The biggest telecom hack in history didnโt start with malware.
It started with a person.
A compromised employee account.
On December 12, 2023, Kyivstar, Ukraineโs largest telecom, was taken down
24 million people lost mobile service.
No phone. No internet. No air raid alerts.
The attackers didnโt break in, they were already inside.
This wasnโt just a breach. It was cyberwar, and a blueprint for whatโs coming.
Here are 3 lessons I believe every security leader must act on now:
1๏ธโฃ The Myth of the Impenetrable Fortress is Dead
Attackers got in by targeting people, not tech.
They were inside for weeks before striking.
โ๏ธ Your biggest risk is not your firewall - itโs your people.
โ๏ธ Assume breach. Build from the inside out.
โ๏ธ Security culture matters more than the latest tool.
2๏ธโฃ Resilience > Prevention
When the core was destroyed, prevention didnโt matter.
Recovery did.
โ๏ธ Do your backups survive when the backups are targeted?
โ๏ธ Has your incident response actually been tested under fire?
โ๏ธ Can your business keep running under attack?
3๏ธโฃ Attacks Hit People, Not Just Servers
โ ATMs down.
โ Air Raid Alerts silenced.
โ Lives disrupted.
This wasnโt an IT problem.
It was a humanitarian one.
We defend networks, but what weโre really protecting are communities, economies, and national resilience.
The Kyivstar attack wasnโt just about code.
It was about culture, readiness, and people under pressure.
The real heroes? The engineers working through the night.
Their story matters just as much as the breach.
Stay secure.๐
__
Enjoying this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Resilience #Kyivstar
It started with a person.
A compromised employee account.
On December 12, 2023, Kyivstar, Ukraineโs largest telecom, was taken down
24 million people lost mobile service.
No phone. No internet. No air raid alerts.
The attackers didnโt break in, they were already inside.
This wasnโt just a breach. It was cyberwar, and a blueprint for whatโs coming.
Here are 3 lessons I believe every security leader must act on now:
1๏ธโฃ The Myth of the Impenetrable Fortress is Dead
Attackers got in by targeting people, not tech.
They were inside for weeks before striking.
โ๏ธ Your biggest risk is not your firewall - itโs your people.
โ๏ธ Assume breach. Build from the inside out.
โ๏ธ Security culture matters more than the latest tool.
2๏ธโฃ Resilience > Prevention
When the core was destroyed, prevention didnโt matter.
Recovery did.
โ๏ธ Do your backups survive when the backups are targeted?
โ๏ธ Has your incident response actually been tested under fire?
โ๏ธ Can your business keep running under attack?
3๏ธโฃ Attacks Hit People, Not Just Servers
โ ATMs down.
โ Air Raid Alerts silenced.
โ Lives disrupted.
This wasnโt an IT problem.
It was a humanitarian one.
We defend networks, but what weโre really protecting are communities, economies, and national resilience.
The Kyivstar attack wasnโt just about code.
It was about culture, readiness, and people under pressure.
The real heroes? The engineers working through the night.
Their story matters just as much as the breach.
Stay secure.
__
Enjoying this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Resilience #Kyivstar
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐17๐คฏ2
#CyberMonday EchoLeak: Zero-click AI attacks now steal Microsoft 365 data with no user action needed.
A new threat called EchoLeak has appeared recently. Attackers can now pull sensitive data right out of Microsoft 365 Copilot - no clicks, no alerts, no warning. Zero-click means users do nothing, but data still leaves the building. ๐ซข
EchoLeak uses prompt injection to break through Copilotโs context and steal information. The bad actor does not need to trick you; AI becomes the way in.
This is part of a bigger trend:
More AI tools = more risk
๐ฅ Top News:
1๏ธโฃ Salesforce, over 20 configuration weaknesses found exposing sensitive data.
2๏ธโฃ Microsoft fixed 67 security flaws in Patch Tuesday (11 critical!).
3๏ธโฃ Apple patched a zero-click bug in Messages used for spying.
4๏ธโฃ Over 269,000 websites hit by JavaScript malware in one month.
๐ซข Recent Critical & High Severity CVEs
โ CVE-2025-24016 (Wazuh #KnownExploited)
โ CVE-2025-32433 (Erlang #KnownExploited)
โ CVE-2024-42009 (Webmail #KnownExploited)
โ CVE-2025-33053 (WebDAV #PublicExploit)
See full CVE lists for the last 7 and 30 days if you want more detail โ https://lnkd.in/dHN8u6nA
Stay alert, patch fast, and treat AI like every other critical system.๐
Which threat worries you most right now?
