Ace 57

1.4K posts

Ace 57

Ace 57

@Ace57_13

Katılım Temmuz 2025
326 Takip Edilen16 Takipçiler
Ace 57 retweetledi
NCSC UK
NCSC UK@NCSC·
The definition of cyber security is expanding as the forces of technology and geopolitics evolve.🌍 In his #CYBERUK26 keynote, CEO Dr Richard Horne explores what the world might look like in a decade's time and how to defend it. Catch up now: youtube.com/watch?v=kPsjBD…
YouTube video
YouTube
English
1
6
17
2K
Ace 57 retweetledi
National Cybersecurity Alliance
April is over, but our AI Fools content is yours to keep! Download our toolkit, share our posts, and put our security tips in action to protect yourself and your accounts all year long. Thanks for tuning in! hubs.la/Q04dWB4M0
National Cybersecurity Alliance tweet media
English
0
3
3
347
Ace 57 retweetledi
CSOonline
CSOonline@CSOonline·
Dismantle implicit trust in OT networks, CISA tells critical infrastructure operators spr.ly/6010BBuY6I
English
0
2
2
235
Ace 57 retweetledi
US Tech Force
US Tech Force@USTechForce·
Tech Force is hiring Information Cybersecurity Specialists! Work to secure critical federal systems, advance cybersecurity efforts, and tackle impactful, mission-focused tech challenges. Apply by May 8. techforce.gov
English
1
4
28
1.8K
Ace 57 retweetledi
Microsoft Learn
Microsoft Learn@MicrosoftLearn·
If you’re putting an AI agent into production, log every action from day one. Not just errors, everything. Traceability is what makes it reliable over time.
English
53
120
1.3K
73.7K
Ace 57 retweetledi
Lambda
Lambda@LambdaAPI·
By AI engineers. For AI teams.
English
0
5
67
847.4K
Ace 57 retweetledi
FBI Cyber Division
FBI Cyber Division@FBICyberDiv·
Threat actors seeking unauthorized access to operational technology (OT) systems have exploited trusted connections through IT systems, third-party partnerships, and the internet. Zero Trust offers a modern, adaptive approach to #cybersecurity by eliminating implicit trust and continuously validating access based on identity, context, and risk. This guidance document, authored by @FBI, @CISAgov, and other partners, provides recommendations for OT owners and operators to implement Zero Trust principles while considering the unique constraints and challenges of OT environments. 🔗 ic3.gov/CSA/2026/26042…
FBI Cyber Division tweet media
English
51
119
358
21.3K
Ace 57 retweetledi
Cybersecurity News Everyday
Cybersecurity News Everyday@TweetThreatNews·
New internet assets are scanned within an hour, with attackers actively probing vulnerabilities and launching credential attacks within 6–12 hours. Continuous ASM paired with human validation uncovers hidden risks fast. #AttackSurface #APIExposure ift.tt/sGDXEfl
English
0
1
1
52
Ace 57 retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️Copy Fail (CVE-2026-31431) is a Linux privilege escalation bug that lets any local user get root using a 732-byte Python script, and itworks on basically every major Linux distro shipped since 2017. Website: copy.fail Write-up: xint.io/blog/copy-fail… GitHub: github.com/theori-io/copy… It's a logic flaw in the kernel's crypto code (authencesn via AF_ALG and splice()) that allows a small write into the page cache, which can be used to tamper with a setuid binary like /usr/bin/su. Think how bad this is going to be for shared environments like Kubernetes, CI runners, and cloud sandboxes, where it enables container escape and tenant-to-host compromise. Found by Theori's Xint Code scanner, patched in the mainline kernel, and publicly disclosed on April 29, 2026; if you can't patch right away, the recommended workaround is to disable the algif_aead module.
English
50
753
3K
351.7K
Ace 57 retweetledi
CISA Cyber
CISA Cyber@CISACyber·
Implementing zero trust in OT environments requires a holistic approach, tailored adaptation, & collaboration between IT, OT, & cyber teams. Our joint guide provides actionable steps to help enhance the security & resilience of your OT. Learn more 👉 go.dhs.gov/iaE
CISA Cyber tweet media
English
4
19
43
4.2K
Ace 57 retweetledi
Sam Altman
Sam Altman@sama·
we're starting rollout of GPT-5.5-Cyber, a frontier cybersecurity model, to critical cyber defenders in the next few days. we will work with the entire ecosystem and the government to figure out trusted access for cyber; we want to rapidly help secure companies/infrastructure.
English
945
698
11.2K
782.8K
Ace 57 retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🛡️ OpenAI Releases 5-Point Action Plan to Strengthen AI-Powered Cyber Defense Source: cybersecuritynews.com/openai-5-point… OpenAI has published a comprehensive cybersecurity action plan outlining a five-pillar strategy to equip trusted defenders with advanced AI capabilities while preventing adversarial misuse. Artificial intelligence is fundamentally reshaping the cybersecurity landscape and not just for defenders. Malicious actors are already leveraging AI to improve phishing campaigns, automate reconnaissance, accelerate malware development, evade detection, and scale cyber operations at unprecedented speed. #cybersecuritynews #OpenAI
Cyber Security News tweet media
English
4
23
69
2.6K
Ace 57 retweetledi
Mandiant (part of Google Cloud)
🔄 Threat actors regularly re-emerge under different identities. New agentic capabilities in Google Threat Intelligence and the dark web monitoring module streamline investigations, linking multi-alias actors and mapping operations. 🔗 Learn more: goo.gle/48ufZj8
Mandiant (part of Google Cloud) tweet media
English
2
9
48
2.5K
Ace 57 retweetledi
OpenAI Newsroom
OpenAI Newsroom@OpenAINewsroom·
We've released a new 5-point action plan for strengthening cyber defense. AI is reshaping cybersecurity. The same capabilities that help defenders may be used by malicious actors. One approach is to treat these systems as too dangerous for broad defensive use and limit them to a very small number of approved partners. We think that misses the central challenge. Attackers won’t wait. Existing models are already useful for many cyber workflows and capabilities will keep advancing. Criminal groups will adopt whatever tools are available. The best way to reduce national risk is to responsibly equip and accelerate trusted defenders faster than adversaries can adapt. Check out our plan ⬇️ openai.com/index/cybersec…
English
101
163
1.3K
146.7K
Ace 57 retweetledi
Microsoft Threat Intelligence
In the first quarter of 2026, Microsoft Threat Intelligence detected approximately 8.3 billion email-based phishing threats, with QR code phishing more than doubling within the period and CAPTCHA gated campaigns evolving rapidly across delivery methods. msft.it/6012vy9q8
English
1
9
23
3.2K
Ace 57 retweetledi
BRICS News
BRICS News@BRICSinfo·
🇷🇺 Russia says it is developing a anti-aging vaccine.
BRICS News tweet mediaBRICS News tweet media
English
464
837
6.9K
639.5K