User Overview

Followers and Following



Total Followers - Last Year
Daily Follower Change - Last Year
Daily Tweets - Last Year

Tweet Stats

Analysed 84 tweets, tweets from the last 46 weeks.
Tweets Day of Week (UTC)
Tweets Hour of Day (UTC)
Tweets Day and Hour Heatmap (UTC)


Last 50 tweets from @NSACyber
#CodebreakerTechTip: Manually reading network captures or log dumps is tedious and error prone. Use scripts and command line tools (jq, xargs, awk, etc.) to do tedious work for you. Look at Task 2’s JSON dump, and you’ll see what we mean.
NSA Cyber Retweeted ·  
Mass exploitation of Atlassian Confluence CVE-2021-26084 is ongoing and expected to accelerate. Please patch immediately if you haven’t already— this cannot wait until after the weekend.
Holy Typo, thanks for the quick call-outs! Here's the corrected #CodebreakerTechTip: CIDR notation indicates how many bits of an IP address are part of the network prefix. For instance, represents a network with 254 hosts. Ready for more? Check out Task 1.
In reply to @FBI
@FBI and @CISAgov shared recent trends and actions to protect against #ransomware. One step organizations can take immediately is restricting remote desktop protocol access and use. For more, read the report and strengthen your defenses against this threat.
How are your networks protected and configured to avoid exploitation? Have you built in appropriate resilience if you should become a victim? Read the latest CISA & @FBI joint advisory with actions to take leading up to holidays & weekends: #StopRansomware
Students participating in this year's Codebreaker Challenge should review our #CodebreakerTechTips for an assist. Check back on Tuesdays, starting next week, if you're feeling stuck!
NSA's Codebreaker Challenge is underway, are you signed up? You can represent your school and compete with other students around the country to see who can crack the code first!

Read how here:
Our guidance is still applicable for network defenders hunting webshells this weekend.
As seen in recently patched Microsoft Exchange vulnerability exploits, malicious cyber actors continue using web shells for data exfil and other actions on victim networks. Protect against this by #patching & applying mitigations in our web shell guidance:…
The QNX BadAlloc vulnerability affects embedded devices like control systems. Follow CISA's guidance and work with your device suppliers for a patch. Remember to check whether devices truly need to be connected…
NSA Cyber Retweeted ·  
We strongly encourage critical infrastructure, ICS owners and operators, and any other operational technology organization using affected Blackberry QNX-based systems to patch ASAP: #Cybersecurity #IoT #OT
ICYMI - Our workforce is empowered and mobilized against the nation's most complex cyber challenges and the best part is, we're just getting started. What comes next? You can watch and see, or, join the mission.
In the digital age, #cybersecurity is more important than ever before. We strive to empower and motivate our talented workforce as we protect and defend our nation. Join the mission – Cybersecurity at NSA.…
Keep your personal, sensitive #data safe from social media threats by using our #cybersecurity guidance and #countermeasures. Read more:…
Congratulations to all the talented men and women at @NSAgov who worked this effort. We’ll proudly display the #PwnieAward!
We were honored to win a @PwnieAwards today for our discovery and disclosure of a critical #cryptographic vulnerability in WIN10. For more info see…
NSA and @CISAgov share Kubernetes configurations and recommendations to harden environments against compromise. Understanding the options for building and maintaining a secure Kubernetes cluster is key to protecting your data & resources.…
NSA Cyber Retweeted ·  
NSA’s Codebreaker Challenge is live! Check out the details, sign up, and see if your college can ‘crack the code’. Use your skills to detect and respond to a simulated compromise in a Defense Industrial Base company’s network.
Our latest #cybersecurity update reminds users to take precautions when using #wireless devices in public to keep their #devices and #data #secure. Check it out:…
We collaborated with @CISAgov & @FBI on our #cybersecurity advisory, detailing Chinese state-sponsored actor #TTPs used against U.S. and allied networks. For a thorough understanding of this cyberthreat, read our overview, observed TTPs & mitigations.…
NSA Cyber Retweeted ·  
Many thanks to Patrick Gray and @riskybusiness for hosting me on his podcast for a chat about @NSACyber.
NSA Cyber Retweeted ·  
Congratulations to Andi Roddy, Chief of the #Nuclear Command & Control Systems #Cybersecurity Group at the @NSAGov - a recipient of this year's #Security Leadership: 2021 #WomeninSecurity program. #securitymanagement #riskmanagement #nationalsecurity…
Our recent #cybersecurity advisory with @CISAgov @FBI & @NCSC publicly exposes a global brute force campaign. Exploitation is likely ongoing. Review our advisory for #IOCs and #mitigation techniques:…
Our director, Rob Joyce, has a new official handle, be sure to give it a follow.
I'm excited to announce the new official account for @NSAGov's Cybersecurity Director! I'll share insights and information about what we are up to. Look forward to engaging with you.
#Ghidra 10.0 has been let loose! We are pleased to include the first version of the new integrated Ghidra debugger. Head over to to check out all the changes and launch the debugger on your reverse engineering project.
#Ghidra 10.0 has been let loose! We are pleased to include the first version of the new integrated Ghidra debugger. Head over to to check out all the changes and launch the debugger on your reverse engineering project.
D3FEND, a MITRE research project funded by the NSA, improves the #cybersecurity of NSS, DoD, and the DIB by providing defensive countermeasures for common offensive techniques. Learn more here:…
NSA Funds Development, Release of D3FEND
We're hiring Information System Security Professionals to design and develop secure, resilient system architectures to mitigate current and future threats.

