CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Proxy vs VPN

App Icon Apple Books
Dive into a comprehensive AWS CCP CLF-C02 Certification guide, masterfully weaving insights from Tutorials Dojo, Adrian Cantrill, Stephane Maarek, and AWS Skills Builder into one unified resource.

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

CyberSecurity - What are some things that get a bad rap, but are actually quite secure?

CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.

There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.

1- PGP

PGP is a Form of Minimalism

As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:

  1. You get from them a PGP identity (public key). How you do that is entirely up to you.
  2. Your PGP program uses that identity to perform a single public key encryption of a message key.
  3. Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
  4. Your correspondent does the opposite operations to get the message.

If you want to sign your message then you:

  1. Hash the message.
  2. Do a public key signature operation on the hash and attach the result to the message.
  3. Your correspondent checks the signature from your PGP identity, which they have acquired somehow.

The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.

As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:

  • Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
  • A Signal session requires the storage and maintenance of a lot of state information.
  • Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
  • Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
  • Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.

The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.

I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.

2- Very long passwords that are actually a sentence

It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”

3- Writing passwords down.

I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Gemini, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.

Did I say passwords? I meant encryption keys.

4- Changing default ports for certain services like dbs

Most of the gangs out there use tools that don’t do a full search, so they go through the default port list

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

5- MFA in general.

Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.

If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.

If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.

6- Oauth for 3rd party apps.

Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.

7- Two-step verification.

Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.

8-Biometric Authentication.

The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.

Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.

One example of this is https://passage.id/ which is about as secure as you can get.

9- Zoom.

Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.

10- Unplugging the ethernet cable.

11- Browser password managers?

Rant moment: reasons cybersecurity fails

<Rant>

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.

No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.

This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.

</Rant>

Why do cyber attackers commonly use social engineering attacks?

Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.

Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.

To conclude:

Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.

source: r/cybersecurity

Source: r/cybersecurity

  • Windows DNSSEC not working on public DNS/IP
    by /u/No_Consideration3743 (cybersecurity) on June 21, 2024 at 7:18 am

    Testing scenario: access the website with poisoned DNS cache and without poisoned DNS cache. For internal servers/IP/DNS, it works. -provides me valid IP of example.com even DNS was poisoned, and rejects bad IP. For public (google.com, youtube.com, etc.) -it gives me the bad IP from poisoned DNS cache. I think its not working when using public services, or did a missed any configuration? Please advise. submitted by /u/No_Consideration3743 [link] [comments]

  • U.S. Bans Kaspersky Software, Citing National Security Risks
    by /u/Redditoscoper (cybersecurity) on June 21, 2024 at 6:13 am

    submitted by /u/Redditoscoper [link] [comments]

  • Help breaking out of Mid-Level jobs
    by /u/millsa_acm (cybersecurity) on June 21, 2024 at 3:42 am

    Hola, So I have been in Cyber going on 3 years in September and have about 11 additional years of Windows/Linux admin experience. I currently work for a defense contractor in the Risk, Governance, and Compliance section, but I'm feeling stuck. I am currently studying for my CISSP which is slow but steady, but its getting there. I always keep my eye on the job market for advancement opportunities, but all these positions have different requirements, most of which I haven't had the chance to dive into yet. I guess at this point I am feeling overwhelmed with the direction I want to go and the best way to get the required experience a lot of these jobs are looking for. I am not sure if I should stick it out here to get further experience along with the years on my resume or what. I love my job, but I am always looking for ways to improve myself. What advice would you give someone that doesn't have a specific Cyber field interest, and how would you go about getting the experience your current job cant give you. submitted by /u/millsa_acm [link] [comments]

  • Fiserv Core UAR
    by /u/No_Dealer_2459 (cybersecurity) on June 21, 2024 at 2:43 am

    Anyone work in banking who has completed a Fiserv Core User access review? Looking to understand how to complete this using a risk based approach. submitted by /u/No_Dealer_2459 [link] [comments]

  • CISO Interview Advice
    by /u/not_today88 (cybersecurity) on June 21, 2024 at 12:34 am

