Aghiath chbib
@AghiathChbib
Serial entrepreneur #Founder #Healthcare #CyberSecurity #Blockchain #AI #Leadership NAMED IN TOP 15 CYBERSECURITY INFLUENCERS TO WATCH ON TWITTER
ID:1075804135524585473
https://aghiathchbib.com 20-12-2018 17:24:28
36,0K Tweets
12,3K Followers
4,3K Following
Empowering Your Company to Embrace Integration & AI securitymagazine.com/articles/10058… #Cyberwarfare #Cybercrime
Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access thehackernews.com/2024/04/resear… #Cybercrime #Cyberattacks
Hackers Hijacking Popular YouTube Channels To Deliver Infostealer Malware cybersecuritynews.com/youtube-channe… #Cyberattacks #Cybersecurity
Hackers Weaponize Suspended Domains To Deliver Malware Payload cybersecuritynews.com/weaponize-susp… #Cybercrime #Cyberthreats
New Cyber Attack Targeting Hospital IT Helpdesks with Voice Calls cybersecuritynews.com/cyber-attack-t… #Cybercrime #DataPrivacy
Hackers Use Weaponized PDF Files to Deliver Byakugan Malware on Windows cybersecuritynews.com/hackers-weapon… #DataPrivacy #Cyberthreats
CISO Perspectives on Complying with Cybersecurity Regulations thehackernews.com/2024/04/ciso-p… #Cybersecurity #Cyberthreats
Google Pixel Phone Zero-days Exploited by Forensic Firms in the Wild : Patch Now cybersecuritynews.com/google-pixel-p… #DataPrivacy #Cyberthreats
Chrome Zero-Day Vulnerability Exploited At Pwn2Own : Patch Now cybersecuritynews.com/chrome-zero-da… #Cybersecurity #Cyberattacks
Considerations for Operational Technology Cybersecurity thehackernews.com/2024/04/consid… #Cyberattacks #Cybersecurity
Researchers Unveil The Attackers Behind The Agent Tesla Campaign cybersecuritynews.com/agent-tesla-at… #Cybercrime #Cybersecurity
Hackers Hijacking YouTube Channels to Steal Your Data cybersecuritynews.com/hackers-hijack… #Cyberthreats #Cybersecurity
Hackers Claiming of Working Windows 0-Day LPE Exploit cybersecuritynews.com/hackers-claimi… #Cybersecurity #Cyberattacks
WordPress Plugin SQl Injection Exposes 1,000,000 Sites to Cyber Attack cybersecuritynews.com/wordpress-plug… #DataPrivacy #Cyberthreats
Research reveals a resurfaced botnet targeting end-of-life devices securitymagazine.com/articles/10056… #Cyberwarfare #Cybercrime
Attack Surface Management vs. Vulnerability Management thehackernews.com/2024/04/attack… #DataPrivacy #Cybercrime
Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution thehackernews.com/2024/04/malici… #Cybersecurity #Cyberthreats
Qualcomm Security Flaws Let Attackers Takeover The Devices cybersecuritynews.com/qualcomm-secur… #DataPrivacy #Cyberattacks
Microsoft Adds 5 New AI Tools to be Added with Azure AI cybersecuritynews.com/ai-tools-with-… #Cybercrime #Cyberattacks
GhostWatch & iTrust: Two Game-Changing Solutions Launched by Security & Compliance Leader TrustNet cybersecuritynews.com/ghostwatch-itr… #Cybercrime #Cyberattacks