Back to feeds

Anonymous

Spying on scammers We saw malicious activities by users where all the user's accounts were withdrawing rewards into a single bank account. Being a small team and time-sensitive product we did not have the option to put bandwidth or stop the funct

See More
Anonymous

Anonymous 3

Stealth • 6m

Finding an elegant solution to shut down the vulnerability in just 30 minutes after getting that intel is really impressive, especially for a small startup team. You prevented what could have been a major financial/reputation hit. This story should be studied as a masterclass in cybersecurity

1 replies1 like
1
Replies (1)

More like this

Recommendations from Medial

Vasvi Seth

Stealth • 6m

🔒 ProxyLogon: Addressing a Critical Vulnerability in Microsoft Exchange Server 🔒 Attention cybersecurity professionals! 🚨 ProxyLogon is not just another vulnerability—it's a critical pre-authenticated threat affecting Microsoft Exchange Server.

See More
0 replies4 likes

Vasvi Seth

Stealth • 6m

🔒 Understanding ZeroLogon: Microsoft's Netlogon Vulnerability 🔒 ZeroLogon, a critical vulnerability in Microsoft’s Netlogon authentication protocol, underscores the vital importance of robust cybersecurity measures. An authentication protocol ser

See More
0 replies3 likes

Vasvi Seth

Stealth • 6m

🚨 Urgent Cybersecurity Alert: Log4Shell Vulnerability 🚨 Attention Medial community, Have you heard about Log4Shell? It's not just another tech jargon. This critical vulnerability is shaking up the cybersecurity landscape, and here's why: Log4Sh

See More
0 replies5 likes
Image Description
Image Description

Somen's 8D world

Stealth • 3m

just thinking what is this I have done 😂. I got a quick idea so I am looking for some notebook and i got this and I just hit by nostalgia 😂 comment if you get it. let me see who studied physics

5 replies5 likes
Anonymous

General Motors is plowing another $850 million into “Cruise” despite losing $8.2 billion on the autonomous car division since 2017. Cruise shut down its robotaxi service last year after one of its cars hit a pedestrian who was struck first by anot

See More
0 replies10 likes
1
Image Description

Vasvi Seth

Stealth • 6m

💼 Understanding Risks in Cybersecurity 💼 Risks are the backbone of cybersecurity strategy – they're what we guard against, mitigate, and manage every day. But what exactly is a risk? 🔒 A risk is anything that can affect the confidentiality, inte

See More
1 replies5 likes
Anonymous

👼 20 Coolest Careers in Cybersecurity 👼 Organizations are hiring individuals with a unique set of skills and capabilities, and seek those who have the abilities and knowledge to fulfill many new job roles in the cybersecurity industry. The cooles

See More
0 replies6 likes
Image Description
Image Description

Akshay Prudhviraj

Stealth • 3m

Hello Guys, I am looking for a job oppurtunity. recently I've worked on my own startup Tanzabooks and decided to shut shop because of personal financials. I am looking for PM roles and I bring in good Business accumen and skills that I learnt for my

See More
5 replies10 likes
Image Description
Image Description

Inactive

Stealth • 7m

How CRED Cred-ed ? Short Case study on CRED CRED, founded by Kunal Shah in 2018, shows how a failing loyalty program can morph into a fintech unicorn. 🦄 Here's how: ➪ Gap Filled: CRED made credit card bill payments easy and rewarding. ➪ Initial S

See More
9 replies14 likes
1
Image Description
Image Description

Sayan Ghosh

Stealth • 5m

Game of Chess and a Guinness World Record! On the occasion of International Chess Day, the International Chess Federation (FIDE) and millions of chess players came together to set a remarkable world record: the most number of chess games played in a

See More
2 replies11 likes

Download the medial app to read full posts, comements and news.