    Calling all CISOs, infosec and hiring managers: I have my first CISO interview next week and as part of my preparation, I'd like to pick your brains about what to expect and further prepare for. About me: I have 20+ years in IT, the past decade in management, but my background has primarily been in infrastructure/systems admin, security/risk, support, and project management. I have a CISSP and blah-blah-blah, but I know I don't know everything. I'm humble, but I don't want to appear too humble and sell myself short or talk out my ass either. This opportunity is a big jump for me. Any advice greatly appreciated. EDIT: Thank you all for the stellar advice! These are fantastic suggestions. submitted by /u/not_today88 [link] [comments]

  • Can virus use network isolation
    by /u/MostStrict4099 (cybersecurity) on June 21, 2024 at 12:27 am

    Hello. I'm curious, has there ever been a case where viruses use network isolation to prevent the reporting of suspicious activity to the cloud console? The reason I'm asking is that I've recently installed two EDR solutions on my computer. One of them triggered auto-isolation, blocking the communication of the other. Only when the endpoint was un-isolated did the event get reported to the other console. This has made me wonder about a potential attack chain that could exploit this situation. submitted by /u/MostStrict4099 [link] [comments]

  • Interview questions
    by /u/Bakla5hx (cybersecurity) on June 21, 2024 at 12:09 am

    What are some questions you all ask during interviews for a Linux heavy role? Can be technical or not. Curious to see everyone’s answers and how detailed or generic they are. submitted by /u/Bakla5hx [link] [comments]

  • Unmasking Wave Stealer: A Deep Dive into Malware Analysis and Its Ultimate Shutdown
    by /u/Few-Calligrapher2797 (cybersecurity) on June 21, 2024 at 12:09 am

    🚨 U*nmasking Wave Stealer: A Deep Dive into Malware Analysis and Its Ultimate Shutdown *🚨 Ever wondered how a seemingly benign app can wreak havoc on your digital life? Meet Wave Stealer, the new malware menace written in Javascript, meticulously crafted and continually updated to evade antivirus detection. Here's what you need to know: 🕵️‍♂️ T*he Developer: *The mastermind, a French-speaking developer known as "sudry" (aka u/svvdry on Telegram), advertised Wave Stealer on Telegram and Discord, ensuring it remained undetected by AV vendors by monitoring and updating it constantly. ⚙️ How It Works: Wave Stealer uses the Electron framework, packing its malicious payload into an NSIS installer. Once executed, it drops files into your system, launching "Installer.exe" to perform its dirty work, including contacting several C2 domains. 🔍 M*alware Analysis: *Our deep dive reveals intricate obfuscation techniques and anti-debugging methods, making Wave Stealer a formidable foe. But its builder and persistence mechanisms had flaws, leading to issues in maintaining its stealth. 📉 T*he Shutdown: *Despite its initial success, Wave Stealer’s author announced its shutdown on June 8, 2024, citing ongoing development challenges. The malware’s C2 domains and panel are now offline, but the saga of Wave Stealer offers valuable insights into modern cyber threats. 🌐 F*ull Analysis: *Dive into the full report to uncover the detailed anatomy of Wave Stealer, from its obfuscated source code to its failed persistence attempts. Learn how this malware targeted popular browsers, apps, and even cryptocurrency wallets, and how it was ultimately brought down. 🔗 R*ead More: *https://medium.com/@callyso0414/unmasking-wave-stealer-a-dive-into-wave-stealer-malware-analysis-and-its-ultimate-shutdown-faa76656be36 👥 J*oin the Discussion: *Share your thoughts and insights on Wave Stealer. How can we better protect ourselves from such evolving threats? Let’s discuss! submitted by /u/Few-Calligrapher2797 [link] [comments]

  • 慢霧CISO指出安全公司對交易平台安全測試的常規流程 / 先聖先賢的心理素質
    by SDChain IoT (Security on Medium) on June 20, 2024 at 11:51 pm

    針對Kraken和CertiK之間的安全性漏洞報告爭議,慢霧科技首席資訊安全官23pds在X平台表示,先不論對錯,從測試角度出發:1.安全測試,可以小額充值測試,證明可行性即可。2.如果是為了驗證風控機制,可以獲取平台授權的情況下,單筆測試,驗證完成,立即聯繫平台退還,並保留與平Continue reading on Medium »

  • The Future of Cybersecurity: How AI and Blockchain Are Revolutionizing Security
    by sarthak siddha (Cybersecurity on Medium) on June 20, 2024 at 11:13 pm

