Sign in to view Greg’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Greater Chicago Area
Contact Info
Sign in to view Greg’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
352 followers
354 connections
Sign in to view Greg’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Greg
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Greg
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Sign in to view Greg’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Experience & Education
-
Lumen Technologies
**** * ******* ********
-
************.***
**-*****/*******
-
**** ***** *** **** ****** ** ******** (****)
******* ****** *** *******
View Greg’s full experience
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View Greg’s full profile
Sign in
Stay updated on your professional world
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Other similar profiles
-
Moreno "Mario" Collodi - MBA
Greater Chicago AreaConnect -
Efrain G.
Woodstock, ILConnect -
Gloria Landaverde
Mobility Analyst for Novartis and Affiliates
Dayton, NJConnect -
salman ali syed
Elmhurst, ILConnect -
Elaine Vernoia
Executive-Level Administrative Professional
Westmont, ILConnect -
Sixto Taveras
IT Technician
New York City Metropolitan AreaConnect -
Richard Asante
Frederick, MDConnect -
Kyle Scheuermann
Service Management/System Engineering
Basking Ridge, NJConnect -
Keith Barry
IT/OT Technician at SkySystems
Asbury, NJConnect -
L. Patricia Abella
--
Bridgewater, NJConnect -
Christina Williams
Service Delivery IT Lead supporting multiple sites
Denver Metropolitan AreaConnect -
CaSarah Vezie
Oceanside, CAConnect -
Mark Hall
Telecommunications Professional
Great Lakes, ILConnect -
Amgaa Purevjal
President @ iCodice LLC,
Greater Chicago AreaConnect -
Nate Lindsey
Greater Chicago AreaConnect -
Jessica Mena
New York City Metropolitan AreaConnect -
Renée Rose
Customer Success Executive at Lumen Technologies
United StatesConnect -
Vasil Simonovski
Greater Chicago AreaConnect -
Kavon Jones
Sr. Executive Assistant at Baseball United
Washington, DCConnect -
Vinhloc Hoang
San Diego, CAConnect
Explore more posts
-
Zoller Consulting LLC
Black Lotus Labs, the threat intelligence arm of Lumen, has identified a multi-year campaign targeting end-of-life small home/small office routers and IoT devices associated with an updated version of “TheMoon” malware. Click here to learn more about this cybersecurity threat and how, together with Lumen, I can help your business stay protected: http://lmn.so/D35CB3
-
NEXTGEN Experience
Black Lotus Labs, the threat intelligence arm of Lumen, has identified a multi-year campaign targeting end-of-life small home/small office routers and IoT devices associated with an updated version of “TheMoon” malware. Click here to learn more about this cybersecurity threat and how, together with Lumen, I can help your business stay protected: http://lmn.so/04E438
-
Elteni - Cybersecurity Consulting & Advisory
In mid-to-late 2022, a massive data breach exposed call and text message records of tens of millions of AT&T cellphone customers and non-AT&T customers. AT&T disclosed that the hacked data did not include the content of calls and texts and is not believed to be publicly available. The breach, resulting from an illegal download on a third-party cloud platform, affected nearly all AT&T cellular customers and those using its network, exposing phone numbers, call and text logs, and limited geographic data. However, customer names, Social Security numbers, and other personal information were not compromised. AT&T notified customers, offered protective resources, and collaborated with law enforcement, leading to at least one arrest. The FBI and DOJ initially delayed public disclosure to assess national security risks. This incident is unrelated to a previous breach in March involving 73 million customers' personal information. https://lnkd.in/e2GCACTR
5
-
NetBrain Technologies Inc.
