#hackingUnmoderated tagAll postsTrendingHotNewPromotedPayoutsmrosenquist1 in #hive-138876 • last yearTop 10 Things the Industry Can Do Now to Mitigate Digital Supply-Chain Attacks▶️ Watch on 3Speak The SolarWinds and Exchange supply-chain attacks have highlighted how vulnerablemrosenquist1 in #hive-138876 • last yearNot Paying Ransomware is the Only Way We All Win▶️ Watch on 3Speak Ransomware is on the rise because cybercriminals are being rewarded. Those who are imjesuscirino in #hacking • 2 years agoProxyChains: Previo a usar Kali linuxProxychains ayuda a colocar en medio de el pentester y el objetivo proxys fijos, aleatorios o dinámicos, para evitar ser detectados facilmente durante el pentesting. 1…twr in #technology • 3 years ago3 Ways Attack Simulations Can Protect Enterprises Against Advanced Persistent ThreatsEnterprises face the tough challenge of ensuring the security of their IT infrastructure. Data breach attempts have now become commonplace as customer data and intellectual property that businessestwr in #technology • 3 years agoHacktronian - An all in one hacking tool for Linux and AndroidHacktronian is an open-source penetration testing framework designed for social engineering and multiple server side attacks, it has a number of custom attack vectors that allow one to portray a rmrosenquist Cybersecurity Strategistin #news • 3 years agoReviewing the 11 Hot (and not) Cybersecurity TrendsRecently an article came out describing several cybersecurity trends which are hot and atwr in #technology • 3 years agoThe Myth Of Coding Bootcamp Job GuaranteesCoding bootcamps are doing something today that’s not being done by traditional four-year computer science degrees: preparing a new generation of web dtwr in #technology • 3 years agoSmall Businesses Are Prime Targets for Hackers – Attracting 70% of AttacksNew research has unveiled that the optimum target for hackers is small-to-medium businesses (SMBs.) This trend has shifted considerably from the past, where larger corporations faced the mosttwr in #technology • 3 years agoHow to Safely Sell your Steam AccountSelling a physical video game is easy. You can auction it on Craigslist or trade it to a friend for something better.twr in #technology • 3 years ago4 Real-Life Examples of Stolen Identity and How They Did ItDid you know that identity theft is one of the fastest-growing crimes in the US? Akeys-defender in #abuse • last yearLeak -- Compromised POSTING key successfully protected!!❗❗❗ 💀💀 ⚠️⚠️ It's a new day and another user leaked one of their private keys into the Steem Blockchain.keys-defender in #abuse • last yearLeak -- Compromised MEMO key successfully protected❗❗❗ 💀💀 ⚠️⚠️ It's a new day and another user leaked one of their private keys into the Steem Blockchain.freedumbnews in #biohacking • 2 years agoA Guide to DIY Bio-Hacking - Elliot RothA Guide to DIY Bio-Hacking READ MORE: Elliot Rothteodora in #books • last yearSocial Engineering, can you be hacked?I need to share first my urge to read. I have it since I was 5 years old and never overcome it. I like to immerse myself in another reality, see the world through someone else…mrosenquist Cybersecurity Strategistin #cybersecurity • 2 years agoWill AI rescue the world from the impending doom of cyber-attacks or be the causeThere has been a good deal of publicized chatter about impending cyberattacks at anmrosenquist Cybersecurity Strategistin #cybersecurity • 2 years agoCharges Against Russian Nation-State Hackers Sends a MessageThe U.S. Department of Justice filed charges against six Russian agentmrosenquist Cybersecurity Strategistin #cybersecurity • 2 years agoThe NSA knows something you don'tThe U.S. National Security Agency knows which vulnerabilities China bamrosenquist Cybersecurity Strategistin #cybersecurity • 2 years agoPhishing Just Became More DangerousWhat do you get when you combine phishing + AI + worm capabilities? Trouble that moves fast! Themrosenquist Cybersecurity Strategistin #cybersecurity • 2 years agoTips for all of us to be more cyber secureThere are many cybersecurity aspects we cannot control in our digital world. It can make anyone feel powerless. But we can control how we act and the decisions we make as we…mrosenquist Cybersecurity Strategistin #cybersecurity • 2 years agoCyber Threats Enhance Phishing with AI and Worm Functions for Rapid DisruptionNew phishing malware leverages Artificial Intelligence and wor