Die beliebte Spieler-Plattform Steam ist aktuell Phishing-Angriffsziel Nr. 1
#CounterStrike #Cyberbedrohung #Cybersecurity #Cybersicherheit #HumanRiskManagement @KnowBe4 #OnlineGaming #Phishing #SecurityAwareness #SocialEngineering #Steam
DORA – Europas Finanzsektor braucht eine neue digitale Risikokultur
#Compliance #Cyberbedrohung #DigitalOperationalResilience-Act #DORA #Finanzwesen @KnowBe4 #Krisenmanagement #Risikomanagement #SecurityAwareness #Sicherheitsbewusstsein #Sicherheitskultur
https://netzpalaver.de/2025/04/15/dora-europas-finanzsektor-braucht-eine-neue-digitale-risikokultur/
Trump Strips Security Clearances of Ex-CISA Head Krebs, SentinelOne – Source: securityboulevard.com https://ciso2ciso.com/trump-strips-security-clearances-of-ex-cisa-head-krebs-sentinelone-source-securityboulevard-com/ #SecurityBoulevard(Original) #rssfeedpostgeneratorecho #TrumpAdministration #CyberSecurityNews #SecurityAwareness #SecurityBoulevard #securityclearance #SocialFacebook #SocialLinkedIn #Cybersecurity #SentinelOne #ChrisKrebs #Spotlight #Cyberlaw #FEATURED #SocialX #CISA #News
Angreifer verdoppeln durchschnittliche Beuteforderungen bei Business-E-Mail-Compromise-Angriffen
#BEC #BusinessEMailCompromise #Cyberbedrohung #HumanRiskManagement @KnowBe4 #Phishing #SecurityAwareness #SocialEngineering
Cyberangriffe auf den Energie- und Versorgungssektor haben sich innerhalb von zwei Jahren mehr als verdoppelt
#Cybersecurity #Cybersicherheit #erneuerbareEnergie #HumanRiskManagement @KnowBe4 #SecurityAwareness #Versorgungssektor
Identity-Management-Day 2025 – Tipps, wie Unternehmen die digitalen Identitäten ihrer Mitarbeiter besser absichern können
#digitaleIdentität #Identity #IdentityManagementDay @KnowBe4 #Phishing #SecurityAwareness #Sicherheitsbewusstsein #SocialEngineering #ZeroTrust
DNS Flood Attack vs. DDoS
A DNS Flood Attack targets DNS servers specifically, whereas a DDoS Attack can target any online service. Understanding the distinction is key to building stronger defenses!
Join our Cyber security training Course -
https://infosectrain.com/cybersecurity-certification-training/
200M X (Twitter) user records leaked in a 34GB free-for-all—again.
Data enthusiast “ThinkingOne” released the files after allegedly failing to get a response from X. The breach combines:
・Data from a 2022 vulnerability X previously downplayed
・January 2025 breach data
・A total of 2.8 billion records spanning X user IDs, emails, bios, locations & more
X continues to deny its systems were the direct source of the leak. But researchers confirm much of the data is real—and the scale is unmatched.
The kicker? ThinkingOne believes this might’ve required internal access, or an attack of unprecedented sophistication.
Even without passwords, this treasure trove fuels phishing, impersonation, and targeted disinformation.
Google-Play-Store mit hunderten bösartiger Apps verseucht
#Cybersecurity #HumanRiskManagement @KnowBe4 #Phishing #PlayStore #SecurityAwareness #SpearPhishing
https://netzpalaver.de/2025/04/03/google-play-store-mit-hunderten-boesartiger-apps-verseucht/
Phishing-Angreifer setzen zunehmen auf russische Bullet-Proof-Domains
#bulletproof #Credentials #Cybersecurity #FakeWebseite #HumanRiskManagement @KnowBe4 #Phishing #SecurityAwareness
Intelligente Cyberabwehr fängt bei den Mitarbeitern an
Schutz vor Cyberbedrohungen: Best Practices und Lösungen | heise https://business-services.heise.de/security/bedrohungen-schwachstellen/beitrag/intelligente-cyberabwehr-faengt-bei-den-mitarbeitern-an-4873 #CredentialStuffing #Phishing #Deepfake #ArtifificialIntelligence #SocialEngineering #CyberSecurity #HumanFactor #SecurityAwareness #HumanRiskManagement
Oracle Hack PR Drama: Deny, Deny, Deny — Despite Damning Data – Source: securityboulevard.com https://ciso2ciso.com/oracle-hack-pr-drama-deny-deny-deny-despite-damning-data-source-securityboulevard-com/ #SecurityBoulevard(Original) #oraclecloudinfrastructure #rssfeedpostgeneratorecho #ApplicationSecurity #OracleAccessManager #CyberSecurityNews #IndustrySpotlight #OracleFusionCloud #SecurityAwareness #SecurityBoulevard #IncidentResponse #MostReadThisWeek #Threats&Breaches #Identity&Access #DevOps
Wird wohl mal wieder Zeit für nen neuen Blogbeitrag:
https://wwwbundesnachrichtendienst.de
https://wwwbnd.de
https://wwwbsi.de
https://wwwverfassungsschutz.de
Alright folks, just a quick heads-up from your friendly neighborhood pentester: Office docs? Yeah, they're *still* a massive playground for attackers.
