Shawn Waldman

458 posts

Shawn Waldman banner
Shawn Waldman

Shawn Waldman

@cyberwaldman

CEO of Secure Cyber Defense LLC, weather and aviation geek. Founder | Keynote Speaker | Thought Leader. My tweets are my own.

Miamisburg, Ohio Katılım Nisan 2016
148 Takip Edilen152 Takipçiler
Shawn Waldman retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️ The FBI has provided a new Public Service Announcement regarding the ShinyHunters cybercriminal group and their recent attack affecting an online Learning Management System (LMS). ic3.gov/PSA/2026/PSA26… The FBI is providing recommendations on what to do if you are contacted directly by anyone claiming to have your data.
Dark Web Informer tweet mediaDark Web Informer tweet media
English
4
45
218
29.7K
Shawn Waldman retweetledi
Rapid7
Rapid7@rapid7·
🚨 Rapid7 Labs has discovered an authentication bypass vuln. affecting #Cisco Catalyst SD-WAN Controller (FKA vSmart). CVE-2026-20182 has a Critical CVSSv3.1 score of 10.0 and allows a remote unauth. attacker to perform privileged operations. Read on: r-7.co/4uLxSlR
English
2
42
111
12.9K
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor’s EDR Solutions | Source: cybersecuritynews.com/qilin-ransomwa… The Qilin ransomware group is deploying a sophisticated, multi-stage infection chain via a malicious msimg32.dll that can disable over 300 endpoint detection and response (EDR) drivers from virtually every major security vendor. As organizations increasingly rely on EDR solutions, which offer far greater behavioral visibility than legacy antivirus, threat actors have adapted by weaponizing EDR killers as a core component of their attack chain. By disabling telemetry collection across process creation, memory activity, and network behavior, attackers can operate undetected long enough to deploy their ransomware payload. #cybersecuritynews #ransomware
Cyber Security News tweet media
English
12
97
345
23.8K
Shawn Waldman retweetledi
The Hacker News
The Hacker News@TheHackersNews·
Microsoft says attackers are poisoning search results to spread fake VPN clients that steal credentials. The campaign redirects software searches to trojanized installers on GitHub that show fake VPN prompts while Hyrax steals credentials. 🔗 Read → thehackernews.com/2026/03/storm-…
English
3
71
167
17.9K
Shawn Waldman retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Hikvision Multiple Products Vulnerability Allows Malicious Users to Escalate Privileges Source: cybersecuritynews.com/hikvision-mult… A severe vulnerability affecting multiple Hikvision products was added to the Known Exploited Vulnerabilities (KEV) catalog on March 5, 2026. Tracked globally under CVE-2017-7921, this security flaw poses a significant risk to organizations that rely on these popular surveillance systems. The flaw enables malicious users to bypass standard security checks, escalate their privileges, and gain unauthorized access to highly sensitive information without needing valid credentials. #cybersecuritynews
Cyber Security News tweet media
English
3
71
230
27.6K
Shawn Waldman retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️🇮🇱 🇮🇷 Israel compromised a widely used Iranian prayer application over the weekend, leveraging it to push notifications to what could be millions of devices. The messages targeted military personnel, calling on them to abandon the regime and take part in efforts to liberate the country, according to sources with knowledge of the operation. WSJ: wsj.com/livecoverage/i…
English
5
11
46
13.1K
Shawn Waldman retweetledi
Saul Sadka
Saul Sadka@Saul_Sadka·
If the IRGC had any plans to attack Tel Aviv’s Ben Gurion Airport—and the tens of billions of dollars’ worth of aircraft sitting on the tarmac—they missed their chance. Every plane just took off at one-minute intervals.
Saul Sadka tweet media
English
18
240
1.8K
171.9K
Shawn Waldman
Shawn Waldman@cyberwaldman·
I have no idea if this account is real, but the information that in this tweet is extremely accurate! Wow…. I mean … All. The. Time. And that bit about insurance companies auditing you is very real. There are a ton of companies that might loose their coverage. But….is cyber insurance worth it? Do you have to have it? There are so many discussion angles here. I’m really interested in everyone’s thoughts on this. #infosec #CyberSecurity #cyberinsurance
IT Unprofessional@it_unprofession

