FIKARA BILALbilaldotcom.hashnode.dev·Apr 15, 2024The gaining access phaseIntroduction The Gaining Access phase in penetration testing represents a pivotal point where ethical hackers try to penetrate a target system's defenses. This article will explore the complexities of this phase, examining the techniques, tools, and ...Discuss#cybersecurity
The WatcherProthewatcher.xyz·Apr 4, 2024Phishing attack imitates US Department of LaborIn January 2022, an advanced phishing scheme was reported aimed at obtaining Office 365 credentials by impersonating the US Department of Labor. This incident highlights the increasing sophistication of phishing efforts. The attack used two methods t...DiscussSocial Engineeringsocial engineering
The WatcherProthewatcher.xyz·Apr 3, 2024Google Drive Notification Trap: A New Twist on PhishingIn 2020, a new scam appeared that misused Google Drive's notification feature. Scammers would create a document with harmful links, then invite their target to work on the document. When invited, the target got a real email from Google, making the sc...DiscussSocial Engineeringsocial engineering
The WatcherProthewatcher.xyz·Apr 1, 2024Phishing Using Fake LinksApril 2021 saw yet another phishing attack emerge that appears specifically designed to target remote workers using cloud-based software. The attack begins when the target receives an email—written in the urgent tone favored by phishing scammers—requ...DiscussSocial Engineeringsocial engineering
Adrianajcyb3r.com·Mar 10, 2024The Power of Influence and Manipulation: Decoding Social EngineeringIn today's world, cyber-attacks are becoming increasingly sophisticated, posing significant challenges in combating cybercriminals. Virtually every imaginable device is interconnected via the Internet, enveloping us in the cyber realm. Cybercriminals...Discuss#cybersecurity
Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Nov 28, 2023How Can an Attacker Execute Malware Through a Script?Executing malware through a script is a common attack vector used by cybercriminals to infect devices and systems. Scripts provide an easy way to distribute and activate malicious code without direct user interaction. Understanding how script-based m...Discuss·35 readsCyber Securityattacker
Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Nov 22, 2023How to Protect Yourself from Social Engineering AttacksSocial engineering refers to manipulation tactics that cybercriminals use to trick people into handing over sensitive information or performing actions that compromise security. With the right strategies, you can identify risks and shield yourself. B...Discuss·26 readsCyber SecuritySecurity
Bilal Gajan Waranicecappman.hashnode.dev·Nov 19, 2023Guarding Against Social Engineering: A Developer's Guide to Cyber ResilienceIntroduction: In the fast-paced world of technology, developers play a critical role in creating and maintaining software that powers our digital lives. However, as the digital landscape evolves, so do the threats that developers face. One such threa...Discusssocial engineering
Stella Jacobitgeeks.hashnode.dev·Oct 18, 2023Social Engineering Attacks: How to Recognize and Prevent ThemHello, dear readers! I'm Stella, and I'm thrilled to have the opportunity to share some vital insights with you today. In today's digital age, where information is at our fingertips, we often find ourselves vulnerable to various online threats. One s...Discusscybersecurity
Lawrence Juma "Jumalaw98"jumalaw98.hashnode.dev·Oct 16, 2023Guarding Against Social Engineering and Phishing: A Comprehensive Guide to Online SecuritySocial engineering and phishing attacks are becoming increasingly sophisticated and prevalent, making it essential for individuals and organizations to be aware of them and take steps to protect themselves. We will explore the critical facets of cybe...DiscussChronicles of CyberSafetyOnline security