User Overview

Followers and Following



Total Followers - Last Year
Daily Follower Change - Last Year
Daily Tweets - Last Year

Tweet Stats

Analysed 177 tweets, tweets from the last 86 weeks.
Tweets Day of Week (UTC)
Tweets Hour of Day (UTC)
Tweets Day and Hour Heatmap (UTC)


Last 50 tweets from @NSACyber
We congratulate @NIST on the successful selection of post quantum-key encapsulation and signature algorithms, and we thank the cryptographic community for all their input into the process.…
As we prepare for the possible assault of a future quantum computer, NIST has chosen the first group of tools for our post-quantum cryptographic standard: CRYSTALS-Kyber CRYSTALS-Dilithium FALCON Sphincs+ Learn more:
As we prepare for the possible assault of a future quantum computer, NIST has chosen the first group of tools for our post-quantum cryptographic standard:

🔒 CRYSTALS-Dilithium
🔒 Sphincs+

Learn more:…
Properly configuring and monitoring PowerShell can yield many benefits, including the ability to detect and prevent abuse by malicious cyber actors. Read our latest report with @CISAgov, @NCSC, and NCSC-New Zealand to find out how.…
Tune in to our latest #NSACyberSpeakerSeries video as host Dr. Josiah Dykstra speaks with Kristina Walter, Chief, NSA’s Defense Industrial Base Cybersecurity, about the DIB and its importance in our cybersecurity mission. Check out the video here:
Stay tuned - on June 16, our Cybersecurity Collaboration Center will release the latest #NSACyberSpeakerSeries video, to talk about securing the Defense Industrial Base. Find more episodes in the series here:…
PRC sponsored cyber actors have exploited telecommunications and other network service providers to expand targeting worldwide. Our latest report with @CISAgov and @FBI outlines continued general trends and specific TTPs used in this targeting.…
D3FEND shows the power of collaboration across the cyber community, as @NSAGov seeks input to further refine #D3FEND and to promote the adoption of this vocabulary.
Protecting against cyber threats has never been more critical.

Our D3FEND framework for countering malicious cyber activity can be used by government agencies, medical facilities, universities, industry, and more.
Looking to access secure enterprise services over a Campus wireless network? You're in luck, the CSfC Campus Wireless Local Area Network Capability Package v3.0 is out now! See new requirements, updates, and more here:…
Malicious actors regularly exploit poor security and misconfigurations to gain access to networks. The latest joint release captures what you can do to keep networks safe from these commonly exploited controls and practices.…
We expect to see an increase in targeting of managed service providers. This joint advisory with @NCSC, @CISAgov, @FBI, @CyberGovAU, and @cybercentre_ca highlights key actions for MSPs and their customers to secure communications and other sensitive data.…
Along with our partners, we urge network defenders to remain vigilant against the Russian cyber threat. Follow recommended mitigations from U.S. and allied cyber authorities to help secure networks and protect sensitive information.…
In reply to @NSA_CSDirector
@NSA_CSDirector discussing #globalthreats with @NCSC CEO @Lindy_Cameron. International collaboration is the key to effective cybersecurity!
There is a power in relationships. The natural flow of the discussion here at @ncsc @CYBERUKevents panel shows how close we are as allies.
#DYK our @NSA_CSDirector is headed across the pond to engage with international counterparts at #CYBERUK22? With panels from "Don't Look Back in Anger" to "A Little Less Conversation, A Little More Action," we anticipate great dialogue!
NSA Cyber Retweeted ·  
In reply to @NSACyber
@NSACyber, along with our partners @NIST and @CISAGov, will play a major role in ensuring our nation’s most sensitive systems are protected from the #quantum computing threat.…
The top #CVEs exploited in 2021 were mostly newly disclosed. This joint advisory highlights the need for timely updates and a patch management program to protect networks.…
Morgan Adamski, Director of @NSAGov's #Cybersecurity Collaboration Center, discusses how the center is at the forefront of intel-driven operational collaboration with partners to secure systems critical to our nation's defense.…
Critical infrastructure organizations should maintain a heightened state of alert against Russian cyber threats. Stay vigilant and follow the mitigations from our joint advisory to harden your IT and OT networks now.…
APT actors are targeting certain ICS/SCADA devices and could gain full system access if undetected. We urge organizations to apply the detection and mitigation recommendations in our joint advisory to thwart this activity.…
Russian FSB cyber actors have targeted critical infrastructure organizations in the U.S. and abroad. Check out @CISAgov and @FBI's resources for defensive actions net defenders should take in this time of heightened cyber risks to IT and OT.
With the @FBI and @DOE_CESER, we issued an advisory on energy sector facility intrusions from 2011-2018:

