Cyber Threat Alliance's Avatar

Cyber Threat Alliance

@cyberalliance.bsky.social

CTA is a group of cybersecurity practitioners who work together to improve the overall security of the global digital ecosystem. We are stronger together. www.cyberthreatalliance.org

1,543 Followers  |  722 Following  |  360 Posts  |  Joined: 08.02.2024
Posts Following

Posts by Cyber Threat Alliance (@cyberalliance.bsky.social)

Cyber Fallout After the Strikes: Signal, Noise, and What Comes Next | FortiGuard Labs Following U.S.-Israeli strikes on Iran, FortiGuard Labs has not yet observed large-scale cyber retaliation. However, we observed that regional cyber activity is rising. Organizations should take acโ€ฆ

CTA member Fortinet Fortiguard Labs provides information around the Iran conflict...

www.fortinet.com/blog/threat-...

#cybersecurity #cyberthreats #cyberrisk @cyberalliance.bsky.social

05.03.2026 11:46 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Hacktivist campaigns increase as United States, Iran, and Israel conflict intensifies Rising tensions have sparked an increase in regional hacktivist activity, but impact has been minimal

CTA Member @sophossecurity.bsky.social discussing hacktivist campaigns increasing as the Iran conflict intensifies
www.sophos.com/en-us/blog/h...
#cybersecurity #cyberthreats #cyberrisk @cyberalliance.bsky.social

04.03.2026 12:50 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Iranian APT Activity During Geopolitical Escalation: Recommendations for Nozomi Customers and Critical Infrastructure Owners Amid war in the Middle East, Iranian cyber actors are escalating espionage and disruptive attacks, raising risks for global critical infrastructure. Here, Nozomi Networks provides a status update and ...

CTA member @nozominetworks.bsky.social on Iranian APT activity during Middle East conflict
www.nozominetworks.com/blog/iranian...
#cybersecurity #cyberthreats #cyberrisk @cyberalliance.bsky.social

04.03.2026 12:44 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Talos on the developing situation in the Middle East Cisco Talos continues to monitor the ongoing conflict in the Middle East. As always, we will be watching closely for any cyber-related incidents that are tied to the conflict.

CTA member @talosintelligence.com on the situation in the Middle East
blog.talosintelligence.com/talos-develo...
#cybersecurity #cyberthreat #cyberrisk @cyberalliance.bsky.social

04.03.2026 12:42 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders.

CTA member @paloaltonetworks.com published a threat brief on the cyber risks related to Iran
unit42.paloaltonetworks.com/iranian-cybe...
#cybersecurity #cyberthreats #cyberrisk @cyberalliance.bsky.social

04.03.2026 12:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

An executiveโ€™s online footprint can be more than a privacy issue, itโ€™s also a business risk. ๐Ÿ‘ฃ

Rapid7 Labs analyzed 100s of engagements from 2024-2025 to understand how exposed todayโ€™s executives really are, & what that means for the enterprise. Read on: https://r-7.co/46mH0E3

24.02.2026 14:03 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Force Multiplier in Cybersecurity: Sharing Intelligence in a Complex Threat Landscape - Cyber Threat Alliance By Jeannette Jarvis, Chief Business Officer For centuries, military leaders have sought ways to amplify their strategic capabilities, whether through stronger defenses, faster communication, or smarte...

For centuries militaries relied on โ€œforce multipliersโ€ to amplify strategy. Today the battlefield is digital, the actors are blurred, and defenders need every edge. Shared, operationalized cyber threat intelligence is one of the strongest force multipliers we have
tinyurl.com/bdewj3cf
#cybersecurity

13.02.2026 13:30 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
The Case for a National Cyber Metrics Dashboard - Aspen Digital Governments must work to develop national cyber metrics for cybersecurity to better inform decision-makers and allocate resources effectively.

Cyber-enabled espionage & critical infrastructure intrusions threaten national security, & most #cybersecurity experts predict things will only get worse. We donโ€™t actually know how bad the problem is nationally because we lack national cyber metrics @cyallianceprez.bsky.social
tinyurl.com/3e9ypwu2

12.02.2026 22:45 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Valentineโ€™s Day 2026 Cyber Scams Cyber criminals are targeting U.S. consumers ahead of Valentineโ€™s Day 2026 with fake shopping sites, fraudulent dating platforms, and phishing domains. Learn how to spot Valentineโ€‘themed scams, protec...

Love is in the Air - and So Are Scammers. Read our @cyberalliance.bsky.social member Check Point on what threats to watch out for as Valentine's Day approaches:

blog.checkpoint.com/research/lov...
#cybersecurity #scam #cyberthreats

12.02.2026 22:38 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
The Chrysalis Backdoor: A Deep Dive into Lotus Blossomโ€™s toolkit Rapid7 Labs, together with the Rapid7 MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom.

