New: hackingAll contenthive-129948krhive-196917hive-180932zzanhive-150122steemhive-183959hive-185836hive-166405photographyhive-188619hive-145157hive-144064hive-101145hive-184714uncommonlabhive-183397hive-103599bitcoinhive-193186hive-139150steem-atlashive-193637hive-180301TrendingNewHotLikersmrosenquist (70)in cybersecurity • 4 days agoCybersecurity Perspectives for 2025 – Rinki SethiThe Cybersecurity Vault — episode 44, with guest Rinki Sethi. 2025 will be an interesting year for the cybersecurity industry! Cybersecurity Insights interviews experts for their take on the most…jeff-kubitz (69)in steemexclusive • 4 days agoVampires Might Be Real - Musk DOGE's SOC SECURITYFOR MORE THAN A DECADE I MADE THE ARGUMENT THE GOVERNMENT TREASURY WAS HACKED BY HACKERS Elon Musk as DOGE, the Department of Government Efficiency, Head said, "Twilight might be true." written…skycorridors (71)in cars • 12 days agoYour Car is SPYING on You!mrnuclearpower (30)in dnb • 19 days agoHack The Planet 528 on 2-1-25 - Bearded Birthday BashPlaylist for Hack The Planet 528 with DJ Pfeif on 2-1-25. Join us every Saturday night at 8:00pm ET for drum & bass mixes on twitch.tv/djpfeifdnb. Thanks for listening…light999 (71)in cybersecurity • 23 days agoCybersecurity: Protecting Your Digital WorldIn today’s interconnected world, cybersecurity is more crucial than ever. With cyber threats on the rise, protecting your digital presence is not just an option—it’s a necessity. Whether you're an…mrosenquist (70)in cybersecurity • 29 days ago10 Cybersecurity Predictions for 2025Every year I trudge into the analysis and release my #cybersecurity predictions. Here is a quick infographic of the top 10 for 2025. Read the full report for all the background and specifics. Let…tovielpro (31)in hacking • last monthsteemCreated with Sketch.How Hackers Target Cryptocurrencies: Protect Yourself TodayCryptocurrency hacking is a growing threat in the digital world. Hackers use sophisticated methods to steal funds from wallets, exchanges, and even blockchain networks. The most common techniques…mrosenquist (70)in cybersecurity • last monthThe Psychology of Phishing Attackers are masterful at using Social Engineering techniques to victimize others. Sumona, the founder of the MindShield institute, outlines the challenges of adapting to avoid online…hacxx (37)in hacxx • 2 months agoHacxx - Telegram Hacking Groups 11Download: Use the tool online:mrosenquist (70)in cybersecurity • 2 months agoCybersecurity Misuse vs Technical VulnerabilityOne of my 2025 cybersecurity predictions is we will see more victimization through the use of products and services which don’t have a technical vulnerability, but rather design features which can…mrosenquist (70)in cybersecurity • 2 months agoThe Cyber Frenemy of the West: Understanding ChinaChina is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive data, and using it to…bijoy1 (74)in hive-129948 • 2 months agoDiscord হ্যাকিং এর শিকার হলামআমার বাংলা ব্লগ আসসালামু আলাইকুম আমার বাংলা ব্লগের সকল বন্ধুরা, সবাই কেমন আছেন? আশা করি সকলে খুব ভালো আছেন। আমিও আল্লাহর রহমতে আলহামদুলিল্লাহ ভালো আছি। আজকে আমি আপনার…mrosenquist (70)in cybersecurity • 4 months agoMalware Can Hide From Email Scanners in Virtual Hard DrivesThis is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters! Never underestimate the creativity and resourcefulness of intelligent…mrosenquist (70)in cybersecurity • 4 months agoAre Leaders Ready to Break the Ransomware CycleIt is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries. A top US national cybersecurity advisor stated in a…mrosenquist (70)in cybersecurity • 4 months agoFraudulent Worker Schemes Lead to CyberattacksSecureworks released a report detailing how North Korean attackers are targeting western countries with a new tactic. Attackers are fraudulently obtaining positions so they can victimize the…mrosenquist (70)in cybersecurity • 4 months agoRising Cyber Aggression from Nation StatesThere are big predators in our digital world. In recent keynotes I have been talking about the big 4 aggressive nation states and how they are heavily investing in offensive cyber capabilities that…korea109 (65)in cybersecurity • 5 months agoUnderstanding the Recent DDoS Attack: What Happened and What It MeansHello, Steemit community! Recently, many of us experienced disruptions on various platforms due to a significant Distributed Denial of Service (DDoS) attack. This incident has sparked discussions…kenji11 (56)in tullys • 5 months agoタリーズコーヒージャパンで、9万人以上の個人情報が流出か!?コーヒーチェーンを展開する「タリーズコーヒージャパン」は自社が運営するオンラインストアへの不正なアクセスで、9万人以上の個人情報が流出したおそれがあると発表したそうでこのサイトでクレジットカード決済をした5万2000人あまりのカード番号や有効期限などの情報が漏えいしたそうなのですがこういったニュースを、最近よく耳にして思うのですが顧客情報を管理するのは本当に難しいですね。…kenji11 (56)in bingx • 5 months agoMajor virtual currency exchange BingX was hacked and over 6 billion yen was leaked, but they are going to compensate the full amount. | 大手仮想通貨取引所BingXにハッキングされ60億円以上が流出したが全額補償するらしい。大手暗号資産(仮想通貨)取引所BingXは20日、ハッキング被害に遭い4,300万ドル(約62億円)以上が不正流出したそうなのですがしかし不正流出した暗号通貨は全額保証するそうなのですがBingXは儲かっていると思いますし私もここの取引所を使ったことがあります。しかしBybit1本に絞ったため今は口座を閉鎖しました。 The major cryptocurrency exchange…johnnypark (42)in binance • 5 months ago어제의 동지가 오늘의 적, 바이낸스와 와지르X의 대립에서 살펴볼 점한때 인수설까지 나돌면서 파트너쉽 관계로써 협업을 진행해온 글로벌 최대 암호화폐 거래소 바이낸스와 인도 암호화폐 거래소 와지르X(WazirX)가 최근까지도 서로 논쟁을 벌이고 있습니다. 인도의 암호화폐 거래소인 와지르X는 최근 지난 7월 약 2억 3000만 달러 규모의 해킹 피해를 입은 것에 대해 이 해킹사건의 일부 책임이 바이낸스에…