Waivio

cybersecurity

hashtag
540.78

Experts

Show more authors

lindarey

52.05

Why Protecting My Website is Critical Against a Breach | Glitch #164

▶️ Watch on 3Speak Why Protecting My Website is Critical against a cyber breach. 💥 Find out more about the project and receive long-for...

mrosenquist

1.2 K
Hive.Blog

Reality of Cybersecurity Risks for AI

The explosive growth of GenAI has serious repercussions for cybersecurity. But is the fear being overplayed in the media? What are the re...

phriendlyphishau

0.02

Privacy and Online Security Myths | Cyber security

Ideally, we all want to keep our data and identities safe online, but there's a lot of confusion about what online privacy means in the ...

tdvtv

4.5 K

BreachForums Getting Hit Again [Breaking News]

by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime In today's video, I'm providing a quick...

mrosenquist

1.2 K
Hive.Blog

CoinGecko Data Breach

Anyone see that CoinGecko is notifying users of a data breach? Although passwords were NOT exposed, user’s names, emails, IP addresses, a...

mrosenquist

1.2 K
Hive.Blog

Come join the LIVE discussion: Cybersecurity's Major Trends & Threat Dynamics

Live tomorrow June 7th 2024 on LinkedIn at noon Pacific/2pm CT — Join a brand new Voice America episode of And Security For All! Matthew ...

mrosenquist

1.2 K
Hive.Blog

Microsoft Recall Cybersecurity & Privacy Risks You Need to Know About!

Microsoft created Recall as a tool to benefit the user, but it has far more value to cybercriminals, hackers, data brokers, digital extor...

chaintuts

11.30
Hive.Blog

Becoming a Phish Fighter - Training to Spot Phishing Scams

Does this corny, MMA themed thumbnail have your attention? Good! I have a great new tutorial for you on fighting...phishing scams that is...

mrosenquist

1.2 K
Hive.Blog

The Real Value for Operation Endgame Malware Takedown

Operation Endgame has taken down a major cyber criminal infrastructure. This is important, but likely not for the reasons you may think. ...

sub7security

0.16

Digital Safeguards: Unveiling and Protecting Smart Contract Vulnerabilities

Introduction As blockchain technology continues to evolve, smart contracts have become fundamental to the implementation of reliable and...

mrosenquist

1.2 K
Hive.Blog

50 CISOs & Cybersecurity Leaders Shaping the Future

I am honored and humbled to be listed among such influential luminaries who collectively push our industry to continually adapt to make o...

mrosenquist

1.2 K
Hive.Blog

Law Enforcement Takes Down Botnet Infrastructure

EUROPOL has struck a blow to the underground botnet community with the largest ever dropper-ecosystem takedown! Over 100 servers that hos...

mrosenquist

1.2 K
Hive.Blog

The Rise and Risks of Shadow AI

Shadow AI, the internal use of AI tools and services without the enterprise oversight teams expressly knowing about it (ex. IT, legal, cy...

sub7security

0.16

The Real Risks of Inadequate Smart Contract Security

In the rapidly evolving landscape of blockchain technology, smart contracts have emerged as a cornerstone, enabling automated, trustless...

afloid0033

0.00

The Ultimate Guide to Adding Value as an MSP for Your Business Clients

In today’s fast-paced digital world, Managed Service Providers (MSPs) play a crucial role in helping businesses streamline their IT oper...

samuelsemeth

0.00

Ensure Safe Email Marketing with These 9 Tips

Email marketing remains a powerful tool for businesses, enabling direct communication with customers, enhancing brand loyalty, and drivi...

mrosenquist

1.2 K
Hive.Blog

New Cryptojacking Malware Breakdown

New Cryptojacking Malware Breakdown - The GhostEngine cryptocurrency mining malware disables endpoint security protections, deletes logs,...

zamoranico654

0.01

The Ransomware Shield: Protecting Your Digital Assets

In an increasingly digital world, the protection of your digital assets has never been more critical. Ransomware, a type of malicious so...

mrosenquist

1.2 K
Hive.Blog

North Korea is Trying to Embed Agents into IT Positions of Western Countries

Attention IT departments, the FBI is warning US companies to be wary of inadvertently hiring North Koreans to remotely work in their IT d...

mrosenquist

1.2 K
Hive.Blog

Free Cybersecurity Specialist Workshop

A free workshop for students looking to become Cybersecurity Specialists!Also, if you are already a professional and want to explore a ca...

mrosenquist

1.2 K
Hive.Blog

SEC Will Require Finance to Notify Breach Victims in 30 Days

More SEC rules, this time mandating financial firms inform victims of data breaches within 30 days! Why wasn't this already a requirement...

hive-world

3.7 K

I Was Hacked Twice: Cyber Security A Must To Everyone

Source Hello Friends, how are you doing? Breaching data online is painful than when one physically stole properties from one physically. ...

prattybayola

0.00

6 Critical Steps to Protect Against Ransomware Attacks

Ransomware attacks have become one of the most daunting cyber threats facing organizations today. These attacks encrypt an organization'...

mrosenquist

1.2 K
Hive.Blog

And Security for All Podcast 2024: Cybersecurity's Major Trends & Threat Dynamics

I’m excited to be speaking live with Kim Hakim on the And Security For All podcast tomorrow to discuss 2024’s Cybersecurity’s Major Trend...

tdvtv

4.5 K

"Breachforums 3.0 und USDoDs [Hacker] mutiges Versprechen an die Community – eine neue Community

by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime The Takedown of BreachForums by the FBI...

phriendlyphishau

0.02

Cyber Security Awarness Training For Business

When it comes to cyber security, employees are often the weakest link. Without an understanding of how to identify and respond to common...

mrosenquist

1.2 K
Hive.Blog

Unlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses!

There are tremendous opportunities in cybersecurity and the industry needs many more qualified workers. Training plays an important part...

vholmgren0033

0.01

The Role of Managed Service Providers in Cybersecurity Breaches

In the digital age, cybersecurity has become a cornerstone for businesses of all sizes. Managed Service Providers (MSPs), which offer ou...

walterjay

1.3 K

Little off schedule doing the Google CyberSecurity Certificate

Another use case of blockchain is going back to your previous posts and check what your goals were. I like it because you know for sure t...

tunnelvision0

148.67
Hive.Blog

The Erosion of Digital Liberty: Government Overreach in Cryptocurrency Regulation

As policymakers target privacy tech, individual freedoms hang in the balance In an age defined by technological advancement and digital ...