Waivio

cybersecurity

hashtag
692.66

Experts

Show more authors

mrosenquist

2.1 K
Hive.Blog

Massive Increase to Unwanted Cell Calls

Something happened this weekend — starting on Monday my cellphone has been lighting up with unknown callers — a 30x increase! I rarely gi...

chaintuts

16.43
Hive.Blog

I Wrote an In-Depth Book on Securing Your Bitcoin — "Digital Sovereignty: Protecting Your Crypto Assets Against Common Threats"

Hey Hive community, I'm Josh McIntyre also known as chaintuts. I've been creating free and open-license educational content about crypto...

mrosenquist

2.1 K
Hive.Blog

Rise of AI in Video Misinformation

https://youtube.com/shorts/Gcsv6_vhZ4Q The Cybersecurity Vault - episode 46, with guest Ryan McBeth. Ryan discusses how cyber plays in th...

mrosenquist

2.1 K
Hive.Blog

How Geopolitical Warfare is Blending Kinetic, Social, and Cyber Risks

https://www.youtube.com/watch?v=bowwgmjTErw Geopolitical Warfare is driving change and adaptation across the globe. Nation States are see...

dauerbrenner05

294.72
Hive.Blog

🕵️ Browser Fingerprinting: The Tracking Nightmare Nobody Talks About

https://i.postimg.cc/ydZp2FjN/i4chkLof.png Many people think tracking only happens through cookies. Think again. 🔥 What is Browser Finger...

mrosenquist

2.1 K
Hive.Blog

Top50 Global Thought Leaders on Privacy 2025

https://i.postimg.cc/FKRtbHfD/Thinkers360-Privacy-leaderboard-2025-1280x640.png Privacy risks and demands will continue to rise in our AI...

mrosenquist

2.1 K
Hive.Blog

Last Minute Save for the CVE Program

https://i.postimg.cc/PJWMc1ph/Chat-GPT-Image-Apr-17-2025-02-55-25-PM.png I am very glad that the Common Vulnerabilities and Exposures (CV...

aristotle01

0.57

CBEX Didn’t Paralyse Nigerians, But the System Did: Unmasking the Rising Wave of AI Trading Scams

In recent times, a disturbing trend has emerged within Nigeria’s financial landscape, a group of highly organized scam communities are c...

mrosenquist

2.1 K
Hive.Blog

Cybercriminals Can Easily Adopt New Tech

https://youtube.com/shorts/n8bQRdSTj80 Sandra Estok discusses how cybercriminals are not burdened by rules when it comes to leveraging ne...

mrosenquist

2.1 K
Hive.Blog

Simplifying Cyber Safety for Everyone with Sandra Estok

https://www.youtube.com/embed/F_qC8n71y44 Cybersecurity is not just a technical endeavor. Attackers often pursue people to either gain ac...

hassemer

15.04
PeakD

What does a Hive White Belt need to learn?

↣ Onboarding people to crypto is almost never an easy task... ↣ Hive is a very peculiar blockchain, with "free" transactions bu...

chaintuts

16.43
Hive.Blog

New Crypto Asset Security Book - "Digital Sovereignty: Protecting Your Crypto Assets Against Common Threats"

"Knowledge builds confidence, and confident users can stand up to the threats that face them." Friends, I'm tremendously excite...

mrosenquist

2.1 K
Hive.Blog

Navigating Cyber Threats, AI Disruption, and Boardroom Divide

CISOs Under Siege: Navigating Escalating Cyber Threats, AI Disruption, and the Boardroom Divide in 2025. These are some of my favorite to...

mrosenquist

2.1 K
Hive.Blog

Secretive Chinese network tries to lure fired federal workers

https://i.postimg.cc/Z5LdXJDY/a-candid-photograph-of-two-chinese-gover-y-KXij5-Qe-Qb-G5-MCahhrwe-MA-XJz-LXe3a-Qbai-f-IKpa-Wzg.jpg Fired &...

mrosenquist

2.1 K
Hive.Blog

Critical Cybersecurity Lessons from the Recent Exposure of U.S. Military Plans

https://www.youtube.com/embed/6ebqQPQCCn4 The recent inadvertent exposure of classified U.S. military plans by top defense and intelligen...

revolverocelotyt

177.52

How To Deal With YouTube Creators Private Video Email Phishing Scam

Image Source: Photo by cottonbro studio: https://www.pexels.com/photo/silver-imac-on-white-table-5083396/ A week ago, I received an emai...

mrosenquist

2.1 K
Hive.Blog

Advanced Malware Targets Cryptocurrency Wallets

More attacks targeting cryptocurrency users. Microsoft has identified a new Remote Access Trojan, named StilachiRAT, that has sophistica...

ariscoco1

11.40

Online Security for Hivians

Hive!! ❤️‍🔥 Photos temporarily removed for security reasons!

waivio_jk

0.00
Waivio

Cost of Integrating Biometric Systems with Access Control Software

Discover the factors that influence the cost of integrating biometric systems with access control software. Learn about installation, har...

mikkkonni

0.10

Cybersecurity

IT is developing rapidly, and with it, cyber threats. After one incident with a hacking attempt, I realized that it was risky to rely on ...

mrosenquist

2.1 K
Hive.Blog

Breaking Down Risks in Cybersecurity

https://youtu.be/Y60C5u6lzdI?si=XVq2oM9WJzxsn8OY Cyber Crime Junkies podcast Breaking Down Risks in Cybersecurity — A great conversation ...

mrosenquist

2.1 K
Hive.Blog

Immutable Cybersecurity Law #12

“Never underestimate the simplicity of the attackers, nor the gullibility of the victims.” Cyberattacks don’t always rely on sophisticate...

mrosenquist

2.1 K
Hive.Blog

Boards Challenged to Embrace Cybersecurity Oversight

Cybersecurity failures are now business risks that CEOs and Boards must own. The world of business owners, investors, and their represent...

waivio_jk

0.00
Waivio

The Ultimate Guide to Biometric Access Control System Integration | Secure Access

Discover how to integrate biometric access control systems seamlessly. Enhance security, streamline authentication, and protect your prem...

vikvitnik

3.3 K

Pentera secures $60 Million in funding to train Cybersecurity Teams through Network Attack Simulation

https://img.leopedia.io/DQmTVVLja9pd6423NrhVvZz7Zo1bgotmrngTPDYExtoH9uY/Pentera-60M-Funding-NwrkAttk.png Cybersecurity has seen the need...

mrosenquist

2.1 K
Hive.Blog

Are They Vulnerabilities or Undocumented Debug Features

The recent undocumented code in the ESP32 microchip, made by Chinese manufacturer Espressif Systems, is used in over 1 billion devices an...

mrosenquist

2.1 K
Hive.Blog

Ransomware Attack Ends a 150 Year Company

Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cyber...

darwin99

0.21
Hive.Blog

Windows 11 Review: Is It Worth the Upgrade?

Windows 11 is Microsoft’s latest operating system, bringing a fresh interface, improved performance, and several new features. Since its ...

vikvitnik

3.3 K

Anagram provides companies with Cybersecurity Training for their employees through Gamified Training

https://img.inleo.io/DQmP6bYSgQZxnDdf3LU4eXpBouXNSz1QKcRjLLVRdwDrPhN/ANAGRAM.png In recent times there has been an increase in security ...

sprarxit

0.00

Top-Tier Digital Solutions Provider

SparxIT, a trusted B2B digital transformation enabler, has a decade-long proficiency in modernizing businesses and driving tangible outco...