

Elevate Your Career with AI & Machine Learning For Dummies PRO and Start mastering the technologies shaping the future—download now and take the next step in your professional journey!
CyberSecurity – What are some things that get a bad rap, but are actually quite secure?
Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.
There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.
1- PGP
PGP is a Form of Minimalism
As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:
- You get from them a PGP identity (public key). How you do that is entirely up to you.
- Your PGP program uses that identity to perform a single public key encryption of a message key.
- Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
- Your correspondent does the opposite operations to get the message.
If you want to sign your message then you:
- Hash the message.
- Do a public key signature operation on the hash and attach the result to the message.
- Your correspondent checks the signature from your PGP identity, which they have acquired somehow.
The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.
As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:
- Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
- A Signal session requires the storage and maintenance of a lot of state information.
- Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
- Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
- Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.
The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.
I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.
2- Very long passwords that are actually a sentence
It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”
3- Writing passwords down.
I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.
We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.
AI-Powered Professional Certification Quiz Platform
Web|iOs|Android|Windows
🚀 Power Your Podcast Like AI Unraveled: Get 20% OFF Google Workspace!
Hey everyone, hope you're enjoying the deep dive on AI Unraveled. Putting these episodes together involves tons of research and organization, especially with complex AI topics.
A key part of my workflow relies heavily on Google Workspace. I use its integrated tools, especially Gemini Pro for brainstorming and NotebookLM for synthesizing research, to help craft some of the very episodes you love. It significantly streamlines the creation process!
Feeling inspired to launch your own podcast or creative project? I genuinely recommend checking out Google Workspace. Beyond the powerful AI and collaboration features I use, you get essentials like a professional email (you@yourbrand.com), cloud storage, video conferencing with Google Meet, and much more.
It's been invaluable for AI Unraveled, and it could be for you too.
Start Your Journey & Save 20%
Google Workspace makes it easy to get started. Try it free for 14 days, and as an AI Unraveled listener, get an exclusive 20% discount on your first year of the Business Standard or Business Plus plan!
Sign Up & Get Your Discount HereUse one of these codes during checkout (Americas Region):
AI- Powered Jobs Interview Warmup For Job Seekers

⚽️Comparative Analysis: Top Calgary Amateur Soccer Clubs – Outdoor 2025 Season (Kids' Programs by Age Group)
Business Standard Plan: 63P4G3ELRPADKQU
Business Standard Plan: 63F7D7CPD9XXUVT
Set yourself up for promotion or get a better job by Acing the AWS Certified Data Engineer Associate Exam (DEA-C01) with the eBook or App below (Data and AI)

Download the Ace AWS DEA-C01 Exam App:
iOS - Android
AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version
Business Standard Plan: 63FLKQHWV3AEEE6
Business Standard Plan: 63JGLWWK36CP7W
Business Plus Plan: M9HNXHX3WC9H7YE
With Google Workspace, you get custom email @yourcompany, the ability to work from anywhere, and tools that easily scale up or down with your needs.
Need more codes or have questions? Email us at info@djamgatech.com.
Did I say passwords? I meant encryption keys.
4- Changing default ports for certain services like dbs
Most of the gangs out there use tools that don’t do a full search, so they go through the default port list
5- MFA in general.
Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.
If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.
If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.
6- Oauth for 3rd party apps.
Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.
7- Two-step verification.
Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.
8-Biometric Authentication.
The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.
Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.
One example of this is https://passage.id/ which is about as secure as you can get.
9- Zoom.
Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.
10- Unplugging the ethernet cable.
11- Browser password managers?
Rant moment: reasons cybersecurity fails
<Rant>
People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.
No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.
This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.
</Rant>
Why do cyber attackers commonly use social engineering attacks?
Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.
Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.
To conclude:
Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.
source: r/cybersecurity
Source: r/cybersecurity
- Server-Side Template Injection (SSTI) ve Client-Side Template Injection (CSTI) Zaafiyetleriby Fatih Erdem (Cybersecurity on Medium) on April 28, 2025 at 6:50 pm
GirişContinue reading on Medium »
- The Crypto War Zone — Weekly “Crypto Security Truths”: Issue 43by Cyber Strategy Institute (Cybersecurity on Medium) on April 28, 2025 at 6:45 pm
$100M Trading Bot Malfunction, 3B+ Gmail Users at Risk, Phishing’s Ruthless Rampage, Scam’s Suspicious Silence, & AI’s Double-Edged SwordContinue reading on Medium »
- Overpass — TryHackme Walkthroughby Alts (Cybersecurity on Medium) on April 28, 2025 at 6:33 pm
https://tryhackme.com/room/overpassContinue reading on Medium »
- Assessing Cybersecurity Knowledge Through Quizzes, Surveys, and Simulated Attacksby Cyber Crew Hub (Cybersecurity on Medium) on April 28, 2025 at 6:29 pm
In today’s digital world, cybersecurity is more important than ever. If you run a business or manage a team, you know that keeping your…Continue reading on Medium »
- A-LISTED TOOLS OFFERED BY THE BEST CYBERSECURITY CERTIFICATIONSby Jennifer Wales (Cybersecurity on Medium) on April 28, 2025 at 6:27 pm
