CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

CyberSecurity - What are some things that get a bad rap, but are actually quite secure?

CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.

There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.

1- PGP

PGP is a Form of Minimalism

As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:

  1. You get from them a PGP identity (public key). How you do that is entirely up to you.
  2. Your PGP program uses that identity to perform a single public key encryption of a message key.
  3. Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
  4. Your correspondent does the opposite operations to get the message.

If you want to sign your message then you:

  1. Hash the message.
  2. Do a public key signature operation on the hash and attach the result to the message.
  3. Your correspondent checks the signature from your PGP identity, which they have acquired somehow.

The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.

As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:

  • Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
  • A Signal session requires the storage and maintenance of a lot of state information.
  • Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
  • Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
  • Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.

The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.

I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.

2- Very long passwords that are actually a sentence

It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”

3- Writing passwords down.

I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.

We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.

AI-Powered Professional Certification Quiz Platform
Crack Your Next Exam with Djamgatech AI Cert Master

Web|iOs|Android|Windows

🚀 Power Your Podcast Like AI Unraveled: Get 20% OFF Google Workspace!

Hey everyone, hope you're enjoying the deep dive on AI Unraveled. Putting these episodes together involves tons of research and organization, especially with complex AI topics.

A key part of my workflow relies heavily on Google Workspace. I use its integrated tools, especially Gemini Pro for brainstorming and NotebookLM for synthesizing research, to help craft some of the very episodes you love. It significantly streamlines the creation process!

Feeling inspired to launch your own podcast or creative project? I genuinely recommend checking out Google Workspace. Beyond the powerful AI and collaboration features I use, you get essentials like a professional email (you@yourbrand.com), cloud storage, video conferencing with Google Meet, and much more.

It's been invaluable for AI Unraveled, and it could be for you too.

Start Your Journey & Save 20%

Google Workspace makes it easy to get started. Try it free for 14 days, and as an AI Unraveled listener, get an exclusive 20% discount on your first year of the Business Standard or Business Plus plan!

Sign Up & Get Your Discount Here

Use one of these codes during checkout (Americas Region):

Business Standard Plan: 63P4G3ELRPADKQU

Business Standard Plan: 63F7D7CPD9XXUVT

Business Standard Plan: 63FLKQHWV3AEEE6

Business Standard Plan: 63JGLWWK36CP7W

Business Plus Plan: M9HNXHX3WC9H7YE

With Google Workspace, you get custom email @yourcompany, the ability to work from anywhere, and tools that easily scale up or down with your needs.

Need more codes or have questions? Email us at .

Did I say passwords? I meant encryption keys.

4- Changing default ports for certain services like dbs

Most of the gangs out there use tools that don’t do a full search, so they go through the default port list


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Gemini, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

Pass the AWS Certified Machine Learning Specialty Exam with Flying Colors: Master Data Engineering, Exploratory Data Analysis, Modeling, Machine Learning Implementation, Operations, and NLP with 3 Practice Exams. Get the MLS-C01 Practice Exam book Now!

5- MFA in general.

Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.

If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.

If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.

6- Oauth for 3rd party apps.

Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.

7- Two-step verification.

Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.

8-Biometric Authentication.

The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.

Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.

One example of this is https://passage.id/ which is about as secure as you can get.

9- Zoom.

Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.

10- Unplugging the ethernet cable.

11- Browser password managers?

Rant moment: reasons cybersecurity fails

<Rant>

People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.

No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.

This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.

</Rant>

Why do cyber attackers commonly use social engineering attacks?

Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.

Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.

To conclude:

Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.

Source: r/cybersecurity

  • Server-Side Template Injection (SSTI) ve Client-Side Template Injection (CSTI) Zaafiyetleri
    by Fatih Erdem (Cybersecurity on Medium) on April 28, 2025 at 6:50 pm

    GirişContinue reading on Medium »

  • The Crypto War Zone — Weekly “Crypto Security Truths”: Issue 43
    by Cyber Strategy Institute (Cybersecurity on Medium) on April 28, 2025 at 6:45 pm

    $100M Trading Bot Malfunction, 3B+ Gmail Users at Risk, Phishing’s Ruthless Rampage, Scam’s Suspicious Silence, & AI’s Double-Edged SwordContinue reading on Medium »

  • Overpass — TryHackme Walkthrough
    by Alts (Cybersecurity on Medium) on April 28, 2025 at 6:33 pm

    https://tryhackme.com/room/overpassContinue reading on Medium »

  • Assessing Cybersecurity Knowledge Through Quizzes, Surveys, and Simulated Attacks
    by Cyber Crew Hub (Cybersecurity on Medium) on April 28, 2025 at 6:29 pm

    In today’s digital world, cybersecurity is more important than ever. If you run a business or manage a team, you know that keeping your…Continue reading on Medium »