__
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #InfoSec #ThreatIntel
A new threat called EchoLeak has appeared recently. Attackers can now pull sensitive data right out of Microsoft 365 Copilot - no clicks, no alerts, no warning. Zero-click means users do nothing, but data still leaves the building. ๐ซข
EchoLeak uses prompt injection to break through Copilotโs context and steal information. The bad actor does not need to trick you; AI becomes the way in.
This is part of a bigger trend:
More AI tools = more risk
1๏ธโฃ Salesforce, over 20 configuration weaknesses found exposing sensitive data.
2๏ธโฃ Microsoft fixed 67 security flaws in Patch Tuesday (11 critical!).
3๏ธโฃ Apple patched a zero-click bug in Messages used for spying.
4๏ธโฃ Over 269,000 websites hit by JavaScript malware in one month.
๐ซข Recent Critical & High Severity CVEs
โ CVE-2025-24016 (Wazuh #KnownExploited)
โ CVE-2025-32433 (Erlang #KnownExploited)
โ CVE-2024-42009 (Webmail #KnownExploited)
โ CVE-2025-33053 (WebDAV #PublicExploit)
See full CVE lists for the last 7 and 30 days if you want more detail โ https://lnkd.in/dHN8u6nA
Stay alert, patch fast, and treat AI like every other critical system.
Which threat worries you most right now?
__
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #InfoSec #ThreatIntel
Please open Telegram to view this post
VIEW IN TELEGRAM
๐3๐คฏ2
The world calls it "news." For us, it's Tuesday morning in Kyiv.
This isnโt a movie set. Itโs my neighborhood. My community. My reality.
As a cybersecurity professional, I see the same pattern here as in digital warfare: Deliberate targeting of civilian infrastructure. Accountability evasion. Global consequences when threats go unchecked.
They label it a "special military operation", but what kind of operation deliberately targets sleeping families?
Hereโs what leaders need to understand:
โ Civilian targeting isnโt "collateral damage" โ itโs intentional strategy
โ Every attack carries command approval, just like cyber threat actors
โ "Neutrality" enables aggressors
Our industryโs principles apply here: Threat analysis. Defense. Accountability.
This morning, people didnโt get to say "good morning."
How can we translate our skills into real-world protection for civilians? Convert your anger into contribution:
https://send.monobank.ua/jar/A3Y5u1H5cL
Eternal memory to those lost. Strength to the injured.
Action > anger.
__
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#CyberWarfare #StandWithUkraine
This isnโt a movie set. Itโs my neighborhood. My community. My reality.
As a cybersecurity professional, I see the same pattern here as in digital warfare: Deliberate targeting of civilian infrastructure. Accountability evasion. Global consequences when threats go unchecked.
They label it a "special military operation", but what kind of operation deliberately targets sleeping families?
Hereโs what leaders need to understand:
โ Civilian targeting isnโt "collateral damage" โ itโs intentional strategy
โ Every attack carries command approval, just like cyber threat actors
โ "Neutrality" enables aggressors
Our industryโs principles apply here: Threat analysis. Defense. Accountability.
This morning, people didnโt get to say "good morning."
How can we translate our skills into real-world protection for civilians? Convert your anger into contribution:
https://send.monobank.ua/jar/A3Y5u1H5cL
Eternal memory to those lost. Strength to the injured.
Action > anger.
__
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#CyberWarfare #StandWithUkraine
๐7๐ค1๐คฏ1
Researchers found 30 fresh datasets, 16 billion credentials. Not recycled. Not old. The data includes Apple, Google, Facebook, GitHub, Telegram, even government services.
This is weaponizable intelligence. Threat actors now have a new playbook.
Every leak follows a pattern:
โ Discovery
โ Dark web trading
โ Account takeovers
โ Business disruption
But this scale? It changes the risk for everyone.
Hereโs what I see (and why I worry):
1๏ธโฃ Password Reuse Epidemic
One bad password = ten breached accounts. People still reuse passwords across work and personal logins.
2๏ธโฃ MFA Gaps
Many users trust passwords alone. MFA is not everywhere, especially on high-value accounts.
3๏ธโฃ Detection Delays
This breach was months in the making. Many companies never knew they were exposed.
