Current space

Members

Filtered creator directory for "security".

Directory 201.5K Indexed posts 43M Verified 0
Active AuthorsRecent indexed creators Registered MembersAccount directory Completed ProfilesProfiles with public details VerifiedTrusted member signals
201.5KActive members
43MIndexed posts
286KDetailed profiles
36Sources in this view

Active authors

Showing directory results matching your search with real activity counts for visible profiles.

Page 1 | 36 shown
9
Privacy Policy - AirSight
Contact Us | Airspace Security Solutions | AirSight
Drone Detection Knowledge Hub | Essential Airspace Security | Airsight
Privacy Policy - AirSight
911 security avatar
@911 security
911 Security
Feb 12, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 22Posts 1Sources 0Reputation
Latest signal 0 reactions
Privacy Policy - AirSight
airsight.com
0Following 0Comments 0Views 0Shares
A
CCTV Blog - A1 Security Cameras
What is WDR (Wide Dynamic Range) in CCTV
CCTV Blog - A1 Security Cameras
a1securitycam avatar
@a1securitycam
A1securitycam User
Apr 7, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
CCTV Blog - A1 Security Cameras
a1securitycameras.com
0Following 0Comments 0Views 0Shares
A
Data Exposure Analysis: Oracle NetSuite | AppOmni
Agentic AI Security Vulnerability in ServiceNow Exposed | AppOmni
Stop Prompt Injection Attacks in ServiceNow with AppOmni AgentGuard
Data Exposure Analysis: Oracle NetSuite | AppOmni
Aaron Costello, Chief of Security Research, AppOmni avatar
@Aaron Costello, Chief of Security Research, AppOmni
Aaron Costello,
Mar 26, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 3Posts 1Sources 0Reputation
Latest signal 0 reactions
Data Exposure Analysis: Oracle NetSuite | AppOmni
appomni.com
0Following 0Comments 0Views 0Shares
A
r2wars: Shall we play a game? - Ackcent
r2wars: Shall we play a game? - Ackcent
Ackcent Cybersecurity avatar
@Ackcent Cybersecurity
Ackcent Cybersecurity
Jan 23, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
r2wars: Shall we play a game? - Ackcent
ackcent.com
0Following 0Comments 0Views 0Shares
A
Securing Roblox: How Our Security Organization Enables Innovation, Trust, and Scale | Roblox
Securing Roblox: How Our Security Organization Enables Innovation, Trust, and Scale | Roblox
Ahmad Alomari, Sr. Manager, Application Security avatar
@Ahmad Alomari, Sr. Manager, Application Security
Ahmad Alomari,
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Securing Roblox: How Our Security Organization Enables Innovation, Trust, and Scale | Roblox
about.roblox.com
0Following 0Comments 0Views 0Shares
A
Aikido Security Raises $60 Million Series B at $1 Billion
Aikido Security Raises $60 Million Series B at $1 Billion
Aikido Security avatar
@Aikido Security
Aikido Security
Feb 7, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Aikido Security Raises $60 Million Series B at $1 Billion
globenewswire.com
0Following 0Comments 0Views 0Shares
A
Oracle Security Services by Red-Database-Security GmbH
PLSQLScanner 2008
Oracle Security Services by Red-Database-Security GmbH
Alexander Kornbrust of Red-Database-Security GmbH avatar
@Alexander Kornbrust of Red-Database-Security GmbH
Alexander Kornbrust
Jan 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Oracle Security Services by Red-Database-Security GmbH
red-database-security.com
0Following 0Comments 0Views 0Shares
A
PLSQLScanner 2008
PLSQLScanner 2008
Alexander Kornbrust von Red-Database-Security GmbH avatar
@Alexander Kornbrust von Red-Database-Security GmbH
Alexander Kornbrust
Jan 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
PLSQLScanner 2008
red-database-security.de
0Following 0Comments 0Views 0Shares
A
AppOmni Launches SaaS & AI Security Packages for Growing Risks | AppOmni
AppOmni in All Major Cloud Marketplaces | AppOmni
AppOmni Launches SaaS & AI Security Packages for Growing Risks | AppOmni
AppOmni Security Experts avatar
@AppOmni Security Experts
AppOmni Security
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
AppOmni Launches SaaS & AI Security Packages for Growing Risks | AppOmni
appomni.com
