
SecPro
@SecProInt
Followers
492
Following
17
Media
3K
Statuses
9K
Cybersecurity, Pentesting, Ethical Hacking, Awareness, Training, Cyberdefense
Alexandria, VA
Joined July 2018
⚙️Prompt Injection - Attacks on automated systems⚙️. 👋 Today we share with you this infographic explaining ‘Prompt Injection’. We invite you to visit our website where you can find resources like this one! .⏩ .🎓 #PromptInjection
0
0
0
⚙️Prompt Injection - Ataques a sistemas automatizados⚙️. 👋 Hoy compartimos con ustedes esta infografía que explica el 'Prompt Injection'. ¡Encuentra y descarga material como este en nuestro sitio web! .⏩ .🎓 #PromptInjection
0
0
0
🛡️¿Qué es el Windows Security Center (WSC)?🛡️. Conoce qué es el Windows Security Center (WSC), aprende sobre este servicio que te permite gestionar tu antimalware. 🔗 Te invitamos a ver el video completo: #WSC #WindowsSecurity
0
0
0
👨💻Comando y control (C2)👨💻. Aprende qué es el comando y control (C2), este mecanismo usado por los atacantes para enviar instrucciones y comprometer sistemas. 💻. 🔗 Te invitamos a ver el video completo: #Comandoycontrol #Ciberseguridad #C2
0
1
0
🔍New Fortinet FortiWeb hacks likely linked to public RCE exploits🔍. #Fortinet #FortiWeb #CyberAttack #RCE #RemoteCodeExecution #CyberSecurity #Infosec.
0
0
0
🛡️Google fixes actively exploited sandbox escape zero day in Chrome🛡️. #Google #Chrome #ZeroDay #CyberSecurity #Sandbox #Exploit #Vulnerability #BrowserSecurity.
0
0
0
💥Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors💥. #DDoS #CyberAttack #CyberSecurity #NetworkSecurity #VolumetricAttacks #HyperVolumetric.
0
0
0
🌐Command and Control (C2) Mechanism🌐. 👋 Today we share this infographic explaining the Command and Control (C2) Mechanism. We invite you to visit our website where you can find resources like this one!.⏩ .🎓 . #Infographic #C2
0
0
0
🌐Mecanismo de comando y control (C2)🌐. 👋Hoy compartimos con ustedes esta infografía, donde explicamos el Mecanismo de comando y control (C2)🕵️♂️¡Encuentra y descarga material como este en nuestro sitio web! .⏩ .🎓 #Infografia #C2
0
0
0
🌐AsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe🌐. #AsyncRAT #OpenSource #CyberThreats #Malware #CyberSecurity #InfoSec.
0
0
0
🖥️Interlock ransomware adopts FileFix method to deliver malware🖥️. #InterlockRansomware #FileFix #Ransomware #Malware #CyberThreats #CyberSecurity.
0
0
0
📧Google Gemini flaw hijacks email summaries for phishing📧. #GoogleGemini #GoogleAI #PhishingAttack #EmailSecurity #TechNews #GoogleSecurity.
0
0
0
🚨GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs🚨. #GPUHammer #RowHammer #CyberSecurity #AIModels #NVIDIA #HardwareHacking #TechNews #InfoSec.
0
0
0
📊Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) 📊. #Fortinet #FortinetPatch #SQL #Patch #vulnerability #SQLInjection #CriticalPatch #CyberSecurity.
0
0
0
🛡️Google reveals details on Android’s Advanced Protection for Chrome🛡️. #AdvancedProtection #Android #AndroidSecurity #ChromeSecurity #Chrome #MobileSecurity.
0
0
0
⏰ MFA Synchronization Attack ⏰.👋 Today we’re sharing this infographic explaining the MFA synchronization attack process. We invite you to visit our website where you can find resources like this one! ⏩.🎓. #Infographic #MFA
0
0
0