Cybersecurity Social Media and Updates

Key Takeaways From 2026 Unit 42 Incident Report
SocialMar 11, 2026

Key Takeaways From 2026 Unit 42 Incident Report

Great conversation with @PaloAltoNtwks Unit 42, where we discussed critical insights from the 2026 Unit 42 Global Incident Response Report. 📍FULL episode here👇 https://t.co/FBcQYVqIr1 📍Read the Report👇 https://t.co/4qBLvLzTTF #cybersecurity #AI #CISO #AI #PaloAltoPartner https://t.co/v9lUBQfN3E

By Shira Rubinoff
AI Era Demands Robust Security and Power Resilience
SocialMar 11, 2026

AI Era Demands Robust Security and Power Resilience

The Critical Importance of Security and Power Resilience for Data Centers in the AI Era by @ChuckDBrooks https://t.co/GZHzYef4B8 #datacenter #cybersecurity

By Chuck Brooks
Dutch Telecom Hack Exposes Millions of Personal Records
SocialMar 11, 2026

Dutch Telecom Hack Exposes Millions of Personal Records

Hacking group begins leaking customer data in Dutch telecom Odido hack https://t.co/byTVBOsAmS "The theft… included names, telephone numbers, e-mail addresses, bank account numbers, birth dates and passport numbers." Every day, in every way, it gets worse. https://t.co/DSdcBeqfD7

By Dave Birch
AI-Generated Code Still Fails Critical Security Checks
SocialMar 11, 2026

AI-Generated Code Still Fails Critical Security Checks

OMG so much time telling LLMs 🤖to create two lambdas that ALWAYS verify Yubikey before taking actions and after many rounds of bug fixes like wrong database table names for example (would never work) they come up with a...

By Teri Radichel
China Bans OpenClaw AI on Government Computers
SocialMar 11, 2026

China Bans OpenClaw AI on Government Computers

Chinese authorities moved to restrict state-run enterprises and government agencies from running OpenClaw AI apps on office computers, acting swiftly to defuse potential security risks https://t.co/m8f5iz16vH

By Lulu Yilun Chen
NightBeacon: AI‑Powered, Self‑Trained Security Platform Launches
SocialMar 10, 2026

NightBeacon: AI‑Powered, Self‑Trained Security Platform Launches

Here's a demo on a project I've been developing and working on for the past 9 months. Called NightBeacon. Using it now in production, getting released fully this week. Our own internally trained models on our own infrastructure (no third party)....

By Dave Kennedy
Demand Thorough Evaluations Before Buying AI Security Tools
SocialMar 10, 2026

Demand Thorough Evaluations Before Buying AI Security Tools

RE: Agentic security testing claims Buyer beware. Make vendors provide you evals for their claims. Describe architecture. Prove workflows. Define models and tuning. Cite data sources. Provide references and case studies. Then buy 🤗

By Jason Haddix
Top Six Nations Facing Highest Cyber Crime Threats
SocialMar 10, 2026

Top Six Nations Facing Highest Cyber Crime Threats

Countries with the highest Cyber Crimes & Scams Threat Levels 1- Russia 🇷🇺 2- Ukraine 🇺🇦 3- China 🇨🇳 4- United States 🇺🇸 5- Nigeria 🇳🇬 6- Romania 🇷🇴

By Raquel (Deep Search)
Nation‑states Already Using Store‑now, Decrypt‑later; Adopt PQC Now
SocialMar 10, 2026

Nation‑states Already Using Store‑now, Decrypt‑later; Adopt PQC Now

"Store now, decrypt later" isn't a theory; it’s a nation-state strategy. If your 2026 roadmap doesn't include Post-Quantum Cryptography (PQC), you’re already behind. The 9 realities CIOs can't ignore: 🔗 https://t.co/l36K8t0jnp #RSAC2026 #PQC #QuantumComputing #CIO

By Tim Crawford
Researchers Identify and Patch Critical Signal Vulnerabilities
SocialMar 10, 2026

Researchers Identify and Patch Critical Signal Vulnerabilities

Very good research. Finding and fixing important vulns in Signal (!), and also trying to learn how we as security engineers can prevent vulns like these going forward. Way to go, Truong, Terzo, and Paterson, and good on Signal for...

