Cyber Security News @The_Cyber_News
Independent Cyber Security News Platform For Security Professionals to Get the Latest #HackingNews, #CyberCrime, #SecurityBreaches, #Malware & Others... cybersecuritynews.com Joined August 2019-
Tweets4K
-
Followers5K
-
Following218
-
Likes98
New Android Malware Mimic As Social Media Apps Steals Sensitive Data @The_Cyber_News Learn more: gbhackers.com/android-malwar… The infection chain of this malware starts after the malicious application is installed on the victim’s Android devices. #cybersecuritynews #Androidmalware
💸 An Empty S3 Bucket Can Make Your AWS Bills Explode @The_Cyber_News Learn more: gbhackers.com/empty-s3-bucke… #cybersecuritynews #AWS
Grafana Tool Vulnerability Let Attackers Inject SQL Queries @The_Cyber_News Learn more: gbhackers.com/grafana-tool-v… 📌 Grafana, widely used for monitoring and observability, has been found to contain a severe SQL injection vulnerability. #cybersecuritynews #vulnerability
1,200+ Vulnerabilities Detected In Microsoft Products In 2023 @The_Cyber_News Learn more: gbhackers.com/microsoft-vuln… 📌 In 2023 alone, the company still had to address 522 problems with Windows (55 of them critical), 249 with Edge, 92 with Office, and 558 with Windows Server (57…
HookChain – A New Sophisticated Technique Evades EDR Detection @The_Cyber_News 📌 This technique demonstrates high efficacy in bypassing the security monitoring and controls implemented by the EDR solution. Learn more: cybersecuritynews.com/hookchain-edr-… #cybersecuritynews #cybersecurity
Multiple QNAP Vulnerability Let Hackers Hijack Your NAS @The_Cyber_News Learn more: cybersecuritynews.com/multiple-qnap-… #cybersecuritynews #vulnerability
Okta Warns Of Credential Stuffing Attacks Using Proxy Services @The_Cyber_News Learn more: gbhackers.com/credential-stu… #cybersecuritynews
Vulnerability in Apache Project Let Hackers Launch Supply Chain Attacks @The_Cyber_News Learn more: cybersecuritynews.com/vulnerability-… #cybersecuritynews
Microsoft Releases Historical MS-DOS 4.0 Source Code to the Public cybersecuritynews.com/microsoft-rele…
Hackers Exploit Google Ads to Spread IP Scanner with Concealed Backdoor @The_Cyber_News Learn more: cybersecuritynews.com/google-ads-to-… #cybersecuritynews
ToddyCat APT Hackers Deploy Multiple Tools to Hijack Network Infrastructure Read more: cybersecuritynews.com/toddycat-apt-h… #cybersecuritynews
Google Meet Now Allows Non-Google Account Users to Join Encrypted Calls @The_Cyber_News Learn more: cybersecuritynews.com/google-meet-en… 📌 Google has announced that external participants without Google accounts can join client-side encrypted Google Meet calls. #cybersecuritynews
Social Engineering Paves the Way for the XZ Cyber Incident @The_Cyber_News Learn more: cybersecuritynews.com/social-enginee… 📌 The initial phase of the attack involved benign contributions to the project, which served dual purposes: to mask the attackers' malicious intentions and to build…
Spyroid RAT Attacking Android Users To Steal Confidential Data @The_Cyber_News Learn more: gbhackers.com/spyroid-rat-at… #cybersecuritynews
IBM QRadar XSS Flaw Let Attackers Arbitrary JavaScript Code @The_Cyber_News Learn more: cybersecuritynews.com/ibm-qradar-xss… 📌 Users can insert any JavaScript code into the Web UI, changing the intended functionality and perhaps exposing credentials inside of a trusted session.…
AI-Based Brute-Forcing Attack Outperforming Probabilistic Model @The_Cyber_News Learn more: cybersecuritynews.com/ai-brute-force… 📌 LLM-based attacks outperformed brute force by 969%, while probabilistic models worked better for stealthy attacks #cybersecuritynews
💰Rewards Up To $10 Million For Information On Iranian Hackers @The_Cyber_News Read more: gbhackers.com/rewards-up-to-… #cybersecuritynews
🚨 GuptiMiner leverages a man-in-the-middle attack to exploit vulnerabilities in the Antivirus update process Learn more: cybersecuritynews.com/antivirus-upda… 📌 By hijacking this process, the attackers have stealthily distributed their malware to unsuspecting users. #cybersecuritynews