    Cybersecurity threats are constantly evolving, demanding innovative solutions to stay ahead of the curve. While traditional methods have…Continue reading on Medium »

  • Building a Detection Engineering Home Lab with Splunk
    by Peter M. (Cybersecurity on Medium) on June 20, 2024 at 10:27 pm

    IntroductionContinue reading on Medium »

  • : …
    by Ahad's Quil (Security on Medium) on June 20, 2024 at 9:42 pm

    Comprehensive Guide to High-Quality Rim Exit Devices: Ensuring Safety and SecurityContinue reading on Medium »

  • 2cef Hacks
    by 2cef C (Cybersecurity on Medium) on June 20, 2024 at 9:39 pm

    This is my journal/blog/document on things I get to learn in cybersecurity as the days pass. Stay Tuned!!Continue reading on Medium »

  • Why are data breaches increasing everyday?
    by Protected Harbor (Security on Medium) on June 20, 2024 at 9:25 pm

    Data breaches are escalating daily due to several key factors. Firstly, rapid digital transformation across industries has expanded the…Continue reading on Medium »

  • Why are data breaches increasing everyday?
    by Protected Harbor (Cybersecurity on Medium) on June 20, 2024 at 9:25 pm

    Data breaches are escalating daily due to several key factors. Firstly, rapid digital transformation across industries has expanded the…Continue reading on Medium »

  • Notcoin: From Play-to-Earn Game to Real-World Crypto
    by Asemcrypt (Cybersecurity on Medium) on June 20, 2024 at 9:18 pm

    Continue reading on Medium »

  • Learning Networks with Linux: Wi-Fi IEEE 802.11 (part II)
    by Audrey's weBlog & reViews (Cybersecurity on Medium) on June 20, 2024 at 9:10 pm

    The anatomy of Wi-Fi (802.11) protocol is discussed. In the long run, this knowledge will be very useful if one wants to develop the Wi-Fi…Continue reading on Medium »

  • Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs: CVE-2024–0762
    by Lithium Networks (Cybersecurity on Medium) on June 20, 2024 at 9:05 pm

    In a significant development for cybersecurity, researchers have uncovered a critical vulnerability in the Unified Extensible Firmware…Continue reading on Medium »

  • I recently had the pleasure of attending RVASec 2024, one of the most valuable and significant…
    by Jad Elahmad (Cybersecurity on Medium) on June 20, 2024 at 8:36 pm

    Before I dive in, I want to give a shout-out to the conference team who created these amazing badges. Wow! They get better every year and…Continue reading on Medium »

  • Система компетенций Европола по борьбе с киберпреступностью 2024
    by Ирония безопасности (Security on Medium) on June 20, 2024 at 8:06 pm

    Что действительно нужно миру, так это ещё одно глубокое погружение в «Систему компетенций Европола по борьбе с киберпреступностью 2024»…Continue reading on Medium »

  • Система компетенций Европола по борьбе с киберпреступностью 2024
    by Ирония безопасности (Cybersecurity on Medium) on June 20, 2024 at 8:06 pm

    Что действительно нужно миру, так это ещё одно глубокое погружение в «Систему компетенций Европола по борьбе с киберпреступностью 2024»…Continue reading on Medium »

  • Securing Your Kubernetes Platform
    by Olawale Olaleye (Security on Medium) on June 20, 2024 at 7:59 pm

    Best practises for securing Kubernetes ClusterContinue reading on Medium »

  • Europol Cybercrime Training Competency Framework 2024
    by Snarky Security (Security on Medium) on June 20, 2024 at 7:52 pm

    What the world really needs is another deep dive into the “Europol Cybercrime Training Competency Framework 2024”. Here, the brilliant…Continue reading on Medium »

  • A Privacy Enhancing Technologies Primer
    by Alex (Security on Medium) on June 20, 2024 at 7:17 pm

    By Alex PrudenContinue reading on Medium »

  • Cyber Range Solutions
    by /u/CyberRangeNinja (cybersecurity) on June 20, 2024 at 7:16 pm

    Looking to bring in a Cyber Range solution for my SOC team, any insights into the ones out there you would be willing to share? submitted by /u/CyberRangeNinja [link] [comments]