0Following 0Comments 0Views 0Shares
A
The MCP Server Risk: AI’s Overlooked Supply Chain Threat - Security Boulevard
The MCP Server Risk: AI’s Overlooked Supply Chain Threat - Security Boulevard
AppSOC Security Blog avatar
@AppSOC Security Blog
AppSOC Security
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
The MCP Server Risk: AI’s Overlooked Supply Chain Threat - Security Boulevard
securityboulevard.com
0Following 0Comments 0Views 0Shares
B
Travelex Paid $2.3 Million to Ransomware Gang: Report
How Did the Exchange Server Exploit Leak? - BankInfoSecurity
AI Kills Fictional Executive in Scenario Probing Red Lines
Travelex Paid $2.3 Million to Ransomware Gang: Report
BnkInfoSecurity avatar
@BnkInfoSecurity
BnkInfoSecurity User
Apr 30, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 55Posts 1Sources 0Reputation
Latest signal 0 reactions
Travelex Paid $2.3 Million to Ransomware Gang: Report
bankinfosecurity.com
0Following 0Comments 0Views 0Shares
B
20 Days Later: Trivy Compromise, Act II | Boost Security Labs
20 Days Later: Trivy Compromise, Act II | Boost Security Labs
Boost Security Labs avatar
@Boost Security Labs
Boost Security
Mar 25, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
20 Days Later: Trivy Compromise, Act II | Boost Security Labs
labs.boostsecurity.io
0Following 0Comments 0Views 0Shares
B
Software Supply Chain Security and the Rapidly Evolving Regulatory Landscape - GRC Viewpoint
Software Supply Chain Security and the Rapidly Evolving Regulatory Landscape - GRC Viewpoint
By Liav Caspi, CTO and Co-Founder of Legit Security avatar
@By Liav Caspi, CTO and Co-Founder of Legit Security
By Liav
Jan 24, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Software Supply Chain Security and the Rapidly Evolving Regulatory Landscape - GRC Viewpoint
grcviewpoint.com
0Following 0Comments 0Views 0Shares
C
CSIS-RCMP Framework for Cooperation: One Vision 3.0 - Canada.ca
Canadian Security Intelligence Service avatar
@Canadian Security Intelligence Service
Canadian Security
Mar 25, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
CSIS-RCMP Framework for Cooperation: One Vision 3.0 - Canada.ca
canada.ca
0Following 0Comments 0Views 0Shares
C
CI/CD Cybersecurity Guide | CD Foundation
CI/CD Cybersecurity Guide | CD Foundation
CD Foundation CI/CD Cybersecurity SIG avatar
@CD Foundation CI/CD Cybersecurity SIG
CD Foundation
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
CI/CD Cybersecurity Guide | CD Foundation
cicd-cybersecurity.netlify.app
0Following 0Comments 0Views 0Shares
C
Center for Internet Security President and CEO William F. Pelgrin Retires After Distinguished Career Dedicated to Improving Cybersecurity
Center for Internet Security President and CEO William F. Pelgrin Retires After Distinguish...
Center for Internet Security avatar
@Center for Internet Security
Center For
Feb 2, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Center for Internet Security President and CEO William F. Pelgrin Retires After Distinguished Career Dedicated to Imp...
prweb.com
0Following 0Comments 0Views 0Shares
C
White Christian Privilege: The Illusion of Religious Equality in AmericaSeptember 9, 202012:00pm EST - Rutgers Center for Security, Race and Rights
White Christian Privilege: The Illusion of Religious Equality in AmericaSeptember 9, 202012...
Center for Security Race & Rights avatar
@Center for Security Race & Rights
Center For
Feb 6, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
White Christian Privilege: The Illusion of Religious Equality in AmericaSeptember 9, 202012:00pm EST - Rutgers Center...
csrr.rutgers.edu
0Following 0Comments 0Views 0Shares
C
House Committee Expands Use of Foreign Agent Registration Act to Target Environmental Advocacy Groups - Charity & Security Network
UN/USAID Report: Somalia Famine Death Toll Higher Than Estimated, Inadequate Aid Among Factors - Charity & Security Network
Conviction of Holy Land Foundation Raises Questions, Concerns for Nonprofits - Charity & Security Network
House Committee Expands Use of Foreign Agent Registration Act to Target Environmental Advoc...
