Current space

Members

Filtered creator directory for "security ".

Directory 201.5K Indexed posts 43M Verified 0
Active AuthorsRecent indexed creators Registered MembersAccount directory Completed ProfilesProfiles with public details VerifiedTrusted member signals
201.5KActive members
43MIndexed posts
286KDetailed profiles
37Sources in this view

Active authors

Showing directory results matching your search with real activity counts for visible profiles.

Page 1 | 36 shown
A
Data Exposure Analysis: Oracle NetSuite | AppOmni
Agentic AI Security Vulnerability in ServiceNow Exposed | AppOmni
Stop Prompt Injection Attacks in ServiceNow with AppOmni AgentGuard
Data Exposure Analysis: Oracle NetSuite | AppOmni
Aaron Costello, Chief of Security Research, AppOmni avatar
@Aaron Costello, Chief of Security Research, AppOmni
Aaron Costello,
Mar 26, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 3Posts 1Sources 0Reputation
Latest signal 0 reactions
Data Exposure Analysis: Oracle NetSuite | AppOmni
appomni.com
0Following 0Comments 0Views 0Shares
A
Oracle Security Services by Red-Database-Security GmbH
PLSQLScanner 2008
Oracle Security Services by Red-Database-Security GmbH
Alexander Kornbrust of Red-Database-Security GmbH avatar
@Alexander Kornbrust of Red-Database-Security GmbH
Alexander Kornbrust
Jan 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Oracle Security Services by Red-Database-Security GmbH
red-database-security.com
0Following 0Comments 0Views 0Shares
A
PLSQLScanner 2008
PLSQLScanner 2008
Alexander Kornbrust von Red-Database-Security GmbH avatar
@Alexander Kornbrust von Red-Database-Security GmbH
Alexander Kornbrust
Jan 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
PLSQLScanner 2008
red-database-security.de
0Following 0Comments 0Views 0Shares
A
AppOmni Launches SaaS & AI Security Packages for Growing Risks | AppOmni
AppOmni in All Major Cloud Marketplaces | AppOmni
AppOmni Launches SaaS & AI Security Packages for Growing Risks | AppOmni
AppOmni Security Experts avatar
@AppOmni Security Experts
AppOmni Security
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
AppOmni Launches SaaS & AI Security Packages for Growing Risks | AppOmni
appomni.com
0Following 0Comments 0Views 0Shares
A
The MCP Server Risk: AI’s Overlooked Supply Chain Threat - Security Boulevard
The MCP Server Risk: AI’s Overlooked Supply Chain Threat - Security Boulevard
AppSOC Security Blog avatar
@AppSOC Security Blog
AppSOC Security
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
The MCP Server Risk: AI’s Overlooked Supply Chain Threat - Security Boulevard
securityboulevard.com
0Following 0Comments 0Views 0Shares
B
20 Days Later: Trivy Compromise, Act II | Boost Security Labs
20 Days Later: Trivy Compromise, Act II | Boost Security Labs
Boost Security Labs avatar
@Boost Security Labs
Boost Security
Mar 25, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
20 Days Later: Trivy Compromise, Act II | Boost Security Labs
labs.boostsecurity.io
0Following 0Comments 0Views 0Shares
C
CSIS-RCMP Framework for Cooperation: One Vision 3.0 - Canada.ca
Canadian Security Intelligence Service avatar
@Canadian Security Intelligence Service
Canadian Security
Mar 25, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
CSIS-RCMP Framework for Cooperation: One Vision 3.0 - Canada.ca
canada.ca
0Following 0Comments 0Views 0Shares
C
CI/CD Cybersecurity Guide | CD Foundation
CI/CD Cybersecurity Guide | CD Foundation
CD Foundation CI/CD Cybersecurity SIG avatar
@CD Foundation CI/CD Cybersecurity SIG
CD Foundation
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
CI/CD Cybersecurity Guide | CD Foundation
cicd-cybersecurity.netlify.app
0Following 0Comments 0Views 0Shares
C
White Christian Privilege: The Illusion of Religious Equality in AmericaSeptember 9, 202012:00pm EST - Rutgers Center for Security, Race and Rights
White Christian Privilege: The Illusion of Religious Equality in AmericaSeptember 9, 202012...
