Youtube Channel

InfoSecWOTD#19 Cryptojacking πŸ’ΈπŸ˜ˆ

Today’s #InfosecWOTD Day 19 is

#Cryptojacking πŸ’ΈπŸ˜ˆ

Cryptojacking is the unauthorized use of personal or enterprise systems for crypto mining. The term crypto mining refers to an activity of solving cryptographic equations through the use of computing hardware to gain cryptocurrencies such as Litecoin, Dogecoin, Bitcoin etc.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #cryptocurrency #crypto #dogecoin #bitcoin #Cryptojacking

InfoSecWOTD#18 RaaS πŸ’€πŸ’°β˜

Today’s #InfosecWOTD Day 18 is

#RaaS πŸ’€πŸ’°β˜

It stands for Ransomware as a Service. This type of cloud offering is illegal and works very similar to any other cloud services (anything as a service XaaS) and is used by bad actors to amplify the ransomware attacks.

RaaS is a subscription-based model which enables its customers or affiliates to use existing ransomware tools and other exploits to execute ransomware attacks.

In the recent months, a malicious group REvil has emerged very strong in conducting these RaaS based attacks and is behind the Kaseya VSA Attack. Read more here: https://unit42.paloaltonetworks.com/revil-threat-actors/

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD#learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #RaaS #ransomwareattack #kaseya #kaseyavsa

InfoSecWOTD#17 Catfishing 🐱🎣

Here is fun #InfosecWOTD Day 17 and it is

#catfishing 🐱🎣

Catfishing and phishing has a lot of similarities. It is a form of social engineering attack where an individual aka the catfish, sets up a false personal profile on a social networking site such as LinkedIn for fraudulent or deceptive purposes.

You can apply very similar strategies to avoid becoming a victim of a catfishing attack.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD#learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #Catfish #catfishing #phishingattacks

InfoSecWOTD#16 Backdoor πŸšͺ

#InfosecWOTD Day 16 is

#Backdoor πŸšͺ 

Backdoors in technology or devices is a secret or undocumented vulnerability in computer software or hardware which is sometimes intentionally maintained or put in place by developers and engineers to gain remote access.

As this is something undocumented in most cases, when found by certain individuals with malicious intent can be used to gain unauthorized remote access and exploitation of such devices/systems.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD#learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #APT #HACKERS #THREATS #backdoor

InfoSecWOTD#15 APT πŸ’€βš“

Today’s #infosec Word of the Day #15 is

#APT πŸ’€βš“

It stands for Advanced Persistent Threat. A threat actor who is acting for a organized crime operative such as a nation state or state sponsored criminal group.

They are typically well funded, use cutting edge technology and target high value companies to conduct cyber espionage, theft of intellectual property for financial gains.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning! A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #APT #HACKERS #THREATS

InfoSecWOTD#14 NGFW πŸ”₯🧱

Today’s #infosec Word of the Day #14 is

#NGFW πŸ”₯🧱

In computer networking, It stands for Next-Generation Firewall (FW). There are many kinds of FWs. For example, a stateful firewall, monitors & detects states of all traffic(data) on a network to track & defend based on traffic patterns & flows. There are other types FWs and are commonly grouped as traditional FWs.

An NGFW provides capabilities beyond a traditional, stateful firewall. While a traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall includes features like application awareness (whitelisting/blacklisting), intrusion detection & prevention, & cloud-delivered threat intelligence, & more.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation & keep #Learning!.

Are you looking for the previous word of the day? Just search #INFOSECWOTD. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #NGFW #Firewall #IPS #IDS #ApplicationWhitelisting #Network #CISCO #FORTINET #Checkpoint

InfoSecWOTD#13 Warm Site πŸŒ“

Today’s #infosec Word of the Day #13 is

#WARMSite πŸŒ“

It is summer in most parts of the world but a warm site is not what you think it is. A warm site is a middle ground between two disaster recovery options, A Hot site πŸŒ• and a Cold site πŸŒ‘, in your Disaster Recovery Planning (DRP).

A hot site is a backup facility that represents a mirrored copy of the primary production center. A cold site represents the same work area, recovery space, and infrastructure support as a hot site, but they don’t function as a complete mirrored copy of the primary production center.

So the warm site is simply a backup facility with all of the primary production equipment without the actual data or information, a middle ground between hot and cold site.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just search #INFOSECWOTD and you will be able to find them. #learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #Hotsite #warmsite #Coldsite #DRP

InfoSecWOTD#12 #DRP πŸ”‹ πŸ”Œ

Today’s #infosec Word of the Day #12 is

#DRP πŸ”‹ πŸ”Œ

DRP stands for Disaster Recovery Plan. It is simply a plan for any business to be able to access the various components of information computer technology after a disaster strikes. #INFOSECWOTD

#DRP is often misunderstood or not properly implemented and is often confused with BCP – Business Continuity Plan. Which is a more comprehensive plan to make sure business can continue business operations through different challenges such as a break in supply chain, disaster and anything that is considered a business interruption. #INFOSECWOTD

Want to learn more in depth? Check out my article on ICSBits blog here: https://lnkd.in/e74vRa3

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow.

Are you looking for the previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity #INFOSECWOTD #BCP #DRP #DR #RiskAssessment

InfoSecWOTD#11 TPM βœ…πŸ›‘

Today’s #infosec Word of the Day #11 is

#TPM βœ…πŸ›‘

TPM stands for Trusted Platform Module. It is a little piece of hardware that sits on your motherboard that has just one important function which is to generate and store cryptographic keys which are then used to authenticate your device. It is also called a cryptoprocessor.

#TPM is trending in the NEWS lately because #Microsoft just announced that the new #Windows11 will only run on a device that has some form of TPM. Here is a good #theVerge article: https://lnkd.in/e7CRUXK

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!. A new word* will be posted tomorrow. Are you looking for the previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity#ransomware #INFOSECWOTD #Windows11 #TPM

InfoSecWOTD#10 PII 🧍

Today’s #infosec Word of the Day #10 is

#PII 🧍

PII stands for Personally identifiable information. Any data that can identify an individual directly or indirectly. Some of the examples are name, address, social security number, telephone number, email address, etc.,

The loss of PII can result in substantial harm to individuals, including identity theft or other fraudulent use of the information. Recent leak of 700 million users of LinkedIn is an example. LinkedIn users should use caution when clicking on emails and be aware of social engineering attacks as this leak greatly increases the risks to especially LinkedIn users.

That is it for today, follow me for more tidbits, and hit that like button on this post to automatically engage in a conversation and keep #Learning!

A new word* will be posted tomorrow. Are you looking for previous word of the day? Just do a search for #INFOSECWOTD and you will be able to find them.

#learning!#cybersecurityawareness #cybersecurity #smurfattack #ddosattacks #DDos #PII #privacy