  • A-LISTED TOOLS OFFERED BY THE BEST CYBERSECURITY CERTIFICATIONS
    by Jennifer Wales (Cybersecurity on Medium) on April 28, 2025 at 6:27 pm

    Mastering the highly rated cybersecurity tools is a must to scale your career as a cybersecurity expert. Know popular cybersecurity…Continue reading on Medium »

  • Cybersecurity stats of the week (April 21st - 27th)
    by /u/Narcisians (cybersecurity) on April 28, 2025 at 6:24 pm

    Hi guys, I send out a weekly newsletter with the latest cybersecurity vendor reports and research, and thought you might find it useful, so sharing it here. All the reports and research below were published between April 14th - April 20th, 2025. Let me know if I'm missing any. (Honestly, I was surprised by how many reports came out last week!) General Mandiant M-Trends 2025 Report 16th edition of M-Trends. Key stats: Exploits continue to be the most common initial infection vector (33%). Stolen credentials are the second highest initial infection vector, making up 16% of investigations. This rise means stolen credentials were the second most common initial infection vector for the first time in 2024. 55% of threat groups active in 2024 were financially motivated, showing a steady increase. Read the full report here. Verizon 2025 Data Breach Investigations Report Insights into the current cybersecurity landscape. Key stats: Third-party involvement in breaches doubled to 30% in this year's report. There was a 34% surge globally in vulnerability exploitation as an initial attack vector. Ransomware attacks rose by 37% since last year. Read the full report here. Rubrik Zero Labs The State of Data Security in 2025: A Distributed Crisis Insights from 1,600+ IT and security leaders across 10 countries (half of whom were CIOs or CISOs) and Rubrik telemetry data, including an analysis of 5.8 billion total files across cloud and SaaS environments. Key stats: Nearly one fifth of organizations globally experienced more than 25 cyberattacks in 2024 alone. This equates to an average of at least one breach every other week. Nearly three-quarters (74%) of respondents said threat actors were able to partially compromise backup and recovery systems. 40% of respondents reported increased security costs as a consequence of a cyber attack. Read the full report here. Netwrix 2025 Cybersecurity Trends Report Insight into how organizations are evolving their approach to cybersecurity as AI adoption grows. Based on a survey of 2,150 IT professionals from 121 countries. Their answers were compared to the results of Netwrix’s Security Trends Reports from 2024, 2023 and 2020 and Cloud Data Security Reports from 2022 and 2020. Key stats: 37% of respondents say that new AI-driven threats forced them to adjust their security approach. 30% of respondents report the emergence of a new attack surface due to the use of AI by their business users. 29% of organizations struggle with compliance since auditors require proof of data security and privacy in AI-based systems. Read the full report here. Ransomware Veeam 2025 Ransomware Trends & Proactive Strategies How Chief Information Security Officers (CISOs), security professionals, and IT leaders are recovering from cyber-threats. Key stats: The percentage of companies impacted by ransomware attacks has slightly declined from 75% to 69%. Of organizations that were attacked by ransomware, only 10% recovered more than 90% of their data. Of organizations that paid a ransom, 82% paid less than the initial ransom. Read the full report here. NCC Group Monthly Threat Pulse – Review of March 2025 Review of March 2025. Key stats: Ransomware cases globally dipped by 32% in March (600 attacks) compared to February. Babuk2 was the most active threat group, responsible for 14% of all attacks in March. Babuk2 drove ransomware activity with 84 attacks in March. This represents a 37% increase for Babuk2 from January (61 attacks). 75% of all global cases took place in North America and Europe combined in March. Read the full report here. Industry-specific KnowBe4 Could Cyberattacks Turn the Lights Off In Europe? How Europe's transition to renewable energy is expanding the region's attack surface. Key stats: The energy sector reported three times more operational technology (OT)/industrial control system (ICS) cyber incidents than any other industry in 2023. Phishing was behind 34% of attacks reported in the energy sector. 94% of energy firms are pushing to adopt AI-driven cybersecurity due to revenue losses and disruptions caused by ransomware and phishing. Read the full report here. AI Cyberhaven 2025 AI Adoption and Risk Report Trends in workplace AI adoption and associated data security risks based on the AI usage patterns of 7 million workers. Key stats: Cyberhaven's assessment of over 700 AI tools found that a troubling 71.7% fall into high or critical risk categories. 34.4% of AI tools have user data accessible to third parties without adequate controls. 83.8% of enterprise data input into AI tools flows to platforms classified as medium, high, or critical risk. Read the full report here. Wallarm The Rise of Agentic AI API ThreatsStats Report Q1 2025 A deep dive into GitHub security issues going back to 2019 for Agentic repositories and analysis of API breaches that occurred in Q1 2025. Key stats: Of the 2,869 security issues analysed in Agentic AI projects, the majority were API-related (65%). 25% of reported security issues in Agentic AI remain open. Some open security issues in Agentic AI are lingering for 1,200-plus days. Read the full report here. BlinkOps 2025 State of AI-Driven Security Automation Survey of more than 1,000 security practitioners and decision-makers on the value of AI-driven automation and autonomous agents and the execution challenges. Key stats: 81% of security leaders state that AI-driven automation is a top priority for their strategy over the next 3 to 5 years. 45% of organizations took up to three months to implement their most recent automation. Only 3% of organizations have ruled out autonomous AI entirely. Read the full report here. Metomic 2025 State of Data Security Report: Top Priorities, Challenges and Concerns for Today's CISOs How 404 leaders face AI risks, shifting threats, and resource gaps. Key stats: 68% of organizations surveyed have experienced data leakage incidents specifically related to employees sharing sensitive information with AI tools. Only 23% of organizations surveyed have implemented comprehensive AI security policies. Despite regularly experiencing malware and phishing incidents, 90% of respondents expressed confidence in their organizations' security measures. Read the full report here. Skyhigh Security 2025 Cloud Adoption and Risk Report Powered by anonymized telemetry data across 3M+ users, 40,000+ cloud services, and 2B+ daily events. Key stats: Less than 10% of enterprises have implemented data protection policies and controls for AI applications. 