๐จ That "harmless" third-party GitHub action? It was a Trojan horse ๐ด
#devsecops #ci #githubactions #supplychainsecurity #cybersecurity
@alucab.bsky.social
Deep in the trenches of IoT/OT/IoMT Cyber Security. Keeping critical infra safe and often calling BS. Views expressed here are mine (and sometimes unfiltered).
๐จ That "harmless" third-party GitHub action? It was a Trojan horse ๐ด
#devsecops #ci #githubactions #supplychainsecurity #cybersecurity
Why Codefinger represents a new stage in the evolution of ransomware
12.04.2025 17:42 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0NIST has dropped some new guidance on IR and how it fits into CSF 2.0.
csrc.nist.gov/pubs/sp/800/...
NSA, CISA, FBI, and International Partners Release Cybersecurity Advisory on โFast Flux,โ a National Security Threat | CISA
05.04.2025 13:12 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0Four Years In: What NERCโs Cyber Security Incident Reporting Data Tells Us (and What It Doesnโt) โ AMPYX CYBER buff.ly/czFPfPC
05.04.2025 14:42 โ ๐ 0 ๐ 1 ๐ฌ 0 ๐ 0Dispersed responsibility, lack of asset inventory is causing gaps in medical device cybersecurity
05.04.2025 15:12 โ ๐ 0 ๐ 1 ๐ฌ 0 ๐ 0AI Image Site GenNomis Exposed 47GB of Underage Deepfakes
05.04.2025 15:42 โ ๐ 0 ๐ 1 ๐ฌ 0 ๐ 05 Strategies to Strengthen Industrial Cybersecurity
05.04.2025 18:12 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0Taylor Swift photo
Breaking: Director of National Intelligence Tulsi Gabbard has revoked the security clearance for Taylor Swift
29.03.2025 14:06 โ ๐ 195 ๐ 12 ๐ฌ 15 ๐ 1Ever heard of a computer that uses water to solve complex math problems? ๐๐ก
In 1936, Soviet engineer Vladimir Lukyanov created the Water Integratorโan analog computer using water flow, gravity, and pipes to solve differential equations.
#Innovation #Engineering #TechHistory #AnalogComputing
๐จHow remote access creates multiple attack vectors in OT environments.
#OTSecurity #CyberSecurity #ICS #RemoteAccess #ThreatDetection #LBSRA
๐จ Supply Chain attack are becoming endemic - Malicious #PyPI Packages Stole Cloud Tokens ๐ก Remember that XKCD meme about open source? That one guy in Nebraska ?
#pypi #sbom #cybersecurity #supplychainattack #integrity
Must-Watch Cybersecurity TV Shows ๐ฏ๐จโ๐ป
Need some hacking inspiration or just love a good cyber-thriller?
๐ฅ Mr. Robot โ The GOAT ๐
๐ต๏ธโโ๏ธ Person of Interest โ Predict future?
๐ฅ Black Mirror โ Every episode = existential crisis ๐ณ
#CyberSecurity #Hacking #TechThriller #TVSeries
Are you watching "Zero Day" ?
Ideal to bring your siblings, your mother, your friends and brag about your job, and it is also a lot of fun. ๐
#Cybersecurity #ZeroDay #CriticalInfrastructure #OTSecurity #InfoSec
Cost of a Data Breach
In 2024, the average cost of a data breach reached an all-time high of $4.88 million
#cybersecurity #databreach #infosec #cyberresilience
buff.ly/xdE7A0N
600+ systems down. A hospital paralyzed.
#CyberSecurity #Ransomware #HealthcareSecurity #ThreatIntel #IoMTSecurity
buff.ly/qT46Pxl
๐ Solar Panels: The New Frontline in Cyber Warfare
Hackers have found a new way to target critical infrastructureโthrough your solar panels.
#Cybersecurity #RenewableEnergy #CriticalInfrastructure #OTSecurity
buff.ly/zkVTF2X
IT vs. OT Cybersecurity Champions
๐ฏ IT: Certified to the moon ๐ โ CISA, CISSP, CCNA, ITILโฆ
๐ซ OT: Just give me IEC 62443, SANS, and a wrench.
#CyberSecurity #OTSecurity #ITvsOT #ICS #IndustrialSecurity #CyberChampion
2024 saw an 87% rise in ransomware attacks targeting OT and two new ICS-specific malware
#otsecurity #ics #cyberthreats #ransomware
eyeInspect is a robust solution designed to safeguard operational technology (OT) and Internet of Things (IoT) environments.
Continuous updates are critical to keep the defense
buff.ly/RAzHrB1
#OTSecurity #Cybersecurity #Forescout #ITOT
Manufacturingโs Silent Cyber Crisis: 75% of cyber incidents in manufacturing last year hit converged IT/OT environments
#cybersecurity #otsecurity #itotconvergence #manufacturing #riskmanagement
Luca: "Let's experiment with GitHub Copilot for a quick script."
Also Luca: "Add code to line 76 to strip away all \n and \s from the variable named value and substitute them with a whitespace."
#GitHubCopilot #DeveloperHumor #AI #Programming
๐ Copilot: [see pic๐]
10 countries account for 78% of malicious traffic
Top Cybersecurity Trends from Vedere Labs
๐ Schneider Electricโs SCADAPack 470i & 474i take a different approach: baking IT-grade security into rugged OT devices without disrupting operations.
buff.ly/VcZz5YF
#OTSecurity #ICS #SCADA #CyberSecurity #ITOT
๐ Types of Cybercrimes on Social Networks
#CyberSecurity #OnlineSafety #DigitalThreat
๐ IoT: The New Ransomware Gateway
Vedere Labs warned in 2022 with R4IoTโshowing how ransomware can exploit IoT to pivot into IT/OT .
2024: Akira, responsible for 15% of incidents last year, just did it
#Cybersecurity #Ransomware #IoTSecurity
buff.ly/p3uqRRU
๐ How to Spot a Penetration Tester
Pentesters leave digital footprints.
Are you monitoring these signs?
#CyberSecurity #Pentesting #RedTeam #BlueTeam #ThreatHunting
Credits : ACEResponder.com
๐ "Cybersecurity experts" donโt exist.
Cybersecurity isnโt one skillโitโs an ecosystem. Risk assessment, governance, security operations, architecture, threat intelligenceโฆ
No one masters it all.
#CyberSecurity #RiskManagement #ThreatIntelligence #InfoSec #SecurityOps
๐ When DrZeroTrust Put eyeInspect to the Test
Seeing Dr. Chase Cunningham try out eyeInspectโand its self-demo capabilityโhits differently.
A seamless user experience isnโt just a nice-to-have; itโs the key to adoption.
#CyberSecurity #UserExperience
buff.ly/b2jdfwN