Discover and read the best of Twitter Threads about #cybersecuritytips

Most recents (6)

Top 10 Blockchain Attacks That resulted in cryptocurrency losses all around the world.

A Thread 🧵👇

#Web3 #cryptotrading #cryptocrash #Bitcoin #Blockchain #cybersecuritytips #hacking #vulnerabilities #javascript
1⃣ Exchange Hack
2⃣ DeFi Hack
Read 15 tweets
According to the report published in 2022 by Identity Theft Resource Center, 1,789 data breach incidents have been recorded. #WorldPasswordDay
According to the White House Council of Economic Advisers, the United States economy loses approximately USD 57 - USD 109 billion each year to harmful cyber activity.

#cybersecuritytips #WorldPasswordDay2022
In Dec 2021, a huge security breach at Bitmart, a crypto trading platform, resulted in hackers removing about USD 200 million in assets. A stolen private key was the major source of the security compromise, which affected two of its #Ethereum and #Binance smart chain hot wallets.
Read 9 tweets
Do You Know What an IMSI Catcher or Stingray is? Well today I am going to tell you about it and how to make one. (This is for educational purposes Only).
#CyberSecurity #cybersecuritytips #infosec #techtwitter

A Thread.
In the cellular architecture, mobile devices are identified by two identities: (IMEI) and (IMSI). IMSI-catchers are devices that act like fake cell towers, which trick a target’s device to connect to them and then relay the communications to an actual cell tower of the carrier.
This way all of the target’s communications – calls, text messages, Internet traffic, etc. – go through the IMSI-catcher and can be collected and read or listened on.The IMSI number is a globally unique number that identifies the user. It is up to 15 digits.
Read 11 tweets
[1] You should start to "explore" different domains within Cybersecurity, for instance in offensive side - red teaming, penetration testing, exploit development, and so on

Red teaming - you're against people, and processes, stealth, data exfiltration, lateral movement and
remaining undetected as long as possible is your attribute, your goals are almost same as what you do in penetration testing.

Now, penetration testing - you're against the technology stacks in place, that accounts to - web apps, mobile apps, various softwares, APIs
Cloud (AWS, Azure, GCP...), WiFi, Microservices, Containers, networks and systems, and so on.
In a nutshell - In penetration testing - you're against the defenses. And in Red Teaming you're against the "Defenders" . Those who are sitting behind systems and monitoring the logs
Read 16 tweets
Today on #DataPrivacyDay, @SFLCin is bringing you some tips and quick fixes to help protect your privacy online.
#DataPrivacyDay2021 #PrivacyAware #privacy #cybersafety #dataprivacy
We as a generation use #SocialMedia almost obsessively. Most of us have accounts on social media websites like #Facebook, #Instagram & #Twitter.
#SocialSecurity #cybersecuritytips #PrivacyAware
We also keep hearing about various #Hacking, #Phishing attempts and in times like these it is important to understand the basics of social media privacy settings to secure yourself from such attempts.
Read 14 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!