What’s the difference between a proxy and a VPN and why is one security stronger than the other? Which security feature is stronger and why?

Proxy vs VPN

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

What’s the difference between a proxy and a VPN, and why is one security stronger than the other? Which security feature is stronger and why?

When it comes to online security, there are a number of different factors to consider. Two of the most popular methods for protecting your identity and data are proxy servers and VPNs. Both proxy servers and VPNs can help to mask your IP address and encrypt your traffic, but there are some key differences between the two. One major difference is that proxy servers only encrypt traffic going through the server, while VPNs encrypt all traffic from your device. This means that proxy servers are only effective if you’re using specific apps or visiting specific websites. VPNs, on the other hand, provide a more comprehensive solution as they can encrypt all traffic from your device, no matter where you’re accessing the internet from. Another key difference is that proxy servers tend to be less expensive than VPNs, but they also offer less privacy and security. When it comes to online security, proxy servers and VPNs both have their pros and cons. It’s important to weigh these factors carefully before decide which option is right for you.

VPN is virtual private network connects your incoming traffic and outgoing traffic to another network.

A proxy just relays your internet traffic. To websites you visit, your IP appears to be that of the proxy server.

A VPN is a type of proxy for which all the communication between your computer and the proxy server is encrypted. With a VPN, no one snooping your internet connection (e.g., your ISP) can see what websites you are visiting or what you are doing there. Security is much better.

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

VPN PROS:

What is a Proxy Server?

A proxy server is a computer system that performs as an intermediary in the request made by users. This type of server helps prevent an attacker from attacking the network and serves as a tool used to create a firewall.

The etymology of the word proxy means “a figure that can be used to represent the value of something”, this means that a proxy server represents or acts on behalf of the user. The fundamental purpose of proxy servers is to safeguard the direct connection of internet users and resources.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

All requests made by the users from the internet go to the proxy server. The responses of the request return back to the proxy server for evaluation and then to the user. Proxy servers serve as an intermediary between the local network and the world wide web. Proxy servers are used for several reasons, such as to filter web content, to avert restrictions like parental blocks, to screen downloads and uploads, and to provide privacy when browsing the internet. The proxy server also prevents and protects the identity of the users.

There are different types of proxy servers used according to the different purposes of a request made by the clients and users. Proxies provide a valuable layer of security for your network and computers. It can be set up as web filters or firewalls which can protect computers from threats such as malware or ransomware. This extra security is also significant when linked with a secured gateway or attached security products. This way, network administrators can filter traffic according to its level of safety or traffic consumption of the network.

Are Proxies and VPNs the same?

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

Proxies are not the same as VPNs. The only similarity between Proxies and VPNs is that they both connect you to the internet via an intermediary server. An online proxy forwards your traffic to its destination, while a VPN, on the other hand, encrypts all traffic between the VPN server and your device. Here are some more differences between proxies and VPNs:

  • VPNs help you encrypt your traffic while proxy servers don’t do that.
  • Proxies don’t protect you from government surveillance, ISP tracking, and hackers, which is why they are never used to handle sensitive information. VPN protects you from the same.
  • VPNs function on the operating system level while proxies work on the application level.
  • Proxies only reroute the traffic of a specific app or browser while VPNs reroute it through a VPN server.
  • Since VPNs need to encrypt your sensitive data, they can be slower than proxies.
  • Most proxy servers are free while most VPNs are paid. Don’t trust free VPN services as they can compromise your data.
  • A VPN connection is found to be more reliable than proxy server connections that can drop more frequently.

Why Is a VPN Considered to be More Secure Than a Proxy Server?

By now, you might have already noticed the reason since we have discussed it. The question is: Is a VPN better than a proxy? The simple answer is “Yes.”

How? A VPN provides privacy and security by routing your traffic through a secure VPN server and encrypting your traffic while a proxy, on the other hand, simply passes that traffic through a mediating server. It doesn’t necessarily offer any extra protection unless you use some extra features.

Proxy PROS:

However, when the motivation is to avoid geo-blocking, a proxy is more likely to be successful. Websites that need to do geo-blocking can normally tell that your IP is that of a VPN server. They don’t account for all the possible proxy servers.

But the problem here is they use datacenter IP (the server IP),

Also VPNs save logs and save EVERYTHING you do.

In the other hand, there are many types of proxy: datacenter proxy (worst one), Residential proxy, Mobile proxy 4G, and Mobile Proxy 5G.

If you use residential proxy or mobile proxy it might be much better and safer for many reasons:

  1. Residential IP means that the Proxy use a regular ISP like comcast, Charter, Sprint, etc.
  2. They don’t save logs.
  3. The connection is not even direct, it goes to their server first and then to a a real device in another place.
  4. Websites like facebook and shopping sites won’t block you, because you use residential or mobile proxy, so they won’t know that you use a proxy to hide your real IP, while VPN will be easily detected.

Now people would say that the problem with socks5 residential and mobile proxy is the cost, because most of websites sells it on very expensive price.

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

I use a good cheap and very high quality socks5 residential proxy costs only 3 USD a month per dedicated residential proxy, and the traffic is unlimited.

And it is very fast because it is dedicated and also virgin with fraud score 0.

The website name is Liber8Proxy.com

Moreover socks5 residential proxy uses socks5 connection port with promixitron so it would cover your entire PC traffic.

Also their customers support are nice and they always online.

