Cybersecurity Social Media and Updates

AI Security Teams Must Track Assets, Origins, Behavior
SocialMar 2, 2026

AI Security Teams Must Track Assets, Origins, Behavior

.@Cisco: Securing Autonomous Supply Chains https://t.co/kMD9aMu5KT @SupplyChainD "AI security teams are now being asked three questions at once: what AI assets do we have, where did they come from, and how will they behave in production as agents interact with...”...

By Holger Müller
Left Ignoring Data Privacy as AI Surveillance Bills Loom
SocialMar 2, 2026

Left Ignoring Data Privacy as AI Surveillance Bills Loom

Yes but effectively NO ONE on the left is talking about data privacy & the House is abt to go into markup on a package of 19 “child safety” bills that would enact unprecedented levels of mass AI surveillance/fully remove...

By Taylor Lorenz
State-Level Attackers Demand Radically Different Security Assumptions
SocialMar 2, 2026

State-Level Attackers Demand Radically Different Security Assumptions

Fun fact: Computer security has a famous 2014 paper on how dramatically different assumptions and practices must be when dealing with the most motivated attacker in the world, who is after -YOU-. This is, -literally-, known "Mossad vs not-Mossad." Note the phone...

By SwiftOnSecurity
Cloudflare Confidently Ready to Counter Iran Threats
SocialMar 2, 2026

Cloudflare Confidently Ready to Counter Iran Threats

Whatever may come next from Iran, @Cloudflare is well aware of their techniques, not worried, and fully prepared to defend our customers.

By Matthew Prince
Essential AI Coding Security Tips From @Elvissun
SocialMar 2, 2026

Essential AI Coding Security Tips From @Elvissun

This guy has lots of great security tips if you're coding with AI, great follow @elvissun

By Pieter Levels
AI Prompt Breaches Reveal Personal Data Tied to Identities
SocialMar 2, 2026

AI Prompt Breaches Reveal Personal Data Tied to Identities

Data breaches containing AI prompts from users create a whole new set of privacy problems. Prompts are frequently very personal in nature and, from a privacy perspective, not something users expect to see tied back to their IRL identities.

By Troy Hunt
Fraud Scams Evolve Beyond Classic CEO Email
SocialMar 2, 2026

Fraud Scams Evolve Beyond Classic CEO Email

My accounting team is receiving scary good fraud attempts… It is no longer the yahoo email from the CEO saying “Send $10M to this bank asap. We just acquired a company. Many thanks” Stay safe out there

By OnlyCFO
AFL++ Integration Makes Libghostty Fuzzing Fast and Fun
SocialMar 1, 2026

AFL++ Integration Makes Libghostty Fuzzing Fast and Fun

I'll write more about this later, but I've spent the past few days hooking up libghostty with AFL++ and fuzzing various parts of it and agents make the full path of fuzz => verify with test case => minimize =>...

By Mitchell Hashimoto
Cybercrime Outpaces Spend; Prioritize Architecture, Identity, Resilience
SocialMar 1, 2026

Cybercrime Outpaces Spend; Prioritize Architecture, Identity, Resilience

Cybercrime growth is outpacing cybersecurity spend. We are not going to tool our way out of this. Architecture, identity discipline, and operational resilience matter more than another dashboard.

By Sean D. Mack
Responsible AI Starts with Zero‑Trust, Encrypted Data Governance
SocialMar 1, 2026

Responsible AI Starts with Zero‑Trust, Encrypted Data Governance

You can't have responsible AI without responsible data. Classify AI data, extend zero trust, encrypt in use, and spell out non-negotiable governance policies from day one. #AISecurity #DataGovernance https://t.co/aiB5P99ido

By Isaac Sacolick
Teams Outage Marks Historic Intelligence Breakthrough
SocialFeb 28, 2026

Teams Outage Marks Historic Intelligence Breakthrough

The loss of access to Microsoft Teams is gonna go down in history as one of the most consequential intelligence actions of all time

By SwiftOnSecurity
Cutting Iran's Remote Work: Teams Access Blocked
SocialFeb 28, 2026

Cutting Iran's Remote Work: Teams Access Blocked

The most important strategic strike on Iran was denying them access to seamless remote work with Microsoft Teams

By SwiftOnSecurity
HTTPS Login Alone Doesn't Protect Session Tokens
SocialFeb 28, 2026

HTTPS Login Alone Doesn't Protect Session Tokens

The other wild thing was only using HTTPS on the login screen, so you could just steal their session tokens instead over HTTP 😱

By SwiftOnSecurity
50+ Expert Forecasts on AI Governance and Security
SocialFeb 27, 2026