Our @cyberalliance.bsky.social member @rapid7.com research:
www.rapid7.com/blog/post/tr...
#cybersecurity #threatintelligence #APT

12.02.2026 22:34 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Eeny, meeny, miny, moe? How ransomware operators choose victims Most ransomware attacks are opportunistic, not targeted at a specific sector or region

Our @cyberalliance.bsky.social's member @sophossecurity.bsky.social notes that most ransomware attacks are opportunistic, not targeted at a specific sector or region

www.sophos.com/en-us/blog/e...
#cybersecurity #ransomware #cyberdefense #threatintelligence

12.02.2026 22:31 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Donโ€™t Lose Sleep Over These 4 Concerns It takes legendary defenses to keep security nightmares at bay

Our @cyberalliance.bsky.social member Symantec says Don't Lose Sleep Over These 4 Concerns:
www.security.com/product-insi...
#cybersecurity #AI #cyberdefense

12.02.2026 22:29 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
2026 scam trends: whatโ€™s changed, whatโ€™s the same & how to stay safe Published by Shameela Gonzalez, Financial Services Industry Lead, on 27 January 2026 ย  Scamsย have becomeย theย reality weย canโ€™tย ignoreย withย every Australianย likely receivingย one in some...

2026 Scam Trends from @cyberalliance.bsky.social member CyberCX

cybercx.com.au/blog/2026-sc...

12.02.2026 22:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Romance scams work because they feel real. They exploit trust, vulnerability, and the very human desire for connection, especially in digital spaces where so much of our social and romantic lives now take place. From our @cyberalliance.bsky.social member @mcafee.com

www.mcafee.com/blogs/intern...

12.02.2026 22:11 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Winning DoW Contracts in 2026: CMMC Preparation for U.S. and International Suppliers Winning DoW Contracts in 2026: CMMC Preparation for U.S. and International Suppliers As the U.S. Department of War (DoW) tightens cybersecurity requirements across its global supply chain, Cybersecโ€ฆ

CMMC is now mandatory for all companies pursuing 2026 DoW contracts. As the DoW strengthens cybersecurity across its supply chain, U.S. and international suppliers must comply to stay eligible. Start your CMMC journey here: tinyurl.com/jx2tzzct #cybersecurity #cyberpolicy #NonProfitCyber

11.02.2026 13:04 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Join @cyberalliance.bsky.social at RSACโ„ข 2026 Conference March 23-26th! We are proud to be an Association Sponsor again this year. As a valued CTA member, you can receive exclusive savings. Register now with code 16UCTAAD for your discount.
Register: www.rsaconference.com/usa/passes-a...
#RSAC2026

11.02.2026 12:41 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
New Trump Cyber Strategy Prompts Companies to Mull Legal Limits The Trump administrationโ€™s push for aggressive cybersecurity tactics that would tap the private sector to help disrupt suspected malicious cyber actors is sparking questions about how far companies ca...

โ€œItโ€™s relatively easy to say that we should go more on the offense, and then itโ€™s a lot harder to actually turn that into execution,โ€ said @cyallianceprez.bsky.social โ€œIโ€™ll be particularly interested to see how this administration frames that pillar.โ€
tinyurl.com/3s3h28vp
#cybersecurity #cyberpolicy

10.02.2026 20:11 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Force Multiplier in Cybersecurity: Sharing Intelligence in a Complex Threat Landscape - Cyber Threat Alliance By Jeannette Jarvis, Chief Business Officer For centuries, military leaders have sought ways to amplify their strategic capabilities, whether through stronger defenses, faster communication, or smarte...

Cyber threat intelligence is more than just data โ€“ it is a strategic asset. And when shared through trusted networks like CTA, it becomes a true force multiplier.
www.cyberthreatalliance.org/force-multip...
@cyberalliance.bsky.social
#cybersecurity #threatintelligence #forcemultiplier #CTI

10.02.2026 13:30 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
How collective investment can level cyber resilience for all Cyber resilience depends on nonprofits, yet they remain underfunded. Closing the cyber equity gap is essential to protect people, systems and democracy.

Closing the cyber equity gap: How collective investment can secure the internet for everyone
"Cybercrime is global, fast-moving and highly profitable. Countering it requires each part of the ecosystem to play its role, including nonprofits."
www.weforum.org/stories/2026...
#WEF #cybersecurity

10.02.2026 12:45 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

State of the Net Conference is live!
@cyallianceprez.bsky.social joins the discussion on โ€œHitting Refresh on Cybersecurity to Address Emerging Technologies.โ€
A timely and essential conversation.
Watch on YouTube: tinyurl.com/4vnjd943
www.stateofthenet.org
#cybersecurity #criticalinfrastructure #AI

09.02.2026 16:10 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
The Security Paradox of Open Source Tools Why are there even more open source flaws now than before, despite the industry knowing the dangers?

