home.social

Search

319 results for “daniel1820815”

  1. @daniel1820815 Fascinating article. Excellent work. My question is: I always run in a and was wondering if this helps protect against exploits, or if it is no protection at all.

  2. @daniel1820815 Ich werde über kurz oder lang mein #pihole zwar installiert aber nicht scharf geschaltet lassen. Das filtern unter #proxmox funktioniert unzuverlässig und was noch schlimmer ist, das Clients im Subnet nicht erkannt werden. Und ja unter einem #rasberrypi hat es ohne zu klagen Funktion.

  3. From #CheckPoint Research:

    Mediaworks Data Extortion Attack

    Hungarian media company #Mediaworks, which operates dozens of newspapers and online outlets, was hit by a data-theft extortion attack. The company confirmed an intrusion after World Leaks posted 8.5TB of internal files online, reportedly including payroll records, contracts, financial documents, and internal communications.

    research.checkpoint.com/2026/1

  4. From #CheckPoint Research:

    Zara Supply Chain Attack

    #Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.

    research.checkpoint.com/2026/1

  5. From #CheckPoint Research:

    Zara Supply Chain Attack

    #Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.

    research.checkpoint.com/2026/1

  6. From #CheckPoint Research:

    Zara Supply Chain Attack

    #Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.

    research.checkpoint.com/2026/1

  7. From #CheckPoint Research:

    Zara Supply Chain Attack

    #Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.

    research.checkpoint.com/2026/1

  8. From #CheckPoint Research:

    Zara Supply Chain Attack

    #Zara, the flagship brand of Spanish fashion group Inditex, has experienced a data breach tied to a third-party technology provider. Inditex confirmed unauthorized access, and experts verified that 197,400 unique email addresses, order IDs, purchase history, and customer support tickets were exposed.

    research.checkpoint.com/2026/1

  9. "Ab wann tickt die Uhr bei der NIS-2-Meldefrist

    NIS-2 verpflichtet Unternehmen zu einem dreistufigen Meldeverfahren bei erheblichen Sicherheitsvorfällen, mit einer Frühwarnung innerhalb von 24 Stunden. Die entscheidende Frage ist dabei nicht wann der Vorfall passiert, sondern ab wann ein Unternehmen davon Kenntnis hat. Denn schon ein begründeter Verdacht kann die Meldefrist auslösen und wer dann zögert, riskiert persönliche Haftung der Geschäftsführung."

    security-insider.de/nis2-melde

    Assess your organization against #NIS2 and #DORA, pinpoint key regulatory gaps, and gain a clear, prioritized plan to strengthen resilience and demonstrate ongoing compliance.

    checkpoint.com/de/services/str

  10. AI Security Masters E8 - Claude Mythos: New Era in Cyber Security

    Join #CheckMates on May 19th at 5 PM CET for an exciting session on #Claude #Mythos, where we'll discuss what happens when #AI moves from assistant to autonomous security operator.

    checkpoint.zoom.us/webinar/reg

  11. AI Security Masters E8 - Claude Mythos: New Era in Cyber Security

    Join #CheckMates on May 19th at 5 PM CET for an exciting session on #Claude #Mythos, where we'll discuss what happens when #AI moves from assistant to autonomous security operator.

    checkpoint.zoom.us/webinar/reg

  12. AI Security Masters E8 - Claude Mythos: New Era in Cyber Security

    Join #CheckMates on May 19th at 5 PM CET for an exciting session on #Claude #Mythos, where we'll discuss what happens when #AI moves from assistant to autonomous security operator.

    checkpoint.zoom.us/webinar/reg

  13. AI Security Masters E8 - Claude Mythos: New Era in Cyber Security

    Join #CheckMates on May 19th at 5 PM CET for an exciting session on #Claude #Mythos, where we'll discuss what happens when #AI moves from assistant to autonomous security operator.

    checkpoint.zoom.us/webinar/reg

  14. AI Security Masters E8 - Claude Mythos: New Era in Cyber Security

    Join #CheckMates on May 19th at 5 PM CET for an exciting session on #Claude #Mythos, where we'll discuss what happens when #AI moves from assistant to autonomous security operator.

    checkpoint.zoom.us/webinar/reg

  15. From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026

    Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.

    In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.

    checkpoint.zoom.us/webinar/reg

  16. From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026

    Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.

    In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.

    checkpoint.zoom.us/webinar/reg

  17. From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026

    Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.

    In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.

    checkpoint.zoom.us/webinar/reg

  18. From #CheckPoint #CheckMates: Last Chance to Register for The State Of Ransomware Q1 2026

    Join CheckMates as they welcome back Check Point Research to the TechTalk stage to discuss #ransomware, which remains one of the most disruptive cyber risks organizations face. The way attacks are executed is changing. In Q1 2026, ransomware activity continued at high levels while consolidating around a smaller number of highly capable groups. This shift is increasing the impact of individual incidents and reshaping how organizations should assess and manage risk.