  • Building an AppSec Program: Part 1 of a 4-Part Series on Application Security
    by Matthew Keeley (Security on Medium) on June 20, 2024 at 6:36 pm

    Hi there! You might know me from my technical deep dives into pentesting, exploit development, and zero-day research. Today, I’m shaking…Continue reading on ProDefense »

  • Secure Your Remote Work Setup with NordVPN: Embracing Work from Anywhere Safely!
    by Duke Dylans (Security on Medium) on June 20, 2024 at 6:34 pm

    In recent years, the concept of remote work has revolutionized how businesses operate and how individuals manage their careers. Whether…Continue reading on Medium »

  • Job Hopping
    by /u/Piece-Exotic (cybersecurity) on June 20, 2024 at 6:25 pm

    I was hired at an MSSP around 4 months ago, I have been learning a lot and even made some python scripts for the rest of the soc to automate little tasks to make everyone's workflow a little faster, as well as doing the typical soc l1 triages. The issue is, things took a turn when I got assigned working graveyard, and life outside of work has taken a big hit. Would this be looked at as a red flag and job hopping when it comes to my situation? This is my first cyber role by the way, I have 4 years of technical support, as well as CCNA, Security+, CySA+, and BTL1. submitted by /u/Piece-Exotic [link] [comments]

  • Memory Forensic Challenges' Write-ups
    by /u/0xHoxed (cybersecurity) on June 20, 2024 at 6:11 pm

    ✨ Explore Our In-Depth Write-Ups for Memory Forensic Challenges! ✨ Dive into our dedicated section for comprehensive write-ups on memory forensic labs and challenges.Whether created by us or referenced from other platforms, each challenge has been meticulously solved by our team or the original author - almost always from one of these two sources. If you're stuck, our detailed guides will help you understand every step and uncover the missing pieces to move forward! 😁 Note: Our walk-throughs are exclusively for retired challenges to keep the ongoing competition alive for everyone else. Available in video 🎥 or text formats! 📝 📌 Check them out here! submitted by /u/0xHoxed [link] [comments]

  • Protect Yourself: The Ultimate Guide to Becoming 100% Anonymous Online
    by Rikard Lundin (Security on Medium) on June 20, 2024 at 5:35 pm

    Ever get the feeling that somebody is watching you on the Internet? It’s not paranoia; in fact: doxxing, tracking, DDoS attacks, and more…Continue reading on Medium »

  • Determine the Real Impact of a Security Breach Using the “So What?” Technique
    by /u/utku1337 (cybersecurity) on June 20, 2024 at 3:56 pm

    submitted by /u/utku1337 [link] [comments]

  • What is the significance of AI in the world of Cybersecurity?
    by /u/Rude_Pie_3588 (cybersecurity) on June 20, 2024 at 3:18 pm

    submitted by /u/Rude_Pie_3588 [link] [comments]

  • US poised to ban sales of Kaspersky software – reports
    by /u/Franco1875 (cybersecurity) on June 20, 2024 at 3:08 pm

    Going to cause a fair few headaches here and fully expect Kaspersky to spit the dummy out big time. submitted by /u/Franco1875 [link] [comments]

  • Kaspersky Ban Coming Thursday to US
    by /u/wolfpackunr (cybersecurity) on June 20, 2024 at 2:09 pm

    After the announcement is released within 100 days all sales, downloads, and future updates including virus definitions will cease. https://www.reuters.com/technology/biden-ban-us-sales-kaspersky-software-over-ties-russia-source-says-2024-06-20/ https://www.cnbc.com/2024/06/20/biden-to-ban-us-sales-of-kaspersky-software-over-ties-to-russia.html submitted by /u/wolfpackunr [link] [comments]

  • I’m Robin Williams. Director of Threat Intelligence and AI at Prelude Security. Former CTI manager at Home Depot. Here to talk about AI, threat intelligence, and automating CTI analysis. AMA
    by /u/EnoughAbrocoma5190 (cybersecurity) on June 20, 2024 at 1:34 pm