50+ Expert Forecasts on AI Governance and Security

RT Digital transformation is hitting a new phase. These 50+ expert predictions on agentic AI, governance, and security outline what leaders must prioritize now. #DigitalTransformation #AI #CISO @Star_CIO https://t.co/zhlbEwiusI

By Isaac Sacolick
Enterprise MCP Adoption Surpasses Security Controls, Need Defense‑in‑depth
SocialFeb 27, 2026

Enterprise MCP Adoption Surpasses Security Controls, Need Defense‑in‑depth

Shot: Enterprise MCP adoption is outpacing security controls https://t.co/B4FpJ7maqr Chaser: Securing AI Agents When Using Google Managed MCP Servers: A Defense-in-Depth Guide https://t.co/HBAXx8caUE

By Richard Seroter
Cloud Providers Can’t Certify TEE Key Secrecy
SocialFeb 27, 2026

Cloud Providers Can’t Certify TEE Key Secrecy

I heard an interesting anecdote about TEEs from some fintech people. They were trying to convince regulators that TEEs aren’t just “computers under their control”, so they asked cloud providers to certify that they’d never hand over the keys. Providers...

By Matthew Green
Google's Android 17 Automates SIM PIN Unlocks
SocialFeb 27, 2026

Google's Android 17 Automates SIM PIN Unlocks

🔓 Android 17 wants to solve the biggest headache with using SIM PIN locks Google is building a new system for letting the phone automatically handle SIM PIN unlocks. ✅ Details - https://t.co/lGbIxYTndW

By AssembleDebug (Shiv)
Under 1% of Flaws Exploited, yet Weaponization Accelerates Dramatically
SocialFeb 27, 2026

Under 1% of Flaws Exploited, yet Weaponization Accelerates Dramatically

"Less than 1% of software vulnerabilities were exploited in the wild over the past year, but those flaws are being weaponized faster and on a larger scale than ever before" https://t.co/MJeKsYSj9R https://t.co/pvetZNrUmq

By Richard Seroter
Security Must Account for All Human Actors
SocialFeb 27, 2026

Security Must Account for All Human Actors

The farmers and the mercenaries: Rethinking the 'human layer' in security | CSO Online https://t.co/W4BglrjoFn

By Chuck Brooks
XRPL Validators Stop Critical Batch Flaw After AI Alert
SocialFeb 27, 2026

XRPL Validators Stop Critical Batch Flaw After AI Alert

BIG: 🚨 XRPL validators blocked a critical Batch amendment flaw that could have enabled unauthorized transactions after AI-assisted researchers flagged the bug before mainnet activation

By Wendy O
Verification Checks Claim, Recognition Finds Identity
SocialFeb 27, 2026

Verification Checks Claim, Recognition Finds Identity

🔍 Face Recognition vs Face Verification 🔑 Face Verification → Confirms if someone is who they claim to be (Yes ✅ / No ❌). 🧑‍🤝‍🧑 Face Recognition → Identifies who the person is by comparing against many faces 👥. #FaceRecognition #FaceVerification #AI...

By Satya Mallick
One Email per Breach May Miss Second Dump
SocialFeb 27, 2026

One Email per Breach May Miss Second Dump

Updated breaches are a bit messy when it comes to sending domain notifications. We only send ONE email per breach to domain subscribers, so you may get an alert for dump 1 but not for dump 2. It's probably worth...

By Troy Hunt
Grammarly’s DLL Injection Caused Recurring Computer Crashes
SocialFeb 27, 2026

Grammarly’s DLL Injection Caused Recurring Computer Crashes

Fun fact I had a senior Director of a facility complain about computer crashing. I would reimage their machine and it would be fine and then it broke again. They kept installing Grammarly which was doing DLL injection into every process.

By SwiftOnSecurity
French Cybersecurity For Dummies Releases Third Edition
SocialFeb 26, 2026

French Cybersecurity For Dummies Releases Third Edition

The third edition of the French version of Cybersecurity For Dummies is now available... #cybersecurity #french #cybersécurité #josephsteinberg #dummies

By Joseph Steinberg
Prompt Injection Attacks Are Already Surfacing in the Wild
SocialFeb 26, 2026

Prompt Injection Attacks Are Already Surfacing in the Wild

"Prompt injection attacks in the wild" https://t.co/wXEOcvcpdX <- if you have coffee in your hand, set it down now. Snort attack likely :-)

By Dr. Anton Chuvakin
Protect Your Identity: Fraud Prevention in AI Era
SocialFeb 26, 2026

Protect Your Identity: Fraud Prevention in AI Era

Insights On Preventing Fraud and Identity Theft in The AI Era by @ChuckDBrooks https://t.co/Z1DoLfU6rP #CyberSecurity #identitytheft

By Chuck Brooks
Combat AI Attacks with Automated Zero‑Trust Security
SocialFeb 26, 2026