Center for Security Race & Rights avatar
@Center for Security Race & Rights
Center For
Feb 6, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
White Christian Privilege: The Illusion of Religious Equality in AmericaSeptember 9, 202012:00pm EST - Rutgers Center...
csrr.rutgers.edu
0Following 0Comments 0Views 0Shares
C
'Hostages release is huge step but there are still worrying barriers to peace in Middle East' - The Mirror
'Hostages release is huge step but there are still worrying barriers to peace in Middle Eas...
Chris Hughes in Tel Aviv Defence and Security Editor avatar
@Chris Hughes in Tel Aviv Defence and Security Editor
Chris Hughes
Feb 5, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
'Hostages release is huge step but there are still worrying barriers to peace in Middle East' - The Mirror
mirror.co.uk
0Following 0Comments 0Views 0Shares
C
Israel Gaza war: Iran warning of 'pre-emptive action' in 'coming hours' ahead of invasion - The Mirror US
Israel Gaza war: Iran warning of 'pre-emptive action' in 'coming hours' ahead of invasion -...
Chris Hughes, Defence and Security Editor avatar
@Chris Hughes, Defence and Security Editor
Chris Hughes,
Feb 5, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Israel Gaza war: Iran warning of 'pre-emptive action' in 'coming hours' ahead of invasion - The Mirror US
themirror.com
0Following 0Comments 0Views 0Shares
C
Gemini Prompt Injection & Copilot Reprompt: Why LLMs Fail
Cloud Security Newsletter
AI Native Security: Securing the Future as Applications Evolve with AI | Google Cloud Functions Vulnerability
Gemini Prompt Injection & Copilot Reprompt: Why LLMs Fail
Cloud Security Newsletter avatar
@Cloud Security Newsletter
Cloud Security
Jan 23, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 3Posts 1Sources 0Reputation
Latest signal 0 reactions
Gemini Prompt Injection & Copilot Reprompt: Why LLMs Fail
cloudsecuritynewsletter.com
0Following 0Comments 0Views 0Shares
C
Cybereason vs. HermeticWiper and IsaacWiper
MITRE ATT&CK 2024: Operational Excellence Defined
Cybereason vs. HermeticWiper and IsaacWiper
Cybereason Security Research Team avatar
@Cybereason Security Research Team
Cybereason Security
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Cybereason vs. HermeticWiper and IsaacWiper
cybereason.com
0Following 0Comments 0Views 0Shares
C
Fake Installer: Ultimately, ValleyRAT infection
Cuckoo Spear – the latest Nation-state Threat Actor targeting Japanese companies
CUCKOO SPEAR Part 1: Analyzing NOOPDOOR from an IR Perspective
Fake Installer: Ultimately, ValleyRAT infection
Cybereason Security Services Team avatar
@Cybereason Security Services Team
Cybereason Security
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 18Posts 1Sources 0Reputation
Latest signal 0 reactions
Fake Installer: Ultimately, ValleyRAT infection
cybereason.com
0Following 0Comments 0Views 0Shares
C
Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand - Security Boulevard
Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand - Security Boulevard
Cybereason Security Team avatar
@Cybereason Security Team
Cybereason Security
Apr 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand - Security Boulevard
securityboulevard.com
0Following 0Comments 0Views 0Shares
C
Hackers exploit React Native Metro vulnerability to launch cross-platform attacks
Cybersecurity Help avatar
@Cybersecurity Help
Cybersecurity Help
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 7Posts 1Sources 0Reputation
Latest signal 0 reactions
Hackers exploit React Native Metro vulnerability to launch cross-platform attacks
cybersecurity-help.cz
0Following 0Comments 0Views 0Shares
C
SSE Decoded: Answers to Your Questions About Security Service Edge - Cybersecurity Insiders
Harnessing AI to Strengthen Cyber Teams Amidst Talent Shortage - Cybersecurity Insiders
SSE Decoded: Answers to Your Questions About Security Service Edge - Cybersecurity Insiders
Cybersecurity Insiders avatar
@Cybersecurity Insiders
Cybersecurity Insiders
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
SSE Decoded: Answers to Your Questions About Security Service Edge - Cybersecurity Insiders
cybersecurity-insiders.com
0Following 0Comments 0Views 0Shares
C
Gartner: Future of identity management is mobile, SaaS - Security Boulevard
Gartner: Future of identity management is mobile, SaaS - Security Boulevard
Cybersecurity Matters avatar
@Cybersecurity Matters
Cybersecurity Matters
Feb 8, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Gartner: Future of identity management is mobile, SaaS - Security Boulevard
securityboulevard.com
0Following 0Comments 0Views 0Shares
C
Cyberattacks are the fastest growing crime and predicted to cost the world $6 trillion annu...
