The WatcherProthewatcher.xyz·Apr 4, 2024Phishing attack imitates US Department of LaborIn January 2022, an advanced phishing scheme was reported aimed at obtaining Office 365 credentials by impersonating the US Department of Labor. This incident highlights the increasing sophistication of phishing efforts. The attack used two methods t...DiscussSocial Engineeringsocial engineering
Kshitij Kakadekshitijkakade.hashnode.dev·Apr 1, 2024Understanding and Mitigating XSS Attacks in Web ApplicationsCross-site scripting (XSS) is a menacing threat to web application security, allowing attackers to inject malicious scripts into websites, potentially leading to data theft, session hijacking, and unauthorized activities. This blog post delves into t...Discuss·1 likeFront-end Security
Zen Chanz3n.hashnode.dev·Dec 12, 2023Unmasking the Challenge: Understanding the Difficulty of Blocking Phishing EmailsDiscover the challenges behind thwarting phishing emails and gain insights into the evolving tactics used by cybercriminals. 💻🕷️📧 Introduction Imagine waking up, grabbing coffee, and opening your inbox to a flood of emails. Among them, you receive...Discussphishing
Fabrice Innocentfabricewrites.hashnode.dev·Oct 18, 2023A Beginner's Guide to Spotting Phishing Emails: Protecting Your Computer and DataIn today's digital age, email is an integral part of our lives. It's a convenient way to communicate, but it can also be a breeding ground for cybercriminals who use phishing emails to compromise your computer and steal your sensitive information. If...Discuss#PhishingAttacks
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 16, 2023Guarding Against Social Engineering and Phishing: A Comprehensive Guide to Online SecuritySocial engineering and phishing attacks are becoming increasingly sophisticated and prevalent, making it essential for individuals and organizations to be aware of them and take steps to protect themselves. We will explore the critical facets of cybe...DiscussChronicles of CyberSafetyOnline security
Nahum Wentworthnahumwentworth.hashnode.dev·Sep 18, 2023How to Identify and Protect Against Social Engineering AttacksSocial engineering is a cyberattack that relies on psychological manipulation to deceive companies or individuals into revealing sensitive information. Unlike traditional attacks that depend on technical or software vulnerabilities, social engineerin...Discusssocial media
OwlOpsecowlopsec.hashnode.dev·Aug 31, 2023Phishing Attacks and Prevention: Safeguarding Against Online DeceptionIntroduction: Briefly introduce the concept of phishing attacks and their prevalence in the digital landscape. Highlight the importance of understanding and preventing phishing attacks to protect sensitive information and maintain online security. ...Discuss#PhishingAttacks
Cyvisorycyvisory.hashnode.dev·Aug 2, 2023Obscurities with MS Teams part 3This time we look mostly at the accounts used for phishing. tl;dr When phishing via Teams, an attacker controls the source AAD. Therefore, he can set every username he wants. This opens some possibilities. E-Mail as username Suffix the Username to ...Discuss·110 readsMicrosoftTeams
Upadrasta Harshaharshaupadrasta.hashnode.dev·Jul 31, 2023Beyond the Click: The Rising Threat of Image-Based WhatsApp Phishing AttacksIntroduction: In today's digital age, the prevalence of cyber threats has reached an alarming level. One of the most potent and insidious forms of cyber-attacks is phishing. While many people are aware of phishing attacks via emails or websites, ther...Discuss#PhishingAttacks
Adedo, I. S.iamadedo.hashnode.dev·Jul 20, 2023Don't Become the Next Victim of Fake Email Phishing! 😱Stay vigilant and avoid falling into the trap of fake email phishing by following these Safety Measures: 🔸Stay Vigilant: Exercise caution with emails, especially from unfamiliar senders or those seeking sensitive data. 🔸Verify Sender Identity: Veri...DiscussHow to.. & DIYphishing