94% of all AI services are at risk for at least one of the top Large Language Model (LLM) risk vectors, including prompt injection/jailbreak, malware generation, toxicity, and bias. 95% of AI applications are at medium or high risk for EU GDPR violation. Read the full report here. Backslash Security Can AI “Vibe Coding” Be Trusted? It Depends… Backslash Security selected seven current versions of OpenAI’s GPT, Anthropic's Claude and Google’s Gemini to test the influence varying prompting techniques had on their ability to produce secure code. Three tiers of prompting techniques, ranging from "naive" to “comprehensive,” were used to generate code for everyday use cases. Key stats: In response to simple, “naive” prompts, all LLMs tested generated insecure code vulnerable to at least 4 of the 10 common CWEs. Prompts specifying a need for security or requesting OWASP best practices produced more secure results, yet still yielded some code vulnerabilities for 5 out of the 7 LLMs tested. OpenAI’s GPT-4o had the lowest performance, scoring a 1/10 secure code result using "naive" prompts. Read the full report here. Resemble AI Q1 2025 AI Deepfake Threats: Critical Enterprise Security Insights & Mitigation Strategies Synthetic media threats and enterprise security implications. Key stats: 18% of deepfakes target organizations. 46% of deepfakes are distributed through video. 23% of deepfakes are Financial Scams and Fraud. Read the full report here. Other Cloud Security Alliance State of SaaS Security Report: Trends and Insights for 2025-2026 Current state of SaaS security. Key stats: SaaS security is a top priority for 86% of organisations. 76% of respondents said they are increasing their budgets this year. 57% of organisations reported they are grappling with fragmented SaaS security administration. Read the full report here. Kensington Cost of Device Theft A survey of 1,000 IT decision-makers in the U.S. and Europe on the impacts on the business operations caused by device thefts and resulting data breaches. Key stats: 76% of IT decision-makers in the U.S. and Europe have been impacted by incidents of device theft in the past two years. 27% of respondents reported data breaches caused by stolen devices. 22% of respondents stated concern about the loss of sensitive data due to insecure home networks. Read the full report here. Exabeam From Hype to Help: How AI Is (Really) Transforming Cybersecurity in 2025 Gaps between executive confidence in artificial intelligence (AI) and the daily reality experienced by front-line security analysts. Plus, regional disparities in the adoption of AI and its impact on productivity. Key stats: 71% of executives report AI-driven productivity gains. Only 22% of analysts agree that AI has significantly improved productivity across their security teams. Only 29% of teams trust AI to act on its own. Read the full report here. Akamai State of Apps and API Security 2025: How AI Is Shifting the Digital Terrain Insights into web attacks and attack trends by region and industry. Key stats: There were 311 billion web attacks in 2024. This represents a 33% year-over-year increase in web attacks. There were more than 230 billion web attacks targeting commerce organisations, making it the most impacted industry. This is nearly triple the number of attacks experienced by high technology (the second most attacked sector). Growth in security alerts related to the MITRE security framework are up 30% Read the full report here. CyberArk 2025 Identity Security Landscape Survey of private and public sector organizations of 500 employees and above. Key stats: There are 82 machine identities for every human in organizations worldwide. Nearly half (42%) of machine identities have sensitive or privileged access. 88% of respondents say that, in their organization, the definition of a ‘privileged user’ applies solely to human identities. Read the full report here. Cymulate Threat Exposure Validation Impact Report 2025 A survey of 1,000 security leaders, SecOps practitioners, and red and blue teamers from around the world to assess how they engage in security validation across cloud, on-premises and hybrid environments. Key stats: 71% of those surveyed consider threat exposure validation to be “absolutely essential”. 98% of organizations plan to invest in exposure management in the future. Almost two-thirds (approximately 66%) of security leaders say that missing exposures due to manual pen testing is an issue. Read the full report here. Bitwarden World Password Day 2025 Survey Annual global survey of over 2,300 employed adults in the United States, Australia, the United Kingdom, Germany, France, and Japan Key stats: 71% of those surveyed consider threat exposure validation to be “absolutely essential”. 98% of organizations plan to invest in exposure management in the future. Almost two-thirds (approximately 66%) of security leaders say that missing exposures due to manual pen testing is an issue. Read the full report here. N-able The 2025 State of the SOC Report Real-world insights from Adlumin Managed Detection and Response (MDR). Key stats: AI now pulls indicators of compromise (IOCs) in as quickly as 10 seconds. 86% of security alerts escalate into tickets, which indicates that most alerts still require human validation. AI can automate 70% of all incident investigations and threat remediation activity. Read the full report here. FBI Internet Crime Complaint Center Report Information from 859,532 complaints of suspected Internet crime. Key stats: The FBI received 859,532 complaints in total in 2024. The FBI received 64,882 complaints about personal data breach in 2024 (versus 55,851 in 2023 and 58,859 in 2022). FBI's Internet Crime Report 2024 recorded $16.6 billion in cybercrime losses. Read the full report here. Barclays Scams Bulletin: Romance scam reports rise 20 per cent as online dating hits 30-year anniversary Romance scam insights. Key stats: In the first quarter of 2025, romance scam reports were up 20 per cent year-on-year compared to Q1 2024. The average amount lost to a romance scam in 2024 was £8,000. This is up from just under £5,800 in 2023. A third (32 per cent) of those targeted by a romance scam said the scammer created a false sense of urgency. Read the full report here. You can get this kind of data in your inbox if you'd like here: A newsletter about cybersecurity statistics I also do a monthly statistics round-up (due to come out tomorrow). submitted by /u/Narcisians [link] [comments]

