New: strongboxitAll contenthive-129948krhive-196917steemzzanhive-183959hive-166405hive-180932hive-185836photographyuncommonlabhive-183397hive-150122hive-101145hive-188619hive-144064bitcoinhive-145157krsuccesslifehive-184714hive-193637hive-109690hive-103599hive-181136TrendingNewHotLikersstrongboxit (25)in strongboxit • 3 years agoWhat is meant by Man in the browser attack?Man-in-the-Browser (MitB) attack is a type of Man-in-the-Middle (MitM) attack specifically involving a browser infected with some type of proxy malware. This malware allows an attacker to intercept…strongboxit (25)in cybersecurity • 3 years agoWhat is meant by ARP Poisoning?ARP Poisoning (also known as ARP Spoofing) is a type of cyber attack carried out over a Local Area Network (LAN). It involves sending malicious ARP packets to a default gateway on a LAN in order…strongboxit (25)in cybersecurity • 3 years agoHow to avoid Password Spraying AttacksUse Multi-Factor Authentication (MFA) Make your passwords more complex Regularly review your password and change your password over a period of time Conduct security awareness training for all…strongboxit (25)in strongboxit • 3 years agoWhat is code-based cryptography?Code-based cryptography incorporates all the cryptosystems, both symmetric and asymmetric, whose security relies entirely on the hardness of decoding in a linear error-correcting code, probably…strongboxit (25)in cybersecurity • 3 years ago10 RULES TO BE FOLLOWED SAFE INTERNET USAGELearn more about the cyber worldstrongboxit (25)in cybersecurity • 3 years agoWhat are identification and authentication failures?Identification and authentication failures are the thieving of user credentials, session tokens, keys, etc.., for gaining unauthorized access. These threats are inherent in online platforms and…strongboxit (25)in cybersecurity • 3 years agoDiscover the reality in the world of CybersecurityMyth: Cyber threats are only external Fact: Insider threats are equally dangerous and need the same attention as external threats Looking for more content related to cybersecurity. Kindly check…strongboxit (25)in strongboxit • 3 years agoCybersecurity MythMyth: We can identify viruses right away Fact: Malware has become stealthy and unidentifiable, causing data leaks, data corruption, etc. Looking for more content related to cybersecurity. Kindly…strongboxit (25)in greyhat • 3 years agoGREY HAT HACKERSGrey hat hackers fall between white hat and black hat hackers. They try to penetrate the system and expose the loopholes without taking the proper consent of the owner. Unlike the black hat hackers…strongboxit (25)in cyberattack • 3 years agoBlack Hat HackersBlack hat hackers are cybercriminals who try to break into the system by using the vulnerabilities present in the computer networks or systems. They infiltrate victims for monetary benefits, to…strongboxit (25)in strongboxit • 3 years agoRoles of a white hat hacker✔️Find and report vulnerabilities in the system before threat factors exploit them. ✔️Develop tools that can detect vulnerabilities and defend them. ✔️Strengthen the overall security posture of…strongboxit (25)in strongboxit • 3 years agoWhite Hat HackersSecurity professionals who exploit weakness in the system. A white hat hacker will try to break into an application or network using methods similar to a hacker or threat vector. Learn more:strongboxit (25)in strongboxit • 3 years agoHow important is cybersecurity?Here are 5 facts that give you a perspective into security attacks the modern world is susceptible to. Get the latest cybersecurity news here:strongboxit (25)in strongboxit • 3 years agoHow important is mobile security?Our mobiles contain the most valuable information in today's world, so it is a priority to safeguard our personal data. Read more about cybersecurity here:strongboxit (25)in strongboxit • 3 years agoSafe internet habitsFor reaching optimum level security, the employees working in the organizations must possess ✔️The ability to recognize suspicious and spoofed domains ✔️Understand differences between HTTP and…strongboxit (25)in strongboxit • 3 years agoAny cybersecurity expert?Test your might by answering the question in the post Looking for more content related to cybersecurity. Kindly check out our blogstrongboxit (25)in cyberthreats • 3 years agoWhat is cyber threat intelligence?Cyber threat intelligence is information about threats and threat actors that helps mitigate harmful events in cyberspace. ✔️Cyber threat intelligence sources include: ✔️Open source…strongboxit (25)in mythvsfact • 3 years agoCybercriminals don't target small and medium businesses (SMB)MYTH: Cybercriminals don't target small and medium businesses (SMB) FACT: About 43%-50% of the cyber attacks in 2020 were on SMBs Looking for more content related to cybersecurity. Kindly check…strongboxit (25)in strongboxit • 3 years agoImplementation of virtual patching✔️Upstream as a standalone Web Application Firewall (WAF). ✔️As a plugin for the executing web server ✔️Directly on the application side by configuration adaptation Looking for more content…strongboxit (25)in credentialstuffing • 3 years agoWhat is credential stuffing?Credential stuffing is a type of cyberattack in which stolen account credentials, typically consisting of lists of usernames or email address and the corresponding passwords, are used to gain…