Charity-and-Security avatar
@Charity-and-Security
Charity-and-Security User
Mar 20, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 6Posts 1Sources 0Reputation
Latest signal 0 reactions
House Committee Expands Use of Foreign Agent Registration Act to Target Environmental Advocacy Groups - Charity & Sec...
charityandsecurity.org
0Following 0Comments 0Views 0Shares
C
Q&A (Part II): Ukraine at the International Court of Justice, Russia's Absence & What Comes Next
Q&A (Part II): Ukraine at the International Court of Justice, Russia's Absence & What Comes...
Chimène Keitner, Zoe Tatarsky, Just Security avatar
@Chimène Keitner, Zoe Tatarsky, Just Security
Chimène Keitner,
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Q&A (Part II): Ukraine at the International Court of Justice, Russia's Absence & What Comes Next
justsecurity.org
0Following 0Comments 0Views 0Shares
C
'Hostages release is huge step but there are still worrying barriers to peace in Middle East' - The Mirror
'Hostages release is huge step but there are still worrying barriers to peace in Middle Eas...
Chris Hughes in Tel Aviv Defence and Security Editor avatar
@Chris Hughes in Tel Aviv Defence and Security Editor
Chris Hughes
Feb 5, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
'Hostages release is huge step but there are still worrying barriers to peace in Middle East' - The Mirror
mirror.co.uk
0Following 0Comments 0Views 0Shares
C
Israel Gaza war: Iran warning of 'pre-emptive action' in 'coming hours' ahead of invasion - The Mirror US
Israel Gaza war: Iran warning of 'pre-emptive action' in 'coming hours' ahead of invasion -...
Chris Hughes, Defence and Security Editor avatar
@Chris Hughes, Defence and Security Editor
Chris Hughes,
Feb 5, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Israel Gaza war: Iran warning of 'pre-emptive action' in 'coming hours' ahead of invasion - The Mirror US
themirror.com
0Following 0Comments 0Views 0Shares
C
Gemini Prompt Injection & Copilot Reprompt: Why LLMs Fail
Cloud Security Newsletter
AI Native Security: Securing the Future as Applications Evolve with AI | Google Cloud Functions Vulnerability
Gemini Prompt Injection & Copilot Reprompt: Why LLMs Fail
Cloud Security Newsletter avatar
@Cloud Security Newsletter
Cloud Security
Jan 23, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 3Posts 1Sources 0Reputation
Latest signal 0 reactions
Gemini Prompt Injection & Copilot Reprompt: Why LLMs Fail
cloudsecuritynewsletter.com
0Following 0Comments 0Views 0Shares
C
Combating Military Obesity | ASP American Security Project
Perspective — The U.S.-China LNG Export Dilemma: Reclaiming Leverage in an Imbalanced Trade Relationship | ASP American Security Project
White Paper: Costs and Consequences of Military Obesity American Security Project
Combating Military Obesity | ASP American Security Project
cmanning@americansecurityproject.org avatar
@cmanning@americansecurityproject.org
Cmanning@americansecurityproject.org User
Apr 26, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 4Posts 1Sources 0Reputation
Latest signal 0 reactions
Combating Military Obesity | ASP American Security Project
americansecurityproject.org
0Following 0Comments 0Views 0Shares
C
Cybereason vs. HermeticWiper and IsaacWiper
MITRE ATT&CK 2024: Operational Excellence Defined
Cybereason vs. HermeticWiper and IsaacWiper
Cybereason Security Research Team avatar
@Cybereason Security Research Team
Cybereason Security
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Cybereason vs. HermeticWiper and IsaacWiper
cybereason.com
0Following 0Comments 0Views 0Shares
C
Fake Installer: Ultimately, ValleyRAT infection
Cuckoo Spear – the latest Nation-state Threat Actor targeting Japanese companies
CUCKOO SPEAR Part 1: Analyzing NOOPDOOR from an IR Perspective
Fake Installer: Ultimately, ValleyRAT infection
Cybereason Security Services Team avatar
@Cybereason Security Services Team
Cybereason Security
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 18Posts 1Sources 0Reputation
Latest signal 0 reactions
Fake Installer: Ultimately, ValleyRAT infection
cybereason.com
0Following 0Comments 0Views 0Shares
C
Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand - Security Boulevard
Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand - Security Boulevard
Cybereason Security Team avatar
@Cybereason Security Team
Cybereason Security
Apr 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand - Security Boulevard