Mastering the highly rated cybersecurity tools is a must to scale your career as a cybersecurity expert. Know popular cybersecurity…Continue reading on Medium »
- Cybersecurity stats of the week (April 21st - 27th)by /u/Narcisians (cybersecurity) on April 28, 2025 at 6:24 pm
Hi guys, I send out a weekly newsletter with the latest cybersecurity vendor reports and research, and thought you might find it useful, so sharing it here. All the reports and research below were published between April 14th - April 20th, 2025. Let me know if I'm missing any. (Honestly, I was surprised by how many reports came out last week!) General Mandiant M-Trends 2025 Report 16th edition of M-Trends. Key stats: Exploits continue to be the most common initial infection vector (33%). Stolen credentials are the second highest initial infection vector, making up 16% of investigations. This rise means stolen credentials were the second most common initial infection vector for the first time in 2024. 55% of threat groups active in 2024 were financially motivated, showing a steady increase. Read the full report here. Verizon 2025 Data Breach Investigations Report Insights into the current cybersecurity landscape. Key stats: Third-party involvement in breaches doubled to 30% in this year's report. There was a 34% surge globally in vulnerability exploitation as an initial attack vector. Ransomware attacks rose by 37% since last year. Read the full report here. Rubrik Zero Labs The State of Data Security in 2025: A Distributed Crisis Insights from 1,600+ IT and security leaders across 10 countries (half of whom were CIOs or CISOs) and Rubrik telemetry data, including an analysis of 5.8 billion total files across cloud and SaaS environments. Key stats: Nearly one fifth of organizations globally experienced more than 25 cyberattacks in 2024 alone. This equates to an average of at least one breach every other week. Nearly three-quarters (74%) of respondents said threat actors were able to partially compromise backup and recovery systems. 40% of respondents reported increased security costs as a consequence of a cyber attack. Read the full report here. Netwrix 2025 Cybersecurity Trends Report Insight into how organizations are evolving their approach to cybersecurity as AI adoption grows. Based on a survey of 2,150 IT professionals from 121 countries. Their answers were compared to the results of Netwrix’s Security Trends Reports from 2024, 2023 and 2020 and Cloud Data Security Reports from 2022 and 2020. Key stats: 37% of respondents say that new AI-driven threats forced them to adjust their security approach. 30% of respondents report the emergence of a new attack surface due to the use of AI by their business users. 29% of organizations struggle with compliance since auditors require proof of data security and privacy in AI-based systems. Read the full report here. Ransomware Veeam 2025 Ransomware Trends & Proactive Strategies How Chief Information Security Officers (CISOs), security professionals, and IT leaders are recovering from cyber-threats. Key stats: The percentage of companies impacted by ransomware attacks has slightly declined from 75% to 69%. Of organizations that were attacked by ransomware, only 10% recovered more than 90% of their data. Of organizations that paid a ransom, 82% paid less than the initial ransom. Read the full report here. NCC Group Monthly Threat Pulse – Review of March 2025 Review of March 2025. Key stats: Ransomware cases globally dipped by 32% in March (600 attacks) compared to February. Babuk2 was the most active threat group, responsible for 14% of all attacks in March. Babuk2 drove ransomware activity with 84 attacks in March. This represents a 37% increase for Babuk2 from January (61 attacks). 75% of all global cases took place in North America and Europe combined in March. Read the full report here. Industry-specific KnowBe4 Could Cyberattacks Turn the Lights Off In Europe? How Europe's transition to renewable energy is expanding the region's attack surface. Key stats: The energy sector reported three times more operational technology (OT)/industrial control system (ICS) cyber incidents than any other industry in 2023. Phishing was behind 34% of attacks reported in the energy sector. 94% of energy firms are pushing to adopt AI-driven cybersecurity due to revenue losses and disruptions caused by ransomware and phishing. Read the full report here. AI Cyberhaven 2025 AI Adoption and Risk Report Trends in workplace AI adoption and associated data security risks based on the AI usage patterns of 7 million workers. Key stats: Cyberhaven's assessment of over 700 AI tools found that a troubling 71.7% fall into high or critical risk categories. 34.4% of AI tools have user data accessible to third parties without adequate controls. 83.8% of enterprise data input into AI tools flows to platforms classified as medium, high, or critical risk. Read the full report here. Wallarm The Rise of Agentic AI API ThreatsStats Report Q1 2025 A deep dive into GitHub security issues going back to 2019 for Agentic repositories and analysis of API breaches that occurred in Q1 2025. Key stats: Of the 2,869 security issues analysed in Agentic AI projects, the majority were API-related (65%). 25% of reported security issues in Agentic AI remain open. Some open security issues in Agentic AI are lingering for 1,200-plus days. Read the full report here. BlinkOps 2025 State of AI-Driven Security Automation Survey of more than 1,000 security practitioners and decision-makers on the value of AI-driven automation and autonomous agents and the execution challenges. Key stats: 81% of security leaders state that AI-driven automation is a top priority for their strategy over the next 3 to 5 years. 45% of organizations took up to three months to implement their most recent automation. Only 3% of organizations have ruled out autonomous AI entirely. Read the full report here. Metomic 2025 State of Data Security Report: Top Priorities, Challenges and Concerns for Today's CISOs How 404 leaders face AI risks, shifting threats, and resource gaps. Key stats: 68% of organizations surveyed have experienced data leakage incidents specifically related to employees sharing sensitive information with AI tools. Only 23% of organizations surveyed have implemented comprehensive AI security policies. Despite regularly experiencing malware and phishing incidents, 90% of respondents expressed confidence in their organizations' security measures. Read the full report here. Skyhigh Security 2025 Cloud Adoption and Risk Report Powered by anonymized telemetry data across 3M+ users, 40,000+ cloud services, and 2B+ daily events. Key stats: Less than 10% of enterprises have implemented data protection policies and controls for AI applications. 