Interested? Read more and apply today:…
NSA's Cybersecurity Collaboration Center enables gov and industry to better prevent and respond to foreign cybersecurity threats to NSS, DoD, and the DIB. Through the center, we develop robust, open, and collaborative relationships with private industry.…
We are seeking offensive and defensive Computer Network Analysts with technical expertise to prevent and eradicate threats to national #security systems. Apply to a technical office or development program here:…
Our #cybersecurity guidance focuses on minimizing risk of disclosing sensitive info or losing service while using VVoIP. Risks include eavesdropping, impersonating users, or perpetrating denial of service downtime.

Read about #mitigations here:…
Digital Network Exploitation Analysts support NSA's mission by conducting research and analysis on targets and processing cyber threat intelligence.

Apply to perform diverse work and protect national security interests:…
We're hiring #Cyber Engineers and #Vulnerability Analysts to help identify vulnerabilities and attacks to the design and operation of our nation's most critical systems.

Learn more and apply:…
We're looking for System Engineers to develop and implement capabilities, provide program oversight and implement best practices across the NSA enterprise.

Interested? Learn more and apply:…
NSA Cyber Retweeted ·  
In a speech earlier, our CEO @Lindy_Cameron set out how cyber security has become a part of all of our lives – and how if the UK 🇬🇧 wants to lead the way, we all need to play our part to build cyber resilience.

Read the full speech on our website ⤵️…
The Commercial Solutions for Classified (CSfC) Campus WLAN CP v2.8 is out for review to solicit comments from stakeholders! See the recently ratified WPA3 standard, client virtualization, and 2FA requirements on the Capability Packages page:…
NSA Cyber Retweeted ·  
In April we issued an alert to address Pulse Connect Secure product vulnerabilities.

Today, we updated the alert to include additional guidance to detect exploitation and combat efforts to obfuscate intrusions:
NSA will play an important role in implementing the requirements of the Executive Order on cybersecurity recently signed by President Biden
Read more about how here:…
NSA Cyber Retweeted ·  
🚨 We have released eviction guidance related to the ongoing SolarWinds Orion incident and related campaign activities affecting U.S. government agency networks, CI entities, and private sector organizations.