Source: https://qr.ae/pvWauF

How to Protect Yourself from Man-in-the-Middle Attacks: Tips for Safer Communication

Man in the middle attacks

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

How to Protect Yourself from Man-in-the-Middle Attacks: Tips for Safer Communication

Man-in-the-middle (MITM) attacks are a type of cyberattack where a malicious actor intercepts communications between two parties in order to secretly access sensitive data or inject false information. While MITM attacks can be difficult to detect, there are some steps you can take to protect yourself.

For example, always verifying the identity of the person you’re communicating with and using encrypted communication tools whenever possible. Additionally, it’s important to be aware of common signs that an attack may be happening, such as unexpected messages or requests for sensitive information.

Man-in-the-middle attacks are one of the most common types of cyberattacks. MITM attacks can allow the attacker to gain access to sensitive information, such as passwords or financial data. Man-in-the-middle attacks can be very difficult to detect, but there are some steps you can take to protect yourself. First, be aware of the warning signs of a man-in-the-middle attack. These include:

– unexpected changes in login pages,

– unexpected requests for personal information,

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

– and unusual account activity.

If you see any of these warning signs, do not enter any sensitive information and contact the company or individual involved immediately. Second, use strong security measures, such as two-factor authentication, to protect your accounts. This will make it more difficult for attackers to gain access to your information. Finally, keep your software and operating system up to date with the latest security patches. This will help to close any potential vulnerabilities that could be exploited by attackers.

Man-in-the-middle attacks can be devastating for individuals and businesses alike. By intercepting communications between two parties, attackers can gain access to sensitive information or even impersonate one of the parties involved. Fortunately, there are a number of steps you can take to protect yourself from man-in-the-middle attacks.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)
  • First, avoid using public Wi-Fi networks for sensitive transactions. Attackers can easily set up their own rogue networks, and it can be difficult to tell the difference between a legitimate network and a malicious one. If you must use public Wi-Fi, be sure to use a VPN to encrypt your traffic.
  • Second, be cautious about the links you click on. When in doubt, hover over a link to see where it will actually take you. And always be suspicious of links that come from untrustworthy sources.
  • Finally, keep your software and security tools up to date. Man-in-the-middle attacks are constantly evolving, so it’s important to have the latest defenses in place.

By following these simple tips, you can help keep yourself safe from man-in-the-middle attacks.

Read more here

Is MITM attack possible when on HTTPS?

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

HTTPS (or really, SSL) is specifically designed to thwart MITM attacks.

Web browsers validate that both the certificate presented by the server is labeled correctly with the website’s domain name and that it has a chain of trust back to a well-known certificate authority. Under normal circumstances, this is enough to prevent anyone from impersonating the website.

As the question points out, you can thwart this by somehow acquiring the secret key for the existing website’s certificate.

You can also launch a MITM attack by getting one of the well-known certificate authorities to issue you a certificate with the domain name of the website you wish to impersonate. This can be (and has been) accomplished by social engineering and hacking into the registrars.

Outside of those two main methods, you would have to rely upon bugs in the SSL protocol or its implementations (of which a few have been discovered over the years).

What are the countermeasures of MITM?

1- Certificates.

For the web, we use a similar principle. A certificate is a specific document issued by a third party that validate the identity of a website. Your PC can ask the third party if the certificate is correct, and only if it is allow the traffic. This is what HTTPs does.

2- Simple…encryption!

Man In The Middle attacks are carried out because an attacker is in between both communicators (let’s say two clients or a client and a server). If he is able to see the communication in clear text, he can do a whole lot ranging from stealing login credentials to snooping on conversations. If encryption is implemented, the attacker would see gibberish and “un-understandable” text instead.

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

In terms of web communication, digital certificates would do a great job of encrypting communication stream (any website using HTTPS encrypts communication stream by default). For social media apps like whats app and Skype, it is the responsibility of the vendor to implement encryption.

MitM Attack Techniques and Types

  • ARP Cache Poisoning. Address Resolution Protocol (ARP) is a low-level process that translates the machine address (MAC) to the IP address on the local network. …
  • DNS Cache Poisoning. …
  • Wi-Fi Eavesdropping. …
  • Session Hijacking.
  • IP Spoofing
  • DNS Spoofing
  • HTTPS Spoofing
  • SSL Hijacking
  • Email Hijacking
  • Wifi Eavesdropping
  • Cookie Stealing and so on.

Can MITM attacks steal credit card information?

When you enter your sensitive information on an HTTP website and press that “Send” button, all your private details travel in plain text from your web browser to the destination server.

A cyber-attacker can employ a man-in-the-middle attack and intercept your information. Since it’s not encrypted, the hacker can see everything: your name, physical address, card numbers, and anything else you entered.

To avoid MITM attacks, don’t share your info on HTTP sites. More on SSL certificates and man-in-the-middle attacks in this detailed medium article

How common are MITM attacks in public places with free WIFI?

Not common by people, but common by malware and other software that are designed to do that.

How do you ensure your RDP is secure from MITM attacks?

  • Make sure all of your workstations and remote servers are patched.
  • On highly sensitive devices, use two-factor authentication.
  • Reduce the number of remote account users with elevated privileges on the server.
  • Make a safe password.
  • Your credentials should not be saved in your RDP register.
  • Remove the RDP file from your computer.

How do we know that the Top 3 Voice Recognition Devices like Siri Alexa and Ok Google are not spying on us?

Proxy vs VPN

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

How do we know that the Top 3 Voice Recognition Devices like Siri Alexa and Ok Google are not spying on us?

When you ask Siri a question, she gives you an answer. But have you ever stopped to wonder how she knows the answer? After all, she’s just a computer program, right? Well, actually, Siri is powered by artificial intelligence (AI) and Machine Learning (ML). This means that she constantly learning and getting better at understanding human speech. So when you ask her a question, she uses her ML algorithms to figure out what you’re saying and then provides you with an answer.

So, How do we know that the Top 3 Voice Recognition Devices like Siri Alexa and Ok Google are not spying on us?

The Amazon Echo is a voice-activated speaker powered by Amazon’s AI assistant, Alexa. Echo uses far-field voice recognition to hear you from across the room, even while music is playing. Once it hears the wake word “Alexa,” it streams audio to the cloud, where the Alexa Voice Service turns the speech into text. Machine learning algorithms then analyze this text to try to understand what you want.

But what does this have to do with spying? Well, it turns out that ML can also be used to eavesdrop on people’s conversations. This is why many people are concerned about their privacy when using voice-activated assistants like Siri, Alexa, and Ok Google. However, there are a few things that you can do to protect your privacy. For example, you can disable voice recognition on your devices or only use them when you’re in a private location. You can also be careful about what information you share with voice-activated assistants. So while they may not be perfect, there are ways that you can minimize the risk of them spying on you.

Some applications which have background components, such as Facebook, do send ambient sounds to their data centers for processing. In so doing, they collect information on what you are talking about, and use it to target advertising.

Siri, Google, and Alexa only do this to decide whether or not you’ve invoked the activation trigger. For Apple hardware, recognition of “Siri, …” happens in hardware locally, without sending out data for recognition. The same for “Alexa, …” for Alexa hardware, and “Hey, Google, …” for Google hardware.

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

Things get more complicated for these three things, when they are installed cross-platform. So, for example, to make “Hey, Google, …” work on non-Google hardware, where it’s not possible to do the recognition locally, yes, it listens. But unlike Facebook, it’s not recording ambient to collect keywords.

Practically, it’s my understanding that the tree major brands don’t, and it’s only things like Facebook which more or less “violate your trust like this. And other than Facebook, I’m uncertain whether or not any other App does this.

You’ll find that most of the terms and conditions you’ve agreed to on installation of a third party App, grant them pretty broad discretion.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

Personally, I tend to not install Apps like that, and use the WebUI from the mobile device browser instead.

If you do that, instead of installing an App, you rob them of their power to eavesdrop effectively. Source: Terry Lambert

How do we know that the Top 3 Voice Recognition Devices like Siri Alexa and Ok Google are not spying on us?

Conclusion:

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

Machine learning is a field of artificial intelligence (AI) concerned with the design and development of algorithms that learn from data. Machine learning algorithms have been used for a variety of tasks, including voice recognition, image classification, and spam detection. In recent years, there has been growing concern about the use of machine learning for surveillance and spying. However, it is important to note that machine learning is not necessarily synonymous with spying. Machine learning algorithms can be used for good or ill, depending on how they are designed and deployed. When it comes to voice-activated assistants such as Siri, Alexa, and OK Google, the primary concern is privacy. These assistants are constantly listening for their wake words, which means they may be recording private conversations without the user’s knowledge or consent. While it is possible that these recordings could be used for nefarious purposes, it is also important to remember that machine learning algorithms are not perfect. There is always the possibility that recordings could be misclassified or misinterpreted. As such, it is important to weigh the risks and benefits of using voice-activated assistants before making a decision about whether or not to use them.

How Microsoft’s Cortana Stacks Up Against Siri and Alexa in Terms of Intelligence?

How do we know that the Top 3 Voice Recognition Devices like Siri Alexa and Ok Google are not spying on us?
Machine Learning For Dummies

ML For Dummies on iOs [Contain Ads]

ML PRO without ADS on iOs [No Ads, More Features]

ML PRO without ADS on Windows [No Ads, More Features]

ML PRO For Web/Android on Amazon [No Ads, More Features]

Use this App to learn about Machine Learning and Elevate your Brain with Machine Learning Quizzes, Cheat Sheets, Ml Jobs Interview Questions and Answers updated daily.

The App provides:

– 400+ Machine Learning Operation on AWS, Azure, GCP and Detailed Answers and References

– 100+ Machine Learning Basics Questions and Answers

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

– 100+ Machine Learning Advanced Questions and Answers

– Scorecard

– Countdown timer

CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Proxy vs VPN

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

CyberSecurity - What are some things that get a bad rap, but are actually quite secure?

CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.

There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.

1- PGP

PGP is a Form of Minimalism

As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:

  1. You get from them a PGP identity (public key). How you do that is entirely up to you.
  2. Your PGP program uses that identity to perform a single public key encryption of a message key.
  3. Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
  4. Your correspondent does the opposite operations to get the message.

If you want to sign your message then you:

  1. Hash the message.
  2. Do a public key signature operation on the hash and attach the result to the message.
  3. Your correspondent checks the signature from your PGP identity, which they have acquired somehow.

The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.

As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:

  • Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
  • A Signal session requires the storage and maintenance of a lot of state information.
  • Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
  • Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
  • Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.

The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.

2- Very long passwords that are actually a sentence

It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”

3- Writing passwords down.

I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.

Did I say passwords? I meant encryption keys.

