Akif Cogo
banner
akifcogo.bsky.social
Akif Cogo
@akifcogo.bsky.social
78 followers 830 following 37 posts
#History | #Political & #Policy Enthusiast |Love #Data | #Cybersecurity | Published Book: Bosnian St. Louis|
Posts Media Videos Starter Packs
The “skills gap” in cybersecurity is widening: 2 out of 3 organizations say they have critical talent shortages. 
Want to stand out? Learn about threat hunting, identity & access management (IAM), or zero trust design.
#InfosecJobs #CyberSkills #Upskill
Did you know many successful breaches start with misconfigured cloud storage or exposed APIs? In 2025, cloud misconfigurations rank among top root causes of data leaks.

Before releasing permission boundaries, always apply the principle of least privilege.
#CloudSecurity #ZeroTrust #DevSecOps
🚨 Alert: A new ransomware variant called FiveHands is active — attackers combine it with the SombRAT backdoor to steal data and demand ransom. Always back up your files offline, isolate backups, and avoid paying blindly. 
#Ransomware #IncidentResponse #CyberAwareness #Cybersecurity
A slew of emails came from US government agencies over the last few days cancelling job postings. Fast not, they will be reposted within next few weeks.
What #NBC and #Peacock are doing to the fans of English Premier League is quite cruel. They single handedly ruined my #Boxing Day experience. How many subscriptions and service you would like us to sign up for you greedy bastards!?
It’s a holiday season. Ever heard of “brushing” scam? Look it up, it’s a combination of #social engineering, #phishing, and #malware distribution that originated maybe 10 years so ago as a fake products review generator and over time morphed into full fledged #cyber crime. Be aware of any QR codes.
In one of the random #cybersecurity groups on facebook someone asked if they can learn cybersecurity without laptop with just their phone. I immediately thought of the #Albanian kid who had done some interesting things with #tv, #Amazon #Firestick and a #cell phone. Everything is possible.
British teenager behind GTA 6 hack receives indefinite hospital order | Cybercrime | The Guardian
Arion Kurtaj, who has severe autism, hacked Rockstar Games using just an Amazon Firestick, mobile phone and hotel TV
amp.theguardian.com
We should collectively blame #Apple for a spread of misinformation due to sh**** camera on iPhones. 150-15 years ago #Nokia had a phone with 32 megapixel camera and optical zoom. Apple is just getting there.
Quick update Bluesky: ever wonder why there are no sharp images of these “drones” when many people have good cameras? 👇👇
In the meanwhile I’m struggling to find remote work…lol
Fourteen North Korean nationals have been indicted in a conspiracy to steal U.S. identities in order to get remote IT jobs to enrich the DPRK regime and fund its nuclear weapons program. The FBI shared this poster of the alleged scammers and is offering up to $5 million for info leading to arrest.
An important and often overlooked aspect of #Cybersecurity is physical security. In any studies, but particularly graduate studies it’s seldom mentioned and often overlooked. As a result images as one below are not uncommon. Protect your physical assets!
I can understand to some degree being sympathetic to a murderer, but outright supporting him based on his deed is lunacy. A nation of masses who support executions is ripped for anarchy. #unitedhealthcare #luigimangione
Useless pundits, I wrote a post about them the other day. Every field has them. Ian is trying to cash in on his previous work.
The impact of AI and deepfakes in 2024 is significantly greater than in any previous years. I suspect continued increase and more importantly greater sophistication. My 2025 prediction is a significant IoT breach that will impact millions of users. #Cybersecurity #AI #deepfakes #IoT #FBI
FBI Warns Smartphone Users—Hang Up And Create A Secret Word Now
The FBI has issued a public warning for smartphone users to hang up immediately and create a secret word as new AI cyber attacks hit—here’s what you need to know and do.
www.forbes.com
I didn’t read this anywhere but I do think that phishing emails account for a healthy portion of all #AiTM attacks. People are just not careful and those landing pages are increasingly looking more sophisticated. 2/2
If anyone asks why there is an increase in AiTM. Here is your answer from my organization: In November, 1,026 or 16% of recipients Caught the #Phish by reporting the email to (intentionally leaving blank). Unfortunately, 784 or 12% of recipients clicked the malicious link. 1/2
Can I get verified if I’m self proclaimed super famous celebrity?
Yep! Quite frankly I’m semi surprised that increase in attacks on critical infrastructure is not even more prominent. I have no doubt we’ll see further uptick in this type of incidents as global affairs are getting increasingly complex.
Its like stating that 95% of all cybersecurity issues are related to human action but not going further to elaborate as far as specific instances are concerned. Just useless information. 2/2
“Pundits” in any field, particularly #politics are incredibly self-evident in an effort to stay relevant. I’m seeing slowly the same trend with some #Cybersecurity “pundits” who offer unoriginal ideas and no new insight into a problem, but just state the obvious. 1/2
Until recently fully encrypted messaging apps were criminals favorite, nowadays government is telling all of us to use them. The new era of Sky ECC is in making just in a broader more streamlined sense. #CyberSecurity #EncryptedMessaging #FBIWarning #MobileSecurity #DataPrivacy
FBI Warns iPhone And Android Users—Stop Sending Texts
US officials urge citizens to use encrypted messaging and calls wherever they can—here’s what you need to know.
www.forbes.com
In depth experience in IT support, System Administration, Networking, and consequent specialization are by far more useful. Security+ may give you some fundamentals but without expertise it’s seldom enough to make you solid at your job. 2/2
This morning I’ve seen a post on Linked In calling for a rebrand of #Cybersecurity. The argument is that Cybersecurity is not entry-level career but rather a destination and I could not agree more. Certs are not enough, things I was thought during my MS in Cyber studies are nowhere near enough 1/2