View our updated guidance:
NSA recently collaborated with Morgan State University on how to use Ghidra to mitigate #cyber vulnerabilities that exist in smart cars. Discover more:…
Today, we released our Potential Threat Vectors to 5G Infrastructure analysis paper with our partners @ODNIgov, @CISAgov & industry to enhance understanding of risks introduced by #5G.

Learn more here:…
NSA, ODNI and CISA Release 5G Analysis Paper
Russian SVR continues leveraging publicly known vulnerabilities—including recently released CVEs—for its cyber activities. Read our joint @NCSC, @CISAgov, and @FBI advisory on how to detect and mitigate this and other techniques the SVR has been using.…
NSA Cyber Retweeted ·  
Ivanti has released security updates for Pulse Connect Secure. Learn more at #Cybersecurity #Infosec
#OperationalTechnology owners and operators will benefit from our recent #Cybersecurity Advisory on how to evaluate risks to their systems & make informed decisions to prevent and detect malicious activities. Review the pragmatic evaluation methodology:…
NSA Cyber Retweeted ·  
🚨 We issued Emergency Directive 21-03 in response to known Pulse Connect Secure vulnerabilities. Federal departments & agencies must run the Pulse Connect Secure Integrity Tool to determine whether any PCS files have been maliciously modified or added:…
NSA Cyber Retweeted ·  
.@CISAgov, @FBI, @CNMF_CyberAlert link Russian SVR/APT 29 actors to network infiltration through #SolarWinds supply chain compromise and GoldenSAML exploitation of M365. Read the report here:…
Russian Foreign Intelligence Service (SVR) cyber actors are exploiting five publicly known vulnerabilities to target U.S. and allied critical networks. Review our joint #cybersecurity guidance with @CISAgov and @FBI and apply the mitigations to stop them:…
NSA Cyber Retweeted ·  
Just Released: We issued supplemental direction v2 to Emergency Directive (ED) 21-02 which requires federal agencies to apply the Windows Server April 2021 security update to all affected Exchange Servers. Learn more: #InfoSec #InfoSecurity
NSA urges applying critical Microsoft patches released today, as exploitation of these #vulnerabilities could allow persistent access and control of enterprise networks.…
NSA Cyber Retweeted ·  
Last week, Rob Joyce officially started his new position as our Director of Cybersecurity. He brings with him a wealth of knowledge from across the U.S. Government and we are excited to have his expertise on our team. Read more:…
Rob Joyce begins as NSAs Director of Cybersecurity
Our Commercial Solution for Classified program delivers commercial monitoring & protection of devices accessing secure enterprise services over wireless networks within classified spaces by using WIDS & WIPS.
Read more:…
In the first session of the #NSACyberSpeakerSeries, host Dr. Josiah Dykstra speaks with Lieutenant Zachary Dannelly, United States Navy, on the effective use of Protective DNS.

View it here:
Tomorrow, our first #NSACyberSpeakerSeries video will be going live. The video will expand on the effective use of Protective DNS from our recent cybersecurity product.…
NSA Cyber Retweeted ·  
Was your organization impacted by the SolarWinds and Active Directory/M365 compromise? Or is your organization not sure if it was compromised?

Use CHIRP – our new program designed to help network defenders find indicators of compromise:
Microsoft has released a powershell script for deploying critical #mitigations related to the Microsoft Exchange Vulnerabilities. If network defenders can't patch in a timely fashion, use the released script to shrink the attack surface.

View the script:…
Replying to @NSACyber
Detection is also critical in attempting to secure your system. You can find #detection signatures here:…
Free access is provided to the 8 hour timeframe for this page.

A Trendsmap Explore subscription provides full access to all available timeframes

Find out more

This account is already logged in to Trendsmap.
Your subscription allows access for one user. If you require access for more users, you can create additional subscriptions.
Please Contact us if you are interested in discussing discounts for 3+ users for your organisation, or have any other queries.