Uncomfortable truth:
Your credentials are likely in this dataset.
Hereโs what security leaders must do NOW:
โ๏ธ Audit MFA coverage (focus on privileged users)
โ๏ธ Deploy credential monitoring tools
โ๏ธ If Affected - Force password resets immediately
โ๏ธ Start moving toward Zero-trust architecture
My take:
This breach is the wake-up call our industry needed. The question is not if your credentials are out there. The question is - what will you do about it?
If you see "Password123" anywhere in your org, please reach out. I want to help.
Whatโs your immediate response strategy?
How are you handling this breach at your company?
__
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#DataBreach #PasswordSecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
๐5๐คฏ3๐ค1
Your biggest vulnerability isn't your firewall โ It's the person sitting next to you.
95% of data breaches start with human error. Is your team the exception?
One click on a phishing link or one weak password can open the door for attackers. Thatโs why I believe regular employee training is not optional - it is mission-critical.
Hereโs what Iโve learned:
1๏ธโฃ Tailor Training to Each Role
โ Developers, finance, and sales face different threats. Match content to their daily risks.
2๏ธโฃ Make It Interactive
โ Use real scenarios and simulations. People remember what they do, not what they watch.
3๏ธโฃ Ask for Feedback
โ Employees know what works. Use their input to improve future sessions.
4๏ธโฃ Test and Repeat
โ Short quizzes and ongoing assessments help knowledge stick and show where to focus next.
A quick story: Early in my career, I saw a simple phishing email trick a smart, trusted team member. They felt bad, but our open culture turned it into a learning moment. We added more hands-on training and peer mentoring. The result? Fewer incidents, stronger teamwork.
Cyber threats keep changing. Our learning should too.
How do you keep your team ready?
Stay secure๐
__
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#EmployeeTraining #CyberAwareness
95% of data breaches start with human error. Is your team the exception?
One click on a phishing link or one weak password can open the door for attackers. Thatโs why I believe regular employee training is not optional - it is mission-critical.
Hereโs what Iโve learned:
1๏ธโฃ Tailor Training to Each Role
โ Developers, finance, and sales face different threats. Match content to their daily risks.
2๏ธโฃ Make It Interactive
โ Use real scenarios and simulations. People remember what they do, not what they watch.
3๏ธโฃ Ask for Feedback
โ Employees know what works. Use their input to improve future sessions.
4๏ธโฃ Test and Repeat
โ Short quizzes and ongoing assessments help knowledge stick and show where to focus next.
A quick story: Early in my career, I saw a simple phishing email trick a smart, trusted team member. They felt bad, but our open culture turned it into a learning moment. We added more hands-on training and peer mentoring. The result? Fewer incidents, stronger teamwork.
Cyber threats keep changing. Our learning should too.
How do you keep your team ready?
Stay secure
__
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#EmployeeTraining #CyberAwareness
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐7๐คฏ1
#CyberMonday 7.3 Tbps DDoS in 45 seconds, do you really think your cloud is ready?
The largest DDoS attack ever seen hit 7.3 Tbps and dumped 37.4 TB of traffic in under a minute. #Cloudflare blocked it, but the message is clear:
Attackers are moving faster and hitting harder than ever.
๐ฅ This week's threat landscape:
1๏ธโฃ Off-hours Attacks Are Up
Hackers don't wait for business hours. They strike when teams are thin. If your SOC is not watching 24/7, you're giving attackers a head start.
2๏ธโฃ Insider Risk Is Real
A GCHQ (Government Communications Headquarters) intern took secret data home. Journalist accounts were hacked. Most breaches start with a person, not a tool.
3๏ธโฃ New Malware, New Tricks
Android malware like AntiDot is spreading using overlays and NFC theft. Trojanized GitHub repos are targeting devs and gamers.
4๏ธโฃ Big Events, Big Damages
Scattered Spider's attack on U.K. retailers caused up to $592M in losses. These are not small problems-they hit real people and real business.
๐ซข Recent Critical & High Severity CVEs
โ CVE-2023-0386 (#LinuxKernel #PublicExploit)
โ CVE-2023-33538 (#TPLink #KnownExploited)
See full CVE lists for the last 7 and 30 days if you want more detail โ https://lnkd.in/dHN8u6nA
My take:
If your last DDoS test was "good enough," it's time to raise the bar.
