text
stringlengths
23
304
label
int64
0
1
Good. This month none of the security vulnerabilities patched by Microsoft was publicly disclosed or found exploited in the wild. 😇
0
Have you got a general #cybersecurity question you want answering?We’ll be doing a q&a section at the end of next week’s podcast.Simply reply to this tweet and we'll see them! https://t.co/DibFEXmJ9n
0
October Events at Dark Reading You Can't Miss https://t.co/pq0HuA2k6S #SMB #RiskAssessment #SecOps
0
#Avalanche takedown: Check if you are safe https://t.co/cwcvr5TzBQ https://t.co/GEOBBAXII1
0
#VirusTotal has integrated machine learning-powered malware detection engine developed by #Trapmine, aims at helping users and researchers identify never-before-seen #malware and exploit attemptshttps://t.co/3elz5AQibu https://t.co/hhVVjWUiQ2
0
RT @charcuteriecoma: I'm looking forward to attending the @SecurityWeek CISO Forum 2019 presented by @intel next week. I'll be on the "In-C…
0
6,500 Dark Web Sites Offline After Hosting Service Attacked https://t.co/0gVXVqufMF #DarkWeb #Hosting
0
If you download Minecraft mods from Google Play, read on … https://t.co/sx1AoSuaky https://t.co/W2Eugv6uYn
0
Batterygate news: Apple to warn users if iOS updates throttle iPhones https://t.co/xHC33oxZb7
0
Hackers hijack song contest with Eurovision voting app attack: http://t.co/ScsMfVHCyL http://t.co/7gTapXZqVM
0
How to Remotely Brick a Server https://t.co/PrOMoxGkhH via @kellymsheridan
0
Crimeware Risk Underestimated, Chronicle Finds https://t.co/2hvCbSHnXg
0
Google Massively Redesigned #Gmail Service – Here's a List of Amazing New Features (Security, Productivity and Performance) That You Must Knowhttps://t.co/5y2aAUoCGmNew Gmail is More Smarter, Secure, and Easier to Use. https://t.co/SkXYacXYwf
0
In its official statement, Indane didn't acknowledge the breach, rather lied that its portal don't host Aadhaar no. of its customers. Aadhaar numbers are not directly displayed on the web page, but exposed in the URLs hyperlinked to each customer's IDhttps://t.co/O5OLqT31BB https://t.co/xOlzCBM6eK
0
RT @matthew_d_green: ESET's research into the MEDoc backdoor is pretty fantastic. https://t.co/5KcooNVjQ5
0
12 AppSec Activities Enterprises Can't Afford to Skip https://t.co/k5VFKpb6bx by @ErickaChick #BSIMM9
0
US military looks to 3,000 new security hires by 2016 http://t.co/B5bcopCmiT http://t.co/5kiDosEOnQ
0
Alleged Russian Hacker Aleksandr Zhukov Pleads Not Guilty After Extradition to United Stateshttps://t.co/xBPfSskabTHe was arrested last year in Bulgaria after authorities shut down "3ve," one of the largest digital ad-fraud schemes that infected over 1.7 million PCs worldwide https://t.co/2Y4my4yxg8
0
The same #encryption millions depend on to protect data is used to hide malicious payloads & criminal activity targeting businesses and individuals. Many orgs aren't doing anything to find out what's going on in their encrypted network tunnels https://t.co/MlA8s5Eb74 by @kg4gwa
0
5 million #VTech customers affected by major #databreach: https://t.co/0pbe5F9IDR https://t.co/rQZPG5JYjP
0
It was optional before, now it's not. If you're applying for a US visa you need to hand over your social media handles.https://t.co/UYhFrBZEZk
0
30 Years Ago, the World's First Cyberattack Set the Stage for Modern Cybersecurity Challenges - https://t.co/BKc8hGMT5t
0
35 state attorney generals tell FCC to pull the plug on robocalls https://t.co/TsMEUbEtGp
0
Demystifying the Dark Web: What You Need to Know https://t.co/iVr0HsYVgh by @kellymsheridan #darkweb #deepweb #cybercrime #tor
0
4 Reasons Why SOC Superstars Quit https://t.co/6n2WgvnZOy by Edy Almer #SOC #Superstars #Cyber #talent
0
Cheddar's Scratch Kitchen Chain Suffers Data Breach https://t.co/hd1XyyCxVK
0
It seems the #JustDial story hasn't ended yet.JustDial shared a statement with THN, which seems to be common for all publications, but is mostly irrelevant to our story and contradictory to our finding.Here below in this thread we have shared our response to this statement. https://t.co/DbU8iknfmX
0
New on The Edge today: A Security-First Approach to #DevOps : https://t.co/zVrhlqFhJ1(Check out The Edge -- Dark Reading's new home for in-depth features, how-tos and more.)
