Cybersecurity Social Media and Updates

90 Zero-Day Exploits Surge as Enterprises Become Prime Targets
SocialMar 6, 2026

90 Zero-Day Exploits Surge as Enterprises Become Prime Targets

Google GTIG: 90 zero-day flaws exploited in 2025 as enterprise targets grow https://t.co/AasF2pQ7kO #BreakingNews https://t.co/fzlSfxjbz0

By Eric Vanderburg
X Bans Undisclosed AI War Clips for 90 Days
SocialMar 6, 2026

X Bans Undisclosed AI War Clips for 90 Days

X Defunds The Deepfakes: Undisclosed AI War Clips To Face 90-Day Revenue Ban | Republic World https://t.co/hUVPj3L7Nj #war #wardeepfake #Deepfake #DeepfakeDetection #AIGeneratedContent #AISecurity #DigitalForensics #SyntheticMedia #MediaManipulation #CyberSecurityAwareness #Disinformation #Misinformation #AIEthics #AIRegulation #TrustInMedia #ContentAuthentication #OnlineSafety

By Amitav Bhattacharjee
AI-Driven Plant Networks Require Built-In Cybersecurity
SocialMar 6, 2026

AI-Driven Plant Networks Require Built-In Cybersecurity

Contributor Spotlight: Shantae Hansen (p. 34) — as AI gets embedded into MES/ERP + IIoT + plant networks, cybersecurity has to be “built-in,” not bolted on. Practical moves: segment OT/IT, least-privilege + MFA, disciplined patching and tested offline backups. #Cybersecurity https://t.co/zvLr3eVkMd

By Lisa Anderson
Meta Glasses Privacy Breach Threatens AR Adoption
SocialMar 5, 2026

Meta Glasses Privacy Breach Threatens AR Adoption

The biggest viral AI post across all lists today. 14,000+ retweets. Meta glasses sending intimate footage to offshore contractors is exactly the privacy nightmare everyone predicted. This could kill consumer AR adoption if not addressed immediately.

By Robert Scoble
Early Draft Review Uncovers Fresh Views
SocialMar 5, 2026

Early Draft Review Uncovers Fresh Views

Complex Systems this week is a tiny experiment: I did a read of a work-in-progress essay rather than the finished version with author's commentary. It's about secondary authentication/authorization, particularly for payments.

By Patrick McKenzie
Agentic AI: Autonomous Ops Agents Beyond Simple Alerts
SocialMar 5, 2026

Agentic AI: Autonomous Ops Agents Beyond Simple Alerts

Think beyond co-pilots. Agentic AI in ops means agents that observe signals, reason across security and reliability data, and take guarded actions - not just summarize alerts. #ITOps #SecOps https://t.co/e3w3lXkvfc

By Isaac Sacolick
IRS Alerts: New Tax Scams Evolving Beyond Phishing
SocialMar 5, 2026

IRS Alerts: New Tax Scams Evolving Beyond Phishing

From phishing emails to bogus tax credits, the IRS warns that scammers keep changing tactics. Here’s what you should know about the most common tax scams now. https://t.co/0ciX8gUJKy

By Kelly Phillips Erb
Regular Drills Prevent Security Skill Decay
SocialMar 5, 2026

Regular Drills Prevent Security Skill Decay

In winter survival training they call it 'dirt time'. You need to get hands-on and practice. Skills decay if you do not practice them. The same is true in security: Tabletop exercises, incident response drills, access reviews. If you only touch...

By Sean D. Mack
AWS Model Privacy: Risks of Insider Access and Data Leakage
SocialMar 5, 2026

AWS Model Privacy: Risks of Insider Access and Data Leakage

Although I’m in 🩷 with Kiro CLI and like that AWS makes a copy of the model so your data doesn’t reach the model providers, I want to know more about AWS internal access to such things, customer segregation with...

