#TechSecurity

2025-05-08

🎙️ J'ai reçu Omar Abdul-Wahab (Polytechnique Montréal) pour parler cyberdéfense en profondeur. À l'heure où TI, cloud, IoT et IA convergent, comment se protéger efficacement?

Omar partage des insights sur les attaques exploitant des apps légitimes, les défis du cloud, l'hétérogénéité de l'IoT et les backdoors dans l'IA.

🎧 Web: polysecure.ca/posts/episode-0x
🎧 Spotify: open.spotify.com/episode/2DtBC
🎧 YouTube: youtu.be/rUHnRUUG1No

#Cybersécurité #Cloud #IoT #IA #TechSecurity #Podcast

Kiara TaylorKiara07
2025-05-02

Ransomware, human error, accidental deletions—your data faces risks every day. But what if you could have the ultimate fail-safe?💡 Tune in to our latest podcast as we explore how volume deletion protection is redefining data security. Learn how it shields your business from threats while giving you peace of mind.

castbox.fm/vi/792811353

Sanjay Mohindroosmohindroo1@vivaldi.net
2025-04-29

What are your thoughts on securing executives at home? Share your ideas and join the debate on bridging these critical cybersecurity gaps. #CyberDebate #CyberProtection #ExecSafety #DigitalDefense #HomeCyberSecurity #TechSecurity #CyberDiscussion
medium.com/@sanjay.mohindroo66

Sanjay Mohindroosmohindroo1@vivaldi.net
2025-04-18

What are your thoughts on securing executives at home? Share your ideas and join the debate on bridging these critical cybersecurity gaps. #CyberDebate #CyberProtection #ExecSafety #DigitalDefense #HomeCyberSecurity #TechSecurity #CyberDiscussion
medium.com/@sanjay.mohindroo66

Newsrampnewsramp
2025-04-01

Antimony: The critical mineral reshaping U.S. defense and tech strategy. Nova Minerals leads domestic production efforts in Alaska, addressing global supply chain vulnerabilities.

Newsramp Image
Global Threadsglobalthreads
2025-03-27

🇨🇳 CHINA | 🇺🇸 US
🔴 US Blacklists 80 Firms Over AI & Defense Fears

🔸 Over 50 Chinese firms added to the export blacklist targeting AI, quantum & hypersonic tech.
🔸 Inspur’s 6 subsidiaries hit again after 2023 sanctions.
🔸 DeepSeek’s Nvidia-based AI raises chip smuggling alarms.
🔸 List includes UAE, Iran, South Africa firms; Iran targeted for drone & missile efforts.

In the early 1980s, Unix systems started using the crypt() function to hash passwords instead of storing them in plain text. This was a major security improvement, but hackers quickly adapted. Instead of guessing passwords one by one, they began precomputing hash values and storing them in massive lookup tables.

This led to the development of rainbow tables, which allowed attackers to crack passwords much faster by simply looking up a hash instead of computing it from scratch. Over time, defenses evolved, introducing salting, which made each hash unique even for the same password. Despite this, password cracking remains a cat-and-mouse game between security researchers and attackers.

If it can be cracked, it will be.

#Cybersecurity #Hacking #Unix #HashCracking #TechSecurity

Securium AcademySecuriumAcademy
2025-03-05

Did You Know? 🚨🔐
Cybersecurity is no longer an option, it’s a necessity!
With our increasing reliance on technology—from online banking to smart homes—cybercriminals are getting smarter, and cyber threats are escalating. 🛡️

💡 Stay secure, stay aware!

📢 Share this to spread awareness and protect your digital life!

📞8368543123
🌐www.securiumacademy.com
bit.ly/Cybersecurityadvancepro

Loki the Catloki@jorijn.dev
2025-03-04

"Peek-a-boo? I think not!" says Apple to UK gov's demand for encryption backdoor. 🔐

In a precedent-setting case, Apple challenges order to create "back door" in secure cloud storage. First test of UK's 2016 surveillance powers - because some things should stay behind closed doors!

#PrivacyMatters #TechSecurity

apple.slashdot.org/story/25/03

2025-02-27

🛡️ Cybersecurity is crucial for Indian businesses! Protect your data 🔒, ensure uninterrupted operations ⏱️, and safeguard your reputation 🏆 by implementing strong measures. Prevent data theft, malware attacks 👾, and hardware damage ⚙️, while maintaining customer trust and optimizing sales 📈.
Visit our site 🔗blog.networkbulls.com/benefits

Benefits of Cybersecurity in India
Enlite IASEnliteIAS
2025-02-16

Why in the News? Today, we explore Cyber Security and its critical role in our increasingly digital world.

Cyber security involves protecting systems, networks, and data from cyber threats such as hacking, ransomware, and data breaches. As our dependence on digital platforms grows, so does the sophistication of cyber attacks targeting individuals, businesses, and governments.

Loki the Catloki@jorijn.dev
2025-02-13

"The name's Door. Back Door." 🕵️‍♂️ UK demands Apple create encryption bypass for iCloud data, but US lawmakers say "No, Mr. Bond." Even allies need boundaries - especially when it comes to breaking into 7 billion people's digital diaries. Time to respect the "Do Not Disturb" sign? 🔐 #Privacy #TechSecurity

news.slashdot.org/story/25/02/

Ankit BytecodeAnkitBytecode
2025-02-12

🏆💻 Craw Security hosted a Capture The Flag competition at DSCI in the Nasscom office, where participants showcased their skills in ethical hacking and cybersecurity challenges
.
.

Loki the Catloki@jorijn.com
2025-01-15

"Smart" cars? More like "Spy" cars! 🕵️ US announces ban on Chinese vehicles over concerns about connected car tech collecting sensitive data. Turns out your car knows more about your daily routine than your therapist! New rules effective 2027-2030. #ConnectedCars #TechSecurity

https://tech.slashdot.org/story/25/01/14/216250/us-finalizes-rule-to-effectively-ban-chinese-vehicles

PUPUWEB Blogpupuweb
2025-01-08

🔐 Enhance your cybersecurity with the best open-source vulnerability scanners! 🛡️ Check out the top 6 tools to protect your system with affordable and powerful solutions.

pupuweb.com/6-best-open-source

2024-11-20

Apple released updates yesterday for iOS, iPadOS, and macOS. If you haven't already updated your devices, get it done.

infosecurity-magazine.com/news
#Apple #iPadOS #iOS #macOS #Tech #Technology #Security #TechSecurity

PUPUWEB Blogpupuweb
2024-11-18

Two Baltic Sea internet cables, linking Lithuania to Sweden and Finland to Germany, are disrupted, raising suspicions of Russian sabotage. Tensions grow as global cybersecurity risks intensify. 🌍🔌

Reade D. Edwardsonreadeedwardson
2024-11-14

Attention CISOs! Discover effective strategies to boost your organization's cybersecurity ROI. Stay secure in the digital landscape. techradar.com/pro/maximizing-c

2024-11-06

🌩️ Misconfigurations: The Top Cloud Security Threat of 2024! 🌩️

With cloud adoption on the rise, a single misconfiguration can expose your data to massive risk. Want to keep your cloud secure? Start with a platform-centric approach that detects and remediates these common but dangerous errors.

What’s your go-to strategy for managing misconfigurations? Let’s discuss! 🛡️

Read more here: guardiansofcyber.com/cybersecu

#Cybersecurity #GuardiansOfCyber #CloudSecurity #Infosec #DataProtection #CloudMisconfiguration #TechSecurity #CISO #SOC #RiskManagement #AIinSecurity

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst