Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 19, 2024Day 19: Don’t Be Fooled!“If it sounds too good to be true, it probably is.” Imagine getting an email informing you that you've won a complimentary Bahamas cruise! All you need to do is click a link and provide your details. Take a moment to gather your belongings before yo...DiscussCybersecurity Awareness 2024: Securing Our Worldsocial engineering
Shruti RajeshforZySec AIblog.zysec.ai·Oct 14, 2024Emerging AI-Powered Solutions to Counter Advanced Phishing AttacksPicture this: You're peacefully drinking your morning coffee, when bam! Your inbox is flooded with emails promising everything from miracle weight loss pills to inheritances from long-lost royals. But fear not, because AI is here, like a superhero in...Discussnews
Indu Jawlacoders.hashnode.dev·Oct 14, 2024In-Depth Exploration of Cybersecurity ConceptsThe CIA Triad: Confidentiality, Integrity, Availability 1. Confidentiality Definition: Confidentiality ensures that sensitive information is accessible only to those authorized to have access. It is fundamental in preventing unauthorized disclosure o...Discuss#cybersecurity
Oluwadamilola Bamigbosedamibamigbose.hashnode.dev·Sep 17, 2024Social Engineering: A Lesson on PhishingSocial engineering refers to a broad range of security threats that exploit human interaction to achieve malicious goals. One of the most prevalent, effective and dangerous forms of social engineering is phishing. Phishing involves tricking individua...Discuss#PhishingAttacks
FIKARA BILALblog.fikara.io·Aug 27, 2024Password Security: Best Practices and ManagementProtecting your online information is crucial to avoid disastrous consequences. No one is immune to identity theft, loss or leakage of personal or financial data, or unauthorized access. One way to reduce the risk is to ensure a certain level of pass...DiscussSecurity
FIKARA BILALblog.fikara.io·Aug 27, 2024La Sécurité des Mots de Passe : Bonnes Pratiques et GestionProtéger ses informations en ligne est crucial pour éviter des conséquences désastreuses. Personne n'est à l'abri d'un vol d'identité, d'une perte ou fuite de données personnelles ou financières, ou encore d'accès non autorisé. Un moyen de diminuer l...Discuss·43 readsSecurity
elc4br4elc4br4.hashnode.dev·Aug 22, 2024GrabThePisher - CyberdefendersEn esta ocasión vamos a analizar a nivel básico un kit de phising para poder responder a una serie de preguntas que se nos plantean. ⚠️ ¡No será necesario usar ninguna herramienta salvo Visual Code Studio! Escenario An attacker compromised a server...DiscussCyberdefenders💎CTF Writeup
Maxwell Antwi Bosiakocybermonday.hashnode.dev·Aug 5, 2024Understanding Phishing Attacks: How to Recognize and Avoid ThemIn today's digital age, phishing attacks have become a prevalent threat to our online security. In the first quarter of 2024, online industries were most targeted by phishing attacks, with over 37% of these attacks on social media. These deceptive at...Discuss·1 like#PhishingAttacks
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Jul 31, 2024Phishing Mail Analysis: Uncovering Deceptive EmailsPhishing attacks are a prevalent cyber threat that targets individuals by tricking them into divulging personal information. This is typically achieved through deceptive emails that prompt recipients to click on malicious links or download harmful fi...DiscussFortify and Defend: Navigating the Cybersecurity Landscapephishing
Vedant Kahalekarvedantk.hashnode.dev·Jun 30, 2024Mr. Phisher - TryHackMe WalkthroughTask I got this sketchy email with a weird-looking attachment. It's like, "Hey, enable macros!" 😬 What even are macros? The Lowdown on Macros Alright, here’s a quick rundown. A macro is like a shortcut that turns a single key press into a whole sequ...Discussmr.phisher