94% of all AI services are at risk for at least one of the top Large Language Model (LLM) risk vectors, including prompt injection/jailbreak, malware generation, toxicity, and bias. 95% of AI applications are at medium or high risk for EU GDPR violation. Read the full report here. Backslash Security Can AI “Vibe Coding” Be Trusted? It Depends… Backslash Security selected seven current versions of OpenAI’s GPT, Anthropic's Claude and Google’s Gemini to test the influence varying prompting techniques had on their ability to produce secure code. Three tiers of prompting techniques, ranging from "naive" to “comprehensive,” were used to generate code for everyday use cases. Key stats: In response to simple, “naive” prompts, all LLMs tested generated insecure code vulnerable to at least 4 of the 10 common CWEs. Prompts specifying a need for security or requesting OWASP best practices produced more secure results, yet still yielded some code vulnerabilities for 5 out of the 7 LLMs tested. OpenAI’s GPT-4o had the lowest performance, scoring a 1/10 secure code result using "naive" prompts. Read the full report here. Resemble AI Q1 2025 AI Deepfake Threats: Critical Enterprise Security Insights & Mitigation Strategies Synthetic media threats and enterprise security implications. Key stats: 18% of deepfakes target organizations. 46% of deepfakes are distributed through video. 23% of deepfakes are Financial Scams and Fraud. Read the full report here. Other Cloud Security Alliance State of SaaS Security Report: Trends and Insights for 2025-2026 Current state of SaaS security. Key stats: SaaS security is a top priority for 86% of organisations. 76% of respondents said they are increasing their budgets this year. 57% of organisations reported they are grappling with fragmented SaaS security administration. Read the full report here. Kensington Cost of Device Theft A survey of 1,000 IT decision-makers in the U.S. and Europe on the impacts on the business operations caused by device thefts and resulting data breaches. Key stats: 76% of IT decision-makers in the U.S. and Europe have been impacted by incidents of device theft in the past two years. 27% of respondents reported data breaches caused by stolen devices. 22% of respondents stated concern about the loss of sensitive data due to insecure home networks. Read the full report here. Exabeam From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025 Gaps between executive confidence in artificial intelligence (AI) and the daily reality experienced by front-line security analysts. Plus, regional disparities in the adoption of AI and its impact on productivity. Key stats: 71% of executives report AI-driven productivity gains. Only 22% of analysts agree that AI has significantly improved productivity across their security teams. Only 29% of teams trust AI to act on its own. Read the full report here. Akamai State of Apps and API Security 2025: How AI Is Shifting the Digital Terrain Insights into web attacks and attack trends by region and industry. Key stats: There were 311 billion web attacks in 2024. This represents a 33% year-over-year increase in web attacks. There were more than 230 billion web attacks targeting commerce organisations, making it the most impacted industry. This is nearly triple the number of attacks experienced by high technology (the second most attacked sector). Growth in security alerts related to the MITRE security framework are up 30% Read the full report here. CyberArk 2025 Identity Security Landscape Survey of private and public sector organizations of 500 employees and above. Key stats: There are 82 machine identities for every human in organizations worldwide. Nearly half (42%) of machine identities have sensitive or privileged access. 88% of respondents say that, in their organization, the definition of a ‘privileged user’ applies solely to human identities. Read the full report here. Cymulate Threat Exposure Validation Impact Report 2025 A survey of 1,000 security leaders, SecOps practitioners, and red and blue teamers from around the world to assess how they engage in security validation across cloud, on-premises and hybrid environments. Key stats: 71% of those surveyed consider threat exposure validation to be “absolutely essential”. 98% of organizations plan to invest in exposure management in the future. Almost two-thirds (approximately 66%) of security leaders say that missing exposures due to manual pen testing is an issue. Read the full report here. Bitwarden World Password Day 2025 Survey Annual global survey of over 2,300 employed adults in the United States, Australia, the United Kingdom, Germany, France, and Japan Key stats: 71% of those surveyed consider threat exposure validation to be “absolutely essential”. 98% of organizations plan to invest in exposure management in the future. Almost two-thirds (approximately 66%) of security leaders say that missing exposures due to manual pen testing is an issue. Read the full report here. N-able The 2025 State of the SOC Report Real-world insights from Adlumin Managed Detection and Response (MDR). Key stats: AI now pulls indicators of compromise (IOCs) in as quickly as 10 seconds. 86% of security alerts escalate into tickets, which indicates that most alerts still require human validation. AI can automate 70% of all incident investigations and threat remediation activity. Read the full report here. FBI Internet Crime Complaint Center Report Information from 859,532 complaints of suspected Internet crime. Key stats: The FBI received 859,532 complaints in total in 2024. The FBI received 64,882 complaints about personal data breach in 2024 (versus 55,851 in 2023 and 58,859 in 2022). FBI's Internet Crime Report 2024 recorded $16.6 billion in cybercrime losses. Read the full report here. Barclays Scams Bulletin: Romance scam reports rise 20 per cent as online dating hits 30-year anniversary Romance scam insights. Key stats: In the first quarter of 2025, romance scam reports were up 20 per cent year-on-year compared to Q1 2024. The average amount lost to a romance scam in 2024 was £8,000. This is up from just under £5,800 in 2023. A third (32 per cent) of those targeted by a romance scam said the scammer created a false sense of urgency. Read the full report here. You can get this kind of data in your inbox if you'd like here: A newsletter about cybersecurity statistics I also do a monthly statistics round-up (due to come out tomorrow). submitted by /u/Narcisians [link] [comments]