0
DIY Portable Secrets Manager With a Raspberry Pi Zero and ARC via @evilsocket https://t.co/I9zI5hxmZ9 https://t.co/0rscI7n064
0
Security roundup! From DeepNudes to the clumsy hacker who dropped his USB stick - and everything in between.https://t.co/hJd3tAnuZV
0
Ex-NSA contractor Harold Thomas Martin III—who stole classified material over more than 20 years—has finally pleaded guilty to the federal charge of willful retention of national defense informationhttps://t.co/yA8LqcxOriby @unix_root https://t.co/MrA6y970DZ
0
Findsploit—a simple bash script to find exploits in local and online databases instantly https://t.co/ehDdzApWSe https://t.co/affuBTnn63
0
RT @DarkReading: Toxic Data: How 'Deepfakes' Threaten Cybersecurity https://t.co/Qcumfv0gqR by @dikaheto #deepfakes
0
RT @TheHackersNews: PyLocky #Ransomware Decryption Tool Released—Unlock Your Files For Freehttps://t.co/vkTAYT8libLimitation: The tool…
0
Malware Framework Gathers 1 Billion Ad Impressions in 3 Months https://t.co/TIrCdbVk9o
0
RT @TheHackersNews: Google's #cybersecurity startup Chronicle launches "Backstory" — A new threat analytics platform that allows businesses…
0
Dark Web hosting provider hacked, 6,500 sites erased https://t.co/yTr6KKFx9t
0
FileZilla fixes show how far we’ve come since Heartbleed https://t.co/YsPsshm0hF
0
Push Technology Used in Mobile Attacks https://t.co/7JU4pSBSn8
0
"Deeply embedded legacy process lies at the heart of an organization's cyber skills gap," writes James Hadley @immersivelabs. Corporate security teams are held back by budget constraints, box-ticking exercises, and outdated training: https://t.co/95C2gFMSHb #skillsgap #security
0
Even the most seasoned #security pros could use a refresher in IT forensics to streamline breach investigations. As veterans know, there's sufficient confusion after an incident that you don't want to have to create a forensics strategy on the fly: https://t.co/VKUJnmLqSR
0
"It's like something's in the water right now," says @HankThomasDC of cybersecurity M&A activity in 2019. This year has been a big one for acquisitions and news isn't slowing down. These deals stood out: https://t.co/YOeoe9NU91 #acquisitions #cloud #threatintel
0
"Operation Sharpshooter" Hits Global Defense, Critical Infrastructure Firms https://t.co/yHT9crd5Y8
0
The Evolution of SIEM https://t.co/ho7oIfvTh1 #SIEM #expectations #realities
0
RT @Darktrace: Justin Fier, Darktrace Director for Cyber Intelligence & Analytics, discusses 3 of the next-generation industrial cyber-atta…
0
Leaky ski helmet speakers expose conversations and data https://t.co/R74T8rPC63
0
Mozilla Private Network VPN gives Firefox another privacy boost https://t.co/ZbRZq2Oo28
0
RT @TheHackersNews: A Young Hacker, Who Hacked Jail System & Modified Records to Get His Friend Released Early, Sentenced to 7-Years in Pri…
0
Singapore's Ministry of Health (MOH) also stated that the #cyberattack was "not the work of casual hackers or criminal gangs," <<<< Government points finger towards state-sponsored #hacking groups.
0
The 20 Worst Metrics in Cybersecurity https://t.co/3i10ITYRkk by @ErickaChick #security #metrics
0
Update → Microsoft's search engine #Bing has been restored in #China after being inaccessible in the country for almost two days. Sources say Bing was blocked due to an "accidental technical error" and not by the #GreatFirewall of censorshiphttps://t.co/efh3LkvTjd https://t.co/rEkHGVG1vT
0
New Encryption Mode Brings Sincerity and Discretion to Low-Cost Android Devices https://t.co/tV5RaQuQQq #encryption #android #google
0
Cloudflare’s RPKI Toolkit: A framework that allows networks to deploy route filtering using cryptography-validated information to make BGP Internet routing more securehttps://t.co/W4jhEKZZQw https://t.co/78UIDggTPn
0
RT @Dcsanalyst: Day 2 of #ICSCC18 Robert Longbottom of @thalesgroup on how UK Ministry of Defense conducts cyber vulnerability investigatio…
0
*cough* DDoSer.https://t.co/pqj7Ema3yN
0
Security is being redefined right before your eyes. That's why you need to take security to #theedge. @Akamai https://t.co/I2M54GbFZw
0
Fileless Malware Attacks on the Rise, Microsoft Says - https://t.co/jvG2n9tQUF
0
ASK THE EXPERTS: How Can We Stop #Ransomware From Spreading? New on #TheEdge. https://t.co/pOD6WZoTGR
0
RT @TheHackersNews: A #Twitter Bug Accidentally Left #Android Users' Protected Tweets Exposed Publicly For 4 Yearshttps://t.co/5eqjrubNyn…
0
#Cyberattacks affect ‘nearly every single company’: https://t.co/Kae5x1iRkW https://t.co/iBTNrSY2Cz
0
It’s been a bracing few weeks for anyone who relies on Microsoft’s Remote Desktop Protocol (RDP). #BlueKeep #GoldBrutehttps://t.co/6E8QU5qFhN
0