4- Changing default ports for certain services like dbs

Most of the gangs out there use tools that don’t do a full search, so they go through the default port list

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

5- MFA in general.

Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.

If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.

If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.

6- Oauth for 3rd party apps.

Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.

7- Two-step verification.

Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.

8-Biometric Authentication.

The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.

Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.

One example of this is https://passage.id/ which is about as secure as you can get.

9- Zoom.

Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.

10- Unplugging the ethernet cable.

11- Browser password managers?

Rant moment: reasons cybersecurity fails

<Rant>

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.

No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.

This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.

</Rant>

Why do cyber attackers commonly use social engineering attacks?

Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.

Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.

To conclude:

Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.

source: r/cybersecurity

Source: r/cybersecurity

  • Microsoft Purview Retention Policy Not Working (Viva Engage)
    by /u/acid2k1 (cybersecurity) on April 26, 2024 at 11:26 pm

    Hi, I’m looking for help. We have recently started using Microsoft Purview, and we began creating a retention policy that targets Viva Engage (Yammer) posts. The policy is designed to automatically delete posts and messages when they reach 12 months old. However, even with the policy set up, the posts or messages do not get deleted. We have waited for more than 7 days, but they are still there. Please take a look at the attached pictures. The policy that is set up and the Viva Engage posts that are older than 12 months are still showing. https://ibb.co/ykL0kdR https://ibb.co/f9HqYyn https://ibb.co/ScgF2yD Does anyone have any suggestions on why they are still showing, even with the retention policy in place? Thanks submitted by /u/acid2k1 [link] [comments]

  • Military Tank Manual, 2017 Zero-Day Anchor Latest Ukraine Cyberattack
    by /u/anynamewillbefine (cybersecurity) on April 26, 2024 at 11:17 pm

    submitted by /u/anynamewillbefine [link] [comments]

  • Secure Email Gateway, Email Digest - Non Action = Block?
    by /u/RexfordITMGR (cybersecurity) on April 26, 2024 at 9:56 pm

    Team- I need some help. My CEO is presenting to me a use case that I’m not sure how a secure email gateway could handle. When the CEO receives the email digest, he wants to scan the digest for emails that he wants to Release or Allow. By not clicking on release or allow, he wants the system to then block all emails from that digest, such that he never sees an email from that sender again. Do we have the capability to configure the system in this way such that by not taking action on an item, it could automatically trigger a block? We are on Proofpoint Enterprise. As you know the industry well… does Mimecast, Microsoft or any other platform do this? I want to have a good understanding of capabilities/what competitors can/cannot do as I prepare a response. Any ideas on how to help achieve his goals? submitted by /u/RexfordITMGR [link] [comments]

  • Fake job interviews target developers with new Python backdoor
    by /u/anynamewillbefine (cybersecurity) on April 26, 2024 at 9:46 pm

    submitted by /u/anynamewillbefine [link] [comments]

  • Passkeys: A Shattered Dream
    by /u/atoponce (cybersecurity) on April 26, 2024 at 9:40 pm

    submitted by /u/atoponce [link] [comments]

  • Cyberattack Gold: SBOMs Offer an Easy Census of Vulnerable Software
    by /u/anynamewillbefine (cybersecurity) on April 26, 2024 at 9:40 pm

    submitted by /u/anynamewillbefine [link] [comments]

  • Ukraine's military intelligence launches cyberattack against United Russia party
    by /u/KI_official (cybersecurity) on April 26, 2024 at 9:31 pm

    submitted by /u/KI_official [link] [comments]

  • A web application like intelx?
    by /u/Soft_Reflection3792 (cybersecurity) on April 26, 2024 at 9:23 pm

    How about building a solution like intelx ? where we can see Url : username and password that got leaked from infostealers ? what do you think...I have toughts on building a saas application. Logs from haveibeenpawed and other tools are boring and old. feedback would be highly appreciated! submitted by /u/Soft_Reflection3792 [link] [comments]

  • Sandbox in remote Enterprise Enviroment
    by /u/frosss (cybersecurity) on April 26, 2024 at 8:17 pm

    Hello Everyone, I am looking to set up a sandbox environment for me and a few fellow analysts to be able to analyze suspicious files, investigate potential phishing email links and attachments, and generally be able to click or download all the things we know are bad but need to know for sure. I wanted to get an understand on how best to have such an environment while also ensure that it will remain secure and not compromise the business environment. The analysts that we have are all remote workers, so I need something that is networked. Is there any reason to have an on prem sandbox these days or should I just be looking at cloud providers such as any.run? I was looking into setting up a Cukoo sandbox, but much of what I can find for that is 2 or more years old, and I am not sure if that is still a recommended solution or not. I am also concerned if I could truly keep the environment secure. Thank you in advance for any ideas! submitted by /u/frosss [link] [comments]

  • Application Security Checklist
    by /u/athanielx (cybersecurity) on April 26, 2024 at 7:40 pm

    How do you conduct a security analysis of an application? We have an infrastructure on AWS, and in addition to auditing the infrastructure, I would like to audit our application. Specifically, I aim to comprehend its logic. Unfortunately, I lack expertise in the AppSec domain, but I am still interested in initiating this process and gaining a high-level overview. I would like to invite the main developers and conduct a brief interview to learn about their application. Essentially, I want to understand the application's functionality, identify potential security vulnerabilities, and ascertain how critical data is safeguarded. Additionally, I discovered that the application is related to the crypto exchange. I found this https://github.com/MahdiMashrur/Awesome-Application-Security-Checklist, but this 4 years old and I'm not sure how this is relevant. submitted by /u/athanielx [link] [comments]