This historical info highlights the need to go Shields Up against this & other potential Russian state-sponsored activity:
NSA Cyber Retweeted ·  
#WiCyS2022 is in-person and we’ll be there! NSA is proud to be a sponsor this year. Check us out at Booth 300 and mark your schedules to hear from our speakers during the conference. Read more here:… #WomenInCybersecurity #SeeHerAsEqual
NSA Cyber Retweeted ·  
🛡 Shields Up! Russian state-sponsored actors have exploited default Multi-Factor Authentication (MFA) protocols. Make sure your MFA protocols are configured properly! Read our latest advisory w/@FBI to defend your networks against this attack:
Updates to our #Kubernetes Hardening Guide with @CISAgov are live! Thanks to all who reached out with feedback to help make the guidance more comprehensive — including more detailed info on logging and threat detection in addition to other clarifications.…
NSA Cyber Retweeted ·  
⚠️ @CISAgov's Conti #Ransomware advisory has recently been updated with new #IOCs! Review the latest information from our partners at #Cybersecurity #InfoSec
In our latest #NSACyberSpeakerSeries video, host Dr. Josiah Dykstra speaks with #Ghidra developer Brian Knighton about the release of Ghidra and its journey over the past three years. Be sure to check out the video here:
Thousands of cybersecurity students and network defenders have used #Ghidra to build and research current technologies since its release — head over to to check it out.
Replying to @NSACyber
On March 8th, our Cybersecurity Collaboration Center will release a new #NSACyberSpeakerSeries video featuring the open source #SRE tool. Find more episodes in the series here:…
Thousands of cybersecurity students and network defenders have used #Ghidra to build and research current technologies since its release — head over to to check it out.
We join Rob Joyce in announcing that #Ghidra is alive! Download your copy: and start reversing! #RSAC #RSAC2019
Network infrastructure security is critical. Administrators can leverage our technical report to help prioritize next steps in their work to strengthen networks against adversary targeting attempts.…
NSA Cyber Retweeted ·  
We issued an advisory with @FBI to help combat the WhisperGate and HermeticWiper malware which are being used to target organizations in Ukraine. Learn more about these threats and how to mitigate your risk: #ShieldsUp
NSA Cyber Retweeted ·  
.@CISAgov and @FBI release advisory on destructive malware affecting organizations in Ukraine, along with recommendations and strategies to prepare for and respond to destructive malware. For more information see #ShieldsUp
Iranian MOIS cyber actors use various CVEs and open-source tools when targeting networks. Use the IOCs and top mitigations in the joint advisory from @FBI, @CISAgov, @NCSC, @CNMF_CyberAlert and @NSAgov to hunt down and harden your networks.…
In case you missed the last @DoD_CIO #DIB Town Hall, there's still another chance to tune in. Join us to learn how we can help you protect your networks.
In a time of growing #cyber threats, do you know which steps to take against malicious actors? On 2/24 join the DoD CISO for the final Town Hall to discuss the critical actions your #DIB organization can take to protect itself. Join here:
New #malware, Cyclops Blink, is detailed in the @NCSC, @FBI, @CISAgov, and @NSAgov advisory. Use the guidance to patch devices to be free of it.…
Congratulations to @GeorgiaTech for winning the 2021 NSA #CodebreakerChallenge! Great job to the 5,465 participants from 631 schools who participated in this year's…
Cisco device admins should use password protection Type 8 whenever possible to keep their passwords secure. For details on the types available and issues with using weak encryption, read our best practices guide…
A key pillar of our #cybersecurity mission is preventing and eradicating threats to both the Defense Industrial Base and National Security Systems — we encourage #DIB partners to join us and discuss cyber best practices at the upcoming town hall.
