
Multicloud + IoT: Securing IoT Applications in Diverse, Distributed Environments - https://t.co/OBgksdZJIP
0
Twitch backs down on 20-character passwords in wake of hacking http://t.co/qeGxMDJ3bk http://t.co/hR74wZTO7k
0
Could it be? https://t.co/gRU3ucLZqt
0
RT @MarkStockley: @NakedSecurity Old school @NakedSecurity t-shirt. It ain't funny, but it is un-ironed 🤣 https://t.co/Hs95JfyX9C
0
Premera Breach: Healthcare businesses in the crosshairs http://t.co/LQl1e6DLYN http://t.co/epuGM8UWgl
0
Hey, iOS users. Got a spare Android phone lying around? Now, you can use it as a secure access key for online services.https://t.co/6Fw5zlIijY
0
SamSam Ransomware Goes on a Tear https://t.co/rBJXD2HyxL #ransomware #SamSam #healthcare
0
Claroty Releases Free Diagnostic Tool for Urgent/11 Vulnerabilities https://t.co/OlkHqBIjIw
0
UK and US #banks to face transatlantic #cyberattack test: https://t.co/8v72EbCeh0 https://t.co/dUinXIrtE8
0
RT @TheHackersNews: Microsoft finally adds end-to-end #encryption to Skype messenger for secure and private conversations https://t.co/eFJP…
0
"We didn't wake up and decide to reverse engineer What'sApp. We wanted to provide integrity from point A to point B in messaging apps" -- @od3dv @checkpointSW, Head of Products Vulnerability Research, Check Point Software Technologies w @SaraPeters #DRNewsDesk #BHUSA
0
Hollywood has accused itself of piracy. https://t.co/spXpM9Zpfk
0
Could the Home Depot data breach be the biggest credit card leak ever? http://t.co/ZwM4mGO61M #security http://t.co/EoczuT4NY5
0
Testing out our new podcast studio... we’ll be back soon 🎉 https://t.co/252juACTXx
0
Hamas-Linked Threat Actor's Infrastructure Disrupted https://t.co/RAA3wHBnqI
0
Google says sorry for pulling a Facebook with monitoring program https://t.co/cXEOmSL9n8
0
#Bitcoin Core Software Patches a Critical #DDoS Attack Vulnerability (CVE-2018-17144) https://t.co/SwMMNPePXF https://t.co/6zjb5AVcHu
0
Stop Cyberbullying Day: Advice for victims and witnesses #STOPCYBERBULLYINGDAYhttps://t.co/pgaNuI71QW
0
Creeps outed as massage app exposes database with workers’ comments https://t.co/aEZFlcZCqy
0
Essential Elements of a Penetration Test https://t.co/jPX0yIoaft @synack #whitepaper reveals how to launch a successful #pentest within your organization
0
Cisco Issues 31 Mid-April Security Alerts https://t.co/FzLsNqeE8m by @kg4gwa #cisco #cybersecurity #vulnerability networking
0
Update—U.S. government has delayed Huawei ban for 90 days https://t.co/aW08qTDH2g Huawei gets a temporary license to continue doing business with American firms until August 19, 2019.
0
Railway Cybersecurity Firm Cervello Raises $4.5 Million https://t.co/WxFMwngyW4
0
U.S. today announced charges against 2 Iranian hackers for creating & using SamSam #ransomware that extorted over $6 million from victimshttps://t.co/UF3Ur8T1q5Since both operate from Iran, they haven't yet been arrested. The FBI has added them to their list of WANTED HACKERS https://t.co/17xPxu9VDc
0
Is $100 million enough to save the web from ads? https://t.co/NMXWiJSu7d
0
We have a new poll on our homepage - we're curious to know how you will or have responded to news of the #WannaCryptor attack. #WannaCry
0
Traits on the autism spectrum that lead folks into cybercrime can also work in a SOC. IT is logical & syntax-guided, and it's easy for pattern-thinkers to spot flaws in code. How autistic people can help fight #cybercrime, and how businesses can hire them: https://t.co/pNVqaxQ8F3
0
Facebook Demanded User Email Passwords - https://t.co/f0opXcX9OX
0
Microsoft explains how detonation-based heuristics and machine learning help Office 365 ATP to detect and fight a broader range of advance online threatshttps://t.co/IpTv30l4vZ via @msftsecurity https://t.co/VZwdyDchPi
0
Apple’s easily abused Enterprise Certificate program isn’t just letting snoopy Facebook and Google apps slide into its App store, it turns out: It’s also being exploited by at least a dozen hardcore porn apps and a dozen gambling apps.https://t.co/9ENbTmvR2T
0
If your #Venmo account is still set to public - it's high time to switch it to private. https://t.co/gePJOopX5g
0
RT @EduardKovacs: Chin Beng Yue of @Fortinet talks about the impact of visibility, control and analytics in an era of convergence at Securi…
0
Financial Firms Face Threats from Employee Mobile Devices https://t.co/R3E9TMRmZn by @kg4gwa #mobile #mobilesecurity #finance #phishing
0
This #BHUSA talk from @monoxgas will dig into methodology, selection process, and challenges of modern command and control. He'll show how trust can be abused for stealthy C2 techniques via internal mail servers, defensive platforms, and trusted domains: https://t.co/GFtH3c1nPW
0
Disrupting the Criminal Economic Model Can be Achieved by Tightly Integrating Security Systems into a Cohesive Framework - https://t.co/aog1H3z1QO
0
RT @interop: Avoid a DOUBLEDOINK when it comes to your IT strategy. Attend Interop, get unbiased IT insight/advice for better tech decision…
0
Google’s location history data shared routinely with police https://t.co/YfCgk4EILO
0
UK Consumers willing to share DNA with banks to secure identity: http://t.co/5xoKrW63oP http://t.co/Pq92YBF4WO
0
Don’t Overlook the Risk in Business Risk Intelligence (BRI) - https://t.co/Q9LpbmD7ZM’t-overlook-business-risk-bri
0
Dell Unveils New Data Protection Appliances https://t.coo2FWXq6SJ
0
The Geopolitical Influence on Business Risk Management - https://t.co/duSPPvd6rN
0
Archive Server of Pale Moon Open Source Browser Hacked https://t.co/8SeMaxstzf
0
Memes on Twitter Used to Communicate With Malware https://t.co/xC6GW64vIw by @jaivijayan #tweet #images #Trojan
0
@lee_ball The original post mentions a "Petcube treat cam" - an IoT device that allows you to watch your pet, talk to them and "fling" (yes fling) treats at them.
0