By Teri Radichel
OEMs Accelerate Design, Strengthen Security for New Vehicle Architectures
SocialMar 5, 2026

OEMs Accelerate Design, Strengthen Security for New Vehicle Architectures

OEMs are driving faster design cycles and enhanced security amid evolving vehicle architectures and compliance requirements. https://t.co/h9d6HBTGMr #automotive #automotivesecurity

By Ed Sperling
Aave V4 Launches Continuous Bug Bounty via Sherlock
SocialMar 5, 2026

Aave V4 Launches Continuous Bug Bounty via Sherlock

We propose launching the Aave V4 bug bounty program with Sherlock. Bug bounties have long been an important part of Aave’s security strategy, and the Sherlock team has demonstrated strong expertise in managing both security contests and bug bounty programs.

By Stani Kulechov
State-Backed Hackers Ready for Undetectable OT Attacks
SocialMar 5, 2026

State-Backed Hackers Ready for Undetectable OT Attacks

State-affiliated hackers set up for critical OT attacks that operators may not detect | CSO Online https://t.co/bvLvNOk8Fn

By Chuck Brooks
AI Accelerates Vulnerability Fixes, Sparking Dual Optimism
SocialMar 4, 2026

AI Accelerates Vulnerability Fixes, Sparking Dual Optimism

Being at UnpromptedAI conference in SF this week seeing extent of using AI for vulnerability discovery and for accelerating fixes has me want to make a slight correction to this post: 1. I am short term *very* pessimistic 2. I am *even...

By Phil Venables
TikTok Denies “Controversial” Tech, Actually Uses End‑to‑end Encryption
SocialMar 4, 2026

TikTok Denies “Controversial” Tech, Actually Uses End‑to‑end Encryption

TikTok announces that they’re not going to deploy “controversial privacy tech” that’s actually the same end-to-end encryption most other providers use to protect users’ DMs. https://t.co/INKzu9ku2z

By Matthew Green
RSAC Attendance: Join ISMG Team to Discuss AI Security Trends
SocialMar 4, 2026

RSAC Attendance: Join ISMG Team to Discuss AI Security Trends

RSAC is coming up. I will be there with the ISMG team. If you are attending, let’s connect. Curious what themes you expect to dominate this year. AI security? Identity? Platform consolidation?

By Sean D. Mack
Google’s AI‑Driven Playbook for Modern Security Threats
SocialMar 4, 2026

Google’s AI‑Driven Playbook for Modern Security Threats

How Google approaches critical security topics, from fundamentals to AI https://t.co/4JCmvNxF8E < we're always learning things about new threats, new (and proven) techniques to respond with. @royalhansen takes a look here.

By Richard Seroter
First Age Verification Prompt Hits Social Media Users
SocialMar 4, 2026

First Age Verification Prompt Hits Social Media Users

One for the “but age verification means *everyone* has to show their gov ID or hand over biometric data” brigade. For the first time ever, I just got an age challenge on a social media platform: https://t.co/IidAL3Czai

By Troy Hunt
Aave V4 Security-First Design Detailed in Transparency Report
SocialMar 4, 2026

Aave V4 Security-First Design Detailed in Transparency Report

As part of building in public, Aave Labs is sharing our approach to smart contract security for Aave V4 with the broader DeFi community.

By Stani Kulechov
CIOs Must Prepare for Uncertain, High‑Impact HNDL Threat
SocialMar 4, 2026

CIOs Must Prepare for Uncertain, High‑Impact HNDL Threat

A strategic roadmap for the post-quantum CIO | @CIOonline https://t.co/UgFtyYdqYb My take: Harvest now, decode later (HNDL) is one of the hardest threats for CIOs to prepare for. Because it’s entirely unclear how big an issue really is. But probably...

By Dion Hinchcliffe
Your AI Data Stays Private, Never Used for Training
SocialMar 4, 2026

Your AI Data Stays Private, Never Used for Training

Three topics come up continually when it comes to AI, and they all center on trust. With LeapSpace, your data remains your data. We do not use your data to train AI models. Every interaction is private, secure, encrypted and...

