Guy Albertini
gsharpsecurity.bsky.social
Guy Albertini
@gsharpsecurity.bsky.social
Fractional CISO
As AI integrates deeper into business, "logging in" becomes a massive risk. From data poisoning to model theft, compromised credentials are the keys to your AI kingdom. 🤖🔐

Check out G-Sharp Security’s latest breakdown on mitigating these risks:

gsharpsecurity.com/the-new-fron...

#AI #IAM
The New Frontier of Cyber Threats: When Adversaries Log In, Not Break In – G-Sharp Security
gsharpsecurity.com
January 9, 2026 at 10:49 PM
Big changes are coming to VMware licensing under Broadcom. Starting April 10th, the minimum core requirement per CPU is jumping from 16 to a whopping 72 cores!

www.techzine.eu/news/infrast...
Broadcom raises minimum requirement for VMware licenses: from 16 to 72 cores
Broadcom is significantly increasing the minimum requirement for VMware licenses. According to VMware distributor Arrow, the minimum number of required
www.techzine.eu
March 30, 2025 at 12:17 PM
www.nowsecure.com/blog/2025/02...

NowSecure finds DeepSeek iOS app vulnerable to multiple security risks, urging organizations to immediately prohibit its use.
NowSecure Uncovers Multiple Security and Privacy Flaws in DeepSeek iOS Mobile App - NowSecureShare on LinkedinShare on XShare on FacebookShare on Mastodon
A NowSecure mobile application security and privacy assessment has uncovered multiple security and privacy issues in the DeepSeek iOS mobile app that lead As the top iOS app since Jan 25, 2025, the De...
www.nowsecure.com
February 7, 2025 at 2:21 AM
U.S. officials from the FBI and CISA have recommended that Americans use encrypted messaging apps to protect their communications from foreign hackers, amid an unprecedented cyberattack on telecommunications companies such as AT&T and Verizon.

www.nbcnews.com/tech/securit...
U.S. officials urge Americans to use encrypted apps amid cyberattack that exposed live phone calls
Officials from the FBI and CISA said it was impossible to predict when the telecommunications companies would be fully safe from interlopers.
www.nbcnews.com
December 4, 2024 at 1:13 AM
This novel cyberattack method dubbed the “Nearest Neighbor Attack” underscores the importance of securing wireless networks, applying multi-factor authentication (MFA), and promptly patching known vulnerabilities to mitigate such risks.

www.techtarget.com/searchsecuri...
Volexity details Russia's novel 'Nearest Neighbor Attack' | TechTarget
Volexity published research on a new attack style it dubbed the 'Nearest Neighbor Attack' that a Russian nation-state group leveraged in 2022.
www.techtarget.com
November 29, 2024 at 6:51 PM
Reposted by Guy Albertini
Hackers Can Access Laptop Webcams Without Activating LED Indicator
Hackers Can Access Laptop Webcams Without Activating LED Indicator
A critical vulnerability affecting laptop webcams, specifically on ThinkPad X230 models has been recently discovered.
cybersecuritynews.com
November 29, 2024 at 11:11 AM
Reposted by Guy Albertini
Protect Your Smart Home from Cyber Attacks: The Shocking Truth About How Your Devices Are…
Protect Your Smart Home from Cyber Attacks: The Shocking Truth About How Your Devices Are…
Smart devices make our lives easier, but they also could put us, our household or our information in danger.
infosecwriteups.com
November 29, 2024 at 1:01 PM
Insurance company unveiled a policy specifically designed to shield CISOs from personal liability. 

cyberscoop.com/ciso-liabili...
CISOs can now obtain professional liability insurance
New Jersey-based Crum & Forster recently unveiled a policy specifically designed to shield CISOs from personal liability.
cyberscoop.com
November 22, 2024 at 10:40 PM
Reposted by Guy Albertini
CISA Warns of Apple & Oracle Agile Vulnerabilities Exploited in Wild
CISA Warns of Apple & Oracle Agile Vulnerabilities Exploited in Wild
CISA has issued an urgent advisory regarding three critical vulnerabilities affecting Apple and Oracle products.
cybersecuritynews.com
November 22, 2024 at 12:35 PM
Reposted by Guy Albertini
🚀 Join our OSINT 101 Online Meetup and learn essential tools & techniques for investigations! 🌐 From OPSEC to geolocation & sock puppets, we've got you covered. 🕵️‍♀️

📅 When: 26th November
🎙️ Speaker: @mifarelady.bsky.social

🔗 www.meetup.com/nl-NL...

#OSINT #Cybersecurity
OSINT 101: One does not simply "Google it", di 26 nov 2024, 19:00 | Meetup
This meetup was canceled in August so let's do it this time! Are you ready to dive into the world of Open Source Intelligence (OSINT)? Join our OSINT 101 meetup (online),
www.meetup.com
November 21, 2024 at 10:00 AM
Reposted by Guy Albertini
Now for the professional intro! 🧵

I’m Steph, a cybersecurity educator, content creator, and engineer empowering professionals to protect their digital lives and grow their careers on their terms. My focus? Making complex ideas simple, actionable, and relatable. #Cybersecurity #infosec
November 20, 2024 at 3:07 PM
Reposted by Guy Albertini
We need a feed for Threat Intel on Bluesky for us #Cybersecurity and #Infosec people.
Something to share CVE's, attacks, and such rather than just the typical cybersecurity news.
November 21, 2024 at 2:22 PM
Reposted by Guy Albertini
America's drinking water systems have a hard-to-swallow cybersecurity problem
America's drinking water systems have a hard-to-swallow cybersecurity problem
More than 100 million rely on systems rife with vulnerabilities, says EPA OIG Nearly a third of US residents are served by drinking water systems with cybersecurity shortcomings, the Environmental Protection Agency's Office of Inspector General found…
dlvr.it
November 19, 2024 at 8:04 PM
Reposted by Guy Albertini
Howard Community College's Cyber Range will provide experiential learning for students in cybersecurity and information technology fields of study.

Making Maryland more competitive means supercharging new, emerging industries like cyber.
November 21, 2024 at 8:32 PM
Reposted by Guy Albertini
Stop & Shop is still restocking shelves in stores across the region nearly two weeks since after a cybersecurity issue wreaked havoc with the supermarket chain's inventory and online ordering systems. Cybersecurity experts say the cyberattack shows the vulnerability of the local supply chain.
Not just tech: Stop & Shop hack shows cybersecurity matters everywhere
Stop & Shop is still restocking shelves in stores across the region nearly two weeks since after a cybersecurity issue wreaked havoc with the supermarket chain's inventory and online ordering systems....
www.wbur.org
November 22, 2024 at 10:52 AM