Just found out we're being audited by our cyber insurance provider. They want to verify we actually have all the security controls we claimed we have. Problem: we don't have all the security controls we claimed we have. When we applied for the insurance, the application asked if we had multi-factor authentication on all admin accounts. I checked "yes" because we were planning to implement it. We never implemented it. Now the auditor wants to see our MFA logs.I have 48 hours to either: 1. Admit we lied and probably lose our coverage 2. Implement MFA across the entire company in two days 3. Get creative I'm going with option 3.I just enabled MFA on every admin account. Forced enrollment. Everyone had to set it up in the last hour. Then I backdated our MFA implementation logs to show it was enabled six months ago. Is this fraud? Technically maybe. But the security is actually in place now. We're just adjusting the timeline of when we claim we did it. The auditor comes on Monday. By then we'll have 48 hours of MFA logs that I'll present as "recent activity" from our "six-month implementation." Did we lie on the application? Yes. Are we fixing it before anyone finds out? Also yes. Corporate compliance is just staying one step ahead of getting caught.

English
0
1
1
34
Shawn Waldman retweetledi
BleepingComputer
BleepingComputer@BleepinComputer·
🚧 Microsoft says reports of Windows 11 boot failures are linked to failed installs of the December Patch Tuesday updates. 🪟 When those updates failed and rolled back, they left Windows in an “improper state”. When these same devices attempted to install the January 2026 updates for Windows 11, it caused them to no longer boot, displaying "UNMOUNTABLE_BOOT_VOLUME" BSOD crash. Microsoft says they are working on a partial resolution to prevent devices from entering this no-boot state. However, this solution won't help those devices that are already impacted.
English
3
15
58
9.4K
Shawn Waldman
Shawn Waldman@cyberwaldman·
Change those passwords. Enable multi factor and move to passkeys!
@JosetteCaruso Josette Caruso@JosetteCaruso_

Breaking news- The cybersecurity firm Malwarebytes confirmed a data leak exposing the personal information of approximately 17.5 million Instagram users. The breach has been linked to a potential Instagram API exposure that occurred in late 2024. The details regarding this incident include: Exposed Information: The leaked dataset includes usernames, full names, verified email addresses, phone numbers, user IDs, and partial physical addresses. Method of Leak: A threat actor using the alias "Solonik" posted the data for free on BreachForums on January 7, 2026. The hacker claimed the data was scraped through an API vulnerability that allowed automated harvesting of profiles. Active Exploitation: Millions of users worldwide have reported receiving unsolicited password reset emails. Experts warn that hackers are using the leaked contact info to trigger these requests en masse to identify active accounts for phishing or hijacking. Meta's Response: As of January 10, 2026, Meta (Instagram's parent company) has not officially confirmed the breach or issued a public statement addressing the specific 17.5 million record leak. Recommended Security Steps To protect your account, cybersecurity experts suggest the following actions: Enable Two-Factor Authentication (2FA): Use an authenticator app rather than SMS to prevent SIM swapping. Ignore Unsolicited Emails: Do not click links in unexpected password reset emails. If you need to change your password, do so manually through the official Instagram Settings. Review Logged-in Devices: Check for unrecognized active sessions in the Meta Accounts Center.

English
0
0
1
58
Shawn Waldman retweetledi
@JosetteCaruso Josette Caruso
@JosetteCaruso Josette Caruso@JosetteCaruso_·
Breaking news- The cybersecurity firm Malwarebytes confirmed a data leak exposing the personal information of approximately 17.5 million Instagram users. The breach has been linked to a potential Instagram API exposure that occurred in late 2024. The details regarding this incident include: Exposed Information: The leaked dataset includes usernames, full names, verified email addresses, phone numbers, user IDs, and partial physical addresses. Method of Leak: A threat actor using the alias "Solonik" posted the data for free on BreachForums on January 7, 2026. The hacker claimed the data was scraped through an API vulnerability that allowed automated harvesting of profiles. Active Exploitation: Millions of users worldwide have reported receiving unsolicited password reset emails. Experts warn that hackers are using the leaked contact info to trigger these requests en masse to identify active accounts for phishing or hijacking. Meta's Response: As of January 10, 2026, Meta (Instagram's parent company) has not officially confirmed the breach or issued a public statement addressing the specific 17.5 million record leak. Recommended Security Steps To protect your account, cybersecurity experts suggest the following actions: Enable Two-Factor Authentication (2FA): Use an authenticator app rather than SMS to prevent SIM swapping. Ignore Unsolicited Emails: Do not click links in unexpected password reset emails. If you need to change your password, do so manually through the official Instagram Settings. Review Logged-in Devices: Check for unrecognized active sessions in the Meta Accounts Center.
@JosetteCaruso Josette Caruso tweet media
English
4
50
120
48.2K