🚨Russian Hackers Exploiting Windows Print Spooler Using GooseEgg Tool Read more: cybersecuritynews.com/russian-apt28-… GooseEgg's commands enable checking exploit success, custom version identification, and privilege escalation #cybersecuritynews
GBHackers on Security @gbhackers_news
8K Followers 2K Following Globally Trusted Cybersecurity & Hacking News Platform. Get Daily Live updates on #Breakingnews #Hackingnews #Investigation #CyberAttack #Breach #MalwareAsh Ketchum @ketc32805234
2 Followers 17 FollowingAly @SecurelyAly
9 Followers 107 Following Tech-Savvy Cybersecurity Advocate | Google Cybersecurity Professional | Skilled in Threat Detection | Dedicated Problem ManagerFA @FA0910242718509
0 Followers 2 FollowingEmenike Okorie @Arcl0rd
81 Followers 844 Following B2B Technical writer transitioning to Cybersecurity | S&L-form Video editor - Tik-Tok, FB, IG, & YouTube | Adobe Premiere Pro & RUSH, CapCut, Inshot, CanvaMike Franjesk @franjesk
0 Followers 6 FollowingPablo @pabl0Sss
2 Followers 25 FollowingJosephine @MICupX0l6t76EU
1 Followers 130 FollowingMd. Naimul @Neo_SecurifyX
0 Followers 13 Following Cybersecurity Specialist And Certified Ethical HackerTomás @seruto2002
0 Followers 81 Following si no me me conoces,no vale la pena seguirme en esta cuenta,usa el sentido común joderO Especialista @oespecialista_x
16 Followers 152 Following O Especialista é um projeto que visa desmistificar temas importantes para todos.flame lavia @FlameLavia90210
1 Followers 49 FollowingHemal Karmakar @hemalkk
3 Followers 152 FollowingBЯIGΛПD ᄃYBΣЯ @brigandcyber
39 Followers 122 Followinggwyn davies @gwyndav58829218
26 Followers 214 Followingzakarie osman @zakarieosman0
0 Followers 18 FollowingAbdulrazaq Bello @BelloAbdul10390
5 Followers 187 Following Professional #resume writers trained to optimize your resume. Helping you write the next chapter of your career. v #resume #career #jobhuntingMr Shadow @MrShadow509
4 Followers 200 Following J'aime apprendre de nouvelles choses sur la technologie et partager mes connaissances avec les autres.Mohamed Mimouni @M_mimouni1
0 Followers 6 FollowingGoat7five @Goat7five
41 Followers 489 FollowingShadi Alkasim @Shadi_Alkasim
3K Followers 3K Following Certified Terrorism & Anti-Terrorism Expert #OSINT,#Conflict,#Military,#Weapons,#Terrorism, #Politics,#Aviation,#Defence,#Security,#UkraineWar,#CyberSecurity01101111 01101110 @YWM7DR6067UoCmG
141 Followers 2K FollowingMarc Beharry @Marc_on_tech
12 Followers 103 Following Digital marketing technologist focused on SEO (search engine optimization), Website Analytics, Blockchain & Cyber Security #CyberSec).Goldeye @Goldeye103
7 Followers 20 FollowingSaurabh Singh @Saurabh_3_singh
1 Followers 22 Followingsteve babbage @stevrosty
16 Followers 82 Following Owner of a technology / IoT company. Passionate about technology and how it can improve our life and environment. I also do a bit of whinging on the side!!Shiva @shivarambharati
78 Followers 841 Followingnorth north @imhereforaccess
24 Followers 42 FollowingJose Alcalde @alcalde_TICs
5 Followers 72 FollowingValon Dauti @vdauti997
50 Followers 17 Following Defending Cyberspace | Cyber Security Engineer | CTI Analyst | Digital ForensicsSandeep Negi @svjnegi
59 Followers 334 FollowingPierre B @bontoux
86 Followers 704 Following Looking forward... ESFJ-a (C.G. Jung) my tweets are my own. [email protected]Mr whiskey @mira34124
7 Followers 47 FollowingElliotSecOps @ElliotSecOps
2K Followers 202 Following Especialista en Cloud Security 🛡️ Cybersecurity | Pentesting | Cloud Computing | Noticias relacionadas al hacking.Urizen @Uriel_ac
139 Followers 113 Following I make my own music 🎵 Cybersecurity https://t.co/zJJ5YPqpV5Erick Obregon @ErickObre
15 Followers 80 FollowingCristobal Aljaro @crialpe
21 Followers 161 FollowingJanaka Sampath @JanakaSamp96948
0 Followers 35 FollowingNdiana Umoh @Cyber_Ndiana
0 Followers 16 FollowingMarc @snavemarc
2K Followers 5K Following Nerd. Interests: Tech, Privacy, Cybersecurity. Developer. Dating the delightful @Katelouise23981 PGP: https://t.co/dti1RPc5d0Ganesh B @bgh9540
4 Followers 157 FollowingEliud Tuwei @ETuwei
7 Followers 67 FollowingShubham Sharma @Shubham_pen
53K Followers 96 Following In cybersecurity, you should be eager to learn new things.Florian Roth @cyb3rops
