Posts

Showing posts from January, 2024

Security Progress 3/365

Day 1-3: Introduction to Cyber Threats Overview of common cyber threats. Real-world examples to set the stage. Phishing Attacks: The most well-known attack type is phishing; we will go through the case studies that can take a real-world example. Types of phishing (email, spear phishing, vishing). Real-world examples and case studies.  2016 Yahoo Breach Scenario: Yahoo experienced a massive data breach where attackers used spear phishing to access employee credentials. Outcome: Personal information from over 500 million accounts was compromised, highlighting the impact of successful phishing attacks on large organizations. Lesson: Even well-established companies can be vulnerable to phishing attacks, emphasizing the need for robust security measures.  COVID-19 Vaccine Phishing Scenario: Cybercriminals exploit the global interest in COVID-19 vaccines, sending emails offering fake vaccine appointments or information. Outcome: Victims may provide personal information or download maliciou