Discover and read the best of Twitter Threads about #cybersecurityawareness

Most recents (11)

A class 12 passout, former security officer and self taught cybergeek from Hyderabad, Shrinivas Rao Dadi, masterminded a nationwide cyberfraud with a turnover of Rs 3 crore a day. The money was being converted into #cryptocurrency and sent to #China. So, how did he do it? Image
There was a hierarchy to how the scamsters operated. Some of them called up citizens, posing as policemen and flashing fake ID cards, over WhatsApp and Skype. Women were targetted the most. In Delhi, one of the scamsters made a video call to a woman, dressed in a khaki uniform.
The victims were told that a parcel he/she had sent by courier was found containing drugs. The terrified victims were deceived into downloading apps, such as Anydesk, that provided the scamster with remote access to his phone screen.
Read 8 tweets
1/ ๐Ÿšจ A recent surge in phishing scams via Google search ads has led to users losing approximately $4 million.
ScamSniffer has investigated multiple cases where users clicked on malicious ads and were directed to fraudulent websites.
#PhishingScams #GoogleAds Image
2/ ๐Ÿ•ต๏ธโ€โ™‚๏ธ Investigation into the keywords used by victims has uncovered numerous malicious ads at the forefront of search results.
Most users, unaware of the deceptive nature of search ads, click on the first available option, leading them to malicious websites.
#Cybersecurity Image
3/ ๐ŸŽฏ Some of the malicious ads and websites target brands such as @zapper_fi , @LidoFinance , @StargateFinance and @DefiLlama.
These advertisers have been identified as placing these malicious ads:
ะขะžะ’ะะ ะ˜ะกะขะ’ะž ะ— ะžะ‘ะœะ•ะ–ะ•ะะžะฎ ะ’ะ†ะ”ะŸะžะ’ะ†ะ”ะยญะ›ะฌะะ†ะกะขะฎ ยซะ ะžะœะฃะก-ะŸะžะ›ะ†ะ“ะ ะะคยป
TRACY ANN MCLEISH. ImageImage
Read 11 tweets
In the world of bug bounty hunting, Insecure Direct Object References (IDORs) can be a goldmine. In this thread, we'll share advanced tips to sharpen your IDOR detection skills. Let's dive in! ๐ŸŒŠ๐Ÿ”

#bugbountytip #bugbountytips #CyberSecurityAwareness

1/n
Always begin with a thorough understanding of the application you're testing. Identify all possible user roles and their access rights. This knowledge is crucial for accurately identifying IDOR vulnerabilities. ๐Ÿง ๐Ÿ“
Pay attention to API endpoints that handle user-specific data. Keep an eye out for patterns in URL parameters or request payloads. Examine how the application validates user input and authorization checks for these sensitive resources. ๐Ÿ“ก๐Ÿ”ฌ
Read 6 tweets
15 ๐…๐‘๐„๐„ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐ฉ๐ซ๐จ๐ฏ๐ข๐๐ž๐ ๐›๐ฒ ๐ญ๐ก๐ž ๐‚๐ˆ๐’๐€ (Cyber & Infrastructure Security Agency of the United States)

1. Cloud Computing Security lnkd.in/dE62kGXX

2. Cloud Security - What Leaders Need to Know lnkd.in/dDSMg7xa
3. Cryptocurrency for Law Enforcement for the Public lnkd.in/dNkVm-4j

4. Cyber Supply Chain Risk Management for the Public lnkd.in/dxEaQA8w

5. Cyber-essentials lnkd.in/dCQr2ket

6. Donโ€™t Wake Up to a Ransomware Attack lnkd.in/d36WV_g5
7. Foundations of Cybersecurity for Managers lnkd.in/dg4Ed4Gf

8. Fundamentals of Cyber Risk Management lnkd.in/dXjpdZMr

9. Introduction to Cyber Intelligence lnkd.in/dB9cgC99

10. Securing Internet-Accessible Systems lnkd.in/dv_nYHbP
Read 6 tweets
Be safer online in 2023 by following these basic tips.

#CyberSecurityAwareness #cybersecurity #privacy

๐Ÿงต
Check if your emails, phone numbers, passwords, etc. have been breached on @haveibeenpwned / Firefox Monitor.

More info -

Use secure passwords that are unique for every account you have. Do not include PII in your passwords, such as your name or birthdate.

I suggest using a passphrase with at least five words or a complex password with at least 25 characters. A password manager can come in handy.
Read 12 tweets
1๏ธโƒฃ NICCS Federal Virtual Training Environment (FedVTE)

Link: rb.gy/5uai1j
2๏ธโƒฃ SANS Cyber Aces Free Cyber Security Training Course

Link: rb.gy/qg9on5
Read 7 tweets
#IGF2022
@SFLCin team will be attending this years @intgovforum in #AddisAbaba, Ethiopia from 28 November to 2 December 2022.
The the overarching theme for #IGF2022 is - "Resilient Internet for a Shared Sustainable and Common Future."
#ResilientInternet #IGF #DigitalDefenders
#eventupdates
We are hosting 2 sessions and participating in one. We are looking forward to having interesting conversations around "Resilient Internet for a Shared Sustainable and Common Future".
The session details are given below -
Session 01: "Help! The Kill switch is taking away my limited agency"
Speakers-
@RadhikaJhalani๐Ÿ”— @SFLCin,
Oliver Spencer ๐Ÿ”— @FreeExpressMm, @agrabeli_๐Ÿ”— @OpenObservatory, @PrasanthTweets๐Ÿ”— @SFLCin,
@arzakkhan,
@FelAnthonio๐Ÿ”— @accessnow.
intgovforum.org/en/content/igfโ€ฆ
Read 6 tweets
Start your Career in Cyber-Security / Information-Security by spending $0

These are FREE University courses that are available online for you to take!
๐Ÿงต

#infosec #infosecurity #Harvard #NetworkSecurity #CyberMonday2022 #CyberSecurityAwareness
๐ˆ๐๐Œ - ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐š๐ฌ๐ข๐œ๐ฌ
This course gives you the background needed to understand the basics of Cybersecurity.
๐Ÿ–‡๏ธ
edx.org/course/cyberseโ€ฆ
๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐…๐ฎ๐ง๐๐š๐ฆ๐ž๐ง๐ญ๐š๐ฅ๐ฌ

Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks.
๐Ÿ–‡๏ธ
edx.org/course/cyberseโ€ฆ
Read 10 tweets
Want to break into cybersecurity? We've got something special to ease
your journey.๐Ÿ˜Ž

In this webinar, we will discuss industry secrets guaranteed to help you land your dream cybersecurity job.
WHAT WILL YOU LEARN?

1. How to identify a cybersecurity niche and choose a career path.

2. Learn about the technical tools and technology required for entry-level roles.

3. Ways to connect with cybersecurity mentors both home and abroad.
4. Interview preparation steps (Mock interview).

5. How to find entry-level cybersecurity job opportunities.

You can't afford to miss this, so register here: bit.ly/bicbyhacktales
Read 4 tweets
Things to think about before you share something on social media:

A few basic questions to ask before sharing anything you did not write yourself, especially something you found on social media:
(1) Who wrote this?

(2) When was it written? Is it still current?

(3) What do you know about the author (not the person who shared it, the *author*) that makes them a trustworthy source? What conflicts of interest do they have?
Read 9 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!