180K Followers 2K Following Head of Research @nextronsystems #DFIR #YARA #Sigma | detection engineer | creator of @thor_scanner, Aurora, Sigma, LOKI, YARA-Forge | always busy ⌚️🐇vx-underground @vxunderground
291K Followers 211 Following The largest collection of malware source code, samples, and papers on the internet. Password: infectedBleepingComputer @BleepinComputer
212K Followers 175 Following Breaking cybersecurity and technology news, guides, and tutorials that help you get the most from your computer. DMs are open, so send us those tips!GBHackers on Security @gbhackers_news
8K Followers 2K Following Globally Trusted Cybersecurity & Hacking News Platform. Get Daily Live updates on #Breakingnews #Hackingnews #Investigation #CyberAttack #Breach #MalwarePentester Academy @SecurityTube
188K Followers 15K Following We help professionals acquire the skills, knowledge and certificates by teaching defense through offense to advance their careers in cybersecurity.The Cyber Security Hu.. @TheCyberSecHub
162K Followers 403 Following World's Premier Cyber Security Portal™ #cybersecurity #infosec #hacking #tech 📧 [email protected]Blue Team News @blueteamsec1
44K Followers 9K Following The cybersecurity home for the latest #BlueTeam, #DFIR, and #ThreatHunting news and tools.Kaspersky @kaspersky
321K Followers 123 Following Kaspersky is the world’s largest privately held vendor of Internet security solutions for businesses and consumers. For support, visit https://t.co/enRPRUIwcmInfosecurity Magazine @InfosecurityMag
236K Followers 900 Following The only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.MalwareHunterTeam @malwrhunterteam
219K Followers 36 Following Official MHT Twitter account. Check out ID Ransomware (created by @demonslay335). More photos & gifs, less malware.NCSC UK @NCSC
140K Followers 480 Following We are the National Cyber Security Centre – part of the UK’s intelligence & cyber agency @GCHQ. We help to make the UK the safest place to live and work online.Binni Shah @binitamshah
132K Followers 175 Following Linux Evangelist, Malwares , Security Enthusiast, Philanthropist , Reformist , Jain. binitamshah at protonmail dot comPtrace Security GmbH @ptracesecurity
53K Followers 883 Following Empowering IT Security Professionals through Hands-On Online Courses.OffSec @offsectraining
311K Followers 119 Following Empowering the world to fight cyber threats with indispensable cybersecurity skills and resources. Build the path to a secure future with OffSec.Jake Williams @MalwareJake
131K Followers 2K Following Breaker of software | GSE #150 | CTI/DFIR | @ians_security faculty | Bookings: jake at malwarejake dot com | He/himEchoSecureLabs @EchoSecureLabs
51K Followers 204 Following Stay up-to-date on the latest cybersecurity trends and protect yourself and your business with our expert insights and analysis.Dark Reading @DarkReading
326K Followers 47 Following One of the most widely read and trusted cybersecurity news sites, providing IT security professionals informed insights into the latest news and trends.Naked Security @NakedSecurity
91K Followers 203 Following We’ve moved! For the full archive of Naked Security articles and to continue getting the latest Sophos security insights, visit https://t.co/TwnNJ21Cxq or @SophosXOpsSecurityWeek @SecurityWeek
220K Followers 3K Following #Cybersecurity News, Threats, Insights and Expert Analysis: #SCADA #Infosec #ICS CoverageCyberKnow @Cyberknow20
30K Followers 3K Following Situational Awareness | Threat Intelligence | #cybertracker | Hacktivist tracker | Meme Farmer 🇦🇺🇦🇺 Posts and Opinions are my ownHackManac @H4ckManac
28K Followers 181 Following We manage the largest repository of successful public known cyber attacks aiding our customers in crafting superior Cyber Security Strategies optimizing budgetsDark Web Informer @DarkWebInformer
24K Followers 35 Following I provide intel from the #DarkWeb & #Clearnet. Ransomware, Darknet Markets, Threat Alerts, Breaches, & more! Inform your infosec team, if data has been exposed!Zscaler ThreatLabz @Threatlabz
5K Followers 33 Following Threat intelligence and security research from @zscalerFortiGuard Labs @FortiGuardLabs
