photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
🌈 An inclusive place for your photos, silliness, and convos! 🌈

Administered by:

Server stats:

249
active users

#knowbe4

0 posts0 participants0 posts today
PrivacyDigest<p>A North Korean <a href="https://mas.to/tags/Hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacker</span></a> Tricked a US <a href="https://mas.to/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> Vendor Into Hiring Him—and Immediately Tried to <a href="https://mas.to/tags/Hack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hack</span></a> Them</p><p><a href="https://mas.to/tags/KnowBe4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KnowBe4</span></a> detailed the incident in a recent blog post as a warning for other potential targets.<br><a href="https://mas.to/tags/northkorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>northkorea</span></a></p><p><a href="https://www.wired.com/story/north-korean-hacker-hired-ecurity-company-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/north-korean-h</span><span class="invisible">acker-hired-ecurity-company-malware/</span></a></p>
Anthony Collette :donor: / Loistava<p>KnowBe4 Password Policy</p><p>In 2022, KnowBe4 released its first e-book covering password attacks, defenses and what your corporate password policy should be. Here is a summary of their recommendations:</p><p>☑️​ Whenever possible, use phishing-resistant Multifactor Authentication (MFA).<br>☑️​ Use MFA and / or long passwords or passphrases to log on to your devices.<br>☑️​ If you can, use a password manager.<br>☑️​ 12-character perfectly random 4-class passwords defeat all known guessing/cracking attacks.<br>☑️​ If you must think up a password yourself, create a unique and long password or passphrase (at least 20 characters) for all sites and services.</p><p>I’m interested in how we translate this corporate-directed advice into something actionable for ordinary people, outside of organizations with infosec budgets.</p><p>Especially interesting is the fact that — as far as we’re aware — no one has cracked a 12-character, random 4-class password. I’ve circled that below in red . . . kinda rough . . . I’m no graphic designer, for sure!</p><p>Have you heard of this kind of password being cracked out in the wild?</p><p><a href="https://blog.knowbe4.com/password-policy-e-book" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.knowbe4.com/password-poli</span><span class="invisible">cy-e-book</span></a></p><p><a href="https://infosec.exchange/tags/Passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwords</span></a><br><a href="https://infosec.exchange/tags/PasswordManagers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordManagers</span></a><br><a href="https://infosec.exchange/tags/ComplexPasswords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComplexPasswords</span></a><br><a href="https://infosec.exchange/tags/SpecialCharactersInPasswords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SpecialCharactersInPasswords</span></a><br><a href="https://infosec.exchange/tags/KnowBe4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KnowBe4</span></a></p>
Anthony Collette :donor: / Loistava<p>KnowBe4 Password Policy</p><p>In 2022, KnowBe4 released its first e-book covering password attacks, defenses and what your corporate password policy should be. Here is a summary of their recommendations:</p><p>☑️​ Whenever possible, use phishing-resistant Multifactor Authentication (MFA).<br>☑️​ Use MFA and / or long passwords or passphrases to log on to your devices.<br>☑️​ If you can, use a password manager.<br>☑️​ 12-character perfectly random 4-class passwords defeat all known guessing/cracking attacks.<br>☑️​ If you must think up a password yourself, create a unique and long password or passphrase (at least 20 characters) for all sites and services.</p><p>I’m interested in how we translate this corporate-directed advice into something actionable for ordinary people, outside of organizations with infosec budgets.</p><p>Especially interesting is the fact that — as far as we’re aware — no one has cracked a 12-character, random 4-class password. I’ve circled that below in red . . . kinda rough . . . I’m no graphic designer, for sure!</p><p>Have you heard of this kind of password being cracked out in the wild?</p><p><a href="https://blog.knowbe4.com/password-policy-e-book" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.knowbe4.com/password-poli</span><span class="invisible">cy-e-book</span></a></p><p><a href="https://infosec.exchange/tags/Passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passwords</span></a><br><a href="https://infosec.exchange/tags/PasswordManagers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PasswordManagers</span></a><br><a href="https://infosec.exchange/tags/ComplexPasswords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComplexPasswords</span></a><br><a href="https://infosec.exchange/tags/SpecialCharactersInPasswords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SpecialCharactersInPasswords</span></a><br><a href="https://infosec.exchange/tags/KnowBe4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KnowBe4</span></a></p>
Crazypedia :cyber_heart:<p>... . :fucc:<br>I guess I'm checking if <a href="https://toot.chat/tags/knowbe4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KnowBe4</span></a> has training for this one today 🤦‍♂️📧<br><a href="https://toot.chat/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a> <a href="https://toot.chat/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://toot.chat/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a></p><p>RT @helpnetsecurity@twitter.com</p><p>BEC scammers add payroll diversion to their repertoire - <a href="http://bit.ly/2TSBAJ7" rel="nofollow noopener" target="_blank"><span class="invisible">http://</span><span class="">bit.ly/2TSBAJ7</span><span class="invisible"></span></a> - @AgariInc@twitter.com <a href="https://toot.chat/tags/becscams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BECscams</span></a> <a href="https://toot.chat/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p><p>🐦🔗: <a href="https://twitter.com/helpnetsecurity/status/1085491930358796288" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/helpnetsecurity/st</span><span class="invisible">atus/1085491930358796288</span></a></p>
Dr. Roy Schestowitz (罗伊)<a href="https://pleroma.site/tag/knowbe4" rel="nofollow noopener" target="_blank">#KnowBe4</a> buys 'access' to <a href="https://pleroma.site/tag/surveillance" rel="nofollow noopener" target="_blank">#surveillance</a> agencies. From public (but clandestine) to private, for-profit ploy <a href="https://www.prnewswire.com/news-releases/former-cia-technical-intelligence-officer-rosa-smothers-joins-knowbe4-as-senior-vp-of-cyber-operations-300762311.html" rel="nofollow noopener" target="_blank">https://www.prnewswire.com/news-releases/former-cia-technical-intelligence-officer-rosa-smothers-joins-knowbe4-as-senior-vp-of-cyber-operations-300762311.html</a>