By Catherine Adenle
US Reopens Chinese Tech Data Security Scrutiny Amid Military Labels
SocialMar 4, 2026

US Reopens Chinese Tech Data Security Scrutiny Amid Military Labels

This is a repeat of what happened in 2020 under the first Trump admin. Back when they first started exploring the TikTok ban as well. Was primarily around how Riot, Epic and others handled US user data. Ultimately...

By Daniel Ahmad
Three‑quarters of Leaders Report Network Cyber Fraud Surge
SocialMar 4, 2026

Three‑quarters of Leaders Report Network Cyber Fraud Surge

Nearly 75% of global leaders saw someone in their network hit by cyber fraud last year. Phishingn & smishing lead. With ransomware up 4x since 2021, organizations must manage third-party risk and treat cybersecurity as strategic. https://t.co/UZFhgJpvny https://t.co/RZ38Isc4tZ

By Cristina Dolan
AI Emerges as Budget-Friendly Cybersecurity Force Multiplier
SocialMar 4, 2026

AI Emerges as Budget-Friendly Cybersecurity Force Multiplier

Did a new blog @Binary_Defense called: NightBeacon: AI as a Force Multiplier in Cybersecurity We always struggle with budget and headcount. Do we finally have somewhat of a solution for our security programs? https://t.co/sBeXDGT9nx

By Dave Kennedy
Cyber Tools: Both Promise and Limits Against Iran's Nuclear Threat
SocialMar 4, 2026

Cyber Tools: Both Promise and Limits Against Iran's Nuclear Threat

I guess it's fitting that I spent a couple of hours this week signing 400 copies of Countdown to Zero Day for a conference -- fitting because it's a reminder, in regards to Iran's nuclear program, of both the advantages...

By Kim Zetter
Mid‑Market OT: The Most Dangerous Security Gap
SocialMar 4, 2026

Mid‑Market OT: The Most Dangerous Security Gap

Great conversation with David Petrikat-AMDT We discussed why Mid-Market #OT Is the Most Dangerous Place to Be 📍Full episode here 👇 https://t.co/0zi01ZkyCg 📍📍Please read more here 👇 https://t.co/Y5Q7I09c76 #CISO #OTSecurity #CyberResilience #CEO https://t.co/7O5h944IRI

By Shira Rubinoff
Security Duties Persist; Breach Itself Is Violation
SocialMar 4, 2026

Security Duties Persist; Breach Itself Is Violation

A UK court just ruled: security duties don't disappear even if hackers can't read what they stole. The breach itself is the violation. Meanwhile, GDPR surged 220% in a single day. Privacy isn't a checkbox anymore. It's becoming infrastructure. https://t.co/uNnssaoO6P

By Yves Mulkers
Future Drive Success Demands Broader, Deeper Technical Knowledge
SocialMar 4, 2026

Future Drive Success Demands Broader, Deeper Technical Knowledge

Drives are becoming more complex. And knowledge is turning into a key success factor. 🚀 Today we had an intensive exchange at GROLLMUS with Danfoss about training and future skill requirements. Marco de Jong and Mieslinger Christian joined us to...

By Michael Grollmus
HungerRushRMS Breach Leads to Phishing Emails, Aussie Traffic Blocked
SocialMar 4, 2026

HungerRushRMS Breach Leads to Phishing Emails, Aussie Traffic Blocked

Looks like @HungerRushRMS got pwned and the bad guys are emailing customers. Now they’re blocking website traffic (at least they are for Aussie traffic). https://t.co/lKe74m0OTc

By Troy Hunt
Agentic AI Forces Unified ITOps‑SecOps for Resilience
SocialMar 4, 2026

Agentic AI Forces Unified ITOps‑SecOps for Resilience

Most orgs still treat ITOps and SecOps as separate universes, but incidents don't care about org charts. Agentic AI gives leaders a reason to redesign workflows around end-to-end resilience. #CIO #CISO #AI https://t.co/e3w3lXkvfc

By Isaac Sacolick
MFA Remains the Easiest High‑ROI Security Win
SocialMar 3, 2026

MFA Remains the Easiest High‑ROI Security Win

Just about every small and mid sized business I talk to is still behind on MFA. It is still the highest ROI security control available. If you have not enforced MFA everywhere, that is the easiest win you have this quarter. Read more...