By Zooko Wilcox-O'Hearn
Walmart Urged to Secure Email Relay Against Phishing
SocialMar 10, 2026

Walmart Urged to Secure Email Relay Against Phishing

Hey @walmart (or maybe @Walmarttech), could you kindly configure your email relay domain(!) so it can't send phishing emails? I get these once a week, and it's a pretty bad look. https://t.co/lerflUl2eR

By Arvid Kahl
Unclear if Firms Warned Apple About Stolen iPhone Hack Toolkit
SocialMar 10, 2026

Unclear if Firms Warned Apple About Stolen iPhone Hack Toolkit

We still don't know if Trenchant and L3Harris notified Apple once it learned its iPhone-hacking toolkit had been stolen/leaked. The toolkit was later used to target people in China and Ukraine. https://t.co/XBCHssnaQO https://t.co/y6g1IuwfVZ

By Runa Sandvik
Google Messages to Add Shield Against SMS Phishing
SocialMar 10, 2026

Google Messages to Add Shield Against SMS Phishing

Google Messages may soon gain a new shield against SMS blasters A recent beta update reveals code for a dedicated protection feature to thwart localized phishing scams ✅ Details - https://t.co/lgOwSiOpRO

By AssembleDebug (Shiv)
Evervault Secures $25M to Scale Secure Payment Encryption
SocialMar 10, 2026

Evervault Secures $25M to Scale Secure Payment Encryption

ICYMI - .@Evervault raises $25M to scale its ‘secure-by-default’ approach to payment data encryption https://t.co/69Ndf6v1yM @SiliconANGLE @Mike_Wheatley “Quite simply, dealing with this is not their core business, it’s just a distraction from the real business…” - #NextGenApps https://t.co/b0LbyzoIoh

By Holger Müller
Sandboxing AI Coding Agents Prevents Unintended Data Access
SocialMar 10, 2026

Sandboxing AI Coding Agents Prevents Unintended Data Access

AI coding agents running locally can execute commands and access files with the same permissions as the developer — raising the risk of unintended access to sensitive data. Safehouse is a macOS tool that runs agents in a sandbox to limit...

By Paul Sawers
AI Agent Security Emerges as New Industry
SocialMar 10, 2026

AI Agent Security Emerges as New Industry

Securing AI agents is becoming its own industry. OpenAI is acquiring cybersecurity startup Promptfoo to strengthen defenses around how AI systems behave and interact. As agents gain autonomy, protecting them may become as important as building them. https://t.co/JsM6H105Ic @cnbc @JonathanVanian

By Spiros Margaris
When Smart Devices Fail, Simpler Tech Wins
SocialMar 10, 2026

When Smart Devices Fail, Simpler Tech Wins

I spend my days around 𝗶𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝘁 𝘀𝘆𝘀𝘁𝗲𝗺𝘀. Which is exactly why my house behaves like it’s 1995. When you truly understand how “𝘀𝗺𝗮𝗿𝘁” 𝗱𝗲𝘃𝗶𝗰𝗲𝘀 𝗴𝗲𝘁 𝗵𝗮𝗰𝗸𝗲𝗱, you start appreciating 𝘃𝗲𝗿𝘆 𝗱𝘂𝗺𝗯 𝘁𝗲𝗰𝗵𝗻𝗼𝗹𝗼𝗴𝘆 again. #ai #technology

By Pascal Bornet
Q4 2025 Saw Surge in Critical Vulnerabilities
SocialMar 10, 2026

Q4 2025 Saw Surge in Critical Vulnerabilities

The fourth quarter of 2025 was real busy in terms of the number of critical vulnerabilities discovered. For more details, see our report: https://t.co/BbqufFIBtT https://t.co/uXmKR2wOi0