41K Followers 724 Following #FortiGuardLabs is the global threat intelligence and research organization of @Fortinet.Kimberly @StopMalvertisin
16K Followers 631 Following Security Researcher | Cyber Threat / Malware Analyst | Ex Sr. Threat Analyst @ Proofpoint | Founder of Stop Malvertisingblackorbird @blackorbird
28K Followers 600 Following Peace and Love. Just Analysis/Hunter. #APT #threatIntelligence #Exploit Need JobSeba García @eldracote
4K Followers 2K Following Machine learning for network behavior attacks/malware/security. Founder of Stratosphere Labs, @womenintechfund and Mateslab Hackspace. Free your self.National Security Div.. @DOJNatSec
19K Followers 4 Following NSD’s mission is to carry out the Dept’s highest priority: protect the USA from threats to our National Security. Privacy policy: https://t.co/BGjlHW5wALJPCERT/CC @jpcert_en
10K Followers 8 Following Official English Twitter account for JPCERT/CC on security alerts, blog posts, publications, etc. For Inquiries, email [email protected].Citizen Lab @citizenlab
122K Followers 1K Following Research & development at the intersection of cyberspace, global security & human rights. Munk School of Global Affairs & Public Policy, University of TorontoESET @ESET
293K Followers 3K Following For over 30 years we‘ve helped watch over your progress, protecting it with our digital security solutions. Ours is the story of Progress. Protected.Radware @radware
13K Followers 5K Following A leading provider of application delivery & cyber security solutions ensuring optimal service level for applications in virtual, cloud and SDDCs.Cyber_OSINT @Cyber_O51NT
15K Followers 295 Following OSINT treasure hunter, investigator, Cyber Threat Intel analyst, cyberspace explorer. I enjoy studying cyber threat actors. Opinions are my own.Check Point Research @_CPResearch_
21K Followers 115 Following Fighting cyber threats one research at a time. News from Check Point’s (@checkpointSW) Research team. Podcast: https://t.co/Cp128Xv0CM…Cisco Talos Intellige.. @TalosSecurity
48K Followers 171 Following The Official Twitter account of the Cisco Talos Intelligence Group. Support requests: https://t.co/LGrHyYbolXResecurity® @RESecurity
4K Followers 995 Following We provide technology that empowers organizations to reimagine cybersecurity & protect what matters #SaaS #DigitalRiskManagement #CyberThreatIntelligenceHPE Aruba Networking @HPE_Aruba_NETW
73K Followers 2K Following We’re changing the rules of networking to make it amazingly simple for IT to create amazing experiences at the Edge.Group-IB Threat Intel.. @GroupIB_TI
8K Followers 189 Following Official account of the @GroupIB Threat Intelligence Unit. Latest research, analytics, IOCs and threat alerts.Carbon Black @carbonb1ack
28K Followers 5K Following Carbon Black empowers top security teams to close the Risk Gap they face today: https://t.co/VDD65U8Ty9Threat Insight @threatinsight
10K Followers 228 Following @Proofpoint's insights on targeted attacks & the security landscape. Follow us on Mastodon: https://t.co/DT0pYpwuxy.Check Point Software @CheckPointSW
71K Followers 3K Following You deserve the best security. Get the protection you need against Gen V attacks.SafeBreach @safebreach
2K Followers 548 Following SafeBreach simulates hacker breach methods to quantify risks and validate how well your security controls can stand up to a breach. Funded by @SequoiaMcAfee @McAfee
118K Followers 344 Following We make life online safe and enjoyable for everyone. For help 💻📱reach out to @McAfee_HelpIndusface @Indusface
4K Followers 827 Following A leading #appsec company protecting 5000+ customers. Our products are available on-premise, as a service (AppTrana) & through the AWS marketplace.CrowdStrike @CrowdStrike
79K Followers 788 Following The first cloud-native platform that protects endpoints, cloud workloads, identity & data. Start your free trial today: https://t.co/msBcUPjFKoBitdefenderLabs @BitdefenderLabs
22K Followers 543 Following Bitdefender is a Global Leader in Cybersecurity Protecting millions of consumer and business environments since 2001WithSecure™ @WithSecure