โ Run stress tests that match the scale of today's attacks
โ Test your team's response outside office hours
โ Patch high-severity CVEs before attackers do
โ Build a culture where everyone knows their role during an incident
Security is about readiness, not luck. The next wave is already here.
__
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #InfoSec #ThreatIntel
The largest DDoS attack ever seen hit 7.3 Tbps and dumped 37.4 TB of traffic in under a minute. #Cloudflare blocked it, but the message is clear:
Attackers are moving faster and hitting harder than ever.
1๏ธโฃ Off-hours Attacks Are Up
Hackers don't wait for business hours. They strike when teams are thin. If your SOC is not watching 24/7, you're giving attackers a head start.
2๏ธโฃ Insider Risk Is Real
A GCHQ (Government Communications Headquarters) intern took secret data home. Journalist accounts were hacked. Most breaches start with a person, not a tool.
3๏ธโฃ New Malware, New Tricks
Android malware like AntiDot is spreading using overlays and NFC theft. Trojanized GitHub repos are targeting devs and gamers.
4๏ธโฃ Big Events, Big Damages
Scattered Spider's attack on U.K. retailers caused up to $592M in losses. These are not small problems-they hit real people and real business.
๐ซข Recent Critical & High Severity CVEs
โ CVE-2023-0386 (#LinuxKernel #PublicExploit)
โ CVE-2023-33538 (#TPLink #KnownExploited)
See full CVE lists for the last 7 and 30 days if you want more detail โ https://lnkd.in/dHN8u6nA
My take:
If your last DDoS test was "good enough," it's time to raise the bar.
โ Run stress tests that match the scale of today's attacks
โ Test your team's response outside office hours
โ Patch high-severity CVEs before attackers do
โ Build a culture where everyone knows their role during an incident
Security is about readiness, not luck. The next wave is already here.
__
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #InfoSec #ThreatIntel
Please open Telegram to view this post
VIEW IN TELEGRAM
๐6๐คฏ1
The cybersecurity "right skills shortage". SANS 2025 Workforce report.
Helen Patton, Cisco's CISO:
After taking a deep dive into SANS' latest Cybersecurity Workforce Research Report (3400+ respondents globally), I wanted to share some facts with the community.
Here is what stood out to me:
1๏ธโฃ "Right skills" set
โ 52% of organizations say "not having the right staff" is a bigger problem than "not enough staff" (48%). It is essential to adapt and learn new skills to the specific requirements of your job or position.
2๏ธโฃ Training is non-negotiable
โ 55% recognize having security teams is not enough; ongoing skills development is crucial.
3๏ธโฃ Certifications are a must
โ 65% of jobs now require certifications for skill validation.
4๏ธโฃ Top Valued Skills: Teamwork, growth mindset, and adaptability.
5๏ธโฃ New rules (NIS 2 Directive, DORA, Cybersecurity Maturity Model Certification) are shaping how cybersecurity is hired and trained.
So, what do we learn from this?
For CISOs and hiring managers:
Look inside your team. Perhaps the Cybersecurity "star" you are looking for is already working for you and needs some development.
For career seekers:
Start with some entry certifications (CompTIA Security+, eJPT, and others) to get your foot into the first job.
Are you currently looking for a talent? How difficult is it to find a "highly skilled" professional?
Perhaps you are starting in cybersecurity. What problems are giving you the most pain when finding your first job?
Stay sharp, stay secure.๐
(SANS 2025 Workforce report in the comments below.)
__
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #SkillsGap #SANS
Helen Patton, Cisco's CISO:
"My perspective is that we don't have a talent shortage in cybersecurity. The real issue lies in understanding the skill sets that are needed."
After taking a deep dive into SANS' latest Cybersecurity Workforce Research Report (3400+ respondents globally), I wanted to share some facts with the community.
Here is what stood out to me:
1๏ธโฃ "Right skills" set
โ 52% of organizations say "not having the right staff" is a bigger problem than "not enough staff" (48%). It is essential to adapt and learn new skills to the specific requirements of your job or position.
2๏ธโฃ Training is non-negotiable
โ 55% recognize having security teams is not enough; ongoing skills development is crucial.
3๏ธโฃ Certifications are a must
โ 65% of jobs now require certifications for skill validation.
4๏ธโฃ Top Valued Skills: Teamwork, growth mindset, and adaptability.
5๏ธโฃ New rules (NIS 2 Directive, DORA, Cybersecurity Maturity Model Certification) are shaping how cybersecurity is hired and trained.