Ever responded to an incident caused by a simple OSPF adjacency down? Totally preventable... if only you’d known about it beforehand. Check out our Automation Cheat Sheet 🙂 below to help you build your own OSPF neighbor assessments -- so you can be alerted to potential adjacency issues before they become a problem. 🎥 Prefer a step-by-step video? We've got you covered in our YouTube video by George Logarakis, BIT, MEng. Watch now >> https://lnkd.in/eusiaUp7 #NetworkEngineer #NetworkAutomation #AutomateInMinutes 🕒
20
1 Comment -
911 IT
If your IT provider isn’t watching your network 24/7, that leaves room for hackers to get it. They are working around the clock to break into your network, and your IT team needs to monitor around the clock to keep them OUT! If you’re ready for better IT support and a provider you can trust, start here: https://smpl.is/8wm4e #downtime #backup #managedit #itsecurity
1
-
K-12 Technology Group
If your IT provider isn’t watching your network 24/7, that leaves room for hackers to get it. They are working around the clock to break into your network, and your IT team needs to monitor around the clock to keep them OUT! If you’re ready for better IT support and a provider you can trust, start here: https://smpl.is/92bs1 #downtime #backup #managedit #itsecurity
1
-
SOFTwarfare®
Attention #Wichita, #Cleveland, #Nashville, and all critical infrastructure, government, and healthcare professionals! A new report reveals a widespread cyber campaign targeting Fortinet FortiGate systems, impacting potentially 20,000 devices globally. State-backed Chinese actors exploited a critical vulnerability (CVE-2022-42475) for months before it was disclosed, infecting at least 14,000 systems including those in defense industries. This highlights the growing threat to edge devices and the need for heightened vigilance. Get the full story and learn how to protect your systems here https://lnkd.in/gDKt-dUu. #cybersecurity #criticalinfrastructure #ransomware National Defense Industrial Association - (NDIA)
10
-
CyberTI®
✨ "Black Lotus Labs Team at Lumen Technologies have tracked a malware which they have named Cuttlefish." 🔽 "This malware mostly targets networking equipment, specifically enterprise-grade small office/home office (SOHO) routers." 🔽"The malware offers a zero-click approach to capturing data from users and devices behind the targeted network edge. Any data sent across the network equipment infiltrated by this malware is potentially exposed." https://lnkd.in/gzGy5vqU #malware #cuttlefish #eavesdropping
-
Legato Security
Employee Spotlight 🌟 This week we are highlighting our SOC Lead, Weston Ford. Weston has been with us since 2019. Read below to learn more about him! What made you choose Legato? I came across Legato Security by pure luck and had an awesome opportunity to do an internship with them. I had an amazing time with amazing people so decided to stay. What has prepared you the most to lead a team in Security Operations?Legato Security has given me so many opportunities to learn and grow. These opportunities and challenges have put me in many different circumstances and allowed me to gain a lot of leadership experience. What is the most rewarding thing about your position? The security field is an ever evolving and changing landscape. The most rewarding thing is continually learning and growing myself to meet these challenges to stay ahead of the bad guys. What is your favorite place you ever visited and why? New Zealand. New Zealand is an unbelievably diverse place. It has every type of landscape and scenery you can imagine which makes it the perfect road trip destination.
48
5 Comments -
Cyber & IP Association
Hundreds of thousands of US internet routers were destroyed in a massive cyberattac*k, disabling services across the Midwest. Unidentified hacker*s launched the attac*k in October 2023, impacting over 600,000 routers by sending a maliciou*s firmware update. Security analysts at Lumen Technologies discovered the breach and noted its severe potential consequences for rural communities reliant on internet services for emergency, agricultural, and healthcare needs. The attacke*d ISP was believed to be Windstream, though the company did not comment on the incident. Authorities including the FBI had been quiet about their involvement or knowledge of the hac*k. #Cipa_pk #CyberSecurity #InternetOutage #Hacking #Midwest #Telecommunications #LumenTechnologies #Windstream #Malware #EmergencyServices #RuralInternet #TechNews #DataBreach #RouterHack #USInfrastructure
6
3 Comments -
Pearl Technology