72K Followers 4K Following WithSecure™ is the strategic partner for businesses that want measurable cyber security outcomes. From Europe. Trusted by the world. Formerly F-Secure Business.Trellix Advanced Rese.. @TrellixARC
47K Followers 2K Following The Future of XDR. We Bring Security to Life.eSentire @eSentire
6K Followers 2K Following The Authority in Managed Detection and Response. We hunt, investigate, and stop threats before they disrupt your business. Visit https://t.co/wHxNSjo2oxThreat Intel Center @threatintelctr
3K Followers 117 Following #threatintelligence bot tweeting latest Common Vulnerabilities and Exposures published or modified today in realtime from @NISTCyber.Intel Security @IntelSecurity
36K Followers 330 Following @Intel is at the forefront of silicon-level #security innovation working across the ecosystem to help protect customers from emerging threats.XSS Payloads @XssPayloads
43K Followers 0 FollowingCVE Announcements @CVEannounce
23K Followers 5 Following Account maintained by the CVE Program to update the community on CVE-related announcements. https://t.co/2P9qfFa8PUProjectDiscovery.io @pdiscoveryio
30K Followers 121 Following Making cybersecurity accessible to everyone. Join us for the security conference for all things open source: Hardly Strictly Security: https://t.co/R7NlVw3cBJShodan @shodanhq
101K Followers 2 Following Monitor your external network, search the Internet of Things and perform empirical market research. You can also find us on https://t.co/nPLFbFy8R5Intezer @IntezerLabs
10K Followers 540 Following Tweets about security research, incident response, and SecOps automation. We built the Autonomous SOC platform - try it free: https://t.co/7NqZ3ZU0OOMicrosoft Security @msftsecurity
352K Followers 338 Following A new era of cybersecurity is here. Explore Microsoft Copilot for Security today.CVE Trends @CVEtrends
9K Followers 0 Following Monitor trending CVEs in real-time; crowdsourced intel sourced from Twitter, NIST NVD, Reddit, and GitHub. Run by @SimonByteSecurelist @Securelist
20K Followers 1K Following The resource for Kaspersky experts' technical research, analysis, and thoughts.Trend Micro @TrendMicro
115K Followers 4K Following We're a global leader in cybersecurity that helps make the world safe for exchanging digital information.GitHub Security Lab @GHSecurityLab
26K Followers 15 Following GitHub Security Lab’s mission is to inspire and enable the community to secure the open source software we all depend on.Doug Madory @DougMadory
9K Followers 805 Following Director of Internet Analysis at @Kentikinc. Alum of @dynresearch @renesys @uva @dartmouth @usairforceMorphisec @morphisec
2K Followers 637 Following We stop the attacks others don't with advanced anti-ransomware, threat prevention, and risk-based vulnerability prioritization #AMTDCyble @cybleglobal
23K Followers 58 Following World's Fastest-Growing AI-Powered Cybersecurity Company (YC W21).CVE.report @CVEreport
2K Followers 7 Following https://t.co/g798XHB0Ba #0day #Exploit #Vulnerability #Exploits #Vulnerabilities #ZeroDay Tracking the latest CVE VulnerabilitiesAvast Threat Labs @AvastThreatLabs
3K Followers 25 Following The global #cybersecurity network feed of security researchers protecting over 400 million people from new and emerging online threats.Can you trust the person behind a YouTube channel? As reported by @The_Cyber_News, some hackers use the social media platform to direct people, especially children, to download malware. Read for more. cybersecuritynews.com/hackers-hijack…
Hackers Hijacked Notepad++ Plugin To Execute Malicious Code The AhnLab Security Intelligence Center (ASEC) has detected a sophisticated cyberattack targeting users of the popular text and code editor, Notepad++. The plugin in question, “mimeTools.dll,” is a standard component…
A GitHub user and pentester recently unveiled DarkGPT, an AI OSINT tool to help detect leaked databases. Learn more from @The_Cyber_News. cybersecuritynews.com/darkgpt-ai-osi…
🚨 Vulnerability in #WordPress Plugin Exposes Over 40,000 Websites to #CyberAttack 🔥 Read ➡️ bit.ly/3TMfCJM CVE-2024-27956 Unauthenticated Arbitrary SQL Execution CVE-2024-27954 Unauthenticated Arbitrary File Download And SSRF #Hacking #ethicalhacking…
@The_Cyber_News Thanks for the enlightenment.
