Commonwealth Sentinel Cyber Security's Avatar

Commonwealth Sentinel Cyber Security

@cwealthsentinel

At Commonwealth Sentinel, we focus on cyber security so you can focus on other things.# CyberSecurity for local government, non-profit, and small business. #FemaleFounder

206
Followers
536
Following
2,434
Posts
17.11.2024
Joined
Posts Following

Latest posts by Commonwealth Sentinel Cyber Security @cwealthsentinel

Preview
Cybercriminals are using AI to attack the cloud faster - and third-party software is the weak link Google's latest threat report warns that third-party tools are now prime targets for attackers - and businesses have only days to secure them.

Cybercriminals are using AI to attack the cloud faster - and third-party software is the weak link

10.03.2026 20:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image
10.03.2026 17:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Digital Trojan Horse: Why Email is Cyber Attackers' Favorite 94% of all malware is delivered via email. Why is that? What makes email platforms such a popular vector for malware distribution?

Digital Trojan Horse: Why Email is Cyber Attackers' Favorite

10.03.2026 16:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
FBI investigating breach that reportedly hit wiretapping net Infosec In Brief: PLUS: Europol takes down two crime gangs; LastPass users phished (again); Crooks increase crypto hauls; And more

FBI is investigating breach that may have hit its wiretapping tools

10.03.2026 14:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
We've seen ransomware cost American lives. Here's what it will actually take to stop it. Former FBI and CISA leaders analyze why the new National Cyber Strategy must prioritize critical infrastructure and automate threat sharing to stop the $2.73M-per-incident ransomware epidemic.

We’ve seen ransomware cost American lives. Here’s what it will actually take to stop it.

10.03.2026 13:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft Malicious Chrome extensions tied to ownership transfers push malware and steal data, exposing thousands to credential theft and system compromise.

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

10.03.2026 12:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Hackers abuse .arpa DNS and ipv6 to evade phishing defenses Threat actors are abusing the special-use ".arpa" domain and IPv6 reverse DNS in phishing campaigns that more easily evade domain reputation checks and email security gateways.

Hackers abuse .arpa DNS and ipv6 to evade phishing defenses

09.03.2026 20:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Massive GitHub malware operation spreads BoryptGrab stealer Experts found BoryptGrab stealer spreading through 100+ GitHub repositories, stealing browser data, crypto wallets, system info, and more

Massive GitHub malware operation spreads BoryptGrab stealer

09.03.2026 17:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Can the Industry Do More for Women in Security? While women in security have seen forward progress, the path hasn’t always been linear.

Can the Industry Do More for Women in Security?

09.03.2026 16:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Cyber Security Weekly: Top stories from Last Week (March 1– March 7, 2026) Β» Commonwealth Sentinel The FBI disclosed suspicious cyber activity on an internal network tied to surveillance data, and investigators reportedly suspect China.This stands out because it touches a sensitive U.S. federal…

A healthcare data breach isn't just an IT issueβ€”it's a crisis of patient trust, operations, and reputation. When confidential info leaks, the fallout can be swift. Discover more about last week’s major cybersecurity incident.

Read More: buff.ly/bzq8Erf #CyberSecurity #DataBreach

09.03.2026 15:45 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image
09.03.2026 14:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Cyber Safe Focus: Sheri the Magnificent Β» Sheri, the magnificent here with Sheri, the magnificent here with Cyber Safe Focus. Inspired by Johnny Carson’s β€œCarnac the Magnificent,”

Cyber Safe Focus: Sheri the Magnificent Β»

09.03.2026 13:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
The biggest AI threats come from within - 12 ways to defend your organization The gravest AI-powered threat to your cybersecurity isn't coming from external hackers. Review these strategic recommendations for handling the risks from within.

The biggest AI threats come from within - 12 ways to defend your organization

09.03.2026 12:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Where Multi-Factor Authentication Stops and Credential Abuse Starts Seven Windows authentication paths bypass MFA protections, enabling credential attacks through AD, NTLM, Kerberos, RDP, SMB, and service accounts.