Join the DoD CISO and representatives from @NSACyber, @DC3DCISE, and USD(P), for the 2nd Special Session Town Hall TOMMORROW. No registration required, and you can join the session at:
Over the last several years, Russian state-sponsored cyber actors have been targeting U.S. cleared defense contractors. Apply the mitigations in our joint cybersecurity guidance with @FBI & @CISAgov to reduce the risk of compromise by these threat actors.…
It takes collaboration to secure Operational Technology. Morgan Adamski, Director of @NSAGov's #Cybersecurity Collaboration Center, spoke with @DragosInc, @ENERGY, and @CISAgov about threats to these systems and how #Partnerships play a key role in securing them.
Ransomware incidents targeting critical infrastructure were on the rise in 2021. Protect against the threat using the joint cybersecurity guidance from @FBI, @CISAGov, @CyberGovAu, and @NCSC to help reduce the risk of compromise. Read more here:…
Great news! A new version of D3FEND is now available at D3FEND enables other cyber professionals to tailor defenses against specific cyber threats and reduce a system's potential attack surface. Learn more about D3FEND here:…
Last year showed we are committed to building and recruiting the next generation of cyber warriors! This year, we'll continue to build a diverse workforce with the skills to tackle our most complex issues. Learn more by reading our Year in Review:…
Take a look at our 2021 NSA Cybersecurity Year in Review to learn more about our impact and what we have in store for the future:…
VSATs may be targeted just like other networking tech. Keep your information secure by enabling transmission security, segmenting and encrypting communications, and keeping your VSAT hardware and firmware updated.…
Minimize the risk of malicious PDFs affecting your environments. Our latest technical report includes updated #configuration recommendations for #Adobe Acrobat Reader—including for the newer cloud features.…
NSA Cyber Retweeted ·  
We’re expanding our @NSACyber mission and authorities to better secure National Security Systems. Learn more:…
NSA Cyber Retweeted ·  
⚠️ @CISAgov recommends network defenders review the Microsoft blog on destructive malware targeting Ukrainian organizations. #Cybersecurity #InfoSec
NSA Cyber Retweeted ·  
Iranian MOIS hacker group #MuddyWater is using a suite of malware to conduct espionage and malicious activity. If you see two or more of these malware on your network, you may have MuddyWater on it:…. Attributed through @NCIJTF @FBI
Take steps now to protect against the Russia cyber threat: Invest in logs and monitoring so you can hunt out malicious activity & minimize impacts if compromise occurs. Strengthen your networks by taking actions in our joint advisory with @CISAgov & @FBI.…
Today is our Cybersecurity Collaboration Center’s one-year anniversary! We’ve accomplished so much over the past year, and we’re just getting started.
NSA Cyber Retweeted ·  
#1 Inventory your assets now, so you can stay on top of patches coming out. Start with internet exposed assets, but mitigate and update everything.
#2 Monitor and follow up. Malicious actors have been observed patching software they compromise to help retain control of the assets
Log4j vulnerabilities continue to be exploited–keep watch for updates from vendors. Read the advisory with @CISAgov, @FBI, @CyberGovAU, @NCSC, @CERTNZ & @cybercentre_ca for a summary of the threats and mitigations to defend your IT and OT assets.…
NSA Cyber Retweeted ·  
DNSA Neuberger and I published a message today with actions business leaders and IT managers can take to help promote a cyber incident-free holiday season. Read it here:…
Free access is provided to the 8 hour timeframe for this page.

A Trendsmap Explore subscription provides full access to all available timeframes

Find out more

This account is already logged in to Trendsmap.
Your subscription allows access for one user. If you require access for more users, you can create additional subscriptions.
Please Contact us if you are interested in discussing discounts for 3+ users for your organisation, or have any other queries.