So, what do we learn from this?
For CISOs and hiring managers:
Look inside your team. Perhaps the Cybersecurity "star" you are looking for is already working for you and needs some development.
For career seekers:
Start with some entry certifications (CompTIA Security+, eJPT, and others) to get your foot into the first job.
Are you currently looking for a talent? How difficult is it to find a "highly skilled" professional?
Perhaps you are starting in cybersecurity. What problems are giving you the most pain when finding your first job?
Stay sharp, stay secure.
(SANS 2025 Workforce report in the comments below.)
__
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #SkillsGap #SANS
Please open Telegram to view this post
VIEW IN TELEGRAM
๐6๐คฏ1
#CyberMonday 7 Threats, 3 CVEs, 1 Death.
The death of one person has been linked to a ransomware attack on NHS England services at London hospitals.
King's College Hospital confirmed that one patient had "died unexpectedly" during the cyber attack on 3 June 2024, because of "a long wait for a blood test result".
This is what happens when cybersecurity fails.
And this week's risks weren't just techical, it touched lives.๐
๐ฅ Top News:
1๏ธโฃ Ransomware + NHS = tragedy
โ Delayed blood test results contributed to a patientโs death.
2๏ธโฃ Facebook's new AI tool asks users to upload personal photos for "story ideas."
3๏ธโฃ LapDogs espionage: 1,000+ SOHO routers compromised in a China-linked campaign.
4๏ธโฃ Cisco ISE & ISE-PIC RCE flaws (CVE-2025-20281 & 20282).
โ Unauthenticated API access โ root privileges. Update now.
5๏ธโฃ Printer exploits led to real-world "Prishing" attacks via QR code bait.
โ Review and act, harden your printer.
6๏ธโฃ Citrix Bleed 2.0 (CVE-2025-6543): Another NetScaler zero-day.
7๏ธโฃ GIFTEDCROOK malware evolved from browser stealer to full-blown intelligence tool.
๐ซข New Critical CVEs:
โ CVE-2024-54085 (#AMI Redfish API #KnownExploited)
โ CVE-2024-0769 (#DLink #KnownExploited)
๐ Exploitability spike +50%:
โ CVE-2015-5311 (#PowerDNS Server #DOS)
Let's be honest: cybersecurity isn't just about uptime anymore.
It's about protecting real people from real harm.
What stuck with you this week?
Stay secure๐
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #InfoSec #ThreatIntel
The death of one person has been linked to a ransomware attack on NHS England services at London hospitals.
King's College Hospital confirmed that one patient had "died unexpectedly" during the cyber attack on 3 June 2024, because of "a long wait for a blood test result".
This is what happens when cybersecurity fails.
And this week's risks weren't just techical, it touched lives.๐
1๏ธโฃ Ransomware + NHS = tragedy
โ Delayed blood test results contributed to a patientโs death.
2๏ธโฃ Facebook's new AI tool asks users to upload personal photos for "story ideas."
3๏ธโฃ LapDogs espionage: 1,000+ SOHO routers compromised in a China-linked campaign.
4๏ธโฃ Cisco ISE & ISE-PIC RCE flaws (CVE-2025-20281 & 20282).
โ Unauthenticated API access โ root privileges. Update now.
5๏ธโฃ Printer exploits led to real-world "Prishing" attacks via QR code bait.
โ Review and act, harden your printer.
6๏ธโฃ Citrix Bleed 2.0 (CVE-2025-6543): Another NetScaler zero-day.
7๏ธโฃ GIFTEDCROOK malware evolved from browser stealer to full-blown intelligence tool.
โ CVE-2024-54085 (#AMI Redfish API #KnownExploited)
โ CVE-2024-0769 (#DLink #KnownExploited)
๐ Exploitability spike +50%:
โ CVE-2015-5311 (#PowerDNS Server #DOS)
Let's be honest: cybersecurity isn't just about uptime anymore.
It's about protecting real people from real harm.
What stuck with you this week?
Stay secure
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #InfoSec #ThreatIntel
Please open Telegram to view this post
VIEW IN TELEGRAM
๐5๐คฏ2
Please help me to improve my Cybersecurity Blog.
I want all of you to write 3 things that you Like and 3 things that you Don't like about my Blog. ๐
I am a humble person, and I believe there is always room for improvement.
Your feedback matters ๐
(The person with most valuable feedback will get a prise)
Stay secure๐
.
