Derek Onwudiwetecheffect.hashnode.dev·Sep 18, 2023Password Security: Strong & 2FAStrong passwords and two-factor authentication (2FA) are crucial elements of online security, helping to protect your accounts and sensitive information from unauthorized access. Here's an explanation of their importance, along with examples: Strong ...DiscussSecurity
Olamide Matthewtheolamide1.hashnode.dev·Sep 4, 2023The Concepts Of Vulnerability, Threat & Risk In CybersecurityThere is the need to understand the concepts of ‘VULNERABILITY, THREAT, AND RISK’ when trying to understand the nut and bolt of Cybersecurity. These three (3) concepts are fundamental but they’re often used interchangeably. Cybersecurity, like other ...Discuss#cybersecurity
Derek Onwudiwetecheffect.hashnode.dev·Sep 1, 2023MAC Address Whitelisting ControlMAC address whitelisting is a security measure used to enhance network access control by allowing only specific devices with approved MAC addresses to connect to a network. This technique is often employed in conjunction with other security measures ...DiscussMachine Learning
Derek Onwudiwetecheffect.hashnode.dev·Aug 28, 2023The Worm Threats & Solutions"The Worm Threat" refers to a type of cybersecurity attack where malicious software, often referred to as a "worm," spreads across a network by exploiting vulnerabilities. This can result in significant disruptions and data breaches. Let's discuss th...DiscussTutorial
Derek Onwudiwetecheffect.hashnode.dev·Jul 18, 2023The Enigmatic Friend RequestIn the digital Village of Ukana ; Laura was a social media-savvy individual, connecting with friends and family across various platforms. One ordinary day, as she browsed through her notifications, she stumbled upon an intriguing friend request on he...DiscussRequests
Derek Onwudiwetecheffect.hashnode.dev·Jun 7, 2023Saved by AWS BackupAt njamanze there lived a young entrepreneur named Chinedu. Chinedu was an ambitious and tech-savvy individual who had built a successful online shopping platform called ShopTech. It had quickly gained popularity among the locals due to its wide rang...DiscussAWS
Rafiu Abdul-mumin Omotolaphilosopha.hashnode.dev·Jan 12, 2023Secure Coding: The Key to Protecting Your Front-End From Cyber ThreatsWelcome to the world of secure coding, where the only thing more boring than writing code is writing code that's secure. But before you nod off, let's put a spin on things and talk about how to protect your front-end with a dose of humor. So sit back...Discuss·70 readsFrontend Development
Ifeanyi Barthcyberbill.hashnode.dev·Nov 6, 2022Re-emergence Of Opera1ea Threat Group!Threat group codenamed OPERA1E which seems to have gone underground for some time now resurfaced with a major strike that saw about $11 million stolen from banks and telecommunication service providers in Africa and withdrawn by cash through ATMs. Al...Discuss·38 readsthreat
HackeraceforHackerace Blog Posthackeraceblog.hashnode.dev·Oct 7, 2022Malware Threats: Detecting, preventing, and recovering from a malware attackMalware is abbreviated from the term Malicious Software. It is a collective name used to denote a variety of potentially harmful and dangerous software. Malicious software also known as Malware are specifically designed to gain unauthorized access to...Promesa and 1 other are discussing this2 people are discussing thisDiscuss·16 likes·485 readsMalwareThis is amazingly written 3
Cyrill GremaudforCISEL - Technical Security Blogsecurity.cisel.ch·Jun 27, 2022Microsoft Defender for Endpoint - Threat Hunting Cheat SheetLes personnes utilisant la solution Microsoft Defender for Endpoint bénéficient d'un module dédié à la recherche de menace très performant, Advanced Hunting. Threat Hunting - Kesako ? Le Threat Hunting est une technique qui consiste à rechercher proa...Discuss·152 readsVulnerabilityCISEL