  • Reporting fraudulent websites? dhlondemand.ca
    by /u/daredeviloper (cybersecurity) on April 26, 2024 at 7:17 pm

    Received a text pointing me to alerts.dhlondemand.ca I went there directly and interestingly enough it magically “knew” my order number (of course it was wrong) Anyway, is there a way to report these? Is it pointless? Looking at the whois, it’s somewhere in the USA but is that even real info? submitted by /u/daredeviloper [link] [comments]

  • The XZ Utils Backdoor explained - Columbia University Lecture
    by /u/jc_pi (cybersecurity) on April 26, 2024 at 7:16 pm

    https://youtu.be/Q6ovtLdSbEA?si=x0AnjrolYoqzkoOC submitted by /u/jc_pi [link] [comments]

  • LinkedIn Courses for CyberSecurity
    by /u/Actual_Resource_947 (cybersecurity) on April 26, 2024 at 6:40 pm

    Hello everyone, I have a one month premium free on LinkedIn since I studied for CC exam. Now that I've passed, I'd like to use the opportunity to study more about CyberSecurity. For a little background: I'm still in uni and have no experience on CyberSecurity aside from my studies. So I'm want to study more on any beginner or intermediate courses Do you have any courses or instructors that provides certificates on LinkedIn? Thank you! submitted by /u/Actual_Resource_947 [link] [comments]

  • Cybersecurity for Government
    by /u/AwkwardVoicemail (cybersecurity) on April 26, 2024 at 6:06 pm

    I feel like I see a lot of perspectives from those of you who work in the corporate world, but I’m curious about the folks who work cybersecurity in a government or military setting. Do you feel similarly that cybersecurity is undervalued in government? Do you get the budget you need to accomplish your security goals? Do you feel like your career is progressing? Not looking for state secrets or anything, just some different perspectives! submitted by /u/AwkwardVoicemail [link] [comments]

  • Acing your Detection Engineering Interview
    by Julie Agnes Sparks (Security on Medium) on April 26, 2024 at 5:22 pm

    Let’s dive into all the aspects of a Detection & Response engineering interview.Continue reading on Medium »

  • Software Supply Chain Security is a Dependency Management Problem
    by Dana Crane (Cybersecurity on Medium) on April 26, 2024 at 5:20 pm

    Software vendors of all kinds, big and small, are in the habit of not updating their open source software. For example:Continue reading on Medium »

  • Exploring the World of Zero Trust Architecture
    by Sheth Parth (Cybersecurity on Medium) on April 26, 2024 at 5:00 pm

    Introduction:Continue reading on Medium »

  • How to Secure Your CPUT Student Email from Cyber Threats
    by Scott Andery (Cybersecurity on Medium) on April 26, 2024 at 4:55 pm

    In today’s digital age, email security is crucial, especially for students who rely on their email accounts for academic communications…Continue reading on TechWorldTimes »

  • Phishing — Oltalama Saldırısı
    by Sema Sena KÜRÜM (Cybersecurity on Medium) on April 26, 2024 at 4:33 pm

    Phishing, sahte e-postalar, siteler ve mesajlar aracılığıyla kişisel bilgilerinizi çalmaya çalışan bir dolandırıcılık taktiğidir. Bu…Continue reading on Medium »

  • Malware Analysis — Brbbot.exe İnceleme
    by Sema Sena KÜRÜM (Cybersecurity on Medium) on April 26, 2024 at 4:28 pm

    Merhaba, hazırlamış olduğum belge, brbbot.exe adlı dosyanın statik ve dinamik analizini içermektedir. Analiz kapsamında dosyanın yapısı…Continue reading on Medium »

  • TryHackMe | CSRF | WriteUp
    by Axoloth (Cybersecurity on Medium) on April 26, 2024 at 4:27 pm

    Learn how a CSRF vulnerability works and methods to exploit and defend against CSRF vulnerabilities.Continue reading on Medium »

  • Audit Failure (Event ID 4625)
    by /u/Aerovox7 (cybersecurity) on April 26, 2024 at 4:26 pm

    Hello, a server being used by the company I work for had ~35k events of event ID 4625. If I am understanding this correctly, it looks like someone was trying to use common passwords for common usernames to brute force a login into the server. The workstation Name and Source Network Address were unique every time. The Account names attempted were not even on the server and I would be the only person who should be logging into it. Since then, I have disconnected the server from the internet and it will not be reconnected until we get our Fortigate back. My main question is, should I check anything else to make sure everything is good before reconnecting the server to the internet with the Fortigate and how common is an attack like this? submitted by /u/Aerovox7 [link] [comments]

  • Cybersecurity News Review — Week 17
    by Mladen Kirilov (Cybersecurity on Medium) on April 26, 2024 at 4:25 pm

    Welcome to this week’s roundup of some of the most interesting cybersecurity updates. Subscribe for a concise and informed perspective on…Continue reading on Medium »

  • Codify
    by Forhworking (Cybersecurity on Medium) on April 26, 2024 at 4:25 pm

    Continue reading on Medium »

  • Navigating Cybersecurity Complexities Amidst the Age of Interconnected Manufacturing
    by jayesh saini (Cybersecurity on Medium) on April 26, 2024 at 4:24 pm