By Sean D. Mack
GenAI Augments Security Stack; AI Firms Target Specific Markets
SocialMar 3, 2026

GenAI Augments Security Stack; AI Firms Target Specific Markets

Anthropic entering secure code has everyone predicting the collapse of security vendors. I think that framing is too binary. GenAI will augment nearly every layer of the security stack. That does not mean the stack disappears. The better question is: which markets do...

By Sean D. Mack
Exposed API Keys Cost Startup $2.5K in Fees
SocialMar 3, 2026

Exposed API Keys Cost Startup $2.5K in Fees

Claude Code reached LinkedIn We're COOKED 😱 This guy literally exposed his API keys on the front end, got exploited, charged 175 customers $500 each by mistake.. .. then burned $2.5K in Stripe fees before fixing it 😅 https://t.co/WPDCXipLSF

By Data Chaz
AI‑Cybersecurity Convergence Must Be Administration’s Top Priority
SocialMar 3, 2026

AI‑Cybersecurity Convergence Must Be Administration’s Top Priority

Why the convergence of AI and cybersecurity must be a top priority for the administration https://t.co/TbGhk0BYOE https://t.co/EiVI3kNYsI

By Eric Vanderburg
Joining Code Armor Board to Accelerate Cybersecurity Innovation
SocialMar 3, 2026

Joining Code Armor Board to Accelerate Cybersecurity Innovation

Very pleased to be joining the Board at @code_armor . I’ve worked with them for a long time. What they have built and are building is a vital part of the need for speed in any modern cybersecurity program. https://t.co/v8SGWVKobB

By Phil Venables
GenAI Enables Unified Multicloud Config Standardization
SocialMar 3, 2026

GenAI Enables Unified Multicloud Config Standardization

Standardizing multicloud configs from a single set of requirements is finally viable. Think: genAI translating an AWS IAM role -> Azure Role Definition or a CloudFormation template -> Google Deployment Manager config. #IAM #CISO #Cloud https://t.co/vBzM21vM14

By Isaac Sacolick
Isolate Each Kiro CLI Agent in Secure Sandboxes
SocialMar 3, 2026

Isolate Each Kiro CLI Agent in Secure Sandboxes

Securing Kiro CLI Custom AI Agents 🤖 Configuring multiple agents to work with Kiro CLI in individual sandboxes https://t.co/Bt0CxhDK5j https://t.co/Z4WJtwDoms

By Teri Radichel
Future Network Will Verify Truth, Not Trade Data
SocialMar 3, 2026

Future Network Will Verify Truth, Not Trade Data

The internet never solved trust. Web2 monetised attention. Web3 monetised ownership. AI now monetises imitation. Bots everywhere. Fake identities. Zero certainty who’s real. The next trillion-dollar network won’t trade data. It’ll verify truth. That’s the layer @Humanityprot is building.

By That Martini Guy
OAuth Redirect Abuse Fuels Phishing and Malware
SocialMar 3, 2026

OAuth Redirect Abuse Fuels Phishing and Malware

OAuth redirection abuse enables phishing and malware delivery | Microsoft Security Blog I just wrote about this type of attack and what you should be asking about authentication processes. Modifying scopes is an authorization issue but it’s related. https://t.co/TucGqHuinb

By Teri Radichel
GVisor Isolates MCP Sessions, Preventing File Deletion Attacks
SocialMar 3, 2026

GVisor Isolates MCP Sessions, Preventing File Deletion Attacks

"How do you prevent the agent from accidentally (or maliciously) deleting files, uploading sensitive information to untrusted services, or consuming infinite compute?" @vladkol built an open source project that uses gVisor to isolate your MCP sessions. https://t.co/yMsHQbFWRb https://t.co/j5aEAxdrJi