- Local File Inclusion (LFI) vs Remote File Inclusion (RFI)by Adham Hashem (Cybersecurity on Medium) on April 28, 2025 at 6:22 pm
LFI (Local File Inclusion) and RFI (Remote File Inclusion) are web application vulnerabilities that allow attackers to include files in a…Continue reading on Medium »
- Your Password Won’t Save You — Here’s What Actually Keeps You Safe Onlineby Giridharan P (Security on Medium) on April 28, 2025 at 6:21 pm
Let’s be real: “123456” is not a security strategy. But even a strong password isn’t the digital force field you might think it is.Continue reading on Medium »
- Your Password Won’t Save You — Here’s What Actually Keeps You Safe Onlineby Giridharan P (Cybersecurity on Medium) on April 28, 2025 at 6:21 pm
Let’s be real: “123456” is not a security strategy. But even a strong password isn’t the digital force field you might think it is.Continue reading on Medium »
- CVE-2025–27556 | Django — Windows’ta LoginView, LogoutView ve set_language() üzerinde Potansiyel…by Yunus Olçar (Cybersecurity on Medium) on April 28, 2025 at 6:20 pm
Hey, selam. 2 Nisan’da çıkmış olan bu güvenlik açığına birlikte bakalım. Let’s go🚀Continue reading on Medium »
- From Analysis to Action: A Guide to Decisive Cybersecurity Risk Managementby Darryl MacLeod (Cybersecurity on Medium) on April 28, 2025 at 6:19 pm
Introduction: The Paralysis of PerfectionContinue reading on Medium »
- API Security: Scopes and Claimsby Tihomir Manushev (Security on Medium) on April 28, 2025 at 6:08 pm
The key difference between permissions and identity informationContinue reading on Medium »
- API Security: Scopes and Claimsby Tihomir Manushev (Cybersecurity on Medium) on April 28, 2025 at 6:08 pm
The key difference between permissions and identity informationContinue reading on Medium »
- INDIA is lacking Real Cyber Security Skills | Archan Choudhuryby /u/General_Riju (cybersecurity) on April 28, 2025 at 6:03 pm
submitted by /u/General_Riju [link] [comments]
- European IT professionals fear impact of quantum computing on cybersecurityby /u/donutloop (cybersecurity) on April 28, 2025 at 5:48 pm
submitted by /u/donutloop [link] [comments]
- The Must-Have Data Strategy for Modern Manufacturersby Neha Mashruwala (Security on Medium) on April 28, 2025 at 5:47 pm
The manufacturing world is evolving fast, and much of that shift is being driven by data. With emerging technologies on the rise…Continue reading on Medium »
- The Role of Emotional Intelligence in Modern Security and Public Safety Leadershipby Joseph Lozada (Security on Medium) on April 28, 2025 at 5:30 pm
By Joseph LozadaContinue reading on Medium »
- Why 90% of Go Developers Are Getting Security Wrong (And How You Can Fix It)by The Latency Gambler (Security on Medium) on April 28, 2025 at 5:29 pm
Go (Golang) has earned a reputation for simplicity, performance, and concurrency. But in the rush to ship fast, many developers (even…Continue reading on Medium »
- Will NATO Expand Even Further? What the Future Holdsby Denizgeraslan (Security on Medium) on April 28, 2025 at 5:09 pm
As new threats emerge and old rivalries resurface, NATO’s future path could reshape the balance of power worldwide.Continue reading on Medium »
- Jon DiMaggio on the importance of attribution in stopping ransomwareby /u/NoStarchPress (cybersecurity) on April 28, 2025 at 5:04 pm
A use case connecting BlackCat (formerly DarkSide), RansomHub, and Cicada 3301: https://analyst1.com/the-art-of-attribution-a-ransomware-use-case/ submitted by /u/NoStarchPress [link] [comments]
- Heads up! Kali Linux warns of update failuresby /u/robonova-1 (cybersecurity) on April 28, 2025 at 5:01 pm
"On systems still using the old key, users will see "Missing key 827C8569F2518CC677FECA1AED65462EC8D5E4C5, which is needed to verify signature" when trying to get the list of latest software packages." "In the coming day(s), pretty much every Kali system out there will fail to update. [..] This is not only you, this is for everyone, and this is entirely our fault. We lost access to the signing key of the repository, so we had to create a new one," the company said." https://www.bleepingcomputer.com/news/linux/kali-linux-warns-of-update-failures-after-losing-repo-signing-key/ submitted by /u/robonova-1 [link] [comments]
- What are the best books/resources i could use to learn computer architecture?by /u/Horror-Tank-5643 (cybersecurity) on April 28, 2025 at 4:51 pm
I want some resource that doesn't go too deep into the math behind everything, i just need a full overview on topics like instruction set architecture, virtual memory and assembly. I want to build a fairly strong foundation before i move into things like malware analysis. submitted by /u/Horror-Tank-5643 [link] [comments]
- Ethical Hacker — Discover Your Path to Career Success (2025)by Franklin Rhodes (Security on Medium) on April 28, 2025 at 4:29 pm
Colleagues, did you know that “The ethical hacking certification market size was valued at approximately usd $2.3B in 2024 and is expected…Continue reading on Medium »
- AI Securityby Turingvang (Security on Medium) on April 28, 2025 at 4:11 pm
What is AI Security?Continue reading on Medium »
- Confidential Layer ($CLONE): The Future of Private Blockchain Transactionsby Machacjosef (Security on Medium) on April 28, 2025 at 4:00 pm
As cryptocurrency transactions become increasingly monitored, the demand for tools that ensure privacy is rising. Confidential Layer…Continue reading on Medium »
- Exploring the Future of Smart Homes with SwitchBot Electric Blindsby Asqwfxvxqw (Security on Medium) on April 28, 2025 at 4:00 pm
The smart home industry is rapidly evolving, and one of the standout brands leading the charge is SwitchBot. Their innovative products are…Continue reading on Medium »
- BreachForums shutdown due to discovered MyBB 0day.by /u/catdickNBA (cybersecurity) on April 28, 2025 at 3:30 pm