    The era of connected manufacturing, also known as Industry 4.0 or the Industrial Internet of Things (IIoT), comes with many cybersecurity…Continue reading on Medium »

  • Network — Ağ Temelleri
    by Sema Sena KÜRÜM (Cybersecurity on Medium) on April 26, 2024 at 4:23 pm

    Ağ temelleri konusunda hazırladığım yazımı sizlerle paylaşmak istedim. Bu makalede, ağların nasıl çalıştığına dair temel bilgilere yer…Continue reading on Medium »

  • Enhance Your Lifestyle with MUSICOZY Sleep Headphones Bluetooth 5.2
    by AttricusTECH (Security on Medium) on April 26, 2024 at 4:16 pm

    Introduction:Continue reading on Medium »

  • WhatsApp Threatens to Exit India Over Encryption Dispute
    by Daily India Observers (Security on Medium) on April 26, 2024 at 3:35 pm

    WhatsApp has warned the Indian government that it may have to exit the Indian market if it is forced to break its end-to-end message…Continue reading on Medium »

  • Ransomware: Uma Ameaça Crescente e Suas Contramedidas
    by Genisson Matos (Security on Medium) on April 26, 2024 at 3:34 pm

    IntroduçãoContinue reading on Medium »

  • Safeguarding Against Fraud and Breaches Online — What you need to know
    by Errole Gutierrez (Security on Medium) on April 26, 2024 at 3:32 pm

    As more people shop online, keeping payment information safe is a big focus for companies. They’re working harder to make sure that when…Continue reading on 888 TE.CH »

  • Powering the $1T+ Bitcoin Economy: Babylon’s Bitcoin Staking Revolution
    by Editor @ Babylon (Security on Medium) on April 26, 2024 at 3:06 pm

    What’s next? Dive in!Continue reading on BabylonChain.io »

  • ☼ How to secure, Trust Wallet with 2fa (or) Two-Factor Authentication …
    by Customer Support (+1) 8O5 3O1 7541 Trust Wallet (Security on Medium) on April 26, 2024 at 2:59 pm

    ✎ Customer Support (+1) 8O5 3O1 7541 Trust Wallet Contact NumberContinue reading on Medium »

  • OSCP Prep: Introducing My Runbooks —RCE on Linux
    by Security Guy (Security on Medium) on April 26, 2024 at 2:57 pm

    My runbook for enumerating Linux machines in the OSCP once I have RCE! use it for your own CTF/OSCP practiceContinue reading on Medium »

  • Common people need a safe life
    by Md Raihan (Security on Medium) on April 26, 2024 at 2:55 pm

    If the powerful countries of the world would unite and make a peace agreement for the next 100 years, then the common people would get…Continue reading on Medium »

  • Top Family Security Solutions for Complete Peace of Mind: A Comprehensive Guide
    by Katkatr (Security on Medium) on April 26, 2024 at 2:18 pm

    In the present high speed world, guaranteeing the wellbeing and security of your friends and family and property is central. With the…Continue reading on Medium »

  • More than 800 vulnerabilities resolved through CISA ransomware notification pilot
    by /u/TheRecord_Media (cybersecurity) on April 26, 2024 at 2:11 pm

    submitted by /u/TheRecord_Media [link] [comments]

  • Any opinions on Barracuda/Skout as an MSSP/MXDR provider?
    by /u/TheRealGamerCow (cybersecurity) on April 26, 2024 at 2:07 pm

    We're looking to replace our MSSP, and recently got pitched Barracuda. They seemed pretty good, but I'm finding very little about their offerings in the security space. They seem green, but maybe I'm missing something. submitted by /u/TheRealGamerCow [link] [comments]

  • Top cybersecurity stories for the week of 04-22-24 to 04-26-24
    by /u/CISO_Series_Producer (cybersecurity) on April 26, 2024 at 2:06 pm