    Hey folks, I’m Robin Williams, I’ve spent over a decade in cybersecurity, focusing mainly on threat intelligence and purple teaming. I previously managed the threat intelligence program at Home Depot and led security research at Prelude Security. In my current role as the Director of AI at Prelude, I’m building AI-enabled capabilities that transform threat intelligence into actionable detection rules, hunt queries, and more. I’m here to discuss my journey in cybersecurity, my experience running threat intelligence programs, building AI agents, leveraging large language models (LLMs), and much more. Let’s dive in—Ask Me Anything! Edit: I will do my best to answer the rest through tomorrow at 12 ET! submitted by /u/EnoughAbrocoma5190 [link] [comments]

  • Where to go from SOC Analyst?
    by /u/Bubbly-Hold-7560 (cybersecurity) on June 20, 2024 at 1:29 pm

    I don't tend to use Reddit but I have lurked here for a long time when I was aiming to get into the industry. Here is my brief background: Previous military service Have a decent entry level cert (SANS) but no other IT experience other than cybersecurity focused self learning. Landed Tier 1 SOC analyst role at a very good MSSP (been here 6 months now) Have taken to it like a bird to flight and have excelled. I regularly get great feedback from T3 analysts and above. I'm always inquisitive and have learned so much. However, I can start to see the knowledge ceiling approach for on-the-job learning. I doubt a promotion is awaiting despite the good feedback. Currently working on some MS certs when I get the chance. I really love the work itself. I recently went to my first major industry event and did some awesome networking. It made me realise what else is out there. Now...the biggest problem with my role is the shift work, the constantly changing shifts are just a killer and on my days off I have so little motivation to do any more learning. By the time I get myself into the zone it is already the opposite shift schedule and I have close to 0 time to study due to commuting to work. I'm pretty much desperate to move to a new role that is 9-5, as with some consistency in life I feel I can accelerate my learning so much. I would like to land a security engineer role, or perhaps Jr pentester. Even a security analyst that is a more generic role than isolated to the SOC would be worth a move. How do I beef up my résumé to land those kind of roles? I can very confidently talk about what I do at work, but the theoretical knowledge has started to dwindle as I haven't kept up. I thought about investing some cash into a homelab setup. Probably an ESXI-based AD environment with a couple of client VMs, maybe a honeypot, PFSense firewall. Anything to get some different type of practise and to start learning new things as I'm gradually being less and less challenged in this way at work. Any advice would be helpful. submitted by /u/Bubbly-Hold-7560 [link] [comments]

  • Apple’s Internal Tools Exposed: June 2024 Data Breach
    by /u/proudpolock (cybersecurity) on June 20, 2024 at 1:12 pm

    According to the post by IntelBroker, “In June 2024, Apple.com suffered a data breach,” presumably at their hands, that led to the exposure. The threat actor claims to have obtained source code for the following internal tools: AppleConnect-SSO Apple-HWE-Confluence-Advanced AppleMacroPlugin submitted by /u/proudpolock [link] [comments]

  • Thoughts of Workstation Admin
    by /u/InAllThreeHoles (cybersecurity) on June 20, 2024 at 12:23 pm

    I made a post about LAPS being rejected earlier. A suggestion caught my eye. Using a GPO to create workstations local admins for a small group of it techs seems good but if one of these gets compromised wont it void what LAPS was implemented to do? How do people with LAPS treat with local admin usage in a LAPS environment? Lets say a department requires a software installed on short notice. submitted by /u/InAllThreeHoles [link] [comments]

  • Books to read to learn more about the industry
    by /u/Speedeyyyyy (cybersecurity) on June 20, 2024 at 11:37 am

    does anyone have good sources (such as books, podcasts, websites, channels etc.) for me to stay up to date with what's happening with Cyber Security? I'm new to the industry so I'd like to have a few sources where I can have constant access to new information and news about what's happening to learn more. Edit: I can't change the post title but any sources, including books, will be very very helpful for me 🙂 submitted by /u/Speedeyyyyy [link] [comments]

  • How do I prioritize vulnerabilities?
    by /u/Legitimate_Sun_5930 (cybersecurity) on June 20, 2024 at 5:07 am