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hello everyone, We would like to provide an update on recent events over the past two weeks. In or around April 15, we received confirmation of information that we had been suspecting since day 1 - a MyBB 0day. This confirmation came through trusted contacts that we are in touch with, which revealed that our forum (breachforums.st) is subject to infiltration by various agencies and other global law enforcement bodies. Upon learning of this, we immediately took action by shutting down our infrastructure and initiating our incident response procedures. Our findings indicate that, fortunately, our infrastructure were NOT compromised, and no data was infiltrated. Subsequently, we began auditing the MyBB source code and we believe we have identified the PHP exploit. We would like to sincerely apologize to the community and our staff for the lack of communication and transparency during this time. As you can appreciate, given the nature of our work, our priority had to be securing the safety of our infrastructure, staff, and the community above all else. Now that our incident response is complete, we are actively working on a complete rewrite of the forum backend. Finally, we would like to address the growing number of BreachForums clones and the various rumors circulating about us and our administrators. We want to reassure everyone that no members of our team have been arrested, and as previously mentioned, our infrastructure remains secure. We strongly advise against engaging with these BreachForums clones, as they are likely honeypots and cannot be trusted. Please exercise caution and be discerning in whom you trust and which services you use. Thank you for your understanding and continued support. Best regards, BreachForums Administration -----BEGIN PGP SIGNATURE----- iQGzBAEBCgAdFiEE6AwTCKCewa3EGMPwJXiYj2m8o/wFAmgPH6MACgkQJXiYj2m8 o/ygUgwAjO/g2t4uIExjgFJ56AZ8d+hXxmuptGasyX5sVI/f5/6y8hq2STPkp4KZ xX1iOA+vlx+FSjHRx28Pnwyga/6vD/ewS/YxiW+/zNplI+3nWxJF5p2jXo8PbTEy KInTAqUmLll2fiY1vt/2UTXWn2ym6ZdJVfik8e8ABvFSY+WSYlLXe8GOR1VE2V/9 J0fTvMDk29dCqGJDbJAyxCLzNBRcg7tgSmYfudEeTAhqYnzQgxKl2NpgOwnl3jmE cXjJUXobfXhJyjl4MS1jAc75tjEEC3whyrw22sN/pT8QBk9tZx9jW7AWVGw9V9Dk gzTKjsDoQEpBLAHI+MzrajaFS8s9j+qFbmVsnVjELR0OI/4EJl3qNw+SfFHHAnSz fQ/GrrYukjgZobPUENQR+i/1VgiZrD9O7vTF6G9uxBhrBiUvJJiePBFBTnx9r4Sh Y/2mG5RadG5U8CILQxAVx+4QveTGIA5He4Qa8Q02SKcnyd5EscWIB0s71i9KwUSd LUgOhAia =58qK -----END PGP SIGNATURE----- submitted by /u/catdickNBA [link] [comments]
- Burnout - Did you switch careers or work through it?by /u/IHadADreamIWasAMeme (cybersecurity) on April 28, 2025 at 2:38 pm
Curious for those of you that have felt burnout working in Cybersecurity have handled it, especially in the last year or so as the market as the overall job market has deteriorated a bit. I've been in Security for about 12 years, and IT for 15+ years. I find myself way less passionate than I was, but I feel stuck because: The money is good - life isn't about this but we all have bills to pay and want to secure our future as best as we can. Job market is kind of trash, so changing disciplines or even careers seems like it might be difficult / risky. Comfortable - I'm fully remote and generally have it pretty easy in my role, but still find myself just feeling meh about it all. Taking PTO has not helped, if anything it makes me long for something more meaningful. I don't know. Just thought I'd ask and maybe get some inspiration or something. submitted by /u/IHadADreamIWasAMeme [link] [comments]
- Final round of interview with a CISOby /u/SpecialHamster6508 (cybersecurity) on April 28, 2025 at 2:15 pm
Hey everyone! I need help. I started interviewing for this company for an internship, and so far, the company is great. The people that I have spoken to are really good at what they do. It's a Security Engineer Internship and I genuinely believe that I would learn a lot during the internship from them and would try my best to contribute throughout the internship, but I have one last hurdle. I have never had a 30-minute interview with a CISO for an internship before, and I don't know what to expect from the interview. I want to ask really good questions, but at the same time, I don't want to ask too generic questions that show that I haven't done any research on the team and company. I don't know what team I'll be working with, but I also don't know what some good questions to ask a CISO are. submitted by /u/SpecialHamster6508 [link] [comments]
- VeriSource Breach Exposes Personal Data of 4 Million Individualsby /u/yash13 (cybersecurity) on April 28, 2025 at 1:31 pm
submitted by /u/yash13 [link] [comments]
- How to Navigate a Career Change from Software Engineering?by /u/BlessED0071 (cybersecurity) on April 28, 2025 at 1:20 pm
Hey everyone, I’ve been working as a software engineer for almost 9 years, mainly with technologies like AWS, Node.js, and React. I’m looking to transition into the cybersecurity field and would love advice on how to make the switch. Thanks submitted by /u/BlessED0071 [link] [comments]
- SMB SIEMby /u/Top_Sink9871 (cybersecurity) on April 28, 2025 at 1:04 pm
Recommendations for SMB SIEM. Currently using ME Event Log Analyzer (LOG360). It's pretty good for the money certainly. However, looking for a more 'mainstream' provider. Thanks! submitted by /u/Top_Sink9871 [link] [comments]
- Cyber Criminals Exploit Pope Francis Death to Launch Global Scamsby /u/barbralodge (cybersecurity) on April 28, 2025 at 12:50 pm
submitted by /u/barbralodge [link] [comments]
- I built a chrome extension that detects and redacts sensitive information from your AI promptsby /u/fxnnur (cybersecurity) on April 28, 2025 at 12:44 pm
It seems like a lot more people are becoming increasingly privacy conscious in their interactions with generative AI chatbots like ChatGPT, Gemini, etc. This seems to be a topic that people are talking more frequently, as more people are learning the risks of exposing sensitive information to these tools. This prompted me to create Redactifi - a browser extension designed to detect and redact sensitive information from your AI prompts. It has a built in ML model and also uses advanced pattern recognition. This means that all processing happens locally on your device. Any thoughts/feedback would be greatly appreciated. Check it out here: https://chromewebstore.google.com/detail/hglooeolkncknocmocfkggcddjalmjoa?utm_source=item-share-cb submitted by /u/fxnnur [link] [comments]
- Redditers what helped you boost up your cyber security career?by /u/Nasdaq_Saver (cybersecurity) on April 28, 2025 at 12:00 pm
submitted by /u/Nasdaq_Saver [link] [comments]
- CEO Charged With Installing Malware on Hospital Computersby /u/rdm81 (cybersecurity) on April 28, 2025 at 10:58 am
https://securityaffairs.com/177020/cyber-crime/ceo-of-cybersecurity-firm-charged-with-installing-malware-on-hospital-systems.html?amp submitted by /u/rdm81 [link] [comments]
- The Vatican, a cybersecurity powerhouseby /u/Party_Wolf6604 (cybersecurity) on April 28, 2025 at 10:45 am
submitted by /u/Party_Wolf6604 [link] [comments]
- Should I leave my job?by /u/Ok-Atmosphere262 (cybersecurity) on April 28, 2025 at 10:15 am
