J3bitokjebitok.hashnode.dev·Dec 18, 2024The Advent of Cyber: Day 10: Phishing - He had a brain full of macros, and had shells in his soul. (TryHackMe)In this article, we’ll cover Phishing - He had a brain full of macros and had shells in his soul writeup as the Day 2 challenge of the Advent of Cyber event challenge. It was interesting to navigate the platform and filter different events and logs b...AdventOfCyber2024
Sakshi from KushoAIsoftware-deep-dives.hashnode.dev·Dec 11, 2024Here's all you need to know about email securityThis blog is written by Jeremy Rivera at KushoAI. We're building the fastest way to test your APIs. It's completely free and you can sign up here. While working on an email marketing strategy for a client in a previous role, I quickly realized that e...email security
Tran Hoang PhongforFIS Securityblog.fiscybersec.com·Dec 9, 2024Chiến dịch lừa đảo mới sử dụng các tài liệu Word để lẩn tránh khỏi các hệ thống phát hiện xâm nhậpMột cuộc tấn công lừa đảo mới lợi dụng tính năng khôi phục tệp Word của Microsoft bằng cách gửi các tài liệu Word bị hỏng dưới dạng tệp đính kèm email, cho phép chúng vượt qua các phần mềm bảo mật do chúng đang trạng thái bị hỏng nhưng vẫn có thể khô...Newslettersphishing
Mbaoma chukwuemekambaoma.hashnode.dev·Nov 28, 2024Day 13: Awareness for OrganizationsHow Companies Can Boost Security Awareness Organizations play a critical role in cybersecurity by educating their employees and implementing best practices to create a secure work environment. Today, we'll explore effective strategies for boosting se...10 likesphishing
Đinh Văn MạnhforFIS Securityblog.fiscybersec.com·Nov 13, 2024GoIssue: Công Cụ Được Dùng Trong Chiến Dịch Phishing MớiTrong bối cảnh an ninh mạng ngày càng trở nên phức tạp, các cuộc tấn công phishing đang gia tăng cả về số lượng và mức độ tinh vi. Một công cụ phishing mới mang tên "GoIssue" đã xuất hiện, nhắm mục tiêu vào người dùng với các chiến thuật lừa đảo phức...28 readsNewslettersthreat intelligence
Aboelhamd Abdellatifaboelhmd.com·Oct 23, 2024An In-Depth Look at the Verizon 2024 Data Breach Investigations ReportThe 2024 Data Breach Investigations Report (DBIR) by Verizon is a crucial document that outlines the latest trends and patterns in cybersecurity breaches. As organizations increasingly rely on digital infrastructures, understanding the landscape of c...Cybersecurity Strategies
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 19, 2024Day 19: Don’t Be Fooled!“If it sounds too good to be true, it probably is.” Imagine getting an email informing you that you've won a complimentary Bahamas cruise! All you need to do is click a link and provide your details. Take a moment to gather your belongings before yo...Cybersecurity Awareness 2024: Securing Our Worldsocial engineering
Santiago Fernandezblog.santiagoagustinfernandez.com·Oct 17, 2024Analizando correos con Inteligencia ArtificialNo hace falta que les cuente que hubo casi 1,9 millones de ataques de phishing en el último año, con 877.536 sólo en el segundo trimestre de 2024. Las estafas de Business Email Compromise (BEC) también han aumentado, con un importe medio solicitado d...464 readsollama
Shruti RajeshforZySec AIblog.zysec.ai·Oct 14, 2024Emerging AI-Powered Solutions to Counter Advanced Phishing AttacksPicture this: You're peacefully drinking your morning coffee, when bam! Your inbox is flooded with emails promising everything from miracle weight loss pills to inheritances from long-lost royals. But fear not, because AI is here, like a superhero in...news
Indu Jawlacoders.hashnode.dev·Oct 14, 2024In-Depth Exploration of Cybersecurity ConceptsThe CIA Triad: Confidentiality, Integrity, Availability 1. Confidentiality Definition: Confidentiality ensures that sensitive information is accessible only to those authorized to have access. It is fundamental in preventing unauthorized disclosure o...#cybersecurity