Sure, keeping things updated is vital, *but* let's be real: social engineering still wears the crown. Honestly, the least suspecting user often ends up being the biggest security gap in the network.
Just saw this play out at a client's site recently. An employee clicked open a seemingly innocent Word doc... hiding a nasty phishing link. And *poof*, their credentials were gone. Can happen just like that.
Now, AI *can* lend a hand here, but tread carefully. The tech's evolving way faster than most people can adapt. That makes disinformation and manipulation seriously huge threats we need to watch out for.
So, what's the game plan? Awareness training – it's absolutely worth its weight in gold! Plus, fostering a healthy dose of skepticism is key, even when it feels like a drag sometimes. You gotta stay sharp.
How are *you* shielding your users from these kinds of attacks? Let me know!
Medusa-Ransomware erhöht den Druck auf Opfer mit Countdown-Timern
@CheckPointSW #Cybersecurity #Cybersicherheit #Datenleck #EMailSecurity #Medusa #Phishing #Ransomware #SecurityAwareness #Sicherheitsbewusstsein
Need a keynote speaker who doesn’t beat around the bush?
I break down cybersecurity from a hacker’s perspective — the tricks they use, the gaps they exploit, and how to stay ahead. No jargon, no fluff — just real-world stories from 20+ years of experience.
CyberSecurity? AI? Social Engineering? Privacy? OSINT? I make it engaging.
No vague theories — just hard-hitting insights and actionable takeaways.
Audiences leave informed, entertained, and a little paranoid (in a good way).
Watch my speaker reel below and see why event organizers book me again.
Looking for a speaker who cuts through the noise? Let’s talk.
Please share with or tag someone that may benefit from my speaking service.
#CyberSecurity #KeynoteSpeaker #Privacy #OSINT #EventSpeaker #Speaker #Training #SecurityAwareness #OSINT
Speaker Demo Reel: https://www.youtube.com/watch?v=VwNb9cgS5No
Let's schedule some time to talk: https://www.MishaalKhan.com/contact
Phishing-Angriffe, die legitime Microsoft-Kommunikation missbrauchen, nehmen zu
#Authentifizierung #Cybersecurity #HumanRiskManagement @KnowBe4 #Microsoft #Phishing #Security #SecurityAwareness #SociaEngineering
Ransomware-Angriffe und KI-gestützte polymorphe Phishing-Kampagnen nehmen zu
#EMailSicherheit #HumanRiskManagement @KnowBe4 #Phishing #Ransomware #SecurityAwareness #Sicherheitskultur #ThreatIntelligence
What if hackers could track your team’s movements, calls, and even financial activity—without ever breaching your network?
In this clip from our latest episode of Cyberside Chats, LMG’s @sherridavidoff and @MDurrin reveal how nation-state actors are using telecom metadata to launch targeted attacks—and what IT leaders can do about it.
Watch the full video to discover key prevention tactics, including stronger authentication for financial transactions, identifying spoofed calls and texts, and securing third-party telecom providers.
Watch the full episode: https://youtu.be/Lyiwx6upd8E
Listen to the podcast: https://www.chatcyberside.com/e/the-title-of-cschats_11_-_ep_11_-_03_07_25_final_v2_mp3abb2v/?token=36d8802181f520acca954d7188659807