Where Multi-Factor Authentication Stops and Credential Abuse Starts

08.03.2026 20:16 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
2026 Browser Data Reveals Major Enterprise Security Blind Spots The browser is becoming the operating system for modern work, yet many enterprises still treat it as an extension of network or endpoint security. Keep Aware's 2026 State of Browser Security Report…

2026 Browser Data Reveals Major Enterprise Security Blind Spots

08.03.2026 17:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Cisco reveals 2 max-severity defects in firewall management software The vendor said it’s not aware of any active exploitation of the vulnerabilities, which could allow remote attackers to achieve root access and execute code.

Cisco reveals 2 max-severity defects in firewall management software

08.03.2026 16:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Women’s History Month: Encouraging women in cybersecurity at every career stage | Microsoft Security Blog This Women’s History Month, Microsoft explores ways to support the next generation of female defenders at every career stage.

Women’s History Month: Encouraging women in cybersecurity at every career stage

08.03.2026 14:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
WordPress membership plugin bug exploited to create admin accounts Hackers are exploiting a critical vulnerability in the User Registration & Membership plugin, which is installed on more than 60,000 WordPress sites.

WordPress membership plugin bug exploited to create admin accounts

08.03.2026 13:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image
08.03.2026 12:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image
07.03.2026 23:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Phobos Ransomware admin faces up to 20 years after guilty plea Russian national Evgenii Ptitsyn (43) pleaded guilty in the U.S. for his role in the Phobos ransomware operation.

Phobos Ransomware admin faces up to 20 years after guilty plea

07.03.2026 21:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Wikipedia hit by self-propagating JavaScript worm that vandalized pages The Wikimedia Foundation suffered a security incident today after a self-propagating JavaScript worm began vandalizing pages and modifying user scripts across multiple wikis.

Wikipedia hit by self-propagating JavaScript worm that vandalized pages www.bleepingcomputer.com/news/securit...

07.03.2026 18:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Google: Spyware vendors, China-linked spies led 0-day abuse : Of the 90 zero-days GTIG tracked in 2025, 43 hit enterprise tech

Google says spyware makers and China-linked groups dominated zero-day attacks last year

07.03.2026 17:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities Cisco warns CVE-2026-20122 and CVE-2026-20128 in Catalyst SD-WAN Manager are actively exploited; patches released across multiple software versions.

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

07.03.2026 15:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
FBI investigates breach of surveillance and wiretap systems The U.S. Federal Bureau of Investigation (FBI) confirmed on Thursday that it's investigating a breach that affected systems used to manage surveillance and wiretap warrants.

FBI investigates breach of surveillance and wiretap systems

07.03.2026 14:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
James β€˜Aaron’ Bishop Tapped to Serve as New Pentagon CISO Bishop replaces David McKeown, who will take on a role in the private sector after 40 years of government service.

James β€˜Aaron’ Bishop Tapped to Serve as New Pentagon CISO

07.03.2026 13:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Rockwell Vulnerability Allowing Remote ICS Hacking Exploited in Attacks The vulnerability was disclosed and mitigated in 2021 but its in-the-wild exploitation has only now come to light.

Rockwell Vulnerability Allowing Remote ICS Hacking Exploited in Attacks

06.03.2026 21:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image
06.03.2026 18:18 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog CISA adds VMware Aria Operations command injection flaw CVE-2026-22719 to KEV after reports of active exploitation; patches released by Broadcom.

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

06.03.2026 17:08 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
How Port-Out Fraud Created a Catastrophe for AT&T Β» In early 2024, a group of sophisticated fraudsters hijacked the phone numbers of dozens of AT&T customers and launched a port-out fraud cyber attack.

How Port-Out Fraud Created a Catastrophe for AT&T

06.03.2026 15:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0