Cyber Threat Alliance
banner
cyberalliance.bsky.social
Cyber Threat Alliance
@cyberalliance.bsky.social
CTA is a group of cybersecurity practitioners who work together to improve the overall security of the global digital ecosystem. We are stronger together. www.cyberthreatalliance.org
Nominations Are Now Open for the Third Annual Cyber Policy Awards!
Submit your nominations by December 5th to recognize outstanding contributions in one of seven categories.

securityandtechnology.org/event/third-...
Submit your nomination here: form.jotform.com/252225026250...
Cyber Policy Awards Nominations
Please click the link to complete this form.
form.jotform.com
November 14, 2025 at 12:34 PM
"Deterrence is a challenge for every administration; throughout history, the United States has often threatened not to tolerate certain actions, but then failed to respond when those actions occurred" @cyallianceprez.bsky.social
cyberscoop.com/trump-cyber-...
#cybersecurity #deterrence #cyberattack
While White House demands deterrence, Trump shrugs
U.S. cyber officials have pushed for strong action against foreign hacking, while President Trump has downplayed threats, creating mixed signals on cyber defense policy.
cyberscoop.com
November 13, 2025 at 2:32 PM
Check out @cyberalliance.bsky.social member @rapid7.com's new Q3 2025 Threat Landscape Report.
It's a great deep dive into the latest cyber threats. Worth a read!

#cybersecurity #ransomware #threatresearch
www.rapid7.com/blog/post/tr...
Rapid7’s Q3 2025 Threat Landscape Report
The Q3 2025 Threat Landscape Report, authored by the Rapid7 Labs team, paints a clear picture of an environment where attackers are moving faster, working smarter, and using artificial intelligence to...
www.rapid7.com
November 12, 2025 at 6:53 PM
Our @cyberalliance.bsky.social member TrinityCyber recently shared their research on a new threat that tricks visitors of typo-squatted domains into downloading Microsoft Store apps that contain browser hijacking malware.

www.trinitycyber.com/blog/blurred...
#cybersecurity #typosquatting
Blurred Lines: AdTech Abuse Delivers Browser Hijackers Through the Microsoft Store
Attackers exploit typo-squatted domains and trusted platforms like the Microsoft Store to deliver the PhantomJack browser hijacker through the PseudoTDS campaign. Learn how to protect yourself.
www.trinitycyber.com
November 12, 2025 at 12:22 PM
Our @cyberalliance.bsky.social member @telefonica-en.bsky.social discusses Automation in Cyber Security: are we ready?
"Automation isn’t the end of the road, it’s the beginning of a new way to defend ourselves."
telefonicatech.com/en/blog/auto...
#cybersecurity
Automation in Cyber Security: are we ready?
We explore the evolution and challenges of automation in Security Operations Centers (SOC), highlighting how new technologies enable faster, more accurate incident detection and response through autom...
telefonicatech.com
November 11, 2025 at 3:11 PM
Recordings Available!
CyberNextDC 2025 brought together top minds from govt & industry to tackle emerging risks, boost supply chain resilience & shape cybersecurity’s future. We spotlighted bold strategies for a stronger digital world
#CyberNextDC #Cybersecurity #Cyberpolicy
tinyurl.com/mtuw4uj5
CyberNextDC 2025 - YouTube
As cyberattacks continue to hammer networks and critical infrastructure — threatening economic stability and global trust — it has never been more important ...
www.youtube.com
November 4, 2025 at 9:08 PM
Want to stay ahead of cyber threats? @cyberalliance.bsky.social members get exclusive early access to #cyberthreat blogs, research, and reports - often 24–72 hours before the public. You can anticipate, prepare, and protect before others even know what’s coming.
Join us!
www.cyberthreatalliance.org
Home - Cyber Threat Alliance
CTA works to improve the cybersecurity of our global digital ecosystem by sharing real-time, high-quality cyber threat information.
www.cyberthreatalliance.org
October 30, 2025 at 4:46 PM
Join us in congratulating @cyallianceprez.bsky.social for being honored with the Cyber Future Foundation Cyber Futurist Award. Congratulations, Michael. Well deserved!
#cybersecurity #cyberpolicy #leadership
October 27, 2025 at 9:55 PM
CTA's @cyallianceprez.bsky.social said "the downsizing runs the risk of leaving CISA blind to certain threats and trends and will also limit CISA’s ability to influence the private sector and communicate its priorities.”
tinyurl.com/5n92cncb
#cybersecurity #cyberpolicy
CISA’s international, industry and academic partnerships slashed
The latest round of sweeping layoffs could hamper the business community’s collaboration with the beleaguered cyber agency.
tinyurl.com
October 23, 2025 at 4:20 AM
Don't miss the NGO-ISAC Annual Conference – December 4 in Washington, DC
This important event focuses on tackling the critical security challenges facing civil society organizations
Registration is complimentary for all attendees
www.ngoisac.org/2025-confere...
#cybersecurity #criticalinfrastructure
2025 NGO-ISAC Conference | NGO-ISAC
www.ngoisac.org
October 17, 2025 at 6:18 PM
The @cyberalliance.bsky.social four founding CEO's - normally fierce competitors - sat down together to talk about why they chose to share intelligence. Their goal? To better protect the digital world we rely on. This conversation reveals why we are #strongertogether
www.youtube.com/watch?v=i50f...
CTA Founding CEO's Panel
YouTube video by Cyber Threat Alliance
www.youtube.com
October 17, 2025 at 3:14 PM
CTA member @rapid7.com dives into the F5 Breach...
Organizations using F5 technologies should take immediate, prioritized action to validate the integrity of their environments and reduce potential exposure stemming from this incident.
www.rapid7.com/blog/post/ve...
#cybersecurity #breach
Inside the F5 Breach: What We Know and Recommended Actions
Rapid7 Labs reports & advises on a breach that F5 Networks recently disclosed – attributed to a sophisticated nation-state actor.
www.rapid7.com
October 17, 2025 at 2:38 PM
“Diplomatically, we need to have the international community come together and start putting pressure on those countries that are harbouring cyber criminals and saying, 'you are acting outside the interests of the common good'. More diplomatic pressure – More economic pressure
tinyurl.com/yc8fy8ex
'We're continuously under attack': Experts warn of AI and quantum-powered cyber threat | The National
Online security in focus at World Economic Forum event in Dubai
www.thenationalnews.com
October 14, 2025 at 5:01 PM
CTA @cyallianceprez.bsky.social said the agency might not currently have the staff to respond to a major #cybersecurity incident. “You’re talking about an agency that’s really sort of operating at a bare bones kind of level, these are threats that don’t tend to take a break”
tinyurl.com/mtr35zf7
Lawmakers sound alarm over lapsed cybersecurity law - Roll Call
The lapse of two key federal programs could discourage information sharing between companies and the government, leaving an opening for a cyberattack.
rollcall.com
October 13, 2025 at 5:38 PM
"These changes increase the likelihood that a problem will be missed or overlooked, and they will make marshaling the capability to respond to significant incidents harder," @cyallianceprez.bsky.social

