···
Sign in
···
···
cybersecurity
hashtag
692.66
About
Reviews
Updates
1
Followers
0
Experts
Experts
mrosenquist
332.35
· 1991
gorayii
44.72
· 1217
activistpost
28.68
· 3327
hacktax
23.52
· 5
culgin
15.12
· 1581
Show more authors
Posts
Threads
mrosenquist
2.1 K
3 hours ago
Hive.Blog
Massive Increase to Unwanted Cell Calls
Something happened this weekend — starting on Monday my cellphone has been lighting up with unknown callers — a 30x increase! I rarely gi...
chaintuts
16.43
3 hours ago
Hive.Blog
I Wrote an In-Depth Book on Securing Your Bitcoin — "Digital Sovereignty: Protecting Your Crypto Assets Against Common Threats"
Hey Hive community, I'm Josh McIntyre also known as chaintuts. I've been creating free and open-license educational content about crypto...
mrosenquist
2.1 K
22 hours ago
Hive.Blog
Rise of AI in Video Misinformation
https://youtube.com/shorts/Gcsv6_vhZ4Q The Cybersecurity Vault - episode 46, with guest Ryan McBeth. Ryan discusses how cyber plays in th...
mrosenquist
2.1 K
23 hours ago
Hive.Blog
How Geopolitical Warfare is Blending Kinetic, Social, and Cyber Risks
https://www.youtube.com/watch?v=bowwgmjTErw Geopolitical Warfare is driving change and adaptation across the globe. Nation States are see...
dauerbrenner05
294.72
5 days ago
Hive.Blog
🕵️ Browser Fingerprinting: The Tracking Nightmare Nobody Talks About
https://i.postimg.cc/ydZp2FjN/i4chkLof.png Many people think tracking only happens through cookies. Think again. 🔥 What is Browser Finger...
mrosenquist
2.1 K
5 days ago
Hive.Blog
Top50 Global Thought Leaders on Privacy 2025
https://i.postimg.cc/FKRtbHfD/Thinkers360-Privacy-leaderboard-2025-1280x640.png Privacy risks and demands will continue to rise in our AI...
mrosenquist
2.1 K
6 days ago
Hive.Blog
Last Minute Save for the CVE Program
https://i.postimg.cc/PJWMc1ph/Chat-GPT-Image-Apr-17-2025-02-55-25-PM.png I am very glad that the Common Vulnerabilities and Exposures (CV...
aristotle01
0.57
7 days ago
CBEX Didn’t Paralyse Nigerians, But the System Did: Unmasking the Rising Wave of AI Trading Scams
In recent times, a disturbing trend has emerged within Nigeria’s financial landscape, a group of highly organized scam communities are c...
mrosenquist
2.1 K
12 days ago
Hive.Blog
Cybercriminals Can Easily Adopt New Tech
https://youtube.com/shorts/n8bQRdSTj80 Sandra Estok discusses how cybercriminals are not burdened by rules when it comes to leveraging ne...
mrosenquist
2.1 K
14 days ago
Hive.Blog
Simplifying Cyber Safety for Everyone with Sandra Estok
https://www.youtube.com/embed/F_qC8n71y44 Cybersecurity is not just a technical endeavor. Attackers often pursue people to either gain ac...
hassemer
15.04
15 days ago
PeakD
What does a Hive White Belt need to learn?
↣ Onboarding people to crypto is almost never an easy task... ↣ Hive is a very peculiar blockchain, with "free" transactions bu...
chaintuts
16.43
15 days ago
Hive.Blog
New Crypto Asset Security Book - "Digital Sovereignty: Protecting Your Crypto Assets Against Common Threats"
"Knowledge builds confidence, and confident users can stand up to the threats that face them." Friends, I'm tremendously excite...
mrosenquist
2.1 K
22 days ago
Hive.Blog
Navigating Cyber Threats, AI Disruption, and Boardroom Divide
CISOs Under Siege: Navigating Escalating Cyber Threats, AI Disruption, and the Boardroom Divide in 2025. These are some of my favorite to...