Cybersecurity Ventures avatar
@Cybersecurity Ventures
Cybersecurity Ventures
Jan 28, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 2Posts 1Sources 0Reputation
Latest signal 0 reactions
Cyberattacks are the fastest growing crime and predicted to cost the world $6 trillion annually by 2021
prnewswire.com
0Following 0Comments 0Views 0Shares
D
The Art of Compassionate Employee Termination: Tips for Managers
The Art of Compassionate Employee Termination: Tips for Managers
Dahlcore Security Guard Services avatar
@Dahlcore Security Guard Services
Dahlcore Security
Jan 28, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
The Art of Compassionate Employee Termination: Tips for Managers
dahlcore.com
0Following 0Comments 0Views 0Shares
D
The AI Memory Wars: Why One System Crushed the Competition (And It's Not OpenAI) - Security Boulevard
The AI Memory Wars: Why One System Crushed the Competition (And It's Not OpenAI) - Security...
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author avatar
@Deepak Gupta - Tech Entrepreneur, Cybersecurity Author
Deepak Gupta
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
The AI Memory Wars: Why One System Crushed the Competition (And It's Not OpenAI) - Security Boulevard
securityboulevard.com
0Following 0Comments 0Views 0Shares
D
How we handled a recent phishing incident that targeted Dropbox - Dropbox
How we handled a recent phishing incident that targeted Dropbox - Dropbox
Dropbox Security Team avatar
@Dropbox Security Team
Dropbox Security
Feb 12, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
How we handled a recent phishing incident that targeted Dropbox - Dropbox
dropbox.tech
0Following 0Comments 0Views 0Shares
E
Authenticity in Sales: Why it Matters - ESA
Authenticity in Sales: Why it Matters - ESA
Electronic Security Association avatar
@Electronic Security Association
Electronic Security
Jan 29, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Authenticity in Sales: Why it Matters - ESA
esaweb.org
0Following 0Comments 0Views 0Shares
E
Going in-depth on the Windows 10 random number generation infrastructure | Microsoft Security Blog
Going in-depth on the Windows 10 random number generation infrastructure | Microsoft Securi...
Enterprise & Security Team avatar
@Enterprise & Security Team
Enterprise &
Jan 28, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Going in-depth on the Windows 10 random number generation infrastructure | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares
F
The Foundation for Energy Security and Innovation (FESI) Announces Investments to Defend Am...
Foundation for Energy Security and Innovation (FESI) avatar
@Foundation for Energy Security and Innovation (FESI)
Foundation For
Feb 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
The Foundation for Energy Security and Innovation (FESI) Announces Investments to Defend America's Critical Infrastru...