    Below are some of the stories we’ve been reporting this week on Cyber Security Headlines. If you’d like to watch and participate in a discussion about them, the CISO Series does a live 20-minute show every Friday at 12:30pm PT/3:30pm ET. Each week we welcome a different cyber practitioner to offer some color to the week's stories. Our guest this week is Christina Shannon, CIO, KIK Consumer Products. To get involved you can watch live and participate in the discussion on YouTube Live https://youtube.com/live/yT2qG8DtzLY or you can subscribe to the Cyber Security Headlines podcast and get it into your feed. Here are the stories we plan to cover, time permitting: GitHub comments abused to push malware via Microsoft repo URLs The Redline stealer story brings to light the issue of the GitHub flaw that was abused by the threat actors behind RedLine. According to BleepingComputer, the use of the Microsoft GitHub repository makes the files appear trustworthy and the flaw itself “could be abused with any public repository on GitHub, allowing threat actors to create very convincing lures.” Their research shows that the malware zip files are uploaded as part of a comment left on a commit or issue in the project. “When leaving a comment, a GitHub user can attach a file. Instead of generating the URL after a comment is posted, GitHub automatically generates the download link which allows threat actors to attach their malware to any repository without them knowing.” (BleepingComputer) The art of penetrating a business without touching the endpoint Experts from Push Security are presenting detailed information in The Hacker News about the practice of “networkless” attack techniques targeting cloud apps and identities. Describing them as the new perimeter, the article describes techniques such as Adversary-in-the-Middle AiTM phishing, Instant Messaging IM phishing, SAMLjacking is where an attacker makes use of SAML SSO (Security Assertion Markup Language), and Oktajacking, in which an attacker can set-up their own Okta tenant to be used in highly convincing phishing attacks. A link to the report is available in the show notes to this episode. (The Hacker News) Cops may soon use AI to generate reports from body cams Taser maker and police contractor, Axon, has announced a new product called “Draft One,” which leverages OpenAI’s GPT-4 large language model to generate police reports from body cam audio. Critics are quick to point out that this use of AI could potentially lead to baseless accusations due to “hallucination” and further institutional ills like racial bias. Further, because police aren’t AI experts, they may not be well positioned to spot issues with AI outputs. Axon asserts that it has adjusted the AI model to ensure it can’t go off the rails. Axon’s CEO, Rick Smith, points out, “If an officer spends half their day reporting, and we can cut that in half, we have an opportunity to potentially free up 25 percent of an officer’s time to be back out policing.” (MSN and Futurism) Russian hackers claim cyberattack on Indiana water plant Over the weekend, the threat actor known as the Cyber Army of Russia posted a video on its Telegram channel showing how they hacked systems of the Tipton Wastewater Treatment Plant. Tipton provides the city of Tipton and surrounding areas with electric power, water, and wastewater collection and treatment. An Indiana official confirmed that the plant suffered a cyberattack on Friday evening. Tipton’s general manager, Jim Ankrum, said, “TMU experienced minimal disruption and remained operational at all times.” Security research firm Mandiant recently reported that the Cyber Army of Russia has ties to the Russian state actor, Sandworm, which was responsible for a separate attack on a water facility in Muleshoe, Texas that caused a tank to overflow. (The Record) New research discovers vulnerability in archived Apache project A vulnerability has been uncovered in an archived Apache project called “Cordova App Harness,” that could lead to software supply chain attacks. Attackers could use techniques such as Typosquatting, RepoJacking, and dependency confusion to insert vulnerable dependencies in open-source software. Ultimately, the issue could lead to execution of arbitrary code on the host machine where the vulnerable application is deployed. Researchers highlight the risk associated with dependencies on archived open-source projects that may not receive regular security updates. They recommend conducting regular code security scans, avoiding use of deprecated projects, following best practices for configuring dependencies, and providing security education to developers. (Legit Security) Threat actors plant fake assassination story The Czech News Agency, CTK, reports that an unidentified threat actor accessed its website to publish a fake story. The story claimed that Slovakia’s Security Information Service prevented an assassination attempt against newly elected Slovak president Peter Pellegrini by Ukrainian nationals. The faked story was published in English and Czech but did not get distribution to CTK’s clients. Researchers at Mandiant previously tied similar spoofed new stories to the Belarusian-affiliated threat group Ghostwriter, but no indication so far of their involvement here. (The Record) Chinese keyboard app flaws exposed Last year, researchers at Citizen Lab found that the popular Sogou Chinese keyboard app failed to use TLS when sending keystroke data to the cloud for typing predictions. This opens the door to potential spying on typed content. In a follow up, the researchers discovered that virtually all Chinese keyboard mobile apps had the same flaw. The researchers found a lack of TLS in apps from Baidu, Tencent, and iFlytek, as well as ones preinstalled on Android devices sold in China. The only device tested without the flaw was one preinstalled on a Huawei device. The researchers say the ease of exploiting this flaw likely means its been exploited at scale in the wild. The researchers contracted the app developers, with the majority fixing the issue before publication, although its unclear if preinstalled Android apps would receive an update. (MIT Technology Review, Citizen Lab) Sandworm targets critical Ukrainian orgs The Ukrainian Computer Emergency Response Team, or CERT-UA, released a report on activity by the Russian affiliated threat group Sandworm, believed to be associated with Russia’s GRU military intelligence unit. The report claims that in March 2024, Sandworm disrupted IT systems at energy, water, and heating suppliers throughout 10 regions in the country. The group accessed these providers through a variety of vectors, including supply chain attacks, technical support, and novel malware. CERT-UA believes Sandworm coordinated the cyberattacks with missile strikes on infrastructure facilities. (Bleeping Computer) submitted by /u/CISO_Series_Producer [link] [comments]

  • Most painful issues in chemical industry?
    by /u/AdEducational2648 (cybersecurity) on April 26, 2024 at 11:13 am

    Hey everyone, I'm wondering what are the most painful things to deal with in the chemical industry when it comes to a secure IT infrastructure? What are the most vulnerable spots in your opinion? Where do you see issues at your company? Especially now regarding upcoming regulatory changes with NIS2 in Europe, I'm wondering where to start my talking points with clients, and how not to be a salesperson but be of ACTUAL VALUE to a companies IT security. submitted by /u/AdEducational2648 [link] [comments]

  • Here's my article on Phishing Email Investigation: A Step-by-Step Analysis. Do read and let me know your best strategies to avoid falling for phishing scams?
    by /u/saip007 (cybersecurity) on April 26, 2024 at 10:54 am

    submitted by /u/saip007 [link] [comments]

  • Secondary cysec skill?
    by /u/PBBG12000 (cybersecurity) on April 26, 2024 at 9:53 am

