Who you paid. When. And why.
This is a privacy problem with an easy, 30 second fix!
🔗 betweenthehacks.com/...
#Venmo #PrivacyMatters #CyberSecurity #VenmoPrivacy #AppSecurity #DataProtection #DigitalSafety #FixItFast
Who you paid. When. And why.
This is a privacy problem with an easy, 30 second fix!
🔗 betweenthehacks.com/...
#Venmo #PrivacyMatters #CyberSecurity #VenmoPrivacy #AppSecurity #DataProtection #DigitalSafety #FixItFast
It began as a campaign to protect kids online—now it’s a reminder for everyone to tighten up digital hygiene.
Read the history: bth.news/safety
#Cybersecurity #InternetSafety #Infosec
It began as a campaign to protect kids online—now it’s a reminder for everyone to tighten up digital hygiene.
Read the history: bth.news/safety
#Cybersecurity #InternetSafety #Infosec
Check out my 10-minute security checklist: updates, MFA, router tweaks, password scan, and more.
No fluff, no fear—just real-world security tips anyone can follow. 🔗 betweenthehacks.com/...
#cybersecurity #weekendproject #infosec
Check out my 10-minute security checklist: updates, MFA, router tweaks, password scan, and more.
No fluff, no fear—just real-world security tips anyone can follow. 🔗 betweenthehacks.com/...
#cybersecurity #weekendproject #infosec
He couldn’t name a restaurant.
He claimed to live in Houston.
He didn’t know what Halloween was.
Turns out, he was a North Korean spy.
Here’s what happened when Kraken interviewed him:
👉 www.betweenthehacks.com/blog/the-spy...
He couldn’t name a restaurant.
He claimed to live in Houston.
He didn’t know what Halloween was.
Turns out, he was a North Korean spy.
Here’s what happened when Kraken interviewed him:
👉 www.betweenthehacks.com/blog/the-spy...
Kraken’s hiring team spotted the red flags—and uncovered a North Korean spy posing as a dev.
Here’s how it unfolded:
👉 betweenthehacks.com/...
#Cybersecurity #RemoteWork #Infosec
Kraken’s hiring team spotted the red flags—and uncovered a North Korean spy posing as a dev.
Here’s how it unfolded:
👉 betweenthehacks.com/...
#Cybersecurity #RemoteWork #Infosec
Still clinging to qwerty and your dog’s birthday? No judgment—just backup and fix it.
New on Between The Hacks:
betweenthehacks.com/...
#Passwords #WorldPasswordDay #CyberSecurity
Still clinging to qwerty and your dog’s birthday? No judgment—just backup and fix it.
New on Between The Hacks:
betweenthehacks.com/...
#Passwords #WorldPasswordDay #CyberSecurity
Here are 10 smart, simple ways to lock it down in 2025. 🔒
👉 betweenthehacks.com/...
Here are 10 smart, simple ways to lock it down in 2025. 🔒
👉 betweenthehacks.com/...
Quishing: Phishing Got a Glow-Up
QR codes are sneaky little traps. This post explains how attackers use them to phish for creds, how it works, and how to stay safe.
bth.news/quishing
#quishing #cybersecurity #infosec
Quishing: Phishing Got a Glow-Up
QR codes are sneaky little traps. This post explains how attackers use them to phish for creds, how it works, and how to stay safe.
bth.news/quishing
#quishing #cybersecurity #infosec
What SBOMs Forgot About the Network
NetBOM defines where devices should connect, then helps your firewall block the rest.
It’s time to stop trusting by default.
netbom.net
#NetBOM #Cybersecurity #DEFCON33
What SBOMs Forgot About the Network
NetBOM defines where devices should connect, then helps your firewall block the rest.
It’s time to stop trusting by default.
netbom.net
#NetBOM #Cybersecurity #DEFCON33
From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.
I tried to restrict it. Support said: “Put it in the DMZ.”
Nope. I built NetBOM instead.
It’s like SBOM—but for network behavior.
Read the blog: betweenthehacks.com/...
White Paper: netbom.net
#NetBOM #Cybersecurity #IoTSecurity
I tried to restrict it. Support said: “Put it in the DMZ.”
Nope. I built NetBOM instead.
It’s like SBOM—but for network behavior.
Read the blog: betweenthehacks.com/...
White Paper: netbom.net
#NetBOM #Cybersecurity #IoTSecurity
New on Between The Hacks: what it is, how it works, and how to stay protected.
👉 betweenthehacks.com/...
#Ransomware #InfosecHumor
New on Between The Hacks: what it is, how it works, and how to stay protected.
👉 betweenthehacks.com/...
#Ransomware #InfosecHumor
Passkeys are here—and they’re everything passwords wish they were.
✅ Can’t be guessed
✅ Can’t be phished
✅ Seamless login with Face ID, Touch ID, or security key
Full breakdown: betweenthehacks.com/passkeys
#Passkeys #Cybersecurity #WebAuthn #DigitalSecurity
Passkeys are here—and they’re everything passwords wish they were.
✅ Can’t be guessed
✅ Can’t be phished
✅ Seamless login with Face ID, Touch ID, or security key
Full breakdown: betweenthehacks.com/passkeys
#Passkeys #Cybersecurity #WebAuthn #DigitalSecurity
This week, I took action.
✂️ Cut the Ethernet cable
📡 Rotated the SSID every 60 seconds
🧊 Put the printer in the freezer
Welcome to Physical Zero Trust™
www.ckd3.com/blog/cut-eth...
(fixed link)
#infosechumor #cybersecurity #iot
This week, I took action.
✂️ Cut the Ethernet cable
📡 Rotated the SSID every 60 seconds
🧊 Put the printer in the freezer
Welcome to Physical Zero Trust™
www.ckd3.com/blog/cut-eth...
(fixed link)
#infosechumor #cybersecurity #iot
In my latest post, I explain how segmentation helps, but visibility is the next frontier.
🧠 www.ckd3.com/blog/everyth...
#infosec #homeiot #security
In my latest post, I explain how segmentation helps, but visibility is the next frontier.
🧠 www.ckd3.com/blog/everyth...
#infosec #homeiot #security
It’s a reminder that even the best in security are human.
I broke down what happened and how to protect yourself (or your team):
www.ckd3.com/blog/troy-hu...
#infosec #phishing #cybersecurity
It’s a reminder that even the best in security are human.
I broke down what happened and how to protect yourself (or your team):
www.ckd3.com/blog/troy-hu...
#infosec #phishing #cybersecurity
"The use of AI is creating an expanded attack surface that
might be exploited by threat actors. Existing methods need to be extended to address new vulnerabilities that are inherent in AI"
www.weforum.org/publications...
"The use of AI is creating an expanded attack surface that
might be exploited by threat actors. Existing methods need to be extended to address new vulnerabilities that are inherent in AI"
www.weforum.org/publications...
After Microsoft, now Cloudflare discloses an incident where it lost customer logs... for Microsoft this was weeks of logs... for Cloudflare only 3.5 hours
blog.cloudflare.com/cloudflare-i...
After Microsoft, now Cloudflare discloses an incident where it lost customer logs... for Microsoft this was weeks of logs... for Cloudflare only 3.5 hours
blog.cloudflare.com/cloudflare-i...