117 afleveringen

Learn the latest Cybersecurity updates in the tech world.

Cybersecurity Tech Brief By HackerNoon HackerNoon

    • Technologie

Learn the latest Cybersecurity updates in the tech world.

    Compromised Credentials and Breaches: How It Affects Your Business

    Compromised Credentials and Breaches: How It Affects Your Business

    This story was originally published on HackerNoon at: https://hackernoon.com/compromised-credentials-and-breaches-how-it-affects-your-business.
    Small businesses have been a lucrative target for cybercriminals. And for obvious reasons such as lack of Security resources, Financial resources, etc.
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #cybersecurity-for-small-business-owners, #compromised-credentials, #cyber-breaches, #small-business, #brute-force-attack, #credential-stuffing, #dictionary-attacks, #business-security, and more.


    This story was written by: @swati1012. Learn more about this writer by checking @swati1012's about page,
    and for more stories, please visit hackernoon.com.



    The above-mentioned reasons make small businesses susceptible to various cybercrimes like phishing and social engineering attacks, among others.

    Through these attacks, the threat actors steal your organization’s credentials. Once they obtain these credentials, the threat actor can launch various attacks to steal your information.

    • 5 min.
    Reinventing Blockchain Security: Exclusive Interview With Cyvers CEO Deddy Lavid

    Reinventing Blockchain Security: Exclusive Interview With Cyvers CEO Deddy Lavid

    This story was originally published on HackerNoon at: https://hackernoon.com/reinventing-blockchain-security-exclusive-interview-with-cyvers-ceo-deddy-lavid.
    Cyvers co-founder and CEO Deddy Lavid provides valuable insights into how AI algorithms can identify potential blockchain security threats.
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #blockchain-security, #cyvers-ceo-deddy-lavid, #cyvers-security-report-2023, #cyvers-security-report-2024, #blockchain-regulation, #doa-hack-of-2016, #protecting-digital-assets, #cybersecurity-in-web3, and more.


    This story was written by: @penworth. Learn more about this writer by checking @penworth's about page,
    and for more stories, please visit hackernoon.com.



    In this interview with Olayimika Oyebanji, Cyvers co-founder and CEO, Deddy Lavid, provides valuable insights into how AI algorithms can identify potential blockchain security threats.

    • 13 min.
    The Best Private Search Engines — Alternatives to Google

    The Best Private Search Engines — Alternatives to Google

    This story was originally published on HackerNoon at: https://hackernoon.com/untraceable-search-engines-alternatives-to-google-811b09d5a873.
    Private search engines have seen huge growth over the past few years. Until recently, it was unthinkable that anyone could compete with Google in the search realm. However, there are now many smaller players in the search game that are growing rapidly. Google’s market share has declined from 78.7 percent in February 2017 to slightly below 70 percent in February 2018.
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #privacy, #internet, #search-engines, #alternatives-to-google, #technology, and more.


    This story was written by: @stewofkc. Learn more about this writer by checking @stewofkc's about page,
    and for more stories, please visit hackernoon.com.

    • 7 min.
    Free Workshop From Security Risk Advisors Empowers Organizations To Select Optimal OT Security Tools

    Free Workshop From Security Risk Advisors Empowers Organizations To Select Optimal OT Security Tools

    This story was originally published on HackerNoon at: https://hackernoon.com/free-workshop-from-security-risk-advisors-empowers-organizations-to-select-optimal-ot-security-tools.
    Based in Philadelphia, SRA operates across the USA, Ireland, and Australia and has announced the launch of its OT/XIoT Detection Selection Workshop.
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #cybersecurity, #sra, #cyberwire, #sra-announcement, #iot-solutions, #cyber-threats, #press-release, #good-company, and more.


    This story was written by: @cyberwire. Learn more about this writer by checking @cyberwire's about page,
    and for more stories, please visit hackernoon.com.

    • 2 min.
    Social Engineering Attacks: One of the Biggest and Quietest Threats to Your Business

    Social Engineering Attacks: One of the Biggest and Quietest Threats to Your Business

    This story was originally published on HackerNoon at: https://hackernoon.com/social-engineering-attacks-one-of-the-biggest-and-quietest-threats-to-your-business.
    Protect your small business from social engineering attacks with training, verification, encryption, and awareness of common scams.
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #cybersecurity, #social-engineering, #small-business-security, #cyber-threats, #cyber-protection, #cyber-scams, #phishing, #encryption, and more.


    This story was written by: @swati1012. Learn more about this writer by checking @swati1012's about page,
    and for more stories, please visit hackernoon.com.

    • 6 min.
    Red Team Phishing Simulations: Using Evilginx2 and GoPhish

    Red Team Phishing Simulations: Using Evilginx2 and GoPhish

    This story was originally published on HackerNoon at: https://hackernoon.com/red-team-phishing-simulations-using-evilginx2-and-gophish.
    I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations.
    Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.
    You can also check exclusive content about #phishing, #hacking, #red-team, #nginx, #phishing-email, #golang, #cybersecurity, #phishing-simulations, and more.


    This story was written by: @matejsmycka. Learn more about this writer by checking @matejsmycka's about page,
    and for more stories, please visit hackernoon.com.



    I'd like to share my experiences using evilginx2 and gophish for red teaming phishing simulations. While there are numerous guides available, I aim to highlight the nuances and practical insights that aren't typically covered in documentation and tutorials. When setting up a phishing campaign, you have three options: cloning the page, verifying the captured data against a legitimate page, or using a man-in-the-middle attack.

    • 6 min.

Top-podcasts in Technologie

Acquired
Ben Gilbert and David Rosenthal
✨Poki - Podcast over Kunstmatige Intelligentie AI
Alexander Klöpping & Wietse Hage
Bright Podcast
Bright B.V.
Lex Fridman Podcast
Lex Fridman
De Technoloog | BNR
BNR Nieuwsradio
Tweakers Podcast
Tweakers

Suggesties voor jou

Security Weekly Podcast Network (Video)
Security Weekly
Hacked
Hacked
David Bombal
David Bombal
Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
Security Now (Audio)
TWiT