SecurityGuill Profile Banner
SecurityGuill Profile
SecurityGuill

@SecurityGuill

Followers
16K
Following
2K
Media
468
Statuses
1K

Cybersecurity Expert ๐Ÿ‘จโ€๐Ÿ’ป | Content for any types of audiences ๐Ÿ’ก | You will learn something every day ๐Ÿ“š

Joined November 2018
Don't wanna be here? Send us removal request.
@SecurityGuill
SecurityGuill
4 years
This thread brings together all my #infographics until today (2years of work). These are all infographics about #infosec ๐Ÿ”. Feel free to share this tweet if you think it may be useful for your #community ๐Ÿ“š. Follow me โžก @SecurityGuill fore more about #security #hacking #news
Tweet media one
Tweet media two
Tweet media three
Tweet media four
42
944
2K
@SecurityGuill
SecurityGuill
2 years
0-Day. It is a vulnerability in software that even the developers don't know about ๐Ÿ‘จโ€๐Ÿ’ป. Hackers exploit this loophole before it's fixed, giving them an advantage to launch unexpected cyber attacks ๐ŸŽฏ. ๐Ÿ’ฐ They can also sell this vulnerability to other hackers. #CyberSecurity
Tweet media one
0
1
6
@grok
Grok
4 days
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
1K
3K
11K
@SecurityGuill
SecurityGuill
2 years
Have you ever faced a CyberAttack?. Whether in the professional or personal world. Tell in the comments what happened and what you did!
Tweet media one
2
1
4
@SecurityGuill
SecurityGuill
2 years
Internet is like a vast playground, but it also harbors hidden dangers for children ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งโ€๐Ÿ‘ง . From cyberbullying to inappropriate content, safeguarding their online experience is crucial ๐Ÿ›ก. ๐Ÿ’ก Here are essential tips to protect your children online:. ๐Ÿ—ฃ Engage in open conversations
Tweet media one
1
2
5
@SecurityGuill
SecurityGuill
2 years
Social Engineering ๐Ÿ’ก. It is a manipulative tactic used to exploit human psychology ๐Ÿง  and trust in order to gain unauthorized access or information ๐Ÿ”“โ›”. This is based on emotions: provocation of stress, fear, nervousness. Widely used by Phishing attacks #CyberSecurity
Tweet media one
0
3
7
@SecurityGuill
SecurityGuill
2 years
Cyberattacks are becoming more numerous and sophisticated ๐Ÿดโ€โ˜ ๏ธ. Antiviruses are no longer enough to protect yourself ๐Ÿ”“. ๐Ÿ’ก Have you already heard about EDR? . ๐Ÿ“– I made an #infographic that explains what an EDR is! . Follow me โžก @SecurityGuill for everything about #CyberSecurity
Tweet media one
1
12
28
@SecurityGuill
SecurityGuill
2 years
RT @SecurityGuill: [THREAD] ๐Ÿงต - You can have your entire bank account drained in seconds ๐Ÿฆ. I just finished a phone call with someone who jโ€ฆ.
0
11
0
@SecurityGuill
SecurityGuill
2 years
Who uses the '' ls '' command just after using the '' cd '' command?.
6
0
14
@SecurityGuill
SecurityGuill
2 years
If you liked this thread, feel free to RT/share/like/comment. Follow my account @SecurityGuill for more about #infosec #CyberSecurity #cyberattack #hacking #news #technology.
0
0
0
@SecurityGuill
SecurityGuill
2 years
The attackers goals is to make you stress/panic so that you execute actions without thinking. With the right context and the right means of pressure, even sensitized people can fall into the trap. Always be vigilant.
1
0
1
@SecurityGuill
SecurityGuill
2 years
- Always pay attention to the real links received by SMS/email. and go to the official website if you have a doubt. - Never give personnal/sensitive informations over the phone or on unofficial website. - Take a moment to breath and think. Don't give into panic.
1
0
1
@SecurityGuill
SecurityGuill
2 years
However, these transactions were bank transfers initiated by attacker. A few second later, the attacker hung up the phone, and the victim had nothing left in his bank account.
1
0
0
@SecurityGuill
SecurityGuill
2 years
The victim gains confidence because the "adviser" (the attacker) presents him lots of personnal informations. In a panic, the victim decides to validate the operations on his phone, without paying attention.
1
0
0
@SecurityGuill
SecurityGuill
2 years
He explains to the victim that he will have to carry out operations to block the transactions and that she will have to validate on here phone.
1
0
0
@SecurityGuill
SecurityGuill
2 years
A few days later, the person receives a call from his bank adviser, telling him that a malicious person is using his credit card. Of course, it's a phishing call. The attacker reassures the victim by giving him lots of personal information that he has previously stolen.
1
0
0
@SecurityGuill
SecurityGuill
2 years
The attacker therefore recovers the victim credit card numbers and others personnal informations about the person. But that's only the beginning of the problems.
1
0
1
@SecurityGuill
SecurityGuill
2 years
It looks like an official government website. However, this person actually had a (real one) traffic violation to pay. The SMS therefore arrives at the right time (targeted phishing). The person does not pay attention and proceeds to pay for the offence.
1
0
1
@SecurityGuill
SecurityGuill
2 years
It starts with a fairly well-know scam: the fake traffic violation. The person received an SMS telling him that he had an unpaid offense and that he was going to pay more if he did not pay within 24 hours. Of course, it was a phishing SMS, but the link was well done.
1
0
0
@SecurityGuill
SecurityGuill
2 years
[THREAD] ๐Ÿงต - You can have your entire bank account drained in seconds ๐Ÿฆ. I just finished a phone call with someone who just had their bank account emptied. ๐Ÿ”Ž Here's how it went (3 mins read and your money safe). #CyberSecurity #infosec.#CyberAttack #hacking #news #technology
Tweet media one
2
11
12
@SecurityGuill
SecurityGuill
2 years
RT @SecurityGuill: [THREAD] ๐Ÿ“š - My Cybersecurity infographics . This thread brings together all my #infographics until today (2years of wโ€ฆ.
0
43
0
@SecurityGuill
SecurityGuill
2 years
What is Zed #attack Proxy ?
Tweet media one
0
0
6