  • Local File Inclusion (LFI) vs Remote File Inclusion (RFI)
    by Adham Hashem (Cybersecurity on Medium) on April 28, 2025 at 6:22 pm

    LFI (Local File Inclusion) and RFI (Remote File Inclusion) are web application vulnerabilities that allow attackers to include files in a…Continue reading on Medium »

  • Your Password Won’t Save You — Here’s What Actually Keeps You Safe Online
    by Giridharan P (Security on Medium) on April 28, 2025 at 6:21 pm

    Let’s be real: “123456” is not a security strategy. But even a strong password isn’t the digital force field you might think it is.Continue reading on Medium »

  • Your Password Won’t Save You — Here’s What Actually Keeps You Safe Online
    by Giridharan P (Cybersecurity on Medium) on April 28, 2025 at 6:21 pm

    Let’s be real: “123456” is not a security strategy. But even a strong password isn’t the digital force field you might think it is.Continue reading on Medium »

  • CVE-2025–27556 | Django — Windows’ta LoginView, LogoutView ve set_language() üzerinde Potansiyel…
    by Yunus Olçar (Cybersecurity on Medium) on April 28, 2025 at 6:20 pm

    Hey, selam. 2 Nisan’da çıkmış olan bu güvenlik açığına birlikte bakalım. Let’s go🚀Continue reading on Medium »

  • From Analysis to Action: A Guide to Decisive Cybersecurity Risk Management
    by Darryl MacLeod (Cybersecurity on Medium) on April 28, 2025 at 6:19 pm

    Introduction: The Paralysis of PerfectionContinue reading on Medium »

  • API Security: Scopes and Claims
    by Tihomir Manushev (Security on Medium) on April 28, 2025 at 6:08 pm

    The key difference between permissions and identity informationContinue reading on Medium »

  • API Security: Scopes and Claims
    by Tihomir Manushev (Cybersecurity on Medium) on April 28, 2025 at 6:08 pm

    The key difference between permissions and identity informationContinue reading on Medium »

  • INDIA is lacking Real Cyber Security Skills | Archan Choudhury
    by /u/General_Riju (cybersecurity) on April 28, 2025 at 6:03 pm

    submitted by /u/General_Riju [link] [comments]

  • European IT professionals fear impact of quantum computing on cybersecurity
    by /u/donutloop (cybersecurity) on April 28, 2025 at 5:48 pm

    submitted by /u/donutloop [link] [comments]

  • The Must-Have Data Strategy for Modern Manufacturers
    by Neha Mashruwala (Security on Medium) on April 28, 2025 at 5:47 pm

    The manufacturing world is evolving fast, and much of that shift is being driven by data. With emerging technologies on the rise…Continue reading on Medium »

