Nguyễn Văn TrungforFIS Securityblog.fiscybersec.com·Jul 24, 2024Sự cố CrowdStrike bị lợi dụng: Cảnh báo về phishing và phát tán mã độc1. Thông tin chi tiết. Vào thứ Sáu vừa qua ngày 19 tháng 7, công ty bảo mật CrowdStrike đã phát hành một bản cập nhật cấu hình sensor định kỳ, nhưng không may đã gây ra lỗi logic và dẫn đến lỗi màn hình xanh chết chóc (BSOD) trên các hệ thống Windows...DiscussNewsletterscrowdstrke
Raeraeversing.hashnode.dev·Jul 12, 2024Phishing Email - LetsDefend Write upReservei um tempo para realizar uma Challenge do LetsDefend e resolvi realizar um write-up da minha resolução. Link do Challange: https://app.letsdefend.io/challenge/phishing-email Esse Challenge é de nível fácil, realmente achei que é tranquilo para...Discussphishing
Muhammad Abdel AalforKlivvrblog.klivvr.com·Jul 7, 2024The Invisible Threat: Combating Social Engineering in the Financial IndustrySocial engineering, a manipulative technique used by cybercriminals to deceive individuals into divulging confidential information, has emerged as a critical threat to the financial services sector. Unlike traditional cyberattacks that exploit techni...Discuss·94 readsSecuritySecurity
Lakshay Dhoundiyallakshaydhoundiyal.hashnode.dev·Jun 22, 2024How to Protect Your Data from Phishing Attacks : 3 Easy StepsIn our modern digital era, it is important for everyone to ensure that their personal and sensitive information is secured. It still remains one of the most common things in cyber security, where hackers con people into revealing their personal info ...Discuss·2 likesProtecting against phishingg
The WatcherProthewatcher.xyz·Apr 3, 2024Google Drive Notification Trap: A New Twist on PhishingIn 2020, a new scam appeared that misused Google Drive's notification feature. Scammers would create a document with harmful links, then invite their target to work on the document. When invited, the target got a real email from Google, making the sc...DiscussSocial Engineeringsocial engineering
Rendy Setiawanrensetiawanren.hashnode.dev·Jan 16, 2024Part 1 | Fake E-commerce Job Interview InvitationIntro This article explains the characteristics of phishing websites by taking case examples from the X (Twitter) Workfess account. Phishers create a fake website blibli(dot)com and send phishing links to victims to deceive them. It is as if the mess...Discuss·29 readsEducation Against Fraud#educationagainstfraud
Vishal Jhavishalkaushik.hashnode.dev·Dec 26, 2023Navigating the Digital Seas: The Enduring Threat of Phishing and Social Engineering TacticsIntroduction In the ever-evolving landscape of cybersecurity, one persistent and insidious threat continues to plague users worldwide: Phishing and Social Engineering. Despite advancements in technology and increased awareness, cybercriminals are fin...Discuss·10 likesphishing
Zen Chanz3n.hashnode.dev·Dec 12, 2023Unmasking the Challenge: Understanding the Difficulty of Blocking Phishing EmailsDiscover the challenges behind thwarting phishing emails and gain insights into the evolving tactics used by cybercriminals. 💻🕷️📧 Introduction Imagine waking up, grabbing coffee, and opening your inbox to a flood of emails. Among them, you receive...Discussphishing
FIKARA BILALbilaldotcom.hashnode.dev·Nov 30, 2023Basic concepts of cybersecurityCybersecurity is the practice of protecting networks, devices, and data from unauthorized access or criminal use. It involves the art of ensuring the confidentiality, integrity, and availability of information and systems. This field aims to safeguar...DiscussMalware
abdur raafayabdurraafay.hashnode.dev·Nov 24, 2023A Guide to Analyzing Suspicious EmailsUnveiling the Malware and Phishing Emails in your inbox In today's interconnected world, emails remain a primary means of communication, facilitating business transactions, personal interactions, and everything in between. However, amidst the influx ...Discuss·17 likes·110 readsdatasafety