Cybersecurity as viewed by a hacker - documenting the main mistakes companies make and how to avoid them For Free hereb2bcybersecuremedia.substack.com/subscribeJoined July 2025
Having proprietary internal platforms to perform certain tasks is not always the right choice.
Creating your own Zoom for internal company video calls will not always solve your data protection issues.
Lessons learned from hacking victims
A timely response plan can drastically reduce damage: victims of attacks emphasize the importance of tried and tested procedures and operators who are prepared to intervene immediately.
If you want to make sure that no one steals your data, you need to question some of the apps/websites/search engines that you normally use and consider safe.
One of these is the search engine you use.
Make sure you use a search engine that chooses you instead of advertisers.
The truth behind two-factor authentication
It will solve 90% of your problems, but you still think it's useless.
It's like adding a second door to your house.
threads
The truth behind using a VPN
They believe you use one because you care about your online privacy.
In some cases this is true, but in others
You only use it to watch TV series on Netflix in other countries.
The hidden truth that hackers won't tell you
It is often believed that they managed to attack and find vulnerabilities in security systems
The reality is that someone inside your company let us in.
This is something nobody talks about when it comes to cyber attacks.
In many cases, it's not just financial institutions that are attacked with the aim of stealing passwords and money.
Thread
This is a mistake that all companies make
Lack of internal training: Employees are not adequately trained on privacy, security, and procedures, increasing the likelihood of human error and data breaches.
thread
If you are looking for something that is future-proof, cybersecurity is what you need.
As long as the internet exists, there will be a need for someone to protect online data.
This is a strategic point of view if you want to build something that is durable and future-proof.
They responded to a comment on Twitter asking me how to get into the world of cybersecurity.
Current status: technical background with experience in the tech sector
You will have an advantage if you decide to enter the cybersecurity sector starting from this point
thread
The future of the cybersecurity field will be dominated by Indians.
Especially Indians who know how to use AI well in the cybersecurity industry.
I don't understand how, but when it comes to writing code, they are incredible.
thread
Important data about those working in cyber security
Soon, more than 1.8 billion people will have access to the internet.
This means that there will be around 2 billion people who will need someone to protect their data.
thread
Everyone keeps asking me for a little advice on how to protect themselves online.
I respond by saying that using a VPN can prevent 90% of attacks, and if we add two-factor authentication and a couple of habits such as not accessing public networks, we can reach 99%.
The skills an entrepreneur needs to protect their data
You don't have to be an expert, but you should hire one. But you must have:
Knowledge of cybersecurity principles: understand concepts such as encryption, authentication, authorization, access management, and data security
I decided to start producing content here on substack, but also on other social media, about cybersecurity.
The unconventional thing was the point of view I decided to adopt.
Namely, the point of view of hackers.
thread
A mistake made when producing online content
This also applies to cybersecurity
Assuming that others know certain things. The truth is that what is obvious to you may not be obvious to someone else.
5K Followers 794 FollowingGo from lonely and awkward to 5 friends, in 5 weeks || As an introvert, I made 31 friends in person during the pandemic || Solved for 6+ men || Social Skills
233K Followers 1K FollowingCofounder @hackinghub_io | Advisor @CaidoIO. I hack companies and make content about it. #NahamCon organizer. ex @hacker0x01🇮🇷
3.9M Followers 2K FollowingOfficial FBI X account. Submit tips at https://t.co/tGqFRcJykB. Public info may be used for authorized purposes: https://t.co/x6bfDUEYeJ.
63K Followers 82 FollowingThe latest research and news from Unit 42, the Palo Alto Networks (@paloaltontwks) Threat Intelligence and Security Consulting Team covering incident response.
229K Followers 229 Following#1 Cyber Performance Center, providing a human-first platform to create and maintain high-performing cybersecurity individuals and organizations.
5K Followers 794 FollowingGo from lonely and awkward to 5 friends, in 5 weeks || As an introvert, I made 31 friends in person during the pandemic || Solved for 6+ men || Social Skills
240K Followers 200 FollowingBreaking cybersecurity and technology news, guides, and tutorials that help you get the most from your computer. DMs are open, so send us those tips!
8K Followers 2K FollowingFounder @ The Web Lifestyle – Digital Real Estate & E-commerce | U.S. Army Veteran | Husband | Golfer & Gamer | Domain Investor/Domainer
1.1M Followers 0 FollowingNational Security Agency/Central Security Service official account, home to America's codemakers and codebreakers. Likes, retweets, and follows ≠ endorsement.
8K Followers 253 FollowingCompany No. 200601006881 (726630-U)
CyberSecurity Malaysia is the national cyber security specialist centre. An Agency Under The Ministry of Digital Malaysia
191K Followers 417 FollowingSANS is the most trusted and by far the largest source for information & cyber security training, certification and research in the world.
285K Followers 71 FollowingPart of @CISAgov, we respond to major incidents, analyze threats, and exchange critical cybersecurity information with partners around the world.
190K Followers 0 FollowingWe make learning web hacking and security easier. Online systems, code review, videos & courses that can be used to understand, test and exploit bugs!
309K Followers 99 FollowingOfficial communications from CISA on X will always originate from this account. No other accounts are authorized to convey info from CISA or senior CISA staff.
52K Followers 634 FollowingThe Australian Signals Directorate provides intelligence, cyber security and offensive operations in support of the Australian Government and the ADF.
181K Followers 1K FollowingThe National Cybersecurity Alliance is a nonprofit that empowers people to use technology safely & securely. Co-leads Cybersecurity Awareness Month
21K Followers 9K FollowingThought Leader: FORBES Contributor, Georgetown Prof, Named Top Tech Person to Follow by LinkedIn. Voted Top Cybersecurity Person of Year, #cybersecurity, #tech
333K Followers 2K FollowingIndependent investigative journalist. Author of 'Spam Nation,' a NYT bestseller. Former Washington Post reporter. Mastodon: https://t.co/fTKNavlMwp
87.8M Followers 154 FollowingOfficial NASA account. Exploring the universe, advancing science, and inspiring the next generation of explorers.
Verification: https://t.co/8nok3NP4PW
No recent Favorites. New Favorites will appear here.