  • The Role of Emotional Intelligence in Modern Security and Public Safety Leadership
    by Joseph Lozada (Security on Medium) on April 28, 2025 at 5:30 pm

    By Joseph LozadaContinue reading on Medium »

  • Why 90% of Go Developers Are Getting Security Wrong (And How You Can Fix It)
    by The Latency Gambler (Security on Medium) on April 28, 2025 at 5:29 pm

    Go (Golang) has earned a reputation for simplicity, performance, and concurrency. But in the rush to ship fast, many developers (even…Continue reading on Medium »

  • Will NATO Expand Even Further? What the Future Holds
    by Denizgeraslan (Security on Medium) on April 28, 2025 at 5:09 pm

    As new threats emerge and old rivalries resurface, NATO’s future path could reshape the balance of power worldwide.Continue reading on Medium »

  • Jon DiMaggio on the importance of attribution in stopping ransomware
    by /u/NoStarchPress (cybersecurity) on April 28, 2025 at 5:04 pm

    A use case connecting BlackCat (formerly DarkSide), RansomHub, and Cicada 3301: https://analyst1.com/the-art-of-attribution-a-ransomware-use-case/ submitted by /u/NoStarchPress [link] [comments]

  • Heads up! Kali Linux warns of update failures
    by /u/robonova-1 (cybersecurity) on April 28, 2025 at 5:01 pm

    "On systems still using the old key, users will see "Missing key 827C8569F2518CC677FECA1AED65462EC8D5E4C5, which is needed to verify signature" when trying to get the list of latest software packages." "In the coming day(s), pretty much every Kali system out there will fail to update. [..] This is not only you, this is for everyone, and this is entirely our fault. We lost access to the signing key of the repository, so we had to create a new one," the company said." https://www.bleepingcomputer.com/news/linux/kali-linux-warns-of-update-failures-after-losing-repo-signing-key/ submitted by /u/robonova-1 [link] [comments]

  • What are the best books/resources i could use to learn computer architecture?
    by /u/Horror-Tank-5643 (cybersecurity) on April 28, 2025 at 4:51 pm

    I want some resource that doesn't go too deep into the math behind everything, i just need a full overview on topics like instruction set architecture, virtual memory and assembly. I want to build a fairly strong foundation before i move into things like malware analysis. submitted by /u/Horror-Tank-5643 [link] [comments]

  • Ethical Hacker — Discover Your Path to Career Success (2025)
    by Franklin Rhodes (Security on Medium) on April 28, 2025 at 4:29 pm

    Colleagues, did you know that “The ethical hacking certification market size was valued at approximately usd $2.3B in 2024 and is expected…Continue reading on Medium »

  • AI Security
    by Turingvang (Security on Medium) on April 28, 2025 at 4:11 pm

    What is AI Security?Continue reading on Medium »

  • Confidential Layer ($CLONE): The Future of Private Blockchain Transactions
    by Machacjosef (Security on Medium) on April 28, 2025 at 4:00 pm

    As cryptocurrency transactions become increasingly monitored, the demand for tools that ensure privacy is rising. Confidential Layer…Continue reading on Medium »

  • Exploring the Future of Smart Homes with SwitchBot Electric Blinds
    by Asqwfxvxqw (Security on Medium) on April 28, 2025 at 4:00 pm

    The smart home industry is rapidly evolving, and one of the standout brands leading the charge is SwitchBot. Their innovative products are…Continue reading on Medium »

  • BreachForums shutdown due to discovered MyBB 0day.
    by /u/catdickNBA (cybersecurity) on April 28, 2025 at 3:30 pm