🔄 Understand the key risks associated with #LLMs and the best practices to manage risks when working with LLMs: (link in thread) @The_Cyber_News #NLP #ChatGPT #AI #ML #cybersecurity #cybercriminals #hacking #ddosattacks #api #apptrana #indusface
We're honored to be featured h/t @The_Cyber_News in a piece emphasizing the crucial role our platform plays in automating compliance checks, streamlining documentation & ensuring a seamless certification process for CISOs >> hubs.ly/Q02dwfqK0
Our #FortiGuardLabs team recently analyzed the new #ransomware group, #Rhysida, and found that it attacks #Windows machines through #VPN devices and RDP, and is targeting industries such as education and manufacturing. 📚 🦾 Learn more: ftnt.net/6011REwSR @The_Cyber_News
The @FortiGuardLabs team recently analyzed the new #ransomware group, #Rhysida, and found that it attacks #Windows machines through #VPN devices and RDP, and is targeting industries such as education and manufacturing. 📚 🦾 Learn more: ftnt.net/6012RHvEm via @The_Cyber_News
🚨Is Your Online Store Hacked in a Carding Attack? Here’s an Action Plan to Protect Via @Indusface Read more: cybersecuritynews.com/carding-attack/ Carding attacks primarily target information embedded in payment cards, such as credit or debit cards. The attackers, known as carders,…
👉 Try #virtualpatching and start fixing your #vulnerabilities in a day! Understand how: (link in thread) @tumblr #webappsecurity #databreaches #vulnerabilitymanagement #vulnerabilityassessment #waf #apptrana #indusface
We were recently featured in @The_Cyber_News "4 Cyber Threats that Frequently Evade Detection and How to Address Them". Find out how we detect cloned websites, protect customers, and minimize damage: eu1.hubs.ly/H05x9Py0 #cybersecurity #websitespoofing
Our analysis of an attempt to steal the cloud identity in a SQL Server instance for lateral movement highlights the importance of securing cloud identities and implementing least privilege practices when deploying cloud-based and on-premises solutions: msft.it/60129oYRy
😱 🤖 Silent but deadly! : "#Botnet-Driven Low-Rate HTTP #DDoS Attacks" Instead of flooding, they creep in under the radar, sending small, persistent requests: (Link in thread) @gbhackers_news #botattacks #securitysolutions #DDoSprotection #DDoSmitigation #apptrana #indusface
Check Point Data Loss Prevention is highlighted as one of the top 10 #DLP software by @The_Cyber_News! View the full list and learn how we pre-emptively monitor, detect, and block sensitive data from leaving your business. cybersecuritynews.com/data-loss-prev…
🎉Excited for #IndoSec2023, #Indonesia's top cybersecurity event! 🚀We are thrilled to participate and interact with the best minds to discuss and shape the future of cybersecurity. 🎯Stay tuned with us & @Tradepassglobal for updates. 👉To register: indosecsummit.com
"More malicious npm packages found in wake of JumpCloud supply chain hack" published by Reversinglabs. #JumpCloud, #NPM, #CTI, #OSINT, #LAZARUS reversinglabs.com/blog/more-mali…
@The_Cyber_News has named Syxsense one of the best #vulnerabilitymanagement tools of the year! Get all the details here: hubs.la/Q01YThH_0 #cybersecurity #endpointsecurity #patchmanagement