Oluwadamilola Bamigbosedamibamigbose.hashnode.dev·Sep 17, 2024Social Engineering: A Lesson on PhishingSocial engineering refers to a broad range of security threats that exploit human interaction to achieve malicious goals. One of the most prevalent, effective and dangerous forms of social engineering is phishing. Phishing involves tricking individua...Discuss#PhishingAttacks
FIKARA BILALblog.fikara.io·Aug 27, 2024Password Security: Best Practices and ManagementProtecting your online information is crucial to avoid disastrous consequences. No one is immune to identity theft, loss or leakage of personal or financial data, or unauthorized access. One way to reduce the risk is to ensure a certain level of pass...DiscussSecurity
FIKARA BILALblog.fikara.io·Aug 27, 2024La Sécurité des Mots de Passe : Bonnes Pratiques et GestionProtéger ses informations en ligne est crucial pour éviter des conséquences désastreuses. Personne n'est à l'abri d'un vol d'identité, d'une perte ou fuite de données personnelles ou financières, ou encore d'accès non autorisé. Un moyen de diminuer l...Discuss·40 readsSecurity
elc4br4elc4br4.hashnode.dev·Aug 22, 2024GrabThePisher - CyberdefendersEn esta ocasión vamos a analizar a nivel básico un kit de phising para poder responder a una serie de preguntas que se nos plantean. ⚠️ ¡No será necesario usar ninguna herramienta salvo Visual Code Studio! Escenario An attacker compromised a server...DiscussCyberdefenders💎CTF Writeup
Maxwell Antwi Bosiakocybermonday.hashnode.dev·Aug 5, 2024Understanding Phishing Attacks: How to Recognize and Avoid ThemIn today's digital age, phishing attacks have become a prevalent threat to our online security. In the first quarter of 2024, online industries were most targeted by phishing attacks, with over 37% of these attacks on social media. These deceptive at...Discuss·1 like#PhishingAttacks
Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Jul 31, 2024Phishing Mail Analysis: Uncovering Deceptive EmailsPhishing attacks are a prevalent cyber threat that targets individuals by tricking them into divulging personal information. This is typically achieved through deceptive emails that prompt recipients to click on malicious links or download harmful fi...DiscussFortify and Defend: Navigating the Cybersecurity Landscapephishing
Vedant Kahalekarvedantk.hashnode.dev·Jun 30, 2024Mr. Phisher - TryHackMe WalkthroughTask I got this sketchy email with a weird-looking attachment. It's like, "Hey, enable macros!" 😬 What even are macros? The Lowdown on Macros Alright, here’s a quick rundown. A macro is like a shortcut that turns a single key press into a whole sequ...Discussmr.phisher
Lakshay Dhoundiyallakshaydhoundiyal.hashnode.dev·Jun 22, 2024How to Protect Your Data from Phishing Attacks : 3 Easy StepsIn our modern digital era, it is important for everyone to ensure that their personal and sensitive information is secured. It still remains one of the most common things in cyber security, where hackers con people into revealing their personal info ...Discuss·21 likesProtecting against phishingg
Mahak Pandeymahakpandeyofficial.hashnode.dev·Jun 16, 2024Understanding Social Engineering and Its Daily TargetsIn the digital age, social engineering has become one of the most potent tools in a cybercriminal's arsenal. While technology continually advances to safeguard information, the human element often remains the weakest link. This blog delves into socia...Discuss·1 likeemail fraud
The Watcherthewatcher.xyz·Apr 4, 2024Phishing attack imitates US Department of LaborIn January 2022, an advanced phishing scheme was reported aimed at obtaining Office 365 credentials by impersonating the US Department of Labor. This incident highlights the increasing sophistication of phishing efforts. The attack used two methods t...DiscussSocial Engineeringsocial engineering