Hi everyone. I want to look for a new job in cyber security but I'm scared of the current market and not finding something stable. First here is a bit about me: I work in a 4-year college in vulnerability management for about 3 years now. My salary is 73k. I have a masters degree in cyber security from WGU and have the sec+, net+, cysa+, secx, SAL1, and az-900 certifications. My job is VERY comfy. I work for about 2 hours and the rest of the day I study for new certifications or watch YouTube videos. I have zero stress at my job which allows me to focus on my health and wellness. It's a very stable job and I have great benefits as part of a union. Unfortunately, the job doesn't pay enough. I just got married and we are planning to buy a house and have a kid. I'm looking at other opportunities but all I see are contact jobs for 3-6 months. Even though they pay more they are not stable. I could just stick it out at my current easy job and wait for pay raises which will happen. Eventually the 3% raise every year will become a six figure salary even if it takes a while. Or I could get a new job that pays well but might not be as stable with alot more stress. What do you guys think and what would you do in my shoes? submitted by /u/Ok-Atmosphere262 [link] [comments]
- Built a threat search engine for cybersecurity investigations — Would love your feedback!by /u/Distinct_Staff_422 (cybersecurity) on April 28, 2025 at 9:57 am
Hey everyone, I recently launched a project I’ve been working on: xdscvr.com! It’s a threat search engine that searches the web and provides a summary for each result, contextually based on your query. Here are some example use cases: • Is there a known public exploit for CVE-2025-2783? • Has the vendor released a patch or workaround for CVE-2025-2783? • Threat actor groups associated with Akira ransomware • MITRE ATT&CK mapping for the Akira threat I built it because I wanted a faster way to gather threat intel without opening 10+ tabs every time. I’m still developing and enhancing it, and I highly value your feedback: Would you use it? What features would you want added? Any ways to make it better before turning it into a full product? Appreciate any thoughts or ideas! submitted by /u/Distinct_Staff_422 [link] [comments]
- Useful info on criminal misuse of google geminiby /u/bfeebabes (cybersecurity) on April 28, 2025 at 7:05 am
This article and report provides useful facts on misuse. TLDR: Fairly simple use cases rather than the sexed up ones in the media. submitted by /u/bfeebabes [link] [comments]
- What's collaboration like within your cyber team?by /u/reddrag0n51 (cybersecurity) on April 28, 2025 at 6:49 am
I almost never hear of "collaborative security". everyone is so focused on their own isolated role that it feels like collaboration between internal and external teams is left down to the manager's ability to streamline communication and intelligence sharing. wondering how your team handles it right now and whether it's a problem you currently have? if so, how damaging has it been? or do you just deal with it? submitted by /u/reddrag0n51 [link] [comments]
- Future of cybersecurity toolingby /u/paddle7 (cybersecurity) on April 28, 2025 at 2:01 am
Hi all - I'm curious to see what people think will be the next big tool or attack vector. For example, SIEM was huge, EDR was huge, ITDR is growing, and AI is about to boom. What's next for cybersecurity and are there any companies doing what is about to be next? submitted by /u/paddle7 [link] [comments]
- Mentorship Monday - Post All Career, Education and Job questions here!by /u/AutoModerator (cybersecurity) on April 28, 2025 at 12:00 am
This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]
- The 200+ Sites an ICE Surveillance Contractor is Monitoringby /u/FervidBug42 (cybersecurity) on April 27, 2025 at 11:30 pm
submitted by /u/FervidBug42 [link] [comments]
- I Created the Ultimate Cybersecurity Mastery Roadmap (FREE & Open Source!)by /u/hamedessamdev (cybersecurity) on April 27, 2025 at 6:56 pm
Hey everyone 👋, I'm excited to share a project I've been working hard on: Cybersecurity Mastery Roadmap It's a step-by-step, beginner-to-expert roadmap packed with: Curated learning resources Recommended tools Study plans and certifications guide Hands-on labs and practice environments Career paths and specialization tracks Capture The Flag (CTF) competitions to sharpen your skills Top cybersecurity communities you should join Check it out here: https://github.com/Hamed233/Cybersecurity-Mastery-Roadmap submitted by /u/hamedessamdev [link] [comments]
- How do you respond to “Can you hack Instagram accounts?” when you tell someone you’re in cyber security?by /u/skylight269 (cybersecurity) on April 27, 2025 at 4:28 pm
T submitted by /u/skylight269 [link] [comments]
What is Google Workspace?
Google Workspace is a cloud-based productivity suite that helps teams communicate, collaborate and get things done from anywhere and on any device. It's simple to set up, use and manage, so your business can focus on what really matters.
Watch a video or find out more here.
Here are some highlights:
Business email for your domain
Look professional and communicate as you@yourcompany.com. Gmail's simple features help you build your brand while getting more done.
Access from any location or device
Check emails, share files, edit documents, hold video meetings and more, whether you're at work, at home or on the move. You can pick up where you left off from a computer, tablet or phone.
Enterprise-level management tools
Robust admin settings give you total command over users, devices, security and more.
Sign up using my link https://referworkspace.app.goo.gl/Q371 and get a 14-day trial, and message me to get an exclusive discount when you try Google Workspace for your business.
Google Workspace Business Standard Promotion code for the Americas
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
Email me for more promo codes
Active Hydrating Toner, Anti-Aging Replenishing Advanced Face Moisturizer, with Vitamins A, C, E & Natural Botanicals to Promote Skin Balance & Collagen Production, 6.7 Fl Oz
Age Defying 0.3% Retinol Serum, Anti-Aging Dark Spot Remover for Face, Fine Lines & Wrinkle Pore Minimizer, with Vitamin E & Natural Botanicals
Firming Moisturizer, Advanced Hydrating Facial Replenishing Cream, with Hyaluronic Acid, Resveratrol & Natural Botanicals to Restore Skin's Strength, Radiance, and Resilience, 1.75 Oz
Skin Stem Cell Serum
Smartphone 101 - Pick a smartphone for me - android or iOS - Apple iPhone or Samsung Galaxy or Huawei or Xaomi or Google Pixel
Can AI Really Predict Lottery Results? We Asked an Expert.
