Quite an in-depth look at #military #cyber expertise.
"The history of military cyber operations is not just about innovation, but also about the importance of mundane maintenance work, such as training users, patching software, and strengthening passwords." https://tnsr.org/2021/01/what-is-a-cyber-warrior-the-emergence-of-u-s-military-cyber-expertise-1967-2018/
An interesting look at #cryptojacking.
Cybercriminals incorporate #cryptojacking capabilities in existing malware, compromise websites and use social networks to run cryptominers.
Find out what other methods they use in the latest ENISA Cryptojacking report 👉 https://bit.ly/347JMg8 #ENISATL20 #Cybersecurity
That's a useful diagram.
"It doesn't matter if someone hacks my email account, I've got nothing to hide..." 🤯
Next time you hear someone utter the above, remember not everyone sees things like a security professional. Show them this...