-
During RvB with phishing exercise
Red teaming: https://github.com/joshnguyen08/cybersecurity-homelab/blob/main/red-team/RvB-Phishing%20(FINISHED)
Blue teaming: https://github.com/joshnguyen08/…
-
Will this topic also address the privacy of external actors who are captured by the use of AR enabled devices when in the field, or would this be a completely separate topic? Also wonder if there are …
-
https://www.ctinsider.com/business/article/ct-computer-hack-stop-shop-food-shortages-19910111.php
-
https://hackread.com/dumpforums-russian-cybersecurity-firm-dr-web-data-breach/
-
# Name of Proposer
*Lakhs*
# Campaign Name
*A step towards security-Cybersecurity*
## Campaign Description
*Write a 3-5 sentence description of the campaign you are proposing. Your descriptio…
-
https://www.theregister.com/2024/09/23/moneygram_cybersecurity_issue/
-
If we want more ideas about supporting the learning of cybersecurity, we should look at the ACM Curriculum Guidelines.
https://www.acm.org/binaries/content/assets/education/curricula-recommendation…
-
https://dig.watch/updates/data-breach-at-intesa-sanpaolo-under-investigation
https://www.reuters.com/technology/cybersecurity/italys-intesa-said-it-alerted-authorities-security-breach-after-checks-…
-
-
# CyberSecurity | TinkerHub Learning Paths
[https://paths.tinkerhub.org/cybersecurity/](https://paths.tinkerhub.org/cybersecurity/)