prnewswire.com
0Following 0Comments 0Views 0Shares
F
In journalist security field, maturing and understanding - Committee to Protect Journalists
In journalist security field, maturing and understanding - Committee to Protect Journalists
Frank Smyth/CPJ Journalist Security Coordinator avatar
@Frank Smyth/CPJ Journalist Security Coordinator
Frank Smyth/CPJ
Jan 29, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
In journalist security field, maturing and understanding - Committee to Protect Journalists
cpj.org
0Following 0Comments 0Views 0Shares
G
Digging Gold with a Spoon – Resurgence of Monero-mining Malware
Digging Gold with a Spoon – Resurgence of Monero-mining Malware
G DATA Security Center avatar
@G DATA Security Center
G DATA
Apr 30, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Digging Gold with a Spoon – Resurgence of Monero-mining Malware
blog.gdatasoftware.com
0Following 0Comments 0Views 0Shares
G
Exploring GenAI in Cybersecurity: Gemini for Malware Analysis
Malware by the (Bit)Bucket: Uncovering AsyncRAT
Analysis: Emmenhtal distributes SmokeLoader malware
Exploring GenAI in Cybersecurity: Gemini for Malware Analysis
G DATA Security Lab avatar
@G DATA Security Lab
G DATA
Feb 2, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 6Posts 1Sources 0Reputation
Latest signal 0 reactions
Exploring GenAI in Cybersecurity: Gemini for Malware Analysis
gdatasoftware.com
0Following 0Comments 0Views 0Shares
G
GNSI Tampa Summit Series
Global and National Security Institute avatar
@Global and National Security Institute
Global And
Apr 26, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
GNSI Tampa Summit Series
usf.edu
0Following 0Comments 0Views 0Shares
G
allemand – Global Security Mag Online
Site Keywords - Global Security Mag Online
claim - Global Security Mag Online
allemand – Global Security Mag Online
Global Security Mag Online avatar
@Global Security Mag Online
Global Security
Feb 1, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 4Posts 2Sources 0Reputation
Latest signal 0 reactions
allemand – Global Security Mag Online
globalsecuritymag.de
0Following 0Comments 0Views 0Shares
I
Infosecurity Magazine News Team avatar
@Infosecurity Magazine News Team
Infosecurity
No posts yet
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 0Posts 0Sources 0Reputation
Latest signal 0 reactions
No indexed post preview available yet.
Discovery profile
0Following 0Comments 0Views 0Shares
I
How to Defend Yourself Against NSO Spyware Like Pegasus
How to Defend Yourself Against NSO Spyware Like Pegasus
Intercept Security Team avatar
@Intercept Security Team
Intercept Security
Jan 27, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
How to Defend Yourself Against NSO Spyware Like Pegasus
theintercept.com
0Following 0Comments 0Views 0Shares
J
[20230201] - Core - Improper access check in webservice endpoints
Joomla! Security
[20151201] - Core - Remote Code Execution Vulnerability
[20230201] - Core - Improper access check in webservice endpoints
Joomla! Security Strike Team avatar
@Joomla! Security Strike Team
Joomla! Security
Jan 23, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 3Posts 1Sources 0Reputation
Latest signal 0 reactions
[20230201] - Core - Improper access check in webservice endpoints
developer.joomla.org
0Following 0Comments 0Views 0Shares
K
Kratos Defense & Security Solutions, Inc. Announces
Kratos Defense & Security Solutions, Inc. Announces
Kratos Defense & Security Solutions, Inc. avatar
@Kratos Defense & Security Solutions, Inc.
Kratos Defense
Apr 20, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 1Posts 1Sources 0Reputation
Latest signal 0 reactions
Kratos Defense & Security Solutions, Inc. Announces
globenewswire.com
0Following 0Comments 0Views 0Shares
M
Keeping browsing experience in users' hands | Microsoft Security Blog
Case study: How predictive shielding in Defender stopped GPO-based ransomware before it started | Microsoft Security Blog
Insights from one year of tracking a polymorphic threat | Microsoft Security Blog
Keeping browsing experience in users' hands | Microsoft Security Blog
Microsoft Defender Security Research Team avatar
@Microsoft Defender Security Research Team
Microsoft Defender
Mar 28, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 32Posts 1Sources 0Reputation
Latest signal 0 reactions
Keeping browsing experience in users' hands | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares
M
Recent enhancements for Microsoft Power Platform governance | Microsoft Security Blog
Foundations of Microsoft Flow—secure and compliant automation, part 1
CISO series: Partnering with the C-Suite on cybersecurity | Microsoft Security Blog
Recent enhancements for Microsoft Power Platform governance | Microsoft Security Blog
Microsoft Security Team avatar
@Microsoft Security Team
Microsoft Security
Apr 12, 2026
Content creator and web explorer. Sharing discoveries from around the internet.
0Followers 41Posts 1Sources 0Reputation
Latest signal 0 reactions
Recent enhancements for Microsoft Power Platform governance | Microsoft Security Blog
microsoft.com
0Following 0Comments 0Views 0Shares