Making OS Security Somebodyโ€™s Business: Is It Us?
Open source vulnerabilities persist because no one owns the problem. Itโ€™s time to make OS security somebodyโ€™s business.
@cyallianceprez.bsky.social discusses the concern.
tinyurl.com/3a6h7dwt
#opensource #cybersecurity #infosec

06.02.2026 14:12 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
CTA Webinar - What AI Is Actually Changing in Open Source Security    Lessons from the OpenSSL CVEs
YouTube video by Cyber Threat Alliance CTA Webinar - What AI Is Actually Changing in Open Source Security Lessons from the OpenSSL CVEs

Now available on demand!
What AI Is Actually Changing in Open-Source Security -- Lessons from the OpenSSL CVEs
youtu.be/bHQdLgWxb-k
Here is a real-world example of how AI tools can make a real, tangible difference in cyber defense.
#OpenSource #AI #cybersecurity

03.02.2026 15:28 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Today! 9 am ET: What AI Is Actually Changing in Open-Source Security - Lessons from the OpenSSL CVEs
Registration: tinyurl.com/4tn5653y
We dive into a case study of recent OpenSSL CVEs to see where AI is accelerating patch velocity & where it still falls short. No fluff - just a clear view
#AI

02.02.2026 10:23 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Incentivizing Cybercrime Disruption: Inside Fortinetโ€™s World Economic Forum Annual Meeting 2026 Panel | Fortinet Blog At the World Economic Forum Annual Meeting 2026, the session Derek Manky contributed to explored how incentives and public-private partnerships can disrupt the cybercrime economy.โ€ฆ

The WEF Annual Meeting - Fortinet hosted panel on Incentivizing the Disruption of Cybercrime

โ€œCybercrime isnโ€™t a collection of lone actors anymore; itโ€™s a functioning economic ecosystem. And like any system, it responds to incentives.โ€ @cyallianceprez.bsky.social

tinyurl.com/2cyybfcs

#cybercrime

30.01.2026 20:04 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Monday Feb 2nd 9 am ET
What AI Is Actually Changing in Open-Source Security -- Lessons from the OpenSSL CVEs
Register: tinyurl.com/msu6eanw
AI is reshaping how we discover and triage vulns. We break down the impact of AI on #OpenSSL securityโ€”from code analysis to exploit prediction. #cybersecurity

30.01.2026 15:48 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Q&A: Why Cybersecurity Is Now a Core Business Risk, Not Just a Technical Problem Cybersecurity threats are escalating in scale and sophistication, and organisations around the world are scrambling to keep pace with the evolving digital risk

โ€œEven small improvements in #cybersecurity can dramatically reduce your risk, so it is really important to focus on those basic steps and not worry about the really sophisticated high-end threats, because that is not what most companies face.โ€
@cyallianceprez.bsky.social
tinyurl.com/mr47e955

29.01.2026 19:38 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

What AI Is Actually Changing in Open Source Security -- Lessons from the OpenSSL CVEs
Gain a clear view of where AI meaningfully improves openโ€‘source security today, where it falls short, & what these lessons signal for the next gen of collective defense
Monday, Feb 2nd 9 am ET: tinyurl.com/msu6eanw

29.01.2026 12:59 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Join us Monday, Feb 2nd: What AI Is Actually Changing in Open-Source Security -- Lessons from the OpenSSL CVEs
Registration: tinyurl.com/4tn5653y
We dive into a case study of recent OpenSSL CVEs to see where AI is accelerating patch velocity and where it still falls short. No fluffโ€”just a clear view

28.01.2026 16:49 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Your meeting ended but the AI kept listening When transcription is on, even the โ€œcan you stay a minute?โ€ part of the meeting is written down and shared across the company

An important read on using AI to record meetings. The advantages are real, but so are the ramifications.
From @cyberalliance.bsky.social member Gen...

www.gendigital.com/blog/insight...

#cybersecurity #GenAI #AI

28.01.2026 13:05 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Happy 9th Anniversary, CTA: A Celebration of Collaboration in Cyber Defense Unit 42 celebrates 9 years of the Cyber Threat Alliance, tracing its journey from a bold idea to a global leader in collaborative cyber defense.

Kathi Whitbey, @paloaltonetworks.bsky.social, reflects on the @cyberalliance.bsky.social 9 years and the road ahead.

Check it out...

unit42.paloaltonetworks.com/cta-9th-anni...
#CTA9Years #strongertogether #threatintelligence #cybersecurity

26.01.2026 20:58 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0