By Richard Seroter
Cheap AI Gadgets at MWC26 Threaten Your Privacy
SocialMar 3, 2026

Cheap AI Gadgets at MWC26 Threaten Your Privacy

AI companions are everywhere at MWC26. So are red flags. Low price. Unknown brands. Zero transparency on where your data goes. The device isn’t the investment. Your privacy is. https://t.co/5vHc6cpKwi

By Carolina Milanesi
UAE Banks Replace SMS OTPs with Biometrics, AI Security
SocialMar 3, 2026

UAE Banks Replace SMS OTPs with Biometrics, AI Security

UAE banks ditch SMS OTPs: biometrics, in-app approvals, and tighter AI governance become the new security baseline UAE banks must stop using SMS and email OTPs by end-March 2026 More UAE banks now tighten security with biometrics logins, AI fraud checks -...

By Efi Pylarinou
Iranian Drones Strike Amazon Data Centers in Gulf
SocialMar 3, 2026

Iranian Drones Strike Amazon Data Centers in Gulf

Amazon reports that its data centers in Bahrain and the UAE have been hit by Iranian drones. https://t.co/OlIkT0DOwO

By Mikko Hypponen
Building Anonymous Credentials for Future Age Verification
SocialMar 2, 2026

Building Anonymous Credentials for Future Age Verification

New post on anonymous credentials and how to build them. All of this is in service on a longer future post on how these will fit into age verification systems. https://t.co/IqwlP9S6mv

By Matthew Green
Design for Breach: Embrace Cyber Resilience Over Security
SocialMar 2, 2026

Design for Breach: Embrace Cyber Resilience Over Security

We need to move from cybersecurity to cyber resilience. Cybercrime is scaling faster than security budgets. At this point it is safe to assume credentials are compromised and someone has been inside your environment before. If you start from the assumption of...

By Sean D. Mack
Trust Becomes the Bottleneck for Autonomous Enterprise Apps
SocialMar 2, 2026

Trust Becomes the Bottleneck for Autonomous Enterprise Apps

“….every action will still need to be authenticated, authorized, and auditable. As intelligence becomes abundant and software becomes autonomous, trust becomes the constraint.” been amazing to watch @grinich and @WorkOS team make next gen apps and agents enterprise ready… 💥

By Scott Belsky
Data's Shelf Life: Prepare for Future Quantum Threats
SocialMar 2, 2026

Data's Shelf Life: Prepare for Future Quantum Threats

Do you know why this matters? Yes - Interesting right? No - Some ideas for you. 1. How your data has a "Shelf Life" - Even if a "Quantum Hack" is 10 years away, hackers are practicing "Harvest Now, Decrypt Later." 2. Y2Q...

By Joanna Bloor
Build Real Cloud Skills, Not Just Certificates
SocialMar 2, 2026

Build Real Cloud Skills, Not Just Certificates

Want to become a cloud engineer? Stop running behind badges. Start building skills that actually matter. 1️⃣ Understand cloud cost and budgeting. 2️⃣ Learn security and IAM properly. 3️⃣ Get comfortable with automation and Infrastructure as Code. 4️⃣ And most importantly, build real problem-solving ability instead...

By Megha Bhardwaj
AI Security Teams Must Track Assets, Origins, Behavior
SocialMar 2, 2026

AI Security Teams Must Track Assets, Origins, Behavior

.@Cisco: Securing Autonomous Supply Chains https://t.co/kMD9aMu5KT @SupplyChainD "AI security teams are now being asked three questions at once: what AI assets do we have, where did they come from, and how will they behave in production as agents interact with...”...

By Holger Müller
Left Ignoring Data Privacy as AI Surveillance Bills Loom
SocialMar 2, 2026

Left Ignoring Data Privacy as AI Surveillance Bills Loom

Yes but effectively NO ONE on the left is talking about data privacy & the House is abt to go into markup on a package of 19 “child safety” bills that would enact unprecedented levels of mass AI surveillance/fully remove...

By Taylor Lorenz