    Hi! I have been in the industry for over 4 years now, working as an offensive security consultant. But lately I've been feeling that this is not enough. My aim really is to work as a solo consultant/contractor. So when I looked for such positions, rarely did I see anything related to pentesting or red teaming. Now, I understand there is a trust factor involved here and no one is stupid enough to give access of their internal networks to random guys off the internet. However, I did see many positions for stuff like audits, implementation of security tools etc. Due to this, I am considering developing a secondary skill set. My question is:- In your opinion, looking at the current scenario, what product/skill in cyber will you recommend for someone like me? Remember, I still want my primary thing to be red team and pentesting, I just want something to rely upon in case opportunities for it becomes scarcer than now. submitted by /u/PBBG12000 [link] [comments]

  • Any ideas on how I can convince my boss to not require users to give us their passwords?
    by /u/TheRealTengri (cybersecurity) on April 26, 2024 at 6:47 am

    I just recently got a new IT job and their internal security is awful. Two ways are that everybody had local admin rights (which I was able to convince them to change) and they are required to give us their password when we need to work on their laptop since the laptops are assigned to each person and we need to login to their account to make configurations on their account. I am trying to tell them we could just use the local administrator account and copy files to their user folder, but they don't listen. Any ideas on how I can convince my boss to not require users to give us their passwords? submitted by /u/TheRealTengri [link] [comments]

  • ArcaneDoor hackers exploit Cisco zero-days to breach govt networks
    by /u/anynamewillbefine (cybersecurity) on April 26, 2024 at 12:47 am

    submitted by /u/anynamewillbefine [link] [comments]

  • Has anyone made it out of this field?
    by /u/Longjumping-Pin5976 (cybersecurity) on April 25, 2024 at 7:45 pm

    I’ve worked in security for seven years and have had certain elements really worn me down over time. I don’t know what happened, but over the past year the following have really made me feel dissatisfaction with this work: •The feeling of not really creating anything with my labor. •Being a cost center to the business and having budget constantly scrutinized/not getting enough to adequately cover a security program. •Having documented security risk constantly dismissed by leadership or stakeholders. Constantly occuring despite tangibly showing them in multiple ways and communication styles. •Generally being disliked by other parts of the parts of the organization and the typically antisocial nature of technical workers at my org makes the job very lonely. •Constant, reactive firefighting. Nobody cares about what security does unless something negative is happening. I think security is interesting and was able to shrug most of this stuff off early on. But with the market contracting and companies trying to outsource or downsize a cost center, it makes the field less attractive for the long run. Has anyone found skills they picked up in security transferred well to other industries? I was looking at industrial hygiene and safety a while back and it seems like it would be more personally meaningful since there’s a human safety element. Hoping to hear if anyone was able to make moves out of a seemingly niche field. submitted by /u/Longjumping-Pin5976 [link] [comments]

  • My IT Department knows all our passwords
    by /u/Freshwater_Salmon556 (cybersecurity) on April 25, 2024 at 8:38 am

    Hi, was told to post here, hope that's ok. The company I work for has a small IT team and they ask us all for passwords. If we change them, they ask us again for the updated password. This can't be right, can it? We are ISO 2701 and 9001 acredited which must mean something when it comes to security? I don't want to talk to IT for fear of recriminations, what can I do? Among some of the documents we work with are folks' medical records. submitted by /u/Freshwater_Salmon556 [link] [comments]

  • Mentorship Monday - Post All Career, Education and Job questions here!
    by /u/AutoModerator (cybersecurity) on April 22, 2024 at 12:00 am

    This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]

Pass the 2023 AWS Cloud Practitioner CCP CLF-C02 Certification with flying colors Ace the 2023 AWS Solutions Architect Associate SAA-C03 Exam with Confidence Pass the 2023 AWS Certified Machine Learning Specialty MLS-C01 Exam with Flying Colors

List of Freely available programming books - What is the single most influential book every Programmers should read



#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks

Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
zCanadian Quiz and Trivia, Canadian History, Citizenship Test, Geography, Wildlife, Secenries, Banff, Tourism

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Africa Quiz, Africa Trivia, Quiz, African History, Geography, Wildlife, Culture

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA


Health Health, a science-based community to discuss health news and the coronavirus (COVID-19) pandemic

Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.

Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.

Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, and leagues around the world.

Turn your dream into reality with Google Workspace: It’s free for the first 14 days.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6 96DRHDRA9J7GTN6
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
63KKR9EULQRR7VE
63KNY4N7VHCUA9R
63LDXXFYU6VXDG9
63MGNRCKXURAYWC
63NGNDVVXJP4N99
63P4G3ELRPADKQU
With Google Workspace, Get custom email @yourcompany, Work from anywhere; Easily scale up or down
Google gives you the tools you need to run your business like a pro. Set up custom email, share files securely online, video chat from any device, and more.
Google Workspace provides a platform, a common ground, for all our internal teams and operations to collaboratively support our primary business goal, which is to deliver quality information to our readers quickly.
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE
C37HCAQRVR7JTFK
C3AE76E7WATCTL9
C3C3RGUF9VW6LXE
C3D9LD4L736CALC
C3EQXV674DQ6PXP
C3G9M3JEHXM3XC7
C3GGR3H4TRHUD7L
C3LVUVC3LHKUEQK
C3PVGM4CHHPMWLE
C3QHQ763LWGTW4C
Even if you’re small, you want people to see you as a professional business. If you’re still growing, you need the building blocks to get you where you want to be. I’ve learned so much about business through Google Workspace—I can’t imagine working without it.
(Email us for more codes)

error: Content is protected !!