#cybersecurityUnmoderated tagAll postsTrending CommunitiesLeoFinanceVibesWorldmappinHIVE CN 中文社区LifestyleOlio di BalenaSplinterlandsActifitPhotography LoversLiketuHive GamingBlack And WhiteExplore Communities...#cybersecurityTrendingHotNewPayoutsMutedmrosenquist (71)in #cybersecurity • 4 days agoCybersecurity Perspectives 2025 – Interviews with Experts: Dan LohrmannThe Cybersecurity Vault - episode 41, with guest Dan Lohrmann. 2025 will be an interesting year for the cybersecurity industry! Dan Lohrmann provides his insights to the…mrosenquist (71)in #cybersecurity • 5 days agoPersonal AI Supercomputers are a RealityWe get closer every quarter to being able to functionally accomplish real-time deepfake capabilities from our phones - which will usher in a new era of fraud. The miniaturization…mrosenquist (71)in #cybersecurity • 6 days agoThe Psychology of Phishing Attackers are masterful at using Social Engineering techniques to victimize others. Sumona, the founder of the MindShield institute, outlines the challenges of adapting to…chaintuts (51)in Programming & Dev • 6 days agoInsidious Inputs - Three Common Types of Software VulnerabilitiesCurious about how attackers exploit vulnerable software, and how those vulnerabilities work? My latest free and open licensed #tutorial dives into three common software…chaintuts (51)in Programming & Dev • 10 hours agoInsidious Inputs - Three Types of Common Software Vulnerabilities (Video Version)Software #vulnerabilities are a big part of security. Learn about path traversal, cross-site scripting, and buffer overflows with this free and open-licensed #tutorial, including…