I want all of you to write 3 things that you Like and 3 things that you Don't like about my Blog. ๐
I am a humble person, and I believe there is always room for improvement.
Your feedback matters ๐
(The person with most valuable feedback will get a prise)
Stay secure
.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐8
My daily cybersecurity flow keeps me ahead of threats. Here's my 6-site routine:
Staying up to date in cybersecurity feels impossible. News breaks every hour. Threats move faster than most teams can react.
But I have found a daily system that works. I keep these 6 sites in my rotation for real-time alerts and deep dives.
โ The Hacker News
Fast updates on new exploits, CVEs, and breaches. I keep this tab open all day. TG: @thehackernews
โ Bleeping Computer
Trusted for alerts, malware analysis, and patch news. TG: @BleepingComputer
โ tl;dr sec
7 minutes a week for the best tools and resources. Categories for tech, AI, infosec, and more.
โ CISA
America's Cyber Defense Agency. I subscribe to their alerts for breaking news on threats.
โ Sans Internet Storm Center
Daily "Stormcast" for threat trends, malware outbreaks, and vulnerability news.
โ CVEdetails
Not just a CVE database. Advisories, exploits, and RSS feeds for vulnerability intelligence.
Each week, I scan these sites. I don't read every article. I focus on major trends and alerts. This habit keeps my team ready for what's next.
Cybersecurity is not about knowing everything. It's about having the right signals at the right time.
What am I missing? Which sites do You trust to stay ahead?
Share, save, and stay secure.๐
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #InfoSec #ThreatIntel
Staying up to date in cybersecurity feels impossible. News breaks every hour. Threats move faster than most teams can react.
But I have found a daily system that works. I keep these 6 sites in my rotation for real-time alerts and deep dives.
โ The Hacker News
Fast updates on new exploits, CVEs, and breaches. I keep this tab open all day. TG: @thehackernews
โ Bleeping Computer
Trusted for alerts, malware analysis, and patch news. TG: @BleepingComputer
โ tl;dr sec
7 minutes a week for the best tools and resources. Categories for tech, AI, infosec, and more.
โ CISA
America's Cyber Defense Agency. I subscribe to their alerts for breaking news on threats.
โ Sans Internet Storm Center
Daily "Stormcast" for threat trends, malware outbreaks, and vulnerability news.
โ CVEdetails
Not just a CVE database. Advisories, exploits, and RSS feeds for vulnerability intelligence.
Each week, I scan these sites. I don't read every article. I focus on major trends and alerts. This habit keeps my team ready for what's next.
Cybersecurity is not about knowing everything. It's about having the right signals at the right time.
What am I missing? Which sites do You trust to stay ahead?
Share, save, and stay secure.
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #InfoSec #ThreatIntel
Please open Telegram to view this post
VIEW IN TELEGRAM
๐14๐คฏ1
#CyberMonday Hackers breached a Norwegian dam and opened the floodgates.
Norvay Critical infrastructure is under attack. Unidentified hackers have breached the systems of a Norwegian dam and opened its water valve at full capacity.
Single breach can impact communities, economies, and daily life.
Cyber risk = real-world consequences.
๐ฅ Top News:
โ Taiwan's National Security Bureau warned about apps like TikTok and Weibo. Too much data collection. Data flowing where it shouldn't.
โ Exposed JDWP interfaces let attackers mine crypto and launch DDoS on your servers.
โ A new APT, NightEagle, is using zero-days to target Microsoft Exchange.
โ Two new Sudo flaws on Linux. Local users can get root access. Major distros affected Ubuntu, RHEL, Fedora.
โ Google faces a $314M fine for passive Adroid cellular data misuse.
โ Over 40 Firefox extensions are stealing crypto wallet secrets.
โ Glasgow City Council is offline after an attack. City services, disrupted.
๐ซข New Critical CVEs:
โ CVE-2025-6554 (#Chrome #KnownExploited)
โ CVE-2025-6543 (#Citrix #KnownExploited)
๐ Exploitability spike +50%:
โ CVE-2024-5247 (#Netgear #RCE)
โ CVE-2002-1623 (#IKE #UserEnumaration)
Stay sharp, because these threats are not stopping.
Stay secure๐
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #InfoSec #ThreatIntel
Norvay Critical infrastructure is under attack. Unidentified hackers have breached the systems of a Norwegian dam and opened its water valve at full capacity.
Single breach can impact communities, economies, and daily life.
