Post on Medial

Anonymous

Spying on scammers We saw malicious activities by users where all the user's accounts were withdrawing rewards into a single bank account. Being a small team and time-sensitive product we did not have the option to put bandwidth or stop the funct

See More
Anonymous

Anonymous 3

Stealth • 5m

Finding an elegant solution to shut down the vulnerability in just 30 minutes after getting that intel is really impressive, especially for a small startup team. You prevented what could have been a major financial/reputation hit. This story should be studied as a masterclass in cybersecurity

1 replies1 like
1
Replies (1)

More like this

Recommendations from Medial

Vasvi Seth

Stealth • 5m

🔒 ProxyLogon: Addressing a Critical Vulnerability in Microsoft Exchange Server 🔒 Attention cybersecurity professionals! 🚨 ProxyLogon is not just another vulnerability—it's a critical pre-authenticated threat affecting Microsoft Exchange Server.

See More
0 replies4 likes

Vasvi Seth

Stealth • 5m

🔒 Understanding ZeroLogon: Microsoft's Netlogon Vulnerability 🔒 ZeroLogon, a critical vulnerability in Microsoft’s Netlogon authentication protocol, underscores the vital importance of robust cybersecurity measures. An authentication protocol ser

See More
0 replies3 likes

Vasvi Seth

Stealth • 5m

🚨 Urgent Cybersecurity Alert: Log4Shell Vulnerability 🚨 Attention Medial community, Have you heard about Log4Shell? It's not just another tech jargon. This critical vulnerability is shaking up the cybersecurity landscape, and here's why: Log4Sh

See More
0 replies5 likes

Aayush Tripathi

 • 

YouTube • 4m

Hackers can walk right into a coffee shop, hack the free WiFi, and steal your passwords in minutes. Follow these three tips to help keep your network protected when you're working outside of the office. #hackers #databreach #ITbusiness #Techtips

See More
0 replies2 likes
Image Description

Vasvi Seth

Stealth • 5m

💼 Understanding Risks in Cybersecurity 💼 Risks are the backbone of cybersecurity strategy – they're what we guard against, mitigate, and manage every day. But what exactly is a risk? 🔒 A risk is anything that can affect the confidentiality, inte

See More
1 replies5 likes
Anonymous

👼 20 Coolest Careers in Cybersecurity 👼 Organizations are hiring individuals with a unique set of skills and capabilities, and seek those who have the abilities and knowledge to fulfill many new job roles in the cybersecurity industry. The cooles

See More
0 replies6 likes

Payal Manghnani

Stealth • 1d

🖼 3 Essential Tools for Designers These tools will help you work faster and create better designs: 🔹 Gamma: Create landing page or presentation designs on any topic. Just make a few tweaks to the text, and you'll get an impressive result. 🔹 Log

See More
0 replies3 likes
1
Image Description
Image Description

Akshay Prudhviraj

Stealth • 2m

Hello Guys, I am looking for a job oppurtunity. recently I've worked on my own startup Tanzabooks and decided to shut shop because of personal financials. I am looking for PM roles and I bring in good Business accumen and skills that I learnt for my

See More
5 replies10 likes

Inactive

Stealth • 6m

Flipkart’s rise to the top is a masterclass in strategic moves and learning from missteps! Let's see FLIPFLAP of the Flipkart!; 1. Customer Focus: They nailed it with cash on delivery and a solid logistics network. 2. Tech Innovation: Smart tweaks

See More
0 replies6 likes
Image Description
Image Description

Aakash kashyap

Stealth • 1m

❗❗Important For All ❗❗ A $450 million Indian startup, Zest Money, shut down due to strict RBI regulations, highlighting the risks of external factors in business. 🚀 $450 million valuation: Zest Money was a leading player in the buy now pay later s

See More
6 replies4 likes
1

Download the medial app to read full posts, comements and news.