www.govinfosecurity.com/cisa-in-disa...
#cybersecurity #CISA2015 #cyberpolicy
CISA in Disarray Amid Shutdown and Growing Political Threats
Facing major turnover, partisan upheaval and a government shutdown, the U.S. cyber defense agency is now operating at a fraction of its strength, leaving states and
www.govinfosecurity.com
October 13, 2025 at 5:30 PM
Next-gen computing isn’t just faster, it’s fundamentally different. Quantum, neuromorphic, biological, orbital. It’s expanding cyberspace, but also attack surface. Security must be embedded from day one, or we risk building brilliance on a brittle foundation. #QuantumComputing
tinyurl.com/bddjtkps
Securing next-generation computing capabilities for all
Cybersecurity should be built into next-generation computing engineering and deployment processes, but it doesn’t have to mean compromising capability.
www.weforum.org
October 10, 2025 at 1:50 PM
Now on stage at @CyberNextDC: Safeguarding the Backbone: Cybersecurity for Essential Services
Products are facing the internet that were never designed to face the internet. Secure by Operations can manage this.
@gca.bsky.social cyberseccenter.bsky.social
@cyberalliance.bsky.social
#cyberpolicy
October 8, 2025 at 7:04 PM
October 8, 2025 at 6:38 PM
The Next Disruption: Agentic AI and the Business of Cybersecurity now speaking at #CyberNextDC
AI can help with vetting if someone is a 'real' person when recuriting and hiring. Ensure you have processes and audits in place.
@cyberseccenter.bsky.social ky.social @cyberalliance.bsky.social
October 8, 2025 at 5:29 PM
Steve Vintz Co-Chief Executive Officer, Tenable speaking at #CyberNextDC
"21st century threat with 20th century bureaucracy"
#cyberpolicy #cybersecurity
@cyberseccenter.bsky.social @cyberalliance.bsky.social
October 8, 2025 at 5:17 PM
Now at #CyberNextDC: Vulnerable: Weakness in the Nation's Vulnerability Management System
CVE helps us all know we are talking about the same thing. It is critical not just in US but govts & industry worldwide!
Recognize this is an international effort & impact. It can't be single source of funding
October 8, 2025 at 3:43 PM