Veitias Social Network Club Veitias Social Network Club
Результаты поиска
Все результаты
  • Вступить
    Войти
    Регистрация
    Поиск

Поиск

Знакомьтесь и заводите новых друзей

  • Новости
  • ИССЛЕДОВАТЬ
  • Страницы
  • Группы
  • Мероприятия
  • Статьи пользователей
  • Marketplace
  • Funding
  • Offers
  • Jobs
  • Кинозал
  • Игры
  • Разработчики
  • Записей
  • Статьи
  • Пользователи
  • Страницы
  • Группы
  • Мероприятия
  • Nandini Verma
    2025-09-22 04:34:09 - Перевод -
    How Macros Become Malware | Real Security Risks Explained

    In this video, we explore:
    What macros are and how they work
    How cybercriminals exploit macros to deliver malware and ransomware
    Real-world macro-based attack examples (Emotet, Dridex & more)
    How to protect yourself and your organization from macro-based threats

    Watch Here: https://youtu.be/Ro1iAA4Pk9I?si=3xpgvM4JgZUnS5gC

    Don’t miss out! Enroll here to join InfosecTrain Free Webinar and unlock expert insights. https://www.infosectrain.com/events/

    #MacroSecurityRisk #CyberThreats #PhishingAttacks #OfficeMacros #MalwareAttack #InfosecTrain #CyberSecurityAwareness #DocumentSecurity #Emotet #RansomwareDefense
    How Macros Become Malware | Real Security Risks Explained In this video, we explore: ✅ What macros are and how they work ✅ How cybercriminals exploit macros to deliver malware and ransomware ✅ Real-world macro-based attack examples (Emotet, Dridex & more) ✅ How to protect yourself and your organization from macro-based threats Watch Here: https://youtu.be/Ro1iAA4Pk9I?si=3xpgvM4JgZUnS5gC Don’t miss out! 🎯 Enroll here to join InfosecTrain Free Webinar and unlock expert insights. 👉 https://www.infosectrain.com/events/ #MacroSecurityRisk #CyberThreats #PhishingAttacks #OfficeMacros #MalwareAttack #InfosecTrain #CyberSecurityAwareness #DocumentSecurity #Emotet #RansomwareDefense
    0 Комментарии 0 Поделились 2694 Просмотры 0 предпросмотр
    Войдите, чтобы отмечать, делиться и комментировать!
  • Nandini Verma
    2024-12-02 11:36:54 - Перевод -
    What is Cyber Threat Hunting and DFIR? | Steps of Malware Attack Explained

    𝐈𝐧 𝐭𝐡𝐢𝐬 𝐕𝐢𝐝𝐞𝐨, 𝐰𝐞 𝐰𝐢𝐥𝐥 𝐜𝐨𝐯𝐞𝐫:
    Introduction to Threat hunting and DFIR
    Malware Attack Path
    Process Injection Technique
    Detections- using Event logs, rules, ETW and other artefacts

    Watch Here: https://www.youtube.com/watch?v=R4JpagLDD8U

    #CyberThreatHunting #DFIR #MalwareAttack #CyberSecurity #DigitalForensics #IncidentResponse #InfoSec #CyberDefense #MalwareAnalysis #ThreatDetection #infosectrain #learntorise
    What is Cyber Threat Hunting and DFIR? | Steps of Malware Attack Explained 𝐈𝐧 𝐭𝐡𝐢𝐬 𝐕𝐢𝐝𝐞𝐨, 𝐰𝐞 𝐰𝐢𝐥𝐥 𝐜𝐨𝐯𝐞𝐫: 👉 Introduction to Threat hunting and DFIR 👉 Malware Attack Path 👉 Process Injection Technique 👉 Detections- using Event logs, rules, ETW and other artefacts Watch Here: https://www.youtube.com/watch?v=R4JpagLDD8U #CyberThreatHunting #DFIR #MalwareAttack #CyberSecurity #DigitalForensics #IncidentResponse #InfoSec #CyberDefense #MalwareAnalysis #ThreatDetection #infosectrain #learntorise
    0 Комментарии 0 Поделились 5297 Просмотры 0 предпросмотр
    Войдите, чтобы отмечать, делиться и комментировать!
  • Infosec Train добавлены фото
    2024-03-14 06:04:47 - Перевод -
    What are the 5 DarkGate Malware Impacts?

    The impact of DarkGate malware can be devastating for individuals and organizations. Some of the significant consequences.

    More Information - https://www.infosectrain.com/blog/what-is-darkgate-malware-and-its-impact/

    #DarkGateMalware #CyberSecurityThreats #MalwareAttacks #DataBreach #CybersecurityIncidents #CyberThreats #InformationSecurity #CyberAttack #MalwareDetection #NetworkSecurity #CyberSecurityAwareness #DataProtection #MalwareAnalysis #CyberSecurityDefense #CyberCrime #ComputerVirus #SecurityBreaches
    What are the 5 DarkGate Malware Impacts? The impact of DarkGate malware can be devastating for individuals and organizations. Some of the significant consequences. More Information - https://www.infosectrain.com/blog/what-is-darkgate-malware-and-its-impact/ #DarkGateMalware #CyberSecurityThreats #MalwareAttacks #DataBreach #CybersecurityIncidents #CyberThreats #InformationSecurity #CyberAttack #MalwareDetection #NetworkSecurity #CyberSecurityAwareness #DataProtection #MalwareAnalysis #CyberSecurityDefense #CyberCrime #ComputerVirus #SecurityBreaches
    0 Комментарии 0 Поделились 19611 Просмотры 0 предпросмотр
    Войдите, чтобы отмечать, делиться и комментировать!
  • Nandini Verma
    2023-11-06 11:55:38 - Перевод -
    What is Malware? | Types of Malware | Malware Attack

    In our digital age, understanding the insidious world of malware is essential for anyone who uses a computer, smartphone, or any connected device. This video is your comprehensive guide to malware, breaking down what it is, exploring its various types, and delving into the mechanics of a malware attack.

    Watch now: https://www.youtube.com/watch?v=rPeYvYEBAZU&t=11s

    #Malware #WhatIsMalware #MalwareExplained #WhatIsMalwareAndItsTypes #MalwareTutorial #MalwareExplanation #MalwareExplainedSimply #WhatIsMalwareAttack #MalwareAttack #CyberAttack #CyberSecurity #infosectrain
    What is Malware? | Types of Malware | Malware Attack In our digital age, understanding the insidious world of malware is essential for anyone who uses a computer, smartphone, or any connected device. This video is your comprehensive guide to malware, breaking down what it is, exploring its various types, and delving into the mechanics of a malware attack. Watch now: https://www.youtube.com/watch?v=rPeYvYEBAZU&t=11s #Malware #WhatIsMalware #MalwareExplained #WhatIsMalwareAndItsTypes #MalwareTutorial #MalwareExplanation #MalwareExplainedSimply #WhatIsMalwareAttack #MalwareAttack #CyberAttack #CyberSecurity #infosectrain
    0 Комментарии 0 Поделились 3486 Просмотры 0 предпросмотр
    Войдите, чтобы отмечать, делиться и комментировать!
© 2025 Veitias Social Network Club Russian
English Arabic French Spanish Portuguese Deutsch Turkish Dutch Italiano Russian Romaian Portuguese (Brazil) Greek
О нас Условия использования Конфиденциальность Свяжитесь с нами Каталог