Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Would Trump trump his promise on Cybersecurity?

Uday Mittal November 16, 2016 Leave a Comment

Would Trump trump his promise on Cybersecurity?

It’s been almost a week since American citizens elected Donald J. Trump as their 45th president. Ever since, there have been a variety of speculations on what his presidency would mean for the USA and world at large. Many are worried that his victory may have initiated a new trend which could affect the upcoming […]

Filed Under: Awareness, Opinion Tagged With: Cyber Security, cyber-warfare, Narendra Modi, Trump

Effects of Currency Ban on Cyber Security

Uday Mittal November 12, 2016 Leave a Comment

Effects of Currency Ban on Cyber Security

On 8th November, 2016, our honorable Prime Minister Shri. Narendra Modi, in his speech addressing the nation, announced that the currency notes of denomination 500 and 1000 would cease to be legal tender from the midnight of November 8. Following are key points concerning the currency ban (source: The Hindu): These notes can be deposited […]

Filed Under: Awareness Tagged With: cashless, currency ban, Cyber Security, Narendra Modi

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Mr. Robot: Fsociety deploys ransomware
    Mr. Robot: Fsociety deploys ransomware
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • DCPP: Everything You Need to Know
    DCPP: Everything You Need to Know
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • SPN Scanning using ADSI (Part 3)
    SPN Scanning using ADSI (Part 3)
  • Book Review: Penetration Testing Azure for Ethical Hackers
    Book Review: Penetration Testing Azure for Ethical Hackers

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress