Joe Pettit
21.8K posts

Joe Pettit
@joepettit2
Cybersecurity content marketing. MD @welcometobora
Europe Katılım Eylül 2010
1.2K Takip Edilen1.9K Takipçiler

@NealGardner_ He's dealing with an achilles issue. Missed a month, still building fitness, can't over exert himself either bc it's such a sensitive injury.
English
Joe Pettit retweetledi

Errol Weiss, CSO at Health-ISAC, on why hospitals need to plan ransomware recovery the same way they plan for mass casualty events.
And why most still don't.
🔗 Read more: informationsecuritybuzz.com/recovery-is-th…
#Cybersecurity #HealthcareSecurity #InformationSecurityBuzz
English
Joe Pettit retweetledi

"It's not background noise to the organisations that get hit."
James Blake from @Cohesity on why the Iranian situation is older than you think.
Full interview on Youtube: youtu.be/syqwDVOEN0c?si…
Article: informationsecuritybuzz.com/the-new-rules-…
#InformationSecurityBuzz #CyberWarfare

YouTube
English
Joe Pettit retweetledi

Katrina Thompson has ranked the 7 AI SOC platforms to watch in 2026. Agentic-first vs augmentation-first matters more than most vendors admit, and the differences are bigger than the marketing suggests.
Full breakdown: informationsecuritybuzz.com/the-7-top-ai-s…
#AISOC #ISB
English
Joe Pettit retweetledi

Fortra's Rohit Dhamankar has spent years helping organizations navigate the gap between security theory and what actually works in practice.
Join him live to understand what secure GenAI requires: hubs.la/Q04cvgQ20
English
Joe Pettit retweetledi

Attackers are using Datto RMM as a C2 channel, and your security tools won't flag it.
Our FIRE team broke it down. @ChannelInsider covered it.
📰 hubs.la/Q04cvp6h0
🔬 Full report: hubs.la/Q04cvlXS0
English

It's Patch Tuesday. Two CVEs to flag this month. ⛳️
CVE-2026-32201 (SharePoint spoofing) has already been detected in the wild. And CVE-2026-33825 is the BlueHammer vulnerability — rated Exploitation More Likely.
Full breakdown: fortra.com/blog/analysis-…
#PatchTuesday
English
Joe Pettit retweetledi

BlueHammer doesn't rely on obvious malware behaviour.
It chains legitimate Windows components together to expose sensitive system information.
Fortra's FIRE team breaks down exactly how it works and what defenders should watch for: hubs.la/Q04b-8Dq0
English
Joe Pettit retweetledi

Never been happier to have a mouse in the house. 🐭
@_RastaMouse of @_ZeroPointSec has officially joined @Fortra! The mind behind Red Team Ops, one of the most respected training courses in offensive security, is now building what's next with us.
fortra.com/resources/pres…
English

File servers still exist for legacy storage and governance, but most modern workflows now happen in collaboration tools, code platforms, chats, and AI systems.
securityaffairs.com/189368/securit… via @securityaffairs
English
Joe Pettit retweetledi

Manual network management doesn’t scale; Irfahn Khimji from BackBox highlights that as networks grow across vendors and devices, automation is crucial to reduce risk, improve reliability, and free NetOps teams from repetitive tasks.
🔗Read more: informationsecuritybuzz.com/cutting-into-o…
#ISB
English
Joe Pettit retweetledi

New research from Unit 42 at Palo Alto Networks shows that “AI judges” used to moderate and evaluate AI outputs can be manipulated into approving harmful content.
🔗 Read more: informationsecuritybuzz.com/researchers-sh…
✍ Kirsten Doyle
#AIsecurity #LLM #ISBNews
English
Joe Pettit retweetledi

Meta’s Ray-Ban smart glasses privacy controversy escalates as new research from @SuzuLabs uncovers dozens of exposed credentials linked to data-annotation contractor Sama on the dark web.
🔗 Learn more: informationsecuritybuzz.com/metas-smart-gl…
#ISBNews
English
Joe Pettit retweetledi

Hardcoded credentials and leaked secrets are often found during penetration tests, but many secret scanners have a major blind spot.
Michael Weber, Noah Tutt, and Zach Grace from Praetorian explain why scanning only source code is not enough.
🔗: informationsecuritybuzz.com/your-secret-sc…
#ISB
English
Joe Pettit retweetledi

DSPM tools identify where sensitive data resides, but visibility doesn't lower risk. Franklin from Cyberhaven discusses why DSPM efforts stall after discovery and how organizations can act on findings using ticketing, playbooks, and controls.
🔗: informationsecuritybuzz.com/your-dspm-foun…
#ISB
English

I get asked - "what diet are you on?" often.
I'm on no diet. I just don't eat like an asshole anymore. If I want to lose weight I just eat less, if I want to gain more I eat more. Always with a protein intake at heart.
I eat whatever I want - pizza, fried foods, whatever. I just chose to eat more nutrient rich foods like chicken, steak, fish, rice, veggies, lean pork etc because I want the protein, but I still eat whatever I want to, just in moderation.
May only have 3 pieces of pizza vs a whole box.
As the saying goes, abs are made in the kitchen, not at the gym.
All self control.
#WeHackHealth
English

@GeorgeSmileyOBE Why dont you support spurs instead? At least you'll actually have something to moan about.
English

Keep Joe Shields as far from recruitment and Chelsea as possible.
Pys@CFCPys
🚨 Morgan Rogers is the name I keep hearing. (@JacobsBen)
English

@siphillipssport Its like hes not started a game for 5 months or something.
English