By Eugene Kaspersky
Chrome Extension Becomes Malicious After Ownership Transfer
SocialMar 10, 2026

Chrome Extension Becomes Malicious After Ownership Transfer

Roses are red. Violets are blue. Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

By Arvid Kahl
Legacy Breach Drives Board to Prioritize S/4HANA Upgrade
SocialMar 9, 2026

Legacy Breach Drives Board to Prioritize S/4HANA Upgrade

A company faced a cybersecurity breach through legacy systems, raising concerns about their current ECC software. The board was pushed towards an S/4HANA upgrade, thinking it was crucial for survival against maintenance sunsets. #SAP #Cybersecurity #DigitalTransformation https://t.co/nH8L4PewV9

By Eric Kimberling
Protect Processes, Not Just Data, to Avoid Agentic Sprawl
SocialMar 9, 2026

Protect Processes, Not Just Data, to Avoid Agentic Sprawl

Everyone is talking about Agentic AI, but who is talking about Agentic Sprawl? If you aren't protecting the process as much as the data, your automation is a ticking time bomb. 💣 Get the reality check before #RSAC2026: 🔗 https://t.co/6PIC4o7OmO #CIO #CISO #AgenticAI...

By Tim Crawford
IRS Never Requests Personal Info via Social Media
SocialMar 9, 2026

IRS Never Requests Personal Info via Social Media

History meets modern security. Remember: the IRS will never contact you by social media or text to request personal or financial information.

By Raquel (Deep Search)
Even Elaborate Spam Texts Are Still Scams
SocialMar 9, 2026

Even Elaborate Spam Texts Are Still Scams

Got this spam text last night claiming I had a hearing for “toll evasion” and at first I thought wow, this feels like they put more effort than the standard phishing text but then I looked more closely and 😂

By Karissa Bell
Prompt Injection Hacks Land Interview Phone Screens
SocialMar 9, 2026

Prompt Injection Hacks Land Interview Phone Screens

lol I’ve seen these resume prompt injections work multiple times to get to phone screen

By Rachel Tobac
Signal Users Phished, Not Hacked: Officials' Accounts Compromised
SocialMar 9, 2026

Signal Users Phished, Not Hacked: Officials' Accounts Compromised

Signal says "government officials and journalists" have had their accounts compromised via social engineering attacks (rather than any hack of its own system).

By Scott Nover
AI Era Elevates Need for Personal Data Protection
SocialMar 9, 2026

AI Era Elevates Need for Personal Data Protection

#AI-Powered Future: Why Protecting Personal #Data Online Matters More Than Ever by @SecurityTrybe #CyberSecurity #InfoSec #IT #Tech #Technology https://t.co/3qU68xpFLJ

By Ron van Loon
AI Accelerates Data Flow, Making Sensitive Data Identification Harder
SocialMar 9, 2026

AI Accelerates Data Flow, Making Sensitive Data Identification Harder

Great to host the cybersecurity roundtable in NYC with Cyera. Key takeaway: data security is getting dramatically harder. AI systems dramatically increase how fast data moves across systems and teams. Identifying truly sensitive data is becoming the real challenge.

By Sean D. Mack
Threat Actor Leverages Elastic Cloud SIEM for Stolen Data
SocialMar 9, 2026

Threat Actor Leverages Elastic Cloud SIEM for Stolen Data

Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data https://t.co/JvGh3E1LjL https://t.co/YFBi1wO3Bx

By Eric Vanderburg
Detect Reverse Shells with Process‑Network Monitoring Script
SocialMar 9, 2026

Detect Reverse Shells with Process‑Network Monitoring Script

A Script To Monitor Application Network Connections 🔒 How would you spot a reverse shell such as was used in Lexus Nexus breach? I vibe coded this script to see parent and child processes with application paths, process names, IPs,...