    -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hello everyone, We would like to provide an update on recent events over the past two weeks. In or around April 15, we received confirmation of information that we had been suspecting since day 1 - a MyBB 0day. This confirmation came through trusted contacts that we are in touch with, which revealed that our forum (breachforums.st) is subject to infiltration by various agencies and other global law enforcement bodies. Upon learning of this, we immediately took action by shutting down our infrastructure and initiating our incident response procedures. Our findings indicate that, fortunately, our infrastructure were NOT compromised, and no data was infiltrated. Subsequently, we began auditing the MyBB source code and we believe we have identified the PHP exploit. We would like to sincerely apologize to the community and our staff for the lack of communication and transparency during this time. As you can appreciate, given the nature of our work, our priority had to be securing the safety of our infrastructure, staff, and the community above all else. Now that our incident response is complete, we are actively working on a complete rewrite of the forum backend. Finally, we would like to address the growing number of BreachForums clones and the various rumors circulating about us and our administrators. We want to reassure everyone that no members of our team have been arrested, and as previously mentioned, our infrastructure remains secure. We strongly advise against engaging with these BreachForums clones, as they are likely honeypots and cannot be trusted. Please exercise caution and be discerning in whom you trust and which services you use. Thank you for your understanding and continued support. Best regards, BreachForums Administration -----BEGIN PGP SIGNATURE----- iQGzBAEBCgAdFiEE6AwTCKCewa3EGMPwJXiYj2m8o/wFAmgPH6MACgkQJXiYj2m8 o/ygUgwAjO/g2t4uIExjgFJ56AZ8d+hXxmuptGasyX5sVI/f5/6y8hq2STPkp4KZ xX1iOA+vlx+FSjHRx28Pnwyga/6vD/ewS/YxiW+/zNplI+3nWxJF5p2jXo8PbTEy KInTAqUmLll2fiY1vt/2UTXWn2ym6ZdJVfik8e8ABvFSY+WSYlLXe8GOR1VE2V/9 J0fTvMDk29dCqGJDbJAyxCLzNBRcg7tgSmYfudEeTAhqYnzQgxKl2NpgOwnl3jmE cXjJUXobfXhJyjl4MS1jAc75tjEEC3whyrw22sN/pT8QBk9tZx9jW7AWVGw9V9Dk gzTKjsDoQEpBLAHI+MzrajaFS8s9j+qFbmVsnVjELR0OI/4EJl3qNw+SfFHHAnSz fQ/GrrYukjgZobPUENQR+i/1VgiZrD9O7vTF6G9uxBhrBiUvJJiePBFBTnx9r4Sh Y/2mG5RadG5U8CILQxAVx+4QveTGIA5He4Qa8Q02SKcnyd5EscWIB0s71i9KwUSd LUgOhAia =58qK -----END PGP SIGNATURE----- submitted by /u/catdickNBA [link] [comments]

  • Burnout - Did you switch careers or work through it?
    by /u/IHadADreamIWasAMeme (cybersecurity) on April 28, 2025 at 2:38 pm

    Curious for those of you that have felt burnout working in Cybersecurity have handled it, especially in the last year or so as the market as the overall job market has deteriorated a bit. I've been in Security for about 12 years, and IT for 15+ years. I find myself way less passionate than I was, but I feel stuck because: The money is good - life isn't about this but we all have bills to pay and want to secure our future as best as we can. Job market is kind of trash, so changing disciplines or even careers seems like it might be difficult / risky. Comfortable - I'm fully remote and generally have it pretty easy in my role, but still find myself just feeling meh about it all. Taking PTO has not helped, if anything it makes me long for something more meaningful. I don't know. Just thought I'd ask and maybe get some inspiration or something. submitted by /u/IHadADreamIWasAMeme [link] [comments]

  • Final round of interview with a CISO
    by /u/SpecialHamster6508 (cybersecurity) on April 28, 2025 at 2:15 pm

    Hey everyone! I need help. I started interviewing for this company for an internship, and so far, the company is great. The people that I have spoken to are really good at what they do. It's a Security Engineer Internship and I genuinely believe that I would learn a lot during the internship from them and would try my best to contribute throughout the internship, but I have one last hurdle. I have never had a 30-minute interview with a CISO for an internship before, and I don't know what to expect from the interview. I want to ask really good questions, but at the same time, I don't want to ask too generic questions that show that I haven't done any research on the team and company. I don't know what team I'll be working with, but I also don't know what some good questions to ask a CISO are. submitted by /u/SpecialHamster6508 [link] [comments]

  • VeriSource Breach Exposes Personal Data of 4 Million Individuals
    by /u/yash13 (cybersecurity) on April 28, 2025 at 1:31 pm

    submitted by /u/yash13 [link] [comments]

  • How to Navigate a Career Change from Software Engineering?
    by /u/BlessED0071 (cybersecurity) on April 28, 2025 at 1:20 pm

    Hey everyone, I’ve been working as a software engineer for almost 9 years, mainly with technologies like AWS, Node.js, and React. I’m looking to transition into the cybersecurity field and would love advice on how to make the switch. Thanks submitted by /u/BlessED0071 [link] [comments]

  • SMB SIEM
    by /u/Top_Sink9871 (cybersecurity) on April 28, 2025 at 1:04 pm

    Recommendations for SMB SIEM. Currently using ME Event Log Analyzer (LOG360). It's pretty good for the money certainly. However, looking for a more 'mainstream' provider. Thanks! submitted by /u/Top_Sink9871 [link] [comments]

  • Cyber Criminals Exploit Pope Francis Death to Launch Global Scams
    by /u/barbralodge (cybersecurity) on April 28, 2025 at 12:50 pm

    submitted by /u/barbralodge [link] [comments]

  • I built a chrome extension that detects and redacts sensitive information from your AI prompts
    by /u/fxnnur (cybersecurity) on April 28, 2025 at 12:44 pm