Listen as Pearl Technology's Dave Johnson discusses the recent AT&T breach on The Greg and Dan Show. Here are some takeaways: AT&T warns of a massive data data: threat actors stole the call logs for about 109 million customers from an online database on the company's Snowflake account. In a recent Form 8-K filing with the SEC, AT&T says the stolen data contains the call and text records of nearly all AT&T mobile clients and customers of mobile virtual network operators (MVNOs) made from May 1 to October 31, 2022, and on January 2, 2023. MVNOs include Boost, Cricket, Consumer Cellular, etc. FirstNet—Used by first responders and public safety organizations. The data was stolen between April 14 and April 25, 2024. The US Department of Justice permitted AT&T, on May 9 and June 5, 2024, to delay public notification, likely to give law enforcement time to analyze the data for sensitive call records and investigative purposes. Stolen data includes: Telephone numbers of AT&T wireline customers and customers of other carriers. Telephone numbers with which AT&T or MVNO wireless numbers interacted. Count of interactions (e.g., the number of calls or texts). Aggregate call duration for a day or month. One or more cell site ID numbers for a subset of records. AT&T says the data does NOT include the content of calls and texts. AT&T is notifying by email, text, or mail if a number is part of stolen data, also can check online account for notice. Other companies affected by the Snowflake breach (Mandiant says UNC5537 did it) are Advance Auto Parts, Neiman Marcus, Ticketmaster, and others. Also, BlackSuit, who did the CDK breach, has struck in Peoria, IL. #ATTBreach #CyberNews #GregandDanShow #PearlTechnology
1
-
Comcast Technology Solutions
Join our Zenith Live breakout session: https://comca.st/45dnEzi. Come explore the role of Zero Trust data for expanding security capacity. Erica Dermanillian will explain how to leverage data for SASE-based advanced threat detection and controls monitoring. #ZenithLive24 #DataBee #Cybersecurity #SecurityData #ZeroTrust #SASE #ThreatDetection Zscaler
35
2 Comments -
TeleDynamics
Q: What's the difference between network problems and sharks in the ocean? A: The sharks in the network are more predictable! 🦈🔍 Dive deeper into network sea with our complete guide for beginners. Learn how to set up and use Wireshark to capture and analyze voice and data packets, and troubleshoot common VoIP issues like a pro. With 31 pages of step-by-step instructions, detailed explanations, and descriptions of typical voice issues, you'll navigate the treacherous waters of network troubleshooting with ease. ➡️ https://hubs.li/Q02sbpKP0 ⬅️ #WireShark #VoIP #UC #datanetworks
3
-
Ethical Hacking Services
"HPE Aruba Networking has patched critical vulnerabilities in ArubaOS, including four flaws (CVE-2024-26304, CVE-2024-26305, CVE-2024-33511, CVE-2024-33512) with a high severity rating. These vulnerabilities, accessible via the PAPI protocol, could allow remote code execution on affected systems." #vulnerabilitys #cybersecurity #cve #arubaos
-
Clearwater
HPE Aruba Networking/ArubaOS. Critical Vulnerability of remote code execution (RCE) that could allow unauthenticated remote attackers to execute arbitrary code as a privileged user sending crafted packets to the PAPI UDP port (8211). If you use this technology in your healthcare organization please review the details on the vulnerabilities and patch to remediate - https://bit.ly/3UUpced.
2
-
Mindcore Technologies
Is Your Business Prepared for Cyber Threats? 🚨🔒 The recent AT&T breach exposed 90 million customers' call and text data, reminding us of the vital need for robust cybersecurity. Numbers dialed and message durations from 2022 and early 2023 were accessed by hackers. Key Takeaways for Business Protection ✅ Regular Security Audits: Identify and fix vulnerabilities. ✅ Employee Training: Educate staff on best practices. ✅ Multi-Factor Authentication: Add extra security layers. ✅ Data Encryption: Secure data in transit and at rest. ✅ Incident Response Plan: Be ready for potential breaches. Are your communications secure? How are you protecting your business? 👇 #CyberSecurity #DataBreach #BusinessProtection #ATTHack #DigitalSafety #CyberThreats #ITSecurity
2
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Greg Gut in United States
-
Greg Gutknecht
Atlanta Metropolitan Area -
Greg Gutmann
Account Manager - Metals at ISRA Vision Parsytec | Solutions Consultant | Process Improvement | Value Creator
Greater Pittsburgh Region -
greg gut
Technical Consultant at UC Berkeley
San Francisco, CA -
Greg Gutwein
Sr. Product Engineer at Fairbanks Morse a Pentair, Engineered Flow Group
Kansas City, KS
28 others named Greg Gut in United States are on LinkedIn
See others named Greg Gut