Rendy Setiawanrensetiawanren.hashnode.dev·Jan 16, 2024Part 1 | Fake E-commerce Job Interview InvitationIntro This article explains the characteristics of phishing websites by taking case examples from the X (Twitter) Workfess account. Phishers create a fake website blibli(dot)com and send phishing links to victims to deceive them. It is as if the mess...Discuss·27 readsEducation Against Fraud#educationagainstfraud
Vishal Jhavishalkaushik.hashnode.dev·Dec 26, 2023Navigating the Digital Seas: The Enduring Threat of Phishing and Social Engineering TacticsIntroduction In the ever-evolving landscape of cybersecurity, one persistent and insidious threat continues to plague users worldwide: Phishing and Social Engineering. Despite advancements in technology and increased awareness, cybercriminals are fin...Discuss·10 likesphishing
Zen Chanz3n.hashnode.dev·Dec 12, 2023Unmasking the Challenge: Understanding the Difficulty of Blocking Phishing EmailsDiscover the challenges behind thwarting phishing emails and gain insights into the evolving tactics used by cybercriminals. 💻🕷️📧 Introduction Imagine waking up, grabbing coffee, and opening your inbox to a flood of emails. Among them, you receive...Discussphishing
FIKARA BILALbilaldotcom.hashnode.dev·Nov 30, 2023Basic concepts of cybersecurityCybersecurity is the practice of protecting networks, devices, and data from unauthorized access or criminal use. It involves the art of ensuring the confidentiality, integrity, and availability of information and systems. This field aims to safeguar...DiscussMalware
abdur raafayabdurraafay.hashnode.dev·Nov 24, 2023A Guide to Analyzing Suspicious EmailsUnveiling the Malware and Phishing Emails in your inbox In today's interconnected world, emails remain a primary means of communication, facilitating business transactions, personal interactions, and everything in between. However, amidst the influx ...Discuss·17 likes·110 readsdatasafety
tercmdwww.tercmd.com·Nov 19, 2023What's Phishing Like In 2023?I found a phishing filter (here) which can be used in content blockers (as well as adblockers) like uBlock Origin. I wanted to analyze the phishing links — and this is the analysis. Popular Web Hosts Who are the web hosts (and website builders) that ...Discussphishing
Iqmaiqmacodes.hashnode.dev·Oct 9, 2023An Introduction to CybersecurityThis is the twenty-first century, and technology is everywhere. Whether it's technological gadgets like phones and Laptops or everyday machines and systems like cars, elevators and home assistants, or even something as simple as the internet which we...Blender guy and 1 other are discussing this2 people are discussing thisDiscuss·16 likes·161 reads#cybersecurity
Cyvisorycyvisory.hashnode.dev·Aug 2, 2023Obscurities with MS Teams part 3This time we look mostly at the accounts used for phishing. tl;dr When phishing via Teams, an attacker controls the source AAD. Therefore, he can set every username he wants. This opens some possibilities. E-Mail as username Suffix the Username to ...Discuss·110 readsMicrosoftTeams
Upadrasta Harshaharshaupadrasta.hashnode.dev·Jul 31, 2023Beyond the Click: The Rising Threat of Image-Based WhatsApp Phishing AttacksIntroduction: In today's digital age, the prevalence of cyber threats has reached an alarming level. One of the most potent and insidious forms of cyber-attacks is phishing. While many people are aware of phishing attacks via emails or websites, ther...Discuss#PhishingAttacks
Adedo, I. S.iamadedo.hashnode.dev·Jul 20, 2023Don't Become the Next Victim of Fake Email Phishing! 😱Stay vigilant and avoid falling into the trap of fake email phishing by following these Safety Measures: 🔸Stay Vigilant: Exercise caution with emails, especially from unfamiliar senders or those seeking sensitive data. 🔸Verify Sender Identity: Veri...DiscussHow to.. & DIYphishing