How did 0ktapus hack cybersecurity service providers? #shorts
People often make mistakes. Even employees of companies that are responsible for your cybersecurity can make mistakes. In 2022, a group of hackers that go by the name 0ktapus, used social engineering to hack more than 130 companies and compromised almost 10,000 accounts! #Oktapus #cybersecurity #fishingSumsub
— empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.
More about us:
https://sumsub.com
https://twitter.com/Sumsubcom
https://www.instagram.com/sumsubcom/
https://www.linkedin.com/company/18232778/admin/
Видео How did 0ktapus hack cybersecurity service providers? #shorts канала Sumsub
— empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.
More about us:
https://sumsub.com
https://twitter.com/Sumsubcom
https://www.instagram.com/sumsubcom/
https://www.linkedin.com/company/18232778/admin/
Видео How did 0ktapus hack cybersecurity service providers? #shorts канала Sumsub
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
What’s the Safest Anti-Spoofing Technology? | ExplainedA standard set of cyber hygiene rules. #shortsQQAAZZ Group: How Cybercriminals Built a Money Laundering EmpireHow people launder money through e-commerce #shortsHow much does your personal data cost? #shortsHow Kevin Mitnick broke into a bank #shortsHacker stopped a global computer virus epidemy #shortsHow To Make Yourself Invisible To Advertisers | ExplainedWhat Digital Traces Does Your Computer Leave Behind?PDF. It’s convenient, but dangerous #sumsub #shortsHow To Hide Your Digital SecretsWe assembled a cheap hacking tool! #shortsHow to Create an Unbreakable Cipher: Chaos Theory vs Quantum CryptographyNever Share Your Phone With A Stranger | Offline Digital Security TipsHow can scammers use a deepfake of your voice? #ShortsNothing To Hide! Are You Ready To Give Up Your Privacy For Safety?How to find anyone! Photo verification/search methods #Shorts #OSINTHow to Spot a Fake Photo | Digital ForensicsHacking As A Service: No-code HackersHow Dangerous are Deepfakes? | Explained