    It seems like a lot more people are becoming increasingly privacy conscious in their interactions with generative AI chatbots like ChatGPT, Gemini, etc. This seems to be a topic that people are talking more frequently, as more people are learning the risks of exposing sensitive information to these tools. This prompted me to create Redactifi - a browser extension designed to detect and redact sensitive information from your AI prompts. It has a built in ML model and also uses advanced pattern recognition. This means that all processing happens locally on your device. Any thoughts/feedback would be greatly appreciated. Check it out here: https://chromewebstore.google.com/detail/hglooeolkncknocmocfkggcddjalmjoa?utm_source=item-share-cb submitted by /u/fxnnur [link] [comments]

  • Redditers what helped you boost up your cyber security career?
    by /u/Nasdaq_Saver (cybersecurity) on April 28, 2025 at 12:00 pm

    submitted by /u/Nasdaq_Saver [link] [comments]

  • CEO Charged With Installing Malware on Hospital Computers
    by /u/rdm81 (cybersecurity) on April 28, 2025 at 10:58 am

    https://securityaffairs.com/177020/cyber-crime/ceo-of-cybersecurity-firm-charged-with-installing-malware-on-hospital-systems.html?amp submitted by /u/rdm81 [link] [comments]

  • The Vatican, a cybersecurity powerhouse
    by /u/Party_Wolf6604 (cybersecurity) on April 28, 2025 at 10:45 am

    submitted by /u/Party_Wolf6604 [link] [comments]

  • Should I leave my job?
    by /u/Ok-Atmosphere262 (cybersecurity) on April 28, 2025 at 10:15 am

    Hi everyone. I want to look for a new job in cyber security but I'm scared of the current market and not finding something stable. First here is a bit about me: I work in a 4-year college in vulnerability management for about 3 years now. My salary is 73k. I have a masters degree in cyber security from WGU and have the sec+, net+, cysa+, secx, SAL1, and az-900 certifications. My job is VERY comfy. I work for about 2 hours and the rest of the day I study for new certifications or watch YouTube videos. I have zero stress at my job which allows me to focus on my health and wellness. It's a very stable job and I have great benefits as part of a union. Unfortunately, the job doesn't pay enough. I just got married and we are planning to buy a house and have a kid. I'm looking at other opportunities but all I see are contact jobs for 3-6 months. Even though they pay more they are not stable. I could just stick it out at my current easy job and wait for pay raises which will happen. Eventually the 3% raise every year will become a six figure salary even if it takes a while. Or I could get a new job that pays well but might not be as stable with alot more stress. What do you guys think and what would you do in my shoes? submitted by /u/Ok-Atmosphere262 [link] [comments]

  • Built a threat search engine for cybersecurity investigations — Would love your feedback!
    by /u/Distinct_Staff_422 (cybersecurity) on April 28, 2025 at 9:57 am

    Hey everyone, I recently launched a project I’ve been working on: xdscvr.com! It’s a threat search engine that searches the web and provides a summary for each result, contextually based on your query. Here are some example use cases: • Is there a known public exploit for CVE-2025-2783? • Has the vendor released a patch or workaround for CVE-2025-2783? • Threat actor groups associated with Akira ransomware • MITRE ATT&CK mapping for the Akira threat I built it because I wanted a faster way to gather threat intel without opening 10+ tabs every time. I’m still developing and enhancing it, and I highly value your feedback: Would you use it? What features would you want added? Any ways to make it better before turning it into a full product? Appreciate any thoughts or ideas! submitted by /u/Distinct_Staff_422 [link] [comments]

  • Useful info on criminal misuse of google gemini
    by /u/bfeebabes (cybersecurity) on April 28, 2025 at 7:05 am

    This article and report provides useful facts on misuse. TLDR: Fairly simple use cases rather than the sexed up ones in the media. submitted by /u/bfeebabes [link] [comments]

  • What's collaboration like within your cyber team?
    by /u/reddrag0n51 (cybersecurity) on April 28, 2025 at 6:49 am

    I almost never hear of "collaborative security". everyone is so focused on their own isolated role that it feels like collaboration between internal and external teams is left down to the manager's ability to streamline communication and intelligence sharing. wondering how your team handles it right now and whether it's a problem you currently have? if so, how damaging has it been? or do you just deal with it? submitted by /u/reddrag0n51 [link] [comments]

  • Future of cybersecurity tooling
    by /u/paddle7 (cybersecurity) on April 28, 2025 at 2:01 am

    Hi all - I'm curious to see what people think will be the next big tool or attack vector. For example, SIEM was huge, EDR was huge, ITDR is growing, and AI is about to boom. What's next for cybersecurity and are there any companies doing what is about to be next? submitted by /u/paddle7 [link] [comments]

  • Mentorship Monday - Post All Career, Education and Job questions here!
    by /u/AutoModerator (cybersecurity) on April 28, 2025 at 12:00 am

    This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]

  • The 200+ Sites an ICE Surveillance Contractor is Monitoring
    by /u/FervidBug42 (cybersecurity) on April 27, 2025 at 11:30 pm

    submitted by /u/FervidBug42 [link] [comments]

