Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Cyber Security Awareness 2.0

Uday Mittal September 21, 2015 2 Comments

Cyber Security Awareness 2.0

When dealing with Cyber Security, it is often said that people are the weakest links. One vulnerable and gullible employee is all it takes to infiltrate into the company network. However, cyber security managers need to ask themselves this question, are people really the problem here? The challenge for cyber security managers is that they […]

Filed Under: Awareness Tagged With: awareness, Cyber Security, facebook, Social Media, twitter, youtube

Let there be no more MMS Scandals

Uday Mittal August 31, 2015 Leave a Comment

Let there be no more MMS Scandals

MMS. What was the first thing that came to your mind after reading MMS? More often than not it’s sex scandals. Like Google has become a synonymous for search, MMS has become a synonymous for unauthorized capture and/or release of a video clip containing intimate acts, usually sexual in nature, aka Sex Scandals. It’s not only illegal, […]

Filed Under: Awareness Tagged With: awareness, MMS Scandals, technology hygiene

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • DCPP: Everything You Need to Know
    DCPP: Everything You Need to Know
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • AD Exploitation using ADSI - Part 1 (Introduction)
    AD Exploitation using ADSI - Part 1 (Introduction)
  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress