Back

Anonymous

Spying on scammers We saw malicious activities by users where all the user's accounts were withdrawing rewards into a single bank account. Being a small team and time-sensitive product we did not have the option to put bandwidth or stop the funct

See More
Anonymous

Anonymous 3

Hey I am on Medialย โ€ขย 9m

Finding an elegant solution to shut down the vulnerability in just 30 minutes after getting that intel is really impressive, especially for a small startup team. You prevented what could have been a major financial/reputation hit. This story should be studied as a masterclass in cybersecurity

1 replies1 like
1
Replies (1)

More like this

Recommendations from Medial

Vasvi Seth

Cyber Security Stude...ย โ€ขย 9m

๐Ÿ”’ ProxyLogon: Addressing a Critical Vulnerability in Microsoft Exchange Server ๐Ÿ”’ Attention cybersecurity professionals! ๐Ÿšจ ProxyLogon is not just another vulnerabilityโ€”it's a critical pre-authenticated threat affecting Microsoft Exchange Server.

See More
0 replies5 likes

Vasvi Seth

Cyber Security Stude...ย โ€ขย 8m

๐Ÿ”’ Understanding ZeroLogon: Microsoft's Netlogon Vulnerability ๐Ÿ”’ ZeroLogon, a critical vulnerability in Microsoftโ€™s Netlogon authentication protocol, underscores the vital importance of robust cybersecurity measures. An authentication protocol ser

See More
0 replies3 likes

Venkey

Founder of Tenderale...ย โ€ขย 1m

๐Ÿšจ Exciting Opportunity Alert! ๐Ÿšจ We are seeking a skilled Vulnerability and Penetration Tester for a critical project with the Ministry of Finance. If you're passionate about cybersecurity and ensuring the safety of critical systems, this role is a

See More
0 replies3 likes

Vasvi Seth

Cyber Security Stude...ย โ€ขย 8m

๐Ÿšจ Urgent Cybersecurity Alert: Log4Shell Vulnerability ๐Ÿšจ Attention Medial community, Have you heard about Log4Shell? It's not just another tech jargon. This critical vulnerability is shaking up the cybersecurity landscape, and here's why: Log4Sh

See More
0 replies5 likes

Tarun Patel

Cybersecurity Analys...ย โ€ขย 26d

Invest in the Future of Cybersecurity with Us! ๐Ÿ”’ Join Us in Building Indiaโ€™s Leading Cybersecurity Ecosystem We are launching an innovative cybersecurity company in India, offering: โœ… Cutting-Edge Cybersecurity Products โ€“ Devices like Flipper Zero

See More
0 replies4 likes
1
Image Description
Image Description

Somen's 8D world

Hey I am on Medialย โ€ขย 6m

just thinking what is this I have done ๐Ÿ˜‚. I got a quick idea so I am looking for some notebook and i got this and I just hit by nostalgia ๐Ÿ˜‚ comment if you get it. let me see who studied physics

5 replies5 likes

Tarun Patel

Cybersecurity Analys...ย โ€ขย 17d

Hiring Alert: Ethical Hacker Wanted! We are looking for a skilled Ethical Hacker to join our team at Selfsecure. If you're passionate about cybersecurity, penetration testing, and ethical hacking, this is your chance to work with a growing cybersecu

See More
0 replies4 likes
Anonymous

General Motors is plowing another $850 million into โ€œCruiseโ€ despite losing $8.2 billion on the autonomous car division since 2017. Cruise shut down its robotaxi service last year after one of its cars hit a pedestrian who was struck first by anot

See More
0 replies10 likes
1
Image Description

Vasvi Seth

Cyber Security Stude...ย โ€ขย 9m

๐Ÿ’ผ Understanding Risks in Cybersecurity ๐Ÿ’ผ Risks are the backbone of cybersecurity strategy โ€“ they're what we guard against, mitigate, and manage every day. But what exactly is a risk? ๐Ÿ”’ A risk is anything that can affect the confidentiality, inte

See More
1 replies5 likes
Anonymous

๐Ÿ‘ผ 20 Coolest Careers in Cybersecurity ๐Ÿ‘ผ Organizations are hiring individuals with a unique set of skills and capabilities, and seek those who have the abilities and knowledge to fulfill many new job roles in the cybersecurity industry. The cooles

See More
0 replies6 likes

Download the medial app to read full posts, comements and news.