Djamgatech

Read Photos and PDFs Aloud for me iOS
Read Photos and PDFs Aloud for me android
Read Photos and PDFs Aloud For me Windows 10/11
Read Photos and PDFs Aloud For Amazon
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more)
Get 20% off Google Google Workspace (Google Meet) Standard Plan with the following codes: 96DRHDRA9J7GTN6(Email us for more)
AI-Powered Professional Certification Quiz Platform
Web|iOs|Android|Windows
FREE 10000+ Quiz Trivia and and Brain Teasers for All Topics including Cloud Computing, General Knowledge, History, Television, Music, Art, Science, Movies, Films, US History, Soccer Football, World Cup, Data Science, Machine Learning, Geography, etc....

List of Freely available programming books - What is the single most influential book every Programmers should read
- Bjarne Stroustrup - The C++ Programming Language
- Brian W. Kernighan, Rob Pike - The Practice of Programming
- Donald Knuth - The Art of Computer Programming
- Ellen Ullman - Close to the Machine
- Ellis Horowitz - Fundamentals of Computer Algorithms
- Eric Raymond - The Art of Unix Programming
- Gerald M. Weinberg - The Psychology of Computer Programming
- James Gosling - The Java Programming Language
- Joel Spolsky - The Best Software Writing I
- Keith Curtis - After the Software Wars
- Richard M. Stallman - Free Software, Free Society
- Richard P. Gabriel - Patterns of Software
- Richard P. Gabriel - Innovation Happens Elsewhere
- Code Complete (2nd edition) by Steve McConnell
- The Pragmatic Programmer
- Structure and Interpretation of Computer Programs
- The C Programming Language by Kernighan and Ritchie
- Introduction to Algorithms by Cormen, Leiserson, Rivest & Stein
- Design Patterns by the Gang of Four
- Refactoring: Improving the Design of Existing Code
- The Mythical Man Month
- The Art of Computer Programming by Donald Knuth
- Compilers: Principles, Techniques and Tools by Alfred V. Aho, Ravi Sethi and Jeffrey D. Ullman
- Gödel, Escher, Bach by Douglas Hofstadter
- Clean Code: A Handbook of Agile Software Craftsmanship by Robert C. Martin
- Effective C++
- More Effective C++
- CODE by Charles Petzold
- Programming Pearls by Jon Bentley
- Working Effectively with Legacy Code by Michael C. Feathers
- Peopleware by Demarco and Lister
- Coders at Work by Peter Seibel
- Surely You're Joking, Mr. Feynman!
- Effective Java 2nd edition
- Patterns of Enterprise Application Architecture by Martin Fowler
- The Little Schemer
- The Seasoned Schemer
- Why's (Poignant) Guide to Ruby
- The Inmates Are Running The Asylum: Why High Tech Products Drive Us Crazy and How to Restore the Sanity
- The Art of Unix Programming
- Test-Driven Development: By Example by Kent Beck
- Practices of an Agile Developer
- Don't Make Me Think
- Agile Software Development, Principles, Patterns, and Practices by Robert C. Martin
- Domain Driven Designs by Eric Evans
- The Design of Everyday Things by Donald Norman
- Modern C++ Design by Andrei Alexandrescu
- Best Software Writing I by Joel Spolsky
- The Practice of Programming by Kernighan and Pike
- Pragmatic Thinking and Learning: Refactor Your Wetware by Andy Hunt
- Software Estimation: Demystifying the Black Art by Steve McConnel
- The Passionate Programmer (My Job Went To India) by Chad Fowler
- Hackers: Heroes of the Computer Revolution
- Algorithms + Data Structures = Programs
- Writing Solid Code
- JavaScript - The Good Parts
- Getting Real by 37 Signals
- Foundations of Programming by Karl Seguin
- Computer Graphics: Principles and Practice in C (2nd Edition)
- Thinking in Java by Bruce Eckel
- The Elements of Computing Systems
- Refactoring to Patterns by Joshua Kerievsky
- Modern Operating Systems by Andrew S. Tanenbaum
- The Annotated Turing
- Things That Make Us Smart by Donald Norman
- The Timeless Way of Building by Christopher Alexander
- The Deadline: A Novel About Project Management by Tom DeMarco
- The C++ Programming Language (3rd edition) by Stroustrup
- Patterns of Enterprise Application Architecture
- Computer Systems - A Programmer's Perspective
- Agile Principles, Patterns, and Practices in C# by Robert C. Martin
- Growing Object-Oriented Software, Guided by Tests
- Framework Design Guidelines by Brad Abrams
- Object Thinking by Dr. David West
- Advanced Programming in the UNIX Environment by W. Richard Stevens
- Hackers and Painters: Big Ideas from the Computer Age
- The Soul of a New Machine by Tracy Kidder
- CLR via C# by Jeffrey Richter
- The Timeless Way of Building by Christopher Alexander
- Design Patterns in C# by Steve Metsker
- Alice in Wonderland by Lewis Carol
- Zen and the Art of Motorcycle Maintenance by Robert M. Pirsig
- About Face - The Essentials of Interaction Design
- Here Comes Everybody: The Power of Organizing Without Organizations by Clay Shirky
- The Tao of Programming
- Computational Beauty of Nature
- Writing Solid Code by Steve Maguire
- Philip and Alex's Guide to Web Publishing
- Object-Oriented Analysis and Design with Applications by Grady Booch
- Effective Java by Joshua Bloch
- Computability by N. J. Cutland
- Masterminds of Programming
- The Tao Te Ching
- The Productive Programmer
- The Art of Deception by Kevin Mitnick
- The Career Programmer: Guerilla Tactics for an Imperfect World by Christopher Duncan
- Paradigms of Artificial Intelligence Programming: Case studies in Common Lisp
- Masters of Doom
- Pragmatic Unit Testing in C# with NUnit by Andy Hunt and Dave Thomas with Matt Hargett
