Veitias Social Network Club Veitias Social Network Club
Search Results
See All Results
  • Join
    Sign In
    Sign Up
    Search

Search

Discover new people, create new connections and make new friends

  • News Feed
  • EXPLORE
  • Pages
  • Groups
  • Events
  • Blogs
  • Marketplace
  • Funding
  • Offers
  • Jobs
  • Movies
  • Games
  • Developers
  • Posts
  • Articles
  • Users
  • Pages
  • Groups
  • Events
  • Nandini Verma
    2025-09-22 04:34:09 - Translate -
    How Macros Become Malware | Real Security Risks Explained

    In this video, we explore:
    What macros are and how they work
    How cybercriminals exploit macros to deliver malware and ransomware
    Real-world macro-based attack examples (Emotet, Dridex & more)
    How to protect yourself and your organization from macro-based threats

    Watch Here: https://youtu.be/Ro1iAA4Pk9I?si=3xpgvM4JgZUnS5gC

    Don’t miss out! Enroll here to join InfosecTrain Free Webinar and unlock expert insights. https://www.infosectrain.com/events/

    #MacroSecurityRisk #CyberThreats #PhishingAttacks #OfficeMacros #MalwareAttack #InfosecTrain #CyberSecurityAwareness #DocumentSecurity #Emotet #RansomwareDefense
    How Macros Become Malware | Real Security Risks Explained In this video, we explore: βœ… What macros are and how they work βœ… How cybercriminals exploit macros to deliver malware and ransomware βœ… Real-world macro-based attack examples (Emotet, Dridex & more) βœ… How to protect yourself and your organization from macro-based threats Watch Here: https://youtu.be/Ro1iAA4Pk9I?si=3xpgvM4JgZUnS5gC Don’t miss out! 🎯 Enroll here to join InfosecTrain Free Webinar and unlock expert insights. πŸ‘‰ https://www.infosectrain.com/events/ #MacroSecurityRisk #CyberThreats #PhishingAttacks #OfficeMacros #MalwareAttack #InfosecTrain #CyberSecurityAwareness #DocumentSecurity #Emotet #RansomwareDefense
    0 Comments 0 Shares 2769 Views 0 Reviews
    Please log in to like, share and comment!
  • Nandini Verma
    2024-12-02 11:36:54 - Translate -
    What is Cyber Threat Hunting and DFIR? | Steps of Malware Attack Explained

    𝐈𝐧 𝐭𝐑𝐒𝐬 π•π’ππžπ¨, 𝐰𝐞 𝐰𝐒π₯π₯ 𝐜𝐨𝐯𝐞𝐫:
    Introduction to Threat hunting and DFIR
    Malware Attack Path
    Process Injection Technique
    Detections- using Event logs, rules, ETW and other artefacts

    Watch Here: https://www.youtube.com/watch?v=R4JpagLDD8U

    #CyberThreatHunting #DFIR #MalwareAttack #CyberSecurity #DigitalForensics #IncidentResponse #InfoSec #CyberDefense #MalwareAnalysis #ThreatDetection ο»Ώ#infosectrainο»Ώ #learntorise
    What is Cyber Threat Hunting and DFIR? | Steps of Malware Attack Explained 𝐈𝐧 𝐭𝐑𝐒𝐬 π•π’ππžπ¨, 𝐰𝐞 𝐰𝐒π₯π₯ 𝐜𝐨𝐯𝐞𝐫: πŸ‘‰ Introduction to Threat hunting and DFIR πŸ‘‰ Malware Attack Path πŸ‘‰ Process Injection Technique πŸ‘‰ Detections- using Event logs, rules, ETW and other artefacts Watch Here: https://www.youtube.com/watch?v=R4JpagLDD8U #CyberThreatHunting #DFIR #MalwareAttack #CyberSecurity #DigitalForensics #IncidentResponse #InfoSec #CyberDefense #MalwareAnalysis #ThreatDetection ο»Ώ#infosectrainο»Ώ #learntorise
    0 Comments 0 Shares 5311 Views 0 Reviews
    Please log in to like, share and comment!
  • Infosec Train added a photo
    2024-03-14 06:04:47 - Translate -
    What are the 5 DarkGate Malware Impacts?

    The impact of DarkGate malware can be devastating for individuals and organizations. Some of the significant consequences.

    More Information - https://www.infosectrain.com/blog/what-is-darkgate-malware-and-its-impact/

    #DarkGateMalware #CyberSecurityThreats #MalwareAttacks #DataBreach #CybersecurityIncidents #CyberThreats #InformationSecurity #CyberAttack #MalwareDetection #NetworkSecurity #CyberSecurityAwareness #DataProtection #MalwareAnalysis #CyberSecurityDefense #CyberCrime #ComputerVirus #SecurityBreaches
    What are the 5 DarkGate Malware Impacts? The impact of DarkGate malware can be devastating for individuals and organizations. Some of the significant consequences. More Information - https://www.infosectrain.com/blog/what-is-darkgate-malware-and-its-impact/ #DarkGateMalware #CyberSecurityThreats #MalwareAttacks #DataBreach #CybersecurityIncidents #CyberThreats #InformationSecurity #CyberAttack #MalwareDetection #NetworkSecurity #CyberSecurityAwareness #DataProtection #MalwareAnalysis #CyberSecurityDefense #CyberCrime #ComputerVirus #SecurityBreaches
    0 Comments 0 Shares 19625 Views 0 Reviews
    Please log in to like, share and comment!
  • Nandini Verma
    2023-11-06 11:55:38 - Translate -
    What is Malware? | Types of Malware | Malware Attack

    In our digital age, understanding the insidious world of malware is essential for anyone who uses a computer, smartphone, or any connected device. This video is your comprehensive guide to malware, breaking down what it is, exploring its various types, and delving into the mechanics of a malware attack.

    Watch now: https://www.youtube.com/watch?v=rPeYvYEBAZU&t=11s

    #Malware #WhatIsMalware #MalwareExplained #WhatIsMalwareAndItsTypes #MalwareTutorial #MalwareExplanation #MalwareExplainedSimply #WhatIsMalwareAttack #MalwareAttack #CyberAttack #CyberSecurity #infosectrain
    What is Malware? | Types of Malware | Malware Attack In our digital age, understanding the insidious world of malware is essential for anyone who uses a computer, smartphone, or any connected device. This video is your comprehensive guide to malware, breaking down what it is, exploring its various types, and delving into the mechanics of a malware attack. Watch now: https://www.youtube.com/watch?v=rPeYvYEBAZU&t=11s #Malware #WhatIsMalware #MalwareExplained #WhatIsMalwareAndItsTypes #MalwareTutorial #MalwareExplanation #MalwareExplainedSimply #WhatIsMalwareAttack #MalwareAttack #CyberAttack #CyberSecurity #infosectrain
    0 Comments 0 Shares 3500 Views 0 Reviews
    Please log in to like, share and comment!
© 2025 Veitias Social Network Club English
English Arabic French Spanish Portuguese Deutsch Turkish Dutch Italiano Russian Romaian Portuguese (Brazil) Greek
About Terms Privacy Contact Us Directory