Combat AI Attacks with Automated Zero‑Trust Security

CIOs and CISOs face AI-driven attacks that outpace traditional defenses. The answer: automated AI security, zero-trust frameworks, centralized identity, and regular training. Fighting fire with fire is how we protect organizations. https://t.co/HSIY5JYyPE

By Cristina Dolan
Speed Up Pen‑Test Remediation with PlexTrac’s Automated Workflow
SocialFeb 26, 2026

Speed Up Pen‑Test Remediation with PlexTrac’s Automated Workflow

(Sponsor) If pentest reporting takes weeks, remediation stalls.  ⏱️ PlexTrac replaces spreadsheet tracking with a findings-to-fix workflow and exec-ready reporting. See Demo: https://t.co/NuE4kH3FXK https://t.co/DbP8Xmotdx

By Jason Haddix
Google Disables Wallet on Pixel 4 over Severe Security Flaws
SocialFeb 26, 2026

Google Disables Wallet on Pixel 4 over Severe Security Flaws

Google allegedly found "severe security issues" with Pixel 4 series, blocking Google Wallet use ✅ Details - https://t.co/lnyNOXovE7 https://t.co/gJTaZoudLA

By AssembleDebug (Shiv)
Deepfake Fraud Costs UK £9.4B, US Must Act
SocialFeb 26, 2026

Deepfake Fraud Costs UK £9.4B, US Must Act

The UK’s £9.4B loss to deepfake-enabled fraud is not a headline, it’s a warning. AI-powered scams are scaling faster than legacy identity and compliance systems can adapt. If the US doesn’t harden digital onboarding, verification, and cross-sector fraud defenses now, the bill...

By Spiros Margaris
Persona Confirms No Data Breach, Nothing to Leak
SocialFeb 26, 2026

Persona Confirms No Data Breach, Nothing to Leak

Been reading the @Persona_IDV incident write up as a bunch of people have asked “will the data be going into @haveibeenpwned?” Easy answer: no, because there’s no data: https://t.co/4oxtwYBxj2

By Troy Hunt
Privacy Must Be Built Into AI Data Workflows
SocialFeb 25, 2026

Privacy Must Be Built Into AI Data Workflows

RT High-level policies aren't enough. It's time for audits, training, DSPM, and privacy-by-design in AI workflows. If privacy isn't built into how data moves, you're hoping - not leading. #DataGovernance #AI #CIO @Star_CIO https://t.co/Naq82FuMWZ

By Isaac Sacolick
Basic Security Issues Outpace Complex Threats, Says CXO Advisor
SocialFeb 25, 2026

Basic Security Issues Outpace Complex Threats, Says CXO Advisor

One of the big advantage we have here at CXO Advisor is threat intel. We talk to security leaders across industries every week and the same concerns surface independently. Interestingly, it's not the complex theoretical threats, it's the basics: AI...

By Sean D. Mack
Canadian Tire Breach Leaks 38M Emails, Personal Data
SocialFeb 25, 2026

Canadian Tire Breach Leaks 38M Emails, Personal Data

I've had a few queries on this one (which isn't unusual for a large incident), mostly to the effect of "but I've never bought tyres in Canada". So, firstly, this isn't a tyre retailer, there are a heap of other...

By Troy Hunt
Samsung's Keep Secures Data for Galaxy AI
SocialFeb 25, 2026

Samsung's Keep Secures Data for Galaxy AI

I love this directness: “in order to be useful Galaxy AI needs data” which is why @SamsungMobile created “keep” to make sure the user’s info is kept safe https://t.co/EK7ZvUFZTr

By Carolina Milanesi
Threat Actors Downgrade vSmart Controller to Exploit Root Access
SocialFeb 25, 2026

Threat Actors Downgrade vSmart Controller to Exploit Root Access

"Using the built-in update mechanism the actor downgraded a vSmart controller to a version with...known local privilege escalation vulnerabilities.... Achieving...persistence as the user ‘root’, the actor [then] restored..controller to [previous] version" https://t.co/PcdPHtzgCR

By Kim Zetter
AI-Driven Attacks Exploit Simple FortiGate Misconfigurations Globally
SocialFeb 25, 2026

AI-Driven Attacks Exploit Simple FortiGate Misconfigurations Globally

New threat intel shows a financially motivated threat actor using commercial generative AI tools to compromise more than 600 FortiGate devices across 55+ countries by exploiting exposed management ports and weak credentials, not zero-day vulnerabilities. AI is amplifying basic security...

By Sean D. Mack
Beyond Launch: Platform Compliance Drives $100M Advantage
SocialFeb 25, 2026

Beyond Launch: Platform Compliance Drives $100M Advantage

Most founders optimize for the first milestone: launch fast, check the box, move on. @DrataHQ optimized for what comes after. “When you need more than SOC 2 - which happens when you’re successful - we’re right there with you.” Feature vs. platform thinking....