    I'm a soc analyst. First soc job. It's also a brand new soc so we don't really have established procedures yet. One thing I'm wondering about is vulnerabilities. Over the weekend I saw blogs about the windows wifi driver vulnerability. Cve-2024-30078 I looked in our end point manager and it's reporting 824 assets are missing the patch. But where do I go from there? It has a cvss score of 8 which is high. So in my head I go into a sort of panic mode. "HIGH VULNERABILITY NEED TO GET 824 ASSETS PATCHED RIGHT THIS SECOND" But no one else seems to have that sense of urgency. Assets get patched every month anyways and our next patch window is in 2 weeks. Which leads me to my next question. For any vulnerabilities we report, we have to open a ticket and assign it to whoever owns that system. But is it even necessary to open a ticket for something like this when we already know it's going to get patched in 2 weeks? What does opening a ticket do other than give someone more paperwork to fill out? It's not like this specific cve is a complex fix that requires infrastructure changes. It's a windows update. It would've got applied whether there was a cve or not. If I open a ticket for this specific cve, the sysadmins will just put the ticket on hold and say patching in 2 weeks. They're not going to open an emergency change to apply the patch to 824 assets right this second. So I'm failing to see the purpose of dumping a ticket on them to address something that was already going to be addressed anyways. It's redundant work. The only positive thing I see in that is being able to quantify our work to senior leadership. Outside of a c level perspective, it doesn't provide any value to the company. At least that's how I see it. But its my first soc role so I'm sure I'm just being naive. And this makes me feel like vulnerability reporting is useless unless it was an actively exploited threat that needs to be patched right this second. Option 1: don't report vulnerability. It gets patched on patch weekend. Option 2: report vulnerability. It gets patched on patch weekend. 🤷‍♂️ *Thank you for the replies. Valuable information for me. submitted by /u/Legitimate_Sun_5930 [link] [comments]

  • How well do you know the OWASP Top 10
    by /u/Penny-loafers (cybersecurity) on June 20, 2024 at 1:46 am

    submitted by /u/Penny-loafers [link] [comments]

  • There are 3.4 million cybersecurity professionals missing in the world
    by /u/bellangy-0805 (cybersecurity) on June 20, 2024 at 12:46 am

    submitted by /u/bellangy-0805 [link] [comments]

  • CDK cyberattack shuts down auto dealerships across the U.S. Here's what to know.
    by /u/sexuallyactivepope (cybersecurity) on June 20, 2024 at 12:25 am

    submitted by /u/sexuallyactivepope [link] [comments]

  • How beneficial are sites like HackTheBox
    by /u/bosnianlegend10 (cybersecurity) on June 19, 2024 at 10:21 pm

    How helpful would you say sites like HackTheBox, TryHackme, and CyberDefenders are? Do they teach you how to attack certain issues as well as things you would do day-to-day or is it more so familiarizing you with software? I'm looking to get hands-on experience to hopefully eventually get a job in cyber but just need to see if these sites would be the best way to learn. submitted by /u/bosnianlegend10 [link] [comments]

  • Cyber security as a career
    by /u/hockeyjoeg16 (cybersecurity) on June 19, 2024 at 4:29 pm

    Hey guys im a 23M who currently works construction and hate it. I see commercials on TV for local online colleges that offer cyber security and it kinda interests me my question is I fully understand it's gonna be challenging but can anyone learn it? And is it a good career path for a steady life? Is it hard to find a job once you have your qualifications? And can you work remotely? Thanks in advance im just trying to find a good career in life🤣 submitted by /u/hockeyjoeg16 [link] [comments]

  • Mentorship Monday - Post All Career, Education and Job questions here!
    by /u/AutoModerator (cybersecurity) on June 17, 2024 at 12:00 am

    This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]

Ace the 2023 AWS Solutions Architect Associate SAA-C03 Exam with Confidence Pass the 2023 AWS Certified Machine Learning Specialty MLS-C01 Exam with Flying Colors

List of Freely available programming books - What is the single most influential book every Programmers should read



#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks

Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
zCanadian Quiz and Trivia, Canadian History, Citizenship Test, Geography, Wildlife, Secenries, Banff, Tourism

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Africa Quiz, Africa Trivia, Quiz, African History, Geography, Wildlife, Culture

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA


Health Health, a science-based community to discuss health news and the coronavirus (COVID-19) pandemic

Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.

Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.

Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, and leagues around the world.

Turn your dream into reality with Google Workspace: It’s free for the first 14 days.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6 96DRHDRA9J