Ananya Chatterjeedevelover.hashnode.dev·Feb 3, 2025Fake PayPal Requests: How Phishers Use Legitimate Services to Deceive UsersPhishing Scam Hijacks Legit Services to Fake PayPal Requests A phishing campaign is abusing Microsoft 365 test domains to send legitimate payment requests from PayPal, according to Fortinet’s CISO Dr Carl Windsor. Windsor found that the threat actor ...Security Awareness Training Blog#cybersecurity
Jithu Josephjithu-joseph.hashnode.dev·Dec 30, 2024Next Generation Phishing: Leveraging AI for Advanced Cyber ThreatsPhishing has advanced from basic deceptive emails to more complex attacks that take advantage of cutting-edge technology. With the introduction of Large Language Models (LLMs), cybercriminals now have powerful tools to create highly convincing phishi...phishing
Larry D'Jean Artharrypage.hashnode.dev·Nov 21, 2024How a Hacker Could Exploit Canvas FingerprintingCanvas fingerprinting is a tracking technique where a unique identifier is generated based on the graphics rendering capabilities of a user's device, particularly the <canvas> element in HTML. The process involves using the <canvas> element to render...19 likescanvas
Bindhu Gandrabindhugandra.hashnode.dev·Nov 17, 2024Phishing link and URL Checker using Machine LearningIntroduction In today’s digital world, phishing has become one of the most frequent and serious types of cybercrime. These scams trick people into sharing personal information by pretending to be trustworthy websites or emails. With the rise in onlin...capstone project
Nam Anh Mai D.forFIS Securityblog.fiscybersec.com·Nov 12, 2024Chiến dịch lừa đảo nhắm vào các doanh nghiệp sử dụng OpenAI và ChatGPTVừa qua, phía Barracuda Networks thông báo rằng một chiến dịch tấn công lớn với phạm vi toàn cầu của tin tặc đang nhắm tới các doanh nghiệp và người dùng sử dụng dịch vụ của OpenAI thông qua các tài khoản ChatGPT. Cụ thể, các tin tặc đã cố gắng mạo d...Newslettersthreat intelligence
aniesaaniesa.hashnode.dev·Nov 2, 2024Key Tactics to Enhance Online Security and Prevent PhishingPhishing has become one of the most prevalent online scams today, luring unsuspecting users into sharing personal and sensitive information. These attacks have evolved over the years, growing more sophisticated and varied, making them harder to detec...#PhishingAttacks
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 19, 2024Day 19: Don’t Be Fooled!“If it sounds too good to be true, it probably is.” Imagine getting an email informing you that you've won a complimentary Bahamas cruise! All you need to do is click a link and provide your details. Take a moment to gather your belongings before yo...Cybersecurity Awareness 2024: Securing Our Worldsocial engineering
Shruti RajeshforZySec AIblog.zysec.ai·Oct 14, 2024Emerging AI-Powered Solutions to Counter Advanced Phishing AttacksPicture this: You're peacefully drinking your morning coffee, when bam! Your inbox is flooded with emails promising everything from miracle weight loss pills to inheritances from long-lost royals. But fear not, because AI is here, like a superhero in...news
Indu Jawlacoders.hashnode.dev·Oct 14, 2024In-Depth Exploration of Cybersecurity ConceptsThe CIA Triad: Confidentiality, Integrity, Availability 1. Confidentiality Definition: Confidentiality ensures that sensitive information is accessible only to those authorized to have access. It is fundamental in preventing unauthorized disclosure o...#cybersecurity
Oluwadamilola Bamigbosedamibamigbose.hashnode.dev·Sep 17, 2024Social Engineering: A Lesson on PhishingSocial engineering refers to a broad range of security threats that exploit human interaction to achieve malicious goals. One of the most prevalent, effective and dangerous forms of social engineering is phishing. Phishing involves tricking individua...#PhishingAttacks