Cyber risk = real-world consequences.
โ Taiwan's National Security Bureau warned about apps like TikTok and Weibo. Too much data collection. Data flowing where it shouldn't.
โ Exposed JDWP interfaces let attackers mine crypto and launch DDoS on your servers.
โ A new APT, NightEagle, is using zero-days to target Microsoft Exchange.
โ Two new Sudo flaws on Linux. Local users can get root access. Major distros affected Ubuntu, RHEL, Fedora.
โ Google faces a $314M fine for passive Adroid cellular data misuse.
โ Over 40 Firefox extensions are stealing crypto wallet secrets.
โ Glasgow City Council is offline after an attack. City services, disrupted.
โ CVE-2025-6554 (#Chrome #KnownExploited)
โ CVE-2025-6543 (#Citrix #KnownExploited)
๐ Exploitability spike +50%:
โ CVE-2024-5247 (#Netgear #RCE)
โ CVE-2002-1623 (#IKE #UserEnumaration)
Stay sharp, because these threats are not stopping.
Stay secure
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#Cybersecurity #InfoSec #ThreatIntel
Please open Telegram to view this post
VIEW IN TELEGRAM
๐8๐คฏ2
Explaining cyber risk: ๐๐ค๐ฌ ๐ ๐ฉ๐๐๐ฃ๐ ๐ ๐ก๐ค๐ค๐ ๐ซ๐จ. ๐๐ค๐ฌ ๐ ๐๐๐ฉ๐ช๐๐ก๐ก๐ฎ ๐ก๐ค๐ค๐
Everyone been there. You walk into the boardroom with slides, ready to talk risk. Picture yourself as Einstein-clear, smart, in control.
But two minutes in?
Drawing messy lines, talking about threats, and compliance.
Eyes glaze over.
Did I lose them? (Probably.)
Here's what worked for me:
โ ๐ฆ๐ต๐ผ๐ ๐๐ต๐ฒ ๐ป๐๐บ๐ฏ๐ฒ๐ฟ๐ค
"$2M at risk if things go wrong"
Beats "Here's how many vulnerabilities we have."
โ ๐จ๐๐ฒ ๐๐ต๐ฒ๐ถ๐ฟ ๐๐ผ๐ฟ๐ฑ๐
"Business risks," not "attack vectors."
"Disruptions," not "threat actors"
โ ๐ฆ๐ต๐ฎ๐ฟ๐ฒ ๐๐๐ผ๐ฟ๐ถ๐ฒ๐
"Our competitor lost $50M last year to ransomware."
People connect with real events, not long reports.
โ ๐๐ฎ๐น๐น ๐ผ๐๐ ๐๐ฎ๐น๐๐ฒ๐
Security helps us move faster, not slower.
Clarity builds trust.
That's where true security starts.
Got a better way to explain risk to non-technical leaders?
I want to hear your best tip.๐
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#InfoSec #SecurityLeadership
Everyone been there. You walk into the boardroom with slides, ready to talk risk. Picture yourself as Einstein-clear, smart, in control.
But two minutes in?
Drawing messy lines, talking about threats, and compliance.
Eyes glaze over.
Did I lose them? (Probably.)
Here's what worked for me:
โ ๐ฆ๐ต๐ผ๐ ๐๐ต๐ฒ ๐ป๐๐บ๐ฏ๐ฒ๐ฟ
"$2M at risk if things go wrong"
Beats "Here's how many vulnerabilities we have."
โ ๐จ๐๐ฒ ๐๐ต๐ฒ๐ถ๐ฟ ๐๐ผ๐ฟ๐ฑ๐
"Business risks," not "attack vectors."
"Disruptions," not "threat actors"
โ ๐ฆ๐ต๐ฎ๐ฟ๐ฒ ๐๐๐ผ๐ฟ๐ถ๐ฒ๐
"Our competitor lost $50M last year to ransomware."
People connect with real events, not long reports.
โ ๐๐ฎ๐น๐น ๐ผ๐๐ ๐๐ฎ๐น๐๐ฒ
Security helps us move faster, not slower.
Clarity builds trust.
That's where true security starts.
Got a better way to explain risk to non-technical leaders?
I want to hear your best tip.๐
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#InfoSec #SecurityLeadership
Please open Telegram to view this post
VIEW IN TELEGRAM
๐13๐คฏ1
AI is rewriting the rules of cybersecurity. And not everyone is ready. Join live panel on July 10!
