Akbar Khanakbarkhan.hashnode.dev·Sep 7, 2024Phishing in the ShadowsThis task will take you through setting up GoPhish, sending a phishing campaign and capturing user credentials from a spoof website. This is the tryhackme GoPhishing Labs Firstly launch the virtual machine by clicking the green Start Machine button o...Discuss·27 readsphishing
sudip adhikarisudip007.hashnode.dev·Aug 23, 2024Cyber AttackWhat is Cyber Attack ? A cyber attack is any intentional effort by hackers to steal, expose, alter, disable, or destroy data, applications, or other assets by gaining unauthorized access to computer systems, networks, or digital devices. Imagine your...Discuss#cybersecurity
sansquarestarlog.sansquare.in·Aug 3, 2024The Rising Threat of Cyberwarfare: A New Era of ConflictCyberwarfare has emerged as a significant and evolving threat in the 21st century, with nation-states, hacktivist groups, and criminal organizations increasingly leveraging cyberattacks as a potent weapon. These attacks can disrupt critical infrastru...DiscussTech InsightsSecurity
Muhammad Abdel AalforKlivvrblog.klivvr.com·Jul 7, 2024The Invisible Threat: Combating Social Engineering in the Financial IndustrySocial engineering, a manipulative technique used by cybercriminals to deceive individuals into divulging confidential information, has emerged as a critical threat to the financial services sector. Unlike traditional cyberattacks that exploit techni...Discuss·1 like·150 readsSecuritySecurity
Magda Jankowskamagdajankowska.hashnode.dev·Jun 25, 2024Phishing and Social Engineering Attackssmart contracts An overview and walkthrough of how phishing and social engineering attacks can be conducted using smart contracts, along with examples to illustrate the concepts. Overview Phishing and social engineering are types of cyberattacks that...DiscussBlockchain
Ketty C.cyberjournal.io·Jun 4, 2024Brute Force Attacks: Definition and Prevention TipsWe're currently in the final phase of our school project, focusing on configuring and safeguarding virtual machines for an organisation to equip its employees for remote work. I'm specifically handling the implementation of brute force protection and...Discuss#cybersecurity
Arnab Dasdasarnab.hashnode.dev·Apr 18, 2024Comprehensive Guide to Web Security Best Practices: Preventing Common AttacksIntroduction In today's interconnected digital landscape, web security stands as a paramount concern for businesses, organizations, and individuals alike. The ever-evolving nature of cyber threats presents a constant challenge, making it imperative t...Discuss·10 likes#cybersecurity
The Watcherthewatcher.xyz·Mar 27, 2024Attack: Password SprayingA password spraying attack is a type of cyber attack where an attacker uses a single password (or a list of commonly used passwords) against many different accounts before moving on to try a different password. This method is employed to avoid accoun...DiscussAttackscyberattack
The Watcherthewatcher.xyz·Mar 26, 2024How to protect your APIs?The substantial volume of data transmitted via APIs is a matter of concern for those invested in cybersecurity. Despite proactive measures to implement early-stage security considerations and solidify software development life cycle (SDLC) protocols,...Discusscyberattack
Nehal IngoleforRead & Learnlearnwithnehal.hashnode.dev·Mar 18, 2024Cyber Security And Confusion MatrixHello Everyone In this article we will discuss what role does Confusion Matrix plays in the Cybersecurity field?? As we all know that cybersecurity is very important as they are responsible for our security from cybercrime and the tools and tech they...DiscussFalseNegative