yehey

Experts

Show more authors

yehey

Hive.Blog

What to know about cryptocurrency and Bitcoin in the Philippines

Cryptocurrency is a digital or virtual asset designed to work as a medium of exchange. Bitcoin, the first and most well-known cryptocurre...

yehey

Hive.Blog

A day in life of Maynila local.

Assuming you would like a detailed description of a day in the life of a Maynila local: The day begins early in Maynila, with the sun ris...

yehey

Hive.Blog

How to hire a ethical hacker to penetration test your system

When looking to hire an ethical hacker, there are a few key things to consider. Firstly, you want to make sure that the ethical hacker ha...

yehey

Hive.Blog

How Robotics is Changing Cybersecurity

Robotics is changing the cybersecurity landscape in a number of ways. Firstly, the rapid pace of technological advancement is making it d...

yehey

Hive.Blog

What is Penetration Testing?

Penetration testing, also known as pen testing or ethical hacking, is the process of testing a computer system, network, or web applicati...

yehey

Hive.Blog

What is Malware and How to Remove it

Malware is a type of software that is designed to damage or disable computers and computer systems. Malware is often spread through email...

yehey

Hive.Blog

Bitcoin, Ethereum, and the Future of Cryptocurrency

The rise of Bitcoin and Ethereum has led to a renewed interest in cryptocurrency. Cryptocurrency is a type of digital asset that uses cry...

yehey

Hive.Blog

Robotics in the Cybersecurity Industry

Robotics in the cybersecurity industry is an exciting and growing field. Robotics can be used in a number of ways to help secure networks...

yehey

Hive.Blog

What is Penetration Testing?

Penetration testing, also known as pen testing or ethical hacking, is the process of testing a computer system, network or web applicatio...

yehey

Hive.Blog

How to recognize phishing emails and protect yourself from them

What is phishing? Phishing is a type of online fraud where criminals send fake emails or set up fake websites that mimic legitimate ones ...

yehey

Hive.Blog

The most popular tourist attractions in the Philippines.

The most popular tourist attractions in the Philippines. The beaches of Boracay The Banaue Rice Terraces The Chocolate Hills Taal Volcan...

yehey

Hive.Blog

How to recognize phishing emails and protect yourself from them

What is phishing? Phishing is a type of online fraud where criminals send fake emails or set up fake websites that mimic legitimate ones ...

yehey

Hive.Blog

CLLEX supporting agricultural productivity now 96% completed.

The Department of Public Works and Highways (DPWH) is inching closer to delivering the entire 30-kilometer Central Luzon Link Expressway ...

yehey

Hive.Blog

Fast tracks road network to a better Marawi

A road network improvement project of the Department of Public Works and Highways (DPWH) will pave the way to a revitalized economy for t...

yehey

Hive.Blog

Microsoft Defender Experts for Hunting

Microsoft Defender Experts for Hunting now generally available Announced in May, Defender Experts for Hunting provides businesses that al...

yehey

Hive.Blog

Windows, Adobe Zero-Days Used to Deploy Subzero Malware

Attacks With Subzero Surveillance Malware Microsoft reported Subzero attacks against Microsoft customers in Austria, the United Kingdom, ...

quochuy

Hive.Blog

Witness Earnings Monthly Report -

What do Hive Witnesses do and why you should vote for your 30 preferred witnesses. What do Witnesses do? The Hive blockchain uses DPoS (D...

yehey

Hive.Blog

People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices

CISA, the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) have released a joint Cybersecurity Advisory (CSA...

yehey

Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure

The cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom have released a joint Cybersec...

yehey

Department of State Rewards for Justice Program earn up to $10 Million

This joint Cybersecurity Advisory (CSA)—coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of ...

yehey

32 Known Exploited Vulnerabilities added to the Catalog

CISA has added 32 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These typ...

yehey

Cybercriminals seeking more than just ransomware payment

US and UK Expose New Malware Used by MuddyWater Hackers This is expected as we continue to see the ongoing conflict between Russia and Uk...

yehey

Traditional MFA is Creating a False Sense of Security

Traditional MFA is Creating a False Sense of Security Nobody says MFA is 100% will protect you against malicious attackers. It will only ...

yehey

Learn CyberSecurity through playing Games

You got it right, learn cybersecurity offensive and defensive techniques by playing games. “Cyber competitions are a fundamental element ...

quochuy

Hive.Blog

Witness Earnings Weekly Report - 2022-02-08

What do Hive Witnesses do and why you should vote for your 30 preferred witnesses. What do Witnesses do? The Hive blockchain uses DPoS (D...

yehey

Bitfinex’s Stolen $2.5B BTC Awakens

This is not good news in crypto currency industry, added to the declining value of digital assets. The hacked is not new, the BTC moved t...

yehey

Killware: The Most Dangerous Evolution of Ransomware?

Killware: The Most Dangerous Evolution of Ransomware? 2021 was filled with high-profile ransomware attacks on businesses across industrie...

quochuy

Hive.Blog

Witness Earnings Weekly Report - 2022-01-24

What do Hive Witnesses do and why you should vote for your 30 preferred witnesses. What do Witnesses do? The Hive blockchain uses DPoS (D...

yehey

Cross-chain protocol Multichain bug gets exploited for $1.34 million

CISA Urges Organizations to Implement Immediate Cybersecurity Measures to Protect Against Potential Threats In response to recent malicio...

yehey

Crypto.com Hot Wallet Hacked, No Funds Lost Says the Exchange

In a blow to its public image, Crypto.com, the most prominent digital bank in the Asia-Pacific region, was hacked, leaving some customers...