New: infosecAll contenthive-129948hive-196917krhive-150122hive-166405hive-180932hive-185836steemzzanhive-144064hive-188619hive-183959hive-183397hive-101145uncommonlabhive-139150hive-103599photographycryptidhunterhive-145157photohive-109690bitcoinhive-180301lifeTrendingNewHotLikersamy24 (45)in cybersecurity • 10 days ago🕵️ "We Thought It Was Secure… Until It Wasn't." Why Every Web Project Needs a Security Audit (And How to Do It Right)"We shipped it. It worked flawlessly. But then someone bypassed our login." That's what a panicked developer confessed at a recent tech meetup. Their team had built a slick, high-performing web…mrosenquist (70)in cybersecurity • 13 days agoThreat Casting a Nation State Attack on Critical Infrastructure Scenario at CognectCon2025During exercises at CognectCon2025 a number of cyberattack scenarios were discussed that highlighted the risks of cyber attackers leveraging cognitive vulnerabilities to cause major impacts to…mrosenquist (70)in cybersecurity • 18 days agoINTERPOL Takes Down a Infostealers OperationCongrats to INTERPOL for taking down a major cyber information-theft infrastructure! Over 20 thousand Ips/domains were shuttered and 41 servers that contained more than 100GB of sensitive data was…shofiur007 (25)in hive-129948 • 5 months agoসাইবার নিরাপত্তার ভবিষ্যত: ২০২৫ সালে কিভাবে নিরাপদ থাকবেন 🔒💻আজকের ডিজিটাল বিশ্বে সাইবার নিরাপত্তা আগের চেয়ে অনেক বেশি গুরুত্বপূর্ণ। সাইবার হুমকি দ্রুত বিকশিত হচ্ছে, ফলে ব্যক্তিগত এবং ব্যবসায়িক তথ্য রক্ষা করতে হলে আমাদের এগিয়ে থাকতে হবে। হ্যাকাররা এখন এআই…mrosenquist (70)in cybersecurity • 8 months agoPerfect Vulnerability for CISO Ultra Reliable SystemsA “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is…blit32 (25)in infosec • last yearA breakdowb of the Snowflake data leaksHere is a simple breakdown of what is going on with the Snowflake leaks, and what could be the largest data leak in history so far. Sources:callnovo-cc (42)in hive-119463 • last yearUnleash Your IT Outsourcing Potential (4 Factors): Call Center Cybersecurity Solutions That Revolutionize Technical Support ServicesThe digital landscape is rapidly evolving, presenting new challenges for antivirus companies in combating increasingly–sophisticated cyber threats. To keep up, these companies must deliver robust…callnovo-cc (42)in cybersecurity • last yearUnleash Your IT Outsourcing Potential (4 Factors): Call Center Cybersecurity Solutions That Revolutionize Technical Support ServicesThe digital landscape is rapidly evolving, presenting new challenges for antivirus companies in combating increasingly–sophisticated cyber threats. To keep up, these companies must deliver robust…blit32 (25)in technews • last yearIsrael Disinformation Campaign using Generative AI Targeting US and CandaRussia, China, Iran and Israel caught using OpenAI to generate content for disinformation campaigns. Source:secpoint (49)in infosec • last yearJoin SecPoint at Infosecurity Europe 2024, June 4th to 6th! - Download the New June 2024 SecPoint Penetrator & Protector Software Images NowJoin SecPoint at Infosecurity Europe 2024, June 4th to 6th! - Download the New June 2024 SecPoint Penetrator & Protector Software Images Now #infosec #infosecurity #solarnet #secpoint #cybersec…amolmahajan380 (35)in cybersecurity • 2 years agoIn the Digital Shadows: Understanding Cyber Theft and Building Internet Security FortressesIn the age of interconnectedness, where our lives pulsate through servers and cables, a new kind of menace lurks. Cyber theft, the clandestine pilfering of data and assets in the digital domain, has…amolmahajan380 (35)in cybersecurity • 2 years agoComputer Crimes and Internet Security: A Comprehensive OverviewComputer crimes and internet security have emerged as significant concerns in the digital age. The increasing reliance on computers and the internet for personal and professional activities has made…sumitsi5800 (32)in infosec • 2 years agoWorried about your company's digital security? Get the perfect SaaS Security Checklist and rest easy!The majority of SaaS security checklists are designed to assist you in evaluating your current security procedures and making improvements where appropriate.mrosenquist (70)in cybersecurity • 2 years agoCrucial conversations: Overcoming the 5 Areas Where CISOs Tend to StruggleI had a great conversation with Marco Ciappelli and Sean Martin from ITSPmagazine Podcast discussing the mistakes and hard-learned lessons in cybersecurity! They are such characters! A fun and…dakshranta (25)in cyber • 2 years agoAll about cyber securityCyber security, also known as information security, is the practice of protecting computer systems, networks, and sensitive information from unauthorized access, use, disclosure, disruption…lastbreach (60)in german • 3 years agoPOD15 - Die Infosec News der Woche am 21.12.2022Schwachstellen bei #Citrix und #Fortinet, FBI Programm #InfraGard gehackt, Uni Duisburg erneut angegriffen, #Europol Operation #PowerOff erfolgreich, #Twitter Mitarbeiter verurteilt und Datenpanne…lastbreach (60)in german • 3 years agoDie Infosec News der Woche am 18.12.2022Die #Infosec #News der Woche, heute mit #Schwachstellen in #Fortigate und #Citrix, Angriffe auf #InfraGard (FBI) und Uni Duisburg (erneut!), Europol schaltet #DDoS Sites ab, Urteil für ehem.…lastbreach (60)in deutsch • 3 years agoPOD14 - Die Infosec News der Woche am 12.12.2022Guten Morgen! Wie jeden Montag gibt's die #Weekly #News auch wieder zum mithören statt lesen. Heute mit #Schwachstellen in #Sophos und #Cisco Geräten, diversen #Cyberattacken, einer fake #Ransomware…lastbreach (60)in deutsch • 3 years agoDie Infosec News der Woche am 10.12.2022#Lücken in #Sophos Firewalls und #Cisco IP-Telefonen, #Cyberangriffe auf Amnesty International, #Rackspace und Metropolitan Opera, Fake #Ransomware #CryWiper entdeckt und Drogenhändler über…tutorialboy (29)in cybersecurity • 3 years agoA Summary of Fuzzing Tools and Dictionaries For Bug Bounty HuntersIntroduction Testing for vulnerabilities by manually entering input can be unmanageable. In these days and age where people have low levels of time and patience, the idea of manually providing…