โ Hear Dr. Oleh Polihenko, Anastasiia Voitova, and Taras Loboda dive into how AI is changing threat detection, response, and prevention.
โ Learn how to use AI securely - without adding risk
โ Live Q&A + networking at SKELAR Office, Kyiv (๐ฎ๐ป๐ฑ ๐ผ๐ป๐น๐ถ๐ป๐ฒ!)
I see big shifts in both the field and on the frontline. (The pace is real.)
Will you join us?
Event info & registration๐
https://meetup.skelar.tech/skelar-meetup-ai-in-security-10-07
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#AI #CyberResilience
โ Hear Dr. Oleh Polihenko, Anastasiia Voitova, and Taras Loboda dive into how AI is changing threat detection, response, and prevention.
โ Learn how to use AI securely - without adding risk
โ Live Q&A + networking at SKELAR Office, Kyiv (๐ฎ๐ป๐ฑ ๐ผ๐ป๐น๐ถ๐ป๐ฒ!)
I see big shifts in both the field and on the frontline. (The pace is real.)
Will you join us?
Event info & registration๐
https://meetup.skelar.tech/skelar-meetup-ai-in-security-10-07
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#AI #CyberResilience
๐7๐คฏ1
AI-Cybersecurity Reality Check
Yesterday I joined a live panel with some of the sharpest minds in the field.
We talked about how AI is changing cybersecurity fast.
๐ฅ Here are key takeaways:
1๏ธโฃ "Privacy is already abused." (Taras Loboda)
Our phones, our apps, even AI tools-they know us better than we think. Privacy is not what it was. We need to accept this and make smarter choices about what we share, which tools we trust, and how we protect our data.
2๏ธโฃ "Cybersecurity should not prohibit but enable." (Anastasiia Voitova)
Security does not mean stopping progress. Good security guides people. It helps everyone use new tools, like AI, safely.
3๏ธโฃ "Don't blindly trust AIs, check your data." (Dr. Oleh Polihenko)
AI makes mistakes. Sometimes it gives wrong or even risky advice. Our experience and critical thinking are more important than ever. Always check, always verify.
What can we do now?
โ Use AI for boring tasks-emails, reports, compliance checklists. Let machines do the heavy lifting.
โ For sensitive data, use local LLMs that you control.
โ When using online AI tools like ChatGPT or Gemini, always anonymize or pseudonymize your data.
โ Only allow corporate and licensed AI tools. Block everything else.
These lessons feel urgent. In both private sector and military defense, I see how fast the rules change.
Adapting is not optional.
P.S. Thank you, Andrii Popovych and SKELAR, for organizing such a great event! We need more events like this.
Thank you Anastasiia Voitova for merch from Cossacks Labs, love it.
Stay secure๐
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#AI #DataProtection #CyberResilience
Yesterday I joined a live panel with some of the sharpest minds in the field.
We talked about how AI is changing cybersecurity fast.
1๏ธโฃ "Privacy is already abused." (Taras Loboda)
Our phones, our apps, even AI tools-they know us better than we think. Privacy is not what it was. We need to accept this and make smarter choices about what we share, which tools we trust, and how we protect our data.
2๏ธโฃ "Cybersecurity should not prohibit but enable." (Anastasiia Voitova)
Security does not mean stopping progress. Good security guides people. It helps everyone use new tools, like AI, safely.
3๏ธโฃ "Don't blindly trust AIs, check your data." (Dr. Oleh Polihenko)
AI makes mistakes. Sometimes it gives wrong or even risky advice. Our experience and critical thinking are more important than ever. Always check, always verify.
What can we do now?
โ Use AI for boring tasks-emails, reports, compliance checklists. Let machines do the heavy lifting.
โ For sensitive data, use local LLMs that you control.
โ When using online AI tools like ChatGPT or Gemini, always anonymize or pseudonymize your data.
โ Only allow corporate and licensed AI tools. Block everything else.
These lessons feel urgent. In both private sector and military defense, I see how fast the rules change.
Adapting is not optional.
P.S. Thank you, Andrii Popovych and SKELAR, for organizing such a great event! We need more events like this.
Thank you Anastasiia Voitova for merch from Cossacks Labs, love it.
Stay secure
___
Enjoy this? ๐ Repost it to your network and follow @securediary for more.
Join me on LinkedIn.
#AI #DataProtection #CyberResilience
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐17๐คฏ1