- How To Solve It by George Polya
- The Alchemist by Paulo Coelho
- Smalltalk-80: The Language and its Implementation
- Writing Secure Code (2nd Edition) by Michael Howard
- Introduction to Functional Programming by Philip Wadler and Richard Bird
- No Bugs! by David Thielen
- Rework by Jason Freid and DHH
- JUnit in Action
#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks
Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA

Health Health, a science-based community to discuss human health
- Ultra-processed foods tied to 124,000 premature deaths over 2 years in U.S., study findsby /u/HellYeahDamnWrite on April 28, 2025 at 10:28 am
submitted by /u/HellYeahDamnWrite [link] [comments]
- Eating more ultra-processed foods linked to higher risk of early deathby /u/euronews-english on April 28, 2025 at 10:23 am
submitted by /u/euronews-english [link] [comments]
- Being shouted at by parents can alter child’s brain, experts tell UK MPsby /u/BiggieTwiggy1two3 on April 28, 2025 at 7:23 am
submitted by /u/BiggieTwiggy1two3 [link] [comments]
- Tom's Guide: Keep waking up after just 6 hours of sleep? Experts reveal 3 common reasons whyby /u/Mr_Guavo on April 28, 2025 at 1:25 am
submitted by /u/Mr_Guavo [link] [comments]
- For some cancer patients, immunotherapy may be way to skip surgery and chemoby /u/nbcnews on April 27, 2025 at 5:24 pm
submitted by /u/nbcnews [link] [comments]
Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.
- TIL: The entire energy released by the Hiroshima nuclear explosion came from only 0.5g of Uraniumby /u/siorge on April 28, 2025 at 10:25 am
submitted by /u/siorge [link] [comments]
- (TIL) That a woman who wrote a book called "How to murder your husband" was arrested for murdering her husbandby /u/Pisford on April 28, 2025 at 8:19 am
submitted by /u/Pisford [link] [comments]
- TIL in 1991, 60 minutes suggested red wine was the reason for the 'French Paradox' (the French had lower rates of heart disease than Americans despite both having high-fat diets). The day after it aired, all US airlines ran out of red wine & over the next month, red wine sales in the US spiked 44%.by /u/tyrion2024 on April 28, 2025 at 7:51 am
submitted by /u/tyrion2024 [link] [comments]
- TIL about the water-level task, which was originally used as a test for childhood cognitive development. It was later found that a surprisingly high number of college students would fail the task.by /u/Finngolian_Monk on April 28, 2025 at 7:24 am
submitted by /u/Finngolian_Monk [link] [comments]
- TIL the speed limit for trucks on the German Autobahn is 80 km/h (50 mph), slower than in all US states.by /u/Elysion_21 on April 28, 2025 at 6:37 am
submitted by /u/Elysion_21 [link] [comments]
Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.
- Pets found to deliver significant health benefits to the lonely | Group activities with a focus on pets foster more meaningful connections.by /u/chrisdh79 on April 28, 2025 at 10:09 am
submitted by /u/chrisdh79 [link] [comments]
- Ultra-processed foods (UPFs) tied to 124,000 premature deaths over 2 years in US. UPFs include preservatives, emulsifiers and sweeteners. Sugary drinks, sweets, chocolates, pizzas, hamburgers, chicken nuggets are defined as UPFs. By 2018, UPFs made up more than half total dietary energy in the US.by /u/mvea on April 28, 2025 at 9:12 am
submitted by /u/mvea [link] [comments]
- Industrial waste is turning to rock in just decades. The rapid and unplanned-for development of rock around industrial waste sites could have negative impacts on ecosystems and biodiversity, as well as coastal management and land planning.by /u/Wagamaga on April 28, 2025 at 8:37 am
submitted by /u/Wagamaga [link] [comments]
- Foods like Milk, Lactuca sativa (Lettuce), Ginseng, Schisandra chinensis, and Juglans regia (Walnuts) are suggested to have the potential to improve sleep, mainly by influencing brain chemicals such as GABA and serotoninby /u/johnhemingwayscience on April 28, 2025 at 8:08 am
submitted by /u/johnhemingwayscience [link] [comments]
- Non-alcoholic wines offer the potential health perks of regular wine without the alcohol risks, but making them taste just as good is still a key challenge researchers are working onby /u/johnhemingwayscience on April 28, 2025 at 8:05 am
submitted by /u/johnhemingwayscience [link] [comments]
Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, and leagues around the world.
- Heat’s Kevin Love announces the passing of his father, former NBA player Stan Loveby /u/Subject-Property-343 on April 28, 2025 at 2:59 am
submitted by /u/Subject-Property-343 [link] [comments]
- Awkward moment when Seahawks GM and Head Coach deny telling Jalen Milroe he was the best QB in the draft at his 30-visit after Milroe told the media they did. Milroe was drafted with the 92nd overall pickby /u/Subject-Property-343 on April 28, 2025 at 2:56 am
submitted by /u/Subject-Property-343 [link] [comments]
- Bucks Damian Lillard helped off court after non-contact leg injuryby /u/Oldtimer_2 on April 28, 2025 at 2:18 am
submitted by /u/Oldtimer_2 [link] [comments]
- Giants get walk-off win vs Texas on this infield hit turned "Little League" style home runby /u/Oldtimer_2 on April 28, 2025 at 12:24 am
submitted by /u/Oldtimer_2 [link] [comments]
- Timberwolves push Lakers to edge of elimination with 116-113 comeback win behind Edwards' 43 pointsby /u/Oldtimer_2 on April 27, 2025 at 10:55 pm
submitted by /u/Oldtimer_2 [link] [comments]