By Teri Radichel
AI-Driven Workflows Boost Cyber Risk; Security Platforms Poised for Growth
SocialMar 9, 2026

AI-Driven Workflows Boost Cyber Risk; Security Platforms Poised for Growth

As AI agents begin operating across enterprise systems, cybersecurity becomes even more critical. Autonomous workflows increase API calls, expand attack surfaces, and accelerate the speed of cyber threats. Security platforms that combine AI detection, real-time telemetry, and integrated infrastructure are becoming...

By Sergey CYW
This Week's Top Exploits: Qualcomm, iOS, AirSnitch, Vibe Malware
SocialMar 9, 2026

This Week's Top Exploits: Qualcomm, iOS, AirSnitch, Vibe Malware

⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware https://t.co/fIYq27CN68 https://t.co/fsqh6jPvJv

By Eric Vanderburg
Shopify's Growth Fuels a Surge in Scams
SocialMar 9, 2026

Shopify's Growth Fuels a Surge in Scams

Shopify's ecosystem is now mature enough to have more bad actors than any of us can stop. - Shopify app store: people clone your app. - Shopify agencies: people impersonate you. - Shopify merchants: people clone your store or use it to test...

By Kurt Elster
Australia, NZ, Tonga Alert Surge in Pacific Ransomware Attacks
SocialMar 9, 2026

Australia, NZ, Tonga Alert Surge in Pacific Ransomware Attacks

Australia, New Zealand, Tonga, Warn of Rising INC Ransom Attacks Targeting Pacific Networks https://t.co/7RXek7etJs https://t.co/ceSfRJQxvy

By Eric Vanderburg
Cybersecurity Shifts Focus: Protect Data Behind Infrastructure
SocialMar 9, 2026

Cybersecurity Shifts Focus: Protect Data Behind Infrastructure

In Houston this week for the Cyber Security for Critical Assets Summit. Looking through the agenda, one thing stands out. The conversations are no longer just about protecting infrastructure. They are about protecting the data and systems that operate infrastructure. If you're...

By Sean D. Mack
AI Investment Boosts Cybersecurity Amid Market Uncertainty
SocialMar 9, 2026

AI Investment Boosts Cybersecurity Amid Market Uncertainty

Even as concern around artificial intelligence leads to market fluctuations in other sectors, cybersecurity is poised to benefit. Here's why governments and companies around the world are investing in AI as a defense mechanism: https://bit.ly/3OWDASt

By Chris Messina
Quantum Threat Drives Enterprise Shift to Post‑Quantum Crypto
SocialMar 9, 2026

Quantum Threat Drives Enterprise Shift to Post‑Quantum Crypto

Great conversation with enQase We discussed why #Quantum Threat & Post-Quantum Cryptography is becoming a top priority for enterprise #CISOs & #CTOs 📍FULL episode👇 https://t.co/QSA6g4byhP 📍Sched your mtg at #RSAC 👇 https://t.co/qQiSVb0J91 #PQC #cybersecurity #CEO https://t.co/FORk5259Nc

By Shira Rubinoff
Advanced Protection Mode to Block Chrome WebGPU
SocialMar 9, 2026

Advanced Protection Mode to Block Chrome WebGPU

Android's Advanced Protection Mode may soon start disabling WebGPU in chrome to protect against security threats ✅ Details & screenshot - https://t.co/c6KBB1avG2 https://t.co/XWUB3K7om6

By AssembleDebug (Shiv)
Third‑party Integrations, Not SAP Core, Drive Breaches
SocialMar 9, 2026

Third‑party Integrations, Not SAP Core, Drive Breaches

Concerned about cybersecurity with your SAP system? Third-party tools, not S/4HANA, are often the real culprits in breaches. Hackers exploit vulnerabilities in integrated systems, not the core SAP software itself. #SAP #Cybersecurity #TechTips https://t.co/QTo2Og2Ct2

By Eric Kimberling
Agentic AI Accelerates SecOps/ITOps While Keeping Humans
SocialMar 8, 2026