By Omer Khan
Cyberattacks Eclipse Inflation, Recession as SMBs' Top 2026 Threat
SocialFeb 25, 2026

Cyberattacks Eclipse Inflation, Recession as SMBs' Top 2026 Threat

Cyberattacks Overtake Inflation and Recession Concerns as the #1 Threat to SMBs in 2026, New VikingCloud Research Finds https://t.co/O8FsxVZLOe

By Chuck Brooks
Russian Spy Nomma Zarubina Sent to U.S. Prison
SocialFeb 25, 2026

Russian Spy Nomma Zarubina Sent to U.S. Prison

Nomma Zarubina, who once drunk-texted an FBI agent saying "Catch me baby. So many spies," is heading to U.S. prison for spying for Russian intelligence. https://t.co/UnZ15LNWq6

By Runa Sandvik
AI Threats Are Scaring Security Professionals—Act Now
SocialFeb 25, 2026

AI Threats Are Scaring Security Professionals—Act Now

This interview freaked me out. The security "AI"pocalypse is here. The founders of https://t.co/yNcyjm5j7B, Arbaaz Mahmood and Matt Busigin, talk me through why security professionals are freaked out by AI and trying to prepare the world's businesses as fast as they...

By Robert Scoble
Cyber Resilience Means Business Continuity Amid Failures
SocialFeb 25, 2026

Cyber Resilience Means Business Continuity Amid Failures

Cyber resilience goes beyond stopping attacks. It’s keeping the organization running when systems fail, and data is uncertain. Prevention helps, but resilience ensures the business keeps moving. https://t.co/iRvh9PxW7z

By Cristina Dolan
Wynn Resorts Hit by Cyberattack, $1.5M Ransom Demanded
SocialFeb 25, 2026

Wynn Resorts Hit by Cyberattack, $1.5M Ransom Demanded

Wynn Resorts reportedly cyberattacked and asked to pay $1.5M ransom | Casinos & Gaming | Business https://t.co/x191MhE93X

By Chuck Brooks
AI Agents Now in 80% of Fortune 500; Governance Crucial
SocialFeb 25, 2026

AI Agents Now in 80% of Fortune 500; Governance Crucial

80% of Fortune 500 use active AI Agents: Observability, governance, and security shape the new frontier @Microsoft has released its latest Cyber Pulse report, offering practical insights into emerging cybersecurity risks as AI agents become embedded in everyday business operations. https://t.co/nYODu6iNVB...

By Glen Gilmore
Beware: Fake Apple Newsroom Headlines Manipulating Markets
SocialFeb 25, 2026

Beware: Fake Apple Newsroom Headlines Manipulating Markets

You’re going to see a lot of fake Apple Newsroom headlines here that look like this (below), and it may even influence folks/markets until they realize they are all fake tomorrow. Don’t fall for these. It’s a simple manipulation of...

By Rachel Tobac
Ex‑Trenchant Exec Gets 7‑year Sentence
SocialFeb 24, 2026

Ex‑Trenchant Exec Gets 7‑year Sentence

Peter Williams, the former Trenchant exec who stole zero-day exploits from his employer and sold them to a Russian exploit buyer, was sentenced today to 7 years and 3 months in a hearing that was partially closed to the public...

By Kim Zetter
AI Integration Threatens SaaS Moats, Wipes Out Security Stocks
SocialFeb 24, 2026

AI Integration Threatens SaaS Moats, Wipes Out Security Stocks

A security feature launch tweet by Claude wiped out $15B in cybersecurity stocks. AI is eating SaaS. Here’s what this means for the future of SaaS: Cybersecurity names like CrowdStrike, Palo Alto Networks, and Zscaler fell after Anthropic showed Claude...

By Ryan Allis
AI Drafts SOC2 Auth Service, Leaves 35 Issues
SocialFeb 24, 2026

AI Drafts SOC2 Auth Service, Leaves 35 Issues

Asked Opus 4.6 to design an SOC2‑compliant auth service from zero. It came back with 35 issues. Pilot’s job now is to deliver them. Estimated cost: ~$4. Estimated time: ~1 hour + ~10 minutes of cleanup. --- Devs only have jobs until I get better...

By Aleksei Petrov
Boards Demand Business Impact Over Technical Threat Metrics
SocialFeb 24, 2026

Boards Demand Business Impact Over Technical Threat Metrics

📈 The Board is over "Red, Yellow, Green" charts. They want financial risk quantification. Moving from technical metrics to business risk is the #1 theme for CIOs at RSA this year. Stop reporting on "threats" and start reporting on "impact."...

By Tim Crawford