securityboulevard.com
0Following 0Comments 0Views 0Shares
C
Hackers exploit React Native Metro vulnerability to launch cross-platform attacks
Cybersecurity Help avatar
@Cybersecurity Help
Cybersecurity Help
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 7Posts 1Sources 0Reputation
Latest signal 0 reactions
Hackers exploit React Native Metro vulnerability to launch cross-platform attacks
cybersecurity-help.cz
0Following 0Comments 0Views 0Shares
C
SSE Decoded: Answers to Your Questions About Security Service Edge - Cybersecurity Insiders
Harnessing AI to Strengthen Cyber Teams Amidst Talent Shortage - Cybersecurity Insiders
SSE Decoded: Answers to Your Questions About Security Service Edge - Cybersecurity Insiders
Cybersecurity Insiders avatar
@Cybersecurity Insiders
Cybersecurity Insiders
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
SSE Decoded: Answers to Your Questions About Security Service Edge - Cybersecurity Insiders
cybersecurity-insiders.com
0Following 0Comments 0Views 0Shares
C
Gartner: Future of identity management is mobile, SaaS - Security Boulevard
Gartner: Future of identity management is mobile, SaaS - Security Boulevard
Cybersecurity Matters avatar
@Cybersecurity Matters
Cybersecurity Matters
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Gartner: Future of identity management is mobile, SaaS - Security Boulevard
securityboulevard.com
0Following 0Comments 0Views 0Shares
C
Cyberattacks are the fastest growing crime and predicted to cost the world $6 trillion annu...
Cybersecurity Ventures avatar
@Cybersecurity Ventures
Cybersecurity Ventures
Jan 28, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Cyberattacks are the fastest growing crime and predicted to cost the world $6 trillion annually by 2021
prnewswire.com
0Following 0Comments 0Views 0Shares
D
The Art of Compassionate Employee Termination: Tips for Managers
The Art of Compassionate Employee Termination: Tips for Managers
Dahlcore Security Guard Services avatar
@Dahlcore Security Guard Services
Dahlcore Security
Jan 28, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
The Art of Compassionate Employee Termination: Tips for Managers
dahlcore.com
0Following 0Comments 0Views 0Shares
D
Who’s Verifying the Verifier: A Case-Study in Securing LLM Applications - Innovation at Consumer Reports
Who’s Verifying the Verifier: A Case-Study in Securing LLM Applications - Innovation at C...
Dan Leininger, Abraham Kang, Include Security avatar
@Dan Leininger, Abraham Kang, Include Security
Dan Leininger,
Jan 29, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Who’s Verifying the Verifier: A Case-Study in Securing LLM Applications - Innovation at Consumer Reports
10.38.109.147
0Following 0Comments 0Views 0Shares
D
The AI Memory Wars: Why One System Crushed the Competition (And It's Not OpenAI) - Security Boulevard
The AI Memory Wars: Why One System Crushed the Competition (And It's Not OpenAI) - Security...
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author avatar
@Deepak Gupta - Tech Entrepreneur, Cybersecurity Author
Deepak Gupta
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
The AI Memory Wars: Why One System Crushed the Competition (And It's Not OpenAI) - Security Boulevard
securityboulevard.com
0Following 0Comments 0Views 0Shares
D
How we handled a recent phishing incident that targeted Dropbox - Dropbox
How we handled a recent phishing incident that targeted Dropbox - Dropbox
Dropbox Security Team avatar
@Dropbox Security Team
Dropbox Security
Feb 12, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
How we handled a recent phishing incident that targeted Dropbox - Dropbox
dropbox.tech
0Following 0Comments 0Views 0Shares
D
DryRun Security Builds Momentum With Breakthroughs in
DryRun Security Builds Momentum With Breakthroughs in
DryRun Security avatar
@DryRun Security
DryRun Security
Jan 23, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
DryRun Security Builds Momentum With Breakthroughs in
globenewswire.com
0Following 0Comments 0Views 0Shares
D
Duo Desktop | Duo Security
Duo Mobile App | Secure Mobile Authentication | Duo Security
Authentication Methods for Secure Access | Duo Security
Duo Desktop | Duo Security
Duo Security avatar
@Duo Security
Duo Security
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 6Posts 1Sources 0Reputation
Latest signal 0 reactions
Duo Desktop | Duo Security
duo.com
0Following 0Comments 0Views 0Shares