Agentic AI Accelerates SecOps/ITOps While Keeping Humans

Early agentic AI in SecOps nd ITOps: automated triage, narrative investigations, hypothesis-driven analysis, and faster MTTR with humans still in the loop. #AI #ITOps #SecOps https://t.co/e3w3lXkvfc

By Isaac Sacolick
OpenClaw's Prompt Injection Defenses for Web Data Safety
SocialMar 7, 2026

OpenClaw's Prompt Injection Defenses for Web Data Safety

Thinking about putting together a post about all the security measures I have in openclaw to protect against prompt injections. Critical if your openclaw ingests any web data, emails, etc. Would you read it?

By Matthew Berman
Define Policy Once, Enforce Everywhere with GenAI
SocialMar 7, 2026

Define Policy Once, Enforce Everywhere with GenAI

Regulated orgs should target "define policy once, enforce everywhere," with genAI helping map policy to each provider's primitives. #Cloud #CISO #CIO https://t.co/vBzM21vM14

By Isaac Sacolick
Parenthood Turns Cyber Resilience Into Personal Responsibility
SocialMar 7, 2026

Parenthood Turns Cyber Resilience Into Personal Responsibility

Cyber resilience feels different when you’re a parent. Security stops being abstract strategy and becomes something much more personal.

By Sean D. Mack
CIO Hides Risks, Board Demands Change Amid Cyber‑AI Pressures
SocialMar 7, 2026

CIO Hides Risks, Board Demands Change Amid Cyber‑AI Pressures

A board was deeply concerned about cybersecurity, AI opportunities, and SAP maintenance deadlines. To mitigate these risks, a significant change was deemed necessary. However, the CIO failed to present the full scope of risks and alternatives. #Cybersecurity #AI #BusinessStrategy https://t.co/P9A0Dxq8YK

By Eric Kimberling
Check Your Data Exposure with Free Breach Lookup Tools
SocialMar 6, 2026

Check Your Data Exposure with Free Breach Lookup Tools

“To check if your details have appeared in any other public data breaches, there are a number of online tools that you can use, such as https://t.co/nppjjGzwdR” 😎

By Troy Hunt
Proton Defends Compliance with Local Law, Sparks Backlash
SocialMar 6, 2026

Proton Defends Compliance with Local Law, Sparks Backlash

People still shocked that Proton adheres to the law in the country in which they’re based 😮

By Troy Hunt
Apply SRE Principles to Strengthen Security Practices
SocialMar 6, 2026

Apply SRE Principles to Strengthen Security Practices

You can definitely apply SRE principles and practices to your security efforts. Here's a good post at things we do—eliminate toil, alert on symptoms, blameless postmortems, embrace gradual change—that you can do too. https://t.co/4lHNmUkQ52

By Richard Seroter
AWS Secrets Manager Misuse Fueled Lexus Nexus Breach
SocialMar 6, 2026

AWS Secrets Manager Misuse Fueled Lexus Nexus Breach

Lexus Nexus Breach Involving AWS Secrets Manger, RDS, ECS 🔒☁️ Taking a look at the root cause of a breach on AWS, what is actually relevant, and how it may have been prevented https://t.co/Uox6A1LzE9 https://t.co/T7mTvFkZFZ

By Teri Radichel
OT Cybersecurity Fails Governance, Not Just Terminology
SocialMar 6, 2026

OT Cybersecurity Fails Governance, Not Just Terminology

OT cybersecurity is a governance failure masquerading as a vocabulary issue | Control Global https://t.co/ppRU4DoyMR

By Chuck Brooks
Enterprise Zero‑Days Hit Record High, Near 50% Share
SocialMar 6, 2026

Enterprise Zero‑Days Hit Record High, Near 50% Share

"Both the raw number (43) and proportion (48%) of vulnerabilities impacting enterprise technologies reached all-time highs, accounting for almost 50% of total zero-days exploited in 2025." https://t.co/EP6ycYhJJd < threat landscape is changing. You ready?

By Richard Seroter