Satya Nadella: Privacy Is a Human Right https://t.co/IahKJWYNTc #microsoft #privacy #davos
0
Mozilla has told the Australian government that its anti-encryption laws could turn its own employees into insider threats.https://t.co/mmRTcNewZR
0
Start your Friday morning off with a quick look at what made the cybersecurity news this week with @TonyATESET https://t.co/oAVZom4YXC
0
How to Raise the Level of AppSec Competency in Your Organization https://t.co/VLD9eJANxC by Sammy Migues @synopsys #appsec #devops #software #development
0
Brave has accused Google of using a workaround that lets it identify users to ad network.https://t.co/HSyzNINKwi
0
RT @BlackHatEvents: How protocols such as STARTTLS, SPF, DKIM, DMARC, DANE and MTA-STS can be used to detect abuse and phishing attacks on…
0
For the second time in seven months, Singapore has lost control of its citizens’ private medical records. This time, it’s the records of people diagnosed with HIV. https://t.co/NEVd2k33fC https://t.co/ZSqmxjxSfz
0
Two-headed Android frightens users on eve of #Halloween 🤖🤖🐜 https://t.co/0EWeZRmsbF
0
Hacker doxes hundreds of politicians https://t.co/x61e2tj8nE
0
Simmering Tensions in the Antivirus World Erupt Again - https://t.co/09VTxkIazc
0
#Malware of the 90s: Remembering the Michelangelo and Melissa viruses #AntimalwareDay #cybersecurity https://t.co/hGvnBu9t9B
0
Thousands of Android apps bypass Advertising ID to track users https://t.co/7W5v2v4mem
0
Radiohead Defies Hackers, Releases Trove of Stolen Music - https://t.co/tXy78bRF5n
0
Wi-Fi Alliance announces #WPA3 wireless security protocol with new security and privacy features https://t.co/Eo7OTBAyLa https://t.co/yAB8BCqTtm
0
You can’t delete Facebook from some Androids and people aren’t happy https://t.co/TZWzE71fKY
0
[ROUND 4] List of breached sites:1) Youthmanual — Indonesian college and career platform 2) GameSalad — Online learning platform3) Bukalapak — Online Shopping Site4) Lifebear — Japanese Online Notebook5) EstanteVirtual — Online Bookstore6) Coubic — Appointment Scheduling
0
The sextortionists are back, and this time they're bombarding you with "proof" - find out what to do.https://t.co/WQjR3NUub2
0
Google Ad Exchange in data privacy probe https://t.co/6O2qJ8c8X3
0
Skylight researchers retrieved the list of targeted MAC addresses with the help of the offline tool Kaspersky released, which contains the full list of 619 MAC addresses within the executable, but protected using a salted hash algorithm.
0
ESET is diving deeper into #Sednit with the final installment of its paper, ‘En Route with Sednit’. Read it here: https://t.co/g4BwHr2sF4
0
LeakedSource Operator Pleads Guilty in Canada - https://t.co/6YDHhnKw6u
0
North Korea-Linked 'ScarCruft' Adds Bluetooth Harvester to Toolkit https://t.co/0UK8Z9TfEK
0
Unified Security Data: A Simple Idea to Combat Persistent, Complex Cyberattacks https://t.co/ETtOTjhWwN
0
Premera Blue Cross Pays States $10 Million Over Data Breach https://t.co/X3iEpmF8nf
0
Cybercriminals Think Small to Earn Big https://t.co/flMuPLFQFA #breach #SMB
0
App could have let attackers locate and take control of users’ cars https://t.co/OIh6Sjsqul
0
Understand More About Phishing Techniques to Reduce Your Digital Risk - https://t.co/42l3NYvze8
0
Monday review – the hot 21 stories of the week https://t.co/USGUsxeUs7
0
Artist Uses Malware in Installation https://t.co/AL9yXj6wfW #malware #Samsung #Windows
0
‘Unhackable’ Bitfi hardware rooted within one week. https://t.co/i1Sbz1WLdc
0
Dell Teams With CrowdStrike, Secureworks for New Endpoint Security Offering - https://t.co/ubDRJLKdxt $DELL $SCWX
0
Apple, Oracle, VMware Software Hacked at Pwn2Own 2019 - https://t.co/bij1IAKgMF
0
We remember, Google's @Blogger service also had a similar issue in past, which the company patched a few years ago by making it mandatory for every blog owner to set a separate, unique TXT record for their custom domains in order to verify the claim in Blogger's dashboard.
0
#Cybercrime on the rise as economic crime ‘goes digital’: https://t.co/WgNEMxE67B https://t.co/fHAHf3xIlV
0
Politicians and journalists stung by fake open Wi-Fi protest: http://t.co/tuoE6lQYd0 http://t.co/Zl9otaA4xO
0
Collaboration and Information Sharing Should Also Happen Internally: https://t.co/7NDp8a4I2r #infosec
0
Why Password Management and Security Strategies Fall Short https://t.co/z53PLnrR5g by @szurier #password #training
0
Google Secretly Tracks What You Buy Offlinehttps://t.co/SJTyQoXfOoCompany Reportedly Bought Users’ Offline Spending Data from #Mastercard for Personalized Advertising https://t.co/hkIngjrLdd
0
Metal keys beat smart locks in NYC legal battle https://t.co/PWSvedX1pw
0