• Explore
  • Curator's Pick
  • Login
  • Sign up
neoxian stem science technology archon stemsocial palnet waivio hive-130906 photography hive-196387 ecency cent creativecoin proofofbrain education math spanish hive-128780 vyb pimp hive-engine ocd conspiracy pob ctp stem-espanol leofinance hive-167922 stemgeeks discovery-it insect waiv scifimultiverse deepdives hive-111030 chessbrothers calculus vectors leo

#hacking

avatar
@mrosenquist 0
12 months ago
cybersecurity
Rising Cyber Aggression from Nation States There are big predators in our digital world. In recent keynotes I have been talking about the big 4 aggressive nation states and how they are heavily investing in offensive…
17
0
3
14.583 STEM
avatar
@mrosenquist 0
12 months ago
cybersecurity
Are Leaders Ready to Break the Ransomware Cycle It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries. A top US national cybersecurity advisor
27
0
1
30.096 STEM
avatar
@mrosenquist 0
12 months ago
cybersecurity
Malware Can Hide From Email Scanners in Virtual Hard Drives This is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters!<
12
0
1
4.931 STEM
avatar
@mrosenquist 0
10 months ago
cybersecurity
The Cyber Frenemy of the West: Understanding China China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive…
45
0
0
20.494 STEM
@graylinestrider 0
10 months ago
nsfw
Reveal this post
1
0
0
3.976 STEM
avatar
@mrosenquist 0
9 months ago
cybersecurity
The Psychology of Phishing ​ Attackers are masterful at using Social Engineering techniques to victimize others. Sumona, the founder of the MindShield institute, outlines the challenges of adapting to…
20
0
2
13.449 STEM
avatar
@mrosenquist 0
9 months ago
cybersecurity
10 Cybersecurity Predictions for 2025 Every year I trudge into the analysis and release my #cybersecurity predictions. Here is a quick infographic of the top 10 for 2025. Read the full report for all the…
41
0
0
101.796 STEM
avatar
@mrosenquist 0
6 months ago
cybersecurity
Simplifying Cyber Safety for Everyone with Sandra Estok Cybersecurity is not just a technical endeavor. Attackers often pursue people to either gain access to valuable systems or to directly victimize them. This includes companies…
14
0
0
18.150 STEM
avatar
@mrosenquist 0
6 months ago
cybersecurity
Cybercriminals Can Easily Adopt New Tech Sandra Estok discusses how cybercriminals are not burdened by rules when it comes to leveraging new technologies. They quickly adapt new tech in pursuit of their malicious…
19
0
0
34.829 STEM
avatar
@mrosenquist 0
6 months ago
cybersecurity
Cybercrime Follows the Path of Least Resistance We must always look at our cybersecurity defenses from the viewpoint of those attacking them! Here is a clip from my recent interview with HMG Global Viewpoint, talking about the…
15
0
1
6.777 STEM
Menu
Explore Curator's Pick
Trade
Trade STEM Swap