    In this session, Check Point Research will present key insights from the State of Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact. Attendees will gain both strategic context and actionable guidance on defending against modern ransomware operations.

    checkpoint.zoom.us/webinar/reg

  19. From #CheckPoint Research:

    Canvas Data Breach

    #Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.

    research.checkpoint.com/2026/1

  20. From #CheckPoint Research:

    Canvas Data Breach

    #Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.

    research.checkpoint.com/2026/1

  21. From #CheckPoint Research:

    Canvas Data Breach

    #Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.

    research.checkpoint.com/2026/1

  22. From #CheckPoint Research:

    Canvas Data Breach

    #Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.

    research.checkpoint.com/2026/1

  23. From #CheckPoint Research:

    Canvas Data Breach

    #Instructure, the US education technology company behind the #Canvas learning platform, has confirmed a major data breach affecting its cloud-hosted environment. Exposed data reportedly includes student and staff records and private messages, while #ShinyHunters escalated the attack by defacing hundreds of school login portals with ransom messages.

    research.checkpoint.com/2026/1

  24. TechTalk: The State of Ransomware Q1 2026 - Key Trends and Their Impact

    Join #CheckMates on May 13th, for an exciting TechTalk on the latest state of ransomware report.

    In this session, #CheckPoint Research will present key insights from the State of #Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact.

    checkpoint.zoom.us/webinar/reg

  25. TechTalk: The State of Ransomware Q1 2026 - Key Trends and Their Impact

    Join #CheckMates on May 13th, for an exciting TechTalk on the latest state of ransomware report.

    In this session, #CheckPoint Research will present key insights from the State of #Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact.

    checkpoint.zoom.us/webinar/reg

  26. TechTalk: The State of Ransomware Q1 2026 - Key Trends and Their Impact

    Join #CheckMates on May 13th, for an exciting TechTalk on the latest state of ransomware report.

    In this session, #CheckPoint Research will present key insights from the State of #Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact.

    checkpoint.zoom.us/webinar/reg

  27. TechTalk: The State of Ransomware Q1 2026 - Key Trends and Their Impact

    Join #CheckMates on May 13th, for an exciting TechTalk on the latest state of ransomware report.

    In this session, #CheckPoint Research will present key insights from the State of #Ransomware Q1 2026 report, followed by a practical discussion on how security teams can apply these findings to reduce exposure and business impact.

    checkpoint.zoom.us/webinar/reg

  28. From #CheckPoint #CheckMates:

    Business Email Compromise (BEC) remains one of the most effective and costly attack vectors, exploiting human behavior and bypassing traditional email security controls. Once a user engages, attackers move fast, making detection alone insufficient to prevent impact.

    Join my colleagues for a live webinar featuring Christian Crawford and Jesse Weeks, Security Engineers from Check Point's Workspace Security team, as they reveal how AI-driven email security detects and prevents BEC attacks in real time, without relying on manual intervention.

    • What makes BEC one of the most effective and costly attack vectors
    • How to reduce response time without increasing operational complexity
    • Why AI-driven email security is necessary to detect and prevent BEC attacks

    engage.checkpoint.com/how-to-s

  29. From #CheckPoint #CheckMates:

    Business Email Compromise (BEC) remains one of the most effective and costly attack vectors, exploiting human behavior and bypassing traditional email security controls. Once a user engages, attackers move fast, making detection alone insufficient to prevent impact.

    Join my colleagues for a live webinar featuring Christian Crawford and Jesse Weeks, Security Engineers from Check Point's Workspace Security team, as they reveal how AI-driven email security detects and prevents BEC attacks in real time, without relying on manual intervention.

    • What makes BEC one of the most effective and costly attack vectors
    • How to reduce response time without increasing operational complexity
    • Why AI-driven email security is necessary to detect and prevent BEC attacks

    engage.checkpoint.com/how-to-s

  30. From #CheckPoint #CheckMates:

    Business Email Compromise (BEC) remains one of the most effective and costly attack vectors, exploiting human behavior and bypassing traditional email security controls. Once a user engages, attackers move fast, making detection alone insufficient to prevent impact.

    Join my colleagues for a live webinar featuring Christian Crawford and Jesse Weeks, Security Engineers from Check Point's Workspace Security team, as they reveal how AI-driven email security detects and prevents BEC attacks in real time, without relying on manual intervention.

    • What makes BEC one of the most effective and costly attack vectors
    • How to reduce response time without increasing operational complexity
    • Why AI-driven email security is necessary to detect and prevent BEC attacks

    engage.checkpoint.com/how-to-s