  • I Created the Ultimate Cybersecurity Mastery Roadmap (FREE & Open Source!)
    by /u/hamedessamdev (cybersecurity) on April 27, 2025 at 6:56 pm

    Hey everyone 👋, I'm excited to share a project I've been working hard on: Cybersecurity Mastery Roadmap It's a step-by-step, beginner-to-expert roadmap packed with: Curated learning resources Recommended tools Study plans and certifications guide Hands-on labs and practice environments Career paths and specialization tracks Capture The Flag (CTF) competitions to sharpen your skills Top cybersecurity communities you should join Check it out here: https://github.com/Hamed233/Cybersecurity-Mastery-Roadmap submitted by /u/hamedessamdev [link] [comments]

  • How do you respond to “Can you hack Instagram accounts?” when you tell someone you’re in cyber security?
    by /u/skylight269 (cybersecurity) on April 27, 2025 at 4:28 pm

    T submitted by /u/skylight269 [link] [comments]

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

What is Google Workspace?
Google Workspace is a cloud-based productivity suite that helps teams communicate, collaborate and get things done from anywhere and on any device. It's simple to set up, use and manage, so your business can focus on what really matters.

Watch a video or find out more here.

Here are some highlights:
Business email for your domain
Look professional and communicate as you@yourcompany.com. Gmail's simple features help you build your brand while getting more done.

Access from any location or device
Check emails, share files, edit documents, hold video meetings and more, whether you're at work, at home or on the move. You can pick up where you left off from a computer, tablet or phone.

Enterprise-level management tools
Robust admin settings give you total command over users, devices, security and more.

Sign up using my link https://referworkspace.app.goo.gl/Q371 and get a 14-day trial, and message me to get an exclusive discount when you try Google Workspace for your business.

Google Workspace Business Standard Promotion code for the Americas 63F733CLLY7R7MM 63F7D7CPD9XXUVT 63FLKQHWV3AEEE6 63JGLWWK36CP7WM
Email me for more promo codes

Active Hydrating Toner, Anti-Aging Replenishing Advanced Face Moisturizer, with Vitamins A, C, E & Natural Botanicals to Promote Skin Balance & Collagen Production, 6.7 Fl Oz

Age Defying 0.3% Retinol Serum, Anti-Aging Dark Spot Remover for Face, Fine Lines & Wrinkle Pore Minimizer, with Vitamin E & Natural Botanicals

Firming Moisturizer, Advanced Hydrating Facial Replenishing Cream, with Hyaluronic Acid, Resveratrol & Natural Botanicals to Restore Skin's Strength, Radiance, and Resilience, 1.75 Oz

Skin Stem Cell Serum

Smartphone 101 - Pick a smartphone for me - android or iOS - Apple iPhone or Samsung Galaxy or Huawei or Xaomi or Google Pixel

Can AI Really Predict Lottery Results? We Asked an Expert.

Ace the 2025 AWS Solutions Architect Associate SAA-C03 Exam with Confidence Pass the 2025 AWS Certified Machine Learning Specialty MLS-C01 Exam with Flying Colors

List of Freely available programming books - What is the single most influential book every Programmers should read



#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks

Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
zCanadian Quiz and Trivia, Canadian History, Citizenship Test, Geography, Wildlife, Secenries, Banff, Tourism

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Africa Quiz, Africa Trivia, Quiz, African History, Geography, Wildlife, Culture

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA


Health Health, a science-based community to discuss human health

Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.

Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, and leagues around the world.

Turn your dream into reality with Google Workspace: It’s free for the first 14 days.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6 96DRHDRA9J7GTN6
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
63KKR9EULQRR7VE
63KNY4N7VHCUA9R
63LDXXFYU6VXDG9
63MGNRCKXURAYWC
63NGNDVVXJP4N99
63P4G3ELRPADKQU
With Google Workspace, Get custom email @yourcompany, Work from anywhere; Easily scale up or down
Google gives you the tools you need to run your business like a pro. Set up custom email, share files securely online, video chat from any device, and more.
Google Workspace provides a platform, a common ground, for all our internal teams and operations to collaboratively support our primary business goal, which is to deliver quality information to our readers quickly.
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE
C37HCAQRVR7JTFK
C3AE76E7WATCTL9
C3C3RGUF9VW6LXE
C3D9LD4L736CALC
C3EQXV674DQ6PXP
C3G9M3JEHXM3XC7
C3GGR3H4TRHUD7L
C3LVUVC3LHKUEQK
C3PVGM4CHHPMWLE
C3QHQ763LWGTW4C
Even if you’re small, you want people to see you as a professional business. If you’re still growing, you need the building blocks to get you where you want to be. I’ve learned so much about business through Google Workspace—I can’t imagine working without it.
(Email us for more codes)