···
Sign in
···
···
infosec
hashtag
79.19
About
Reviews
Updates
1
Followers
0
Experts
Experts
mrosenquist
26.13
· 1993
doifeellucky
17.77
· 493
macchiata
14.06
· 4152
culgin
5.73
· 1585
skycorridors
4.43
· 1677
Show more authors
Posts
Threads
mrosenquist
2.2 K
20 days ago
Hive.Blog
Threat Casting a Nation State Attack on Critical Infrastructure Scenario at CognectCon2025
During exercises at CognectCon2025 a number of cyberattack scenarios were discussed that highlighted the risks of cyber attackers levera...
tdvtv
3.2 K
25 days ago
KeePass vs the Cloud: Why Centralized Password Managers Keep Failing
by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime Cloud-based password managers are faili...
mrosenquist
2.2 K
25 days ago
Hive.Blog
INTERPOL Takes Down a Infostealers Operation
Congrats to INTERPOL for taking down a major cyber information-theft infrastructure! Over 20 thousand Ips/domains were shuttered and 41 s...
tdvtv
3.2 K
2 months ago
Your VPS Provider Can Still Betray You, Monero or Not
by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime Paying for your VPS with Monero doesn’t...
waivio_annie-naz
0.02
2 months ago
Waivio
Cybersecurity Risk Management: Why It’s Critical for Your Business Future
Cybersecurity risk management is now necessary in today's hyperconnected digital environment. Cyber threats have the potential to interru...
mrosenquist
2.2 K
8 months ago
Hive.Blog
Perfect Vulnerability for CISO Ultra Reliable Systems
A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recentl...
tdvtv
3.2 K
last year
"RISAA, die NSA und der TOD IHRER Datenschutzrechte (es sei denn, Sie sind im Kongress!)
by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime ☆-----☆-----☆-----☆-----☆ Description...
peertube1337
0.08
last year
"Russia's Cyber Militia: Investigation and Legal Challenges"
Cybercrime, Investigation, Stroganov Group, Flint, Legal Proceedings, Information Security, Organized Crime, Cybersecurity, Criminal Case...
aagabriel
1.8 K
2 years ago
PeakD
Tools and Techniques for Cognitive Security
CogSec (Cognitive Security) Collaborative 1. Tools and Techniques for Cognitive Security Tools and Techniques for Cognitive Security ...
tdvtv
3.2 K
2 years ago
Uncovering LE Activities: Darknet Vendor OSINT Perspectives - SANS Summit 2023
by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime Welcome to my talk from the SANS Summit...
tdvtv
3.2 K
2 years ago
Darknet's Silent Alarm: The Secret Behind Canary.txt - Deep Dot Darknet
by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime Ever wondered about the origins of 'can...
mrosenquist
2.2 K
2 years ago
National Cybersecurity Plan Fails to Address Ransomware
The US National Cybersecurity Strategy Implementation Plan fails to address ransomware. There is a real opportunity for the government to...
ruldan20
0.37
2 years ago
Taking review of my IT information security upskilling, soon to take my second tim ...
... e security+ certification. https://www.geeksforgeeks.org/what-is-information-security/amp/ #dbuzz #hive #cryptography #infosec https:...
scetrov
0.22
2 years ago
PeakD
Using WAX permissions to create a custom Warsaken claim-only keypair
Within the world of cybersecurity, one of the key controls that we can employ to protect ourselves is Least Privilege; this principle dic...
gray00
20.88
2 years ago
Hive.Blog
[AIGEN] Official OpenAI's GPT4: Warning to All Hive StakeHolders and witnesses. Quantum Blockchain Innovation Stack;Part 2:
Quantum-Resistant Cryptography a. Post-quantum cryptography algorithms Post-quantum cryptography refers to cryptographic algorithms desig...
mrosenquist
2.2 K
2 years ago
Crucial conversations: Overcoming the 5 Areas Where CISOs Tend to Struggle
I had a great conversation with Marco Ciappelli and Sean Martin from ITSPmagazine Podcast discussing the mistakes and hard-learned lesson...
doifeellucky
436.63
2 years ago
PeakD
The Top 5 cyber security breaches of the last 10 year’s
Well folks, it's that time of year again. Time to reflect on the past decade and take a look at the top 5 cybersecurity breaches that ha...
doifeellucky
436.63
3 years ago
PeakD
Lastpass hack, a password manager disaster…
Source ![source Pixabay https://pixabay.com/images/id-2170630/] What a shitshow...
macchiata
857.13
3 years ago
PeakD
Building Minimalist Productivity Setup
A somewhat minimalist approach to technology Recently, I've been sharing a lot about data and OPSEC (Operation Security). In layman term...
macchiata
857.13
3 years ago
PeakD
Do you care about your data?
Data is the new currency. And if a product is free, you are the product; A phrase coined by a world-famous American sculptor and video ...
lukaz364
4.64
3 years ago
Hive.Blog
Cyber security : a necessary tool for modern-day business
Advancement in information and communication technology has adversely affects the operation and process of businesses, education, militar...
mrosenquist1
4.19
3 years ago
Finding the Next SolarWinds Type of Supply Chain Attack
▶️ Watch on 3Speak It is time the industry evolves our collective capability to detect the next SolarWinds type of supply chain attack. ...
mrosenquist1
4.19
4 years ago
Cybersecurity Insights - Criminalizing Ransomware Payments with Malcolm Harkins
▶️ Watch on 3Speak Ransomware is a growing scourge. Is it possible to eradicate this entire class of attacks? I think it is but in tod...
mrosenquist1
4.19
4 years ago
Cybersecurity Insights - Deficient Forethought for Digital Technology Risks with Alexander Stein
▶️ Watch on 3Speak In today’s Cybersecurity Insights podcast, I am talking with Dr. Alexander Stein, an expert in human decision-making ...
mrosenquist
2.2 K
4 years ago
Video Presentation: Why Cybersecurity is Not Fixed Yet
I recently presented to a small group on why cybersecurity is becoming more difficult over time, despite all the money and effort that is...
mrosenquist1
4.19
4 years ago
Why Cybersecurity is Not Fixed Yet
▶️ Watch on 3Speak I recently presented to a small group on why cybersecurity is becoming more difficult over time, despite all the mone...
mrosenquist1
4.19
4 years ago
They Said a CISO Does What?
▶️ Watch on 3Speak The cybersecurity industry had challenges with bringing in new blood and facilitating the career growth. Misinformat...
anthonyadavisii
2.9 K
4 years ago
You think removing wireless radios is enough to protect air-gapped sys ...
You think removing wireless radios is enough to protect air-gapped systems? Think again. #infosec #lantenna #airgap #cybersecurity https:...
natebowie
43.55
4 years ago
Hive.Blog
Various Tech Podcasts I Think You Might Like
As you can probably see from the title, I thought I would share/review some interesting podcasts related to Information Tech/Security an...
macchiata
857.13
4 years ago
PeakD
OSINT TOOLS : Sherlock Your Social Media
In the previous articles I have mentioned some OSINT tools such as 1) PimEyes 2) Maltego. Today, I will share about Sherlock, an OSINT to...