mrosenquist
2.1 K
23 days ago
Hive.Blog
Secretive Chinese network tries to lure fired federal workers
https://i.postimg.cc/Z5LdXJDY/a-candid-photograph-of-two-chinese-gover-y-KXij5-Qe-Qb-G5-MCahhrwe-MA-XJz-LXe3a-Qbai-f-IKpa-Wzg.jpg Fired &...
mrosenquist
2.1 K
23 days ago
Hive.Blog
Critical Cybersecurity Lessons from the Recent Exposure of U.S. Military Plans
https://www.youtube.com/embed/6ebqQPQCCn4 The recent inadvertent exposure of classified U.S. military plans by top defense and intelligen...
revolverocelotyt
177.52
28 days ago
How To Deal With YouTube Creators Private Video Email Phishing Scam
Image Source: Photo by cottonbro studio: https://www.pexels.com/photo/silver-imac-on-white-table-5083396/ A week ago, I received an emai...
mrosenquist
2.1 K
29 days ago
Hive.Blog
Advanced Malware Targets Cryptocurrency Wallets
More attacks targeting cryptocurrency users. Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophistica...
ariscoco1
11.40
last month
Online Security for Hivians
Hive!! ❤️🔥 Photos temporarily removed for security reasons!
waivio_jk
0.00
last month
Waivio
Cost of Integrating Biometric Systems with Access Control Software
Discover the factors that influence the cost of integrating biometric systems with access control software. Learn about installation, har...
mikkkonni
0.10
last month
Cybersecurity
IT is developing rapidly, and with it, cyber threats. After one incident with a hacking attempt, I realized that it was risky to rely on ...
mrosenquist
2.1 K
last month
Hive.Blog
Breaking Down Risks in Cybersecurity
https://youtu.be/Y60C5u6lzdI?si=XVq2oM9WJzxsn8OY Cyber Crime Junkies podcast Breaking Down Risks in Cybersecurity — A great conversation ...
mrosenquist
2.1 K
last month
Hive.Blog
Immutable Cybersecurity Law #12
“Never underestimate the simplicity of the attackers, nor the gullibility of the victims.” Cyberattacks don’t always rely on sophisticate...
mrosenquist
2.1 K
last month
Hive.Blog
Boards Challenged to Embrace Cybersecurity Oversight
Cybersecurity failures are now business risks that CEOs and Boards must own. The world of business owners, investors, and their represent...
waivio_jk
0.00
last month
Waivio
The Ultimate Guide to Biometric Access Control System Integration | Secure Access
Discover how to integrate biometric access control systems seamlessly. Enhance security, streamline authentication, and protect your prem...
vikvitnik
3.3 K
last month
Pentera secures $60 Million in funding to train Cybersecurity Teams through Network Attack Simulation
https://img.leopedia.io/DQmTVVLja9pd6423NrhVvZz7Zo1bgotmrngTPDYExtoH9uY/Pentera-60M-Funding-NwrkAttk.png Cybersecurity has seen the need...
mrosenquist
2.1 K
last month
Hive.Blog
Are They Vulnerabilities or Undocumented Debug Features
The recent undocumented code in the ESP32 microchip, made by Chinese manufacturer Espressif Systems, is used in over 1 billion devices an...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Ransomware Attack Ends a 150 Year Company
Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cyber...
darwin99
0.21
2 months ago
Hive.Blog
Windows 11 Review: Is It Worth the Upgrade?
Windows 11 is Microsoft’s latest operating system, bringing a fresh interface, improved performance, and several new features. Since its ...
vikvitnik
3.3 K
2 months ago
Anagram provides companies with Cybersecurity Training for their employees through Gamified Training
https://img.inleo.io/DQmP6bYSgQZxnDdf3LU4eXpBouXNSz1QKcRjLLVRdwDrPhN/ANAGRAM.png In recent times there has been an increase in security ...
sprarxit
0.00
2 months ago
Top-Tier Digital Solutions Provider
SparxIT, a trusted B2B digital transformation enabler, has a decade-long proficiency in modernizing businesses and driving tangible outco...