Cyvisorycyvisory.hashnode.dev·Aug 2, 2023Obscurities with MS Teams part 3This time we look mostly at the accounts used for phishing. tl;dr When phishing via Teams, an attacker controls the source AAD. Therefore, he can set every username he wants. This opens some possibilities. E-Mail as username Suffix the Username to ...Discuss·104 readsMicrosoftTeams
Upadrasta Harshaharshaupadrasta.hashnode.dev·Jul 31, 2023Beyond the Click: The Rising Threat of Image-Based WhatsApp Phishing AttacksIntroduction: In today's digital age, the prevalence of cyber threats has reached an alarming level. One of the most potent and insidious forms of cyber-attacks is phishing. While many people are aware of phishing attacks via emails or websites, ther...Discuss#PhishingAttacks
Adedo, I. S.blog.ospreyiq.com.ng·Jul 20, 2023Don't Become the Next Victim of Fake Email Phishing! 😱Stay vigilant and avoid falling into the trap of fake email phishing by following these Safety Measures: 🔸Stay Vigilant: Exercise caution with emails, especially from unfamiliar senders or those seeking sensitive data. 🔸Verify Sender Identity: Veri...DiscussHow to.. & DIYphishing
OusH4ckoush4ck.hashnode.dev·Jul 13, 2023Understanding and Defending against Social Engineering Attacks: Practical Strategies for Enhanced SecurityIntroduction In the ever-evolving landscape of cybersecurity, technological advancements alone are not enough to ensure robust protection against threats. The human factor plays a crucial role in the security of any system, making social engineering ...Discuss·36 readshacking
Tadej Jernejcicstuffilearned.hashnode.dev·Jul 10, 2023What's Social Engineering, anyway?Social engineering attacks in cyber are attacks against a user, typically employing some form of psychological manipulation and/or social interaction. Social engineers don't try to force people into giving up information but instead try to make the v...Discuss·61 reads#cybersecurity
Sudeepa Shiranthaka0xdr3.hashnode.dev·Jul 7, 20235 Essential Tips to Secure Your DataPhishing Awareness — Teach users to be cautious of phishing attempts, where attackers trick individuals into revealing sensitive information through deceptive emails, messages, or websites. Advise them to verify the authenticity of links and attachme...Discusshow-to
Dheeraj N Kashyapdheerajnk02.hashnode.dev·May 21, 2023Malicious World: A Comprehensive Guide to MalwareIntroduction In the realm of cybersecurity, one term strikes fear into the hearts of individuals and organizations alike: malware. Short for "malicious software," malware encompasses a wide range of harmful programs designed to infiltrate, damage, or...Discuss·1 like·71 reads#cybersecurity
Ukezi Ebenezer Nwachukwunwachukwueben.hashnode.dev·May 13, 2023Quishing: How QR code phishing is as a form of social engineering attack.Are you aware of QR code phishing or “quishing”? This form of social engineering attack is gaining popularity among cybercriminals eager to steal your data. What Is Quishing? QR code phishing or quishing is a type of phishing attack that uses QR code...Discuss#cybersecurity
PopLab AgencyforRed Team PTredteam.pt·Apr 9, 2023Ransomware: O que é, como proteger-se e evitar a perda de dados!Descubra tudo sobre o ransomware, um perigoso ataque cibernético! Saiba como proteger-se contra essa ameaça, evitar a perda de dados e manter suas informações seguras. Este artigo oferece dicas práticas e medidas de segurança para prevenir ataques de...Discussphishing
NearFormforNearFormnearform.hashnode.dev·Mar 31, 2023Stay Ahead of Scammers: A GPT-4-Powered SMS Bot to Keep You Safe from Phishing TextsBy Matt Harrison Editor’s note: This is a cross-post written by Software and Machine Learning Engineer, Matt Harrison. Matt has his own blog. Check it out and you’ll find more great blog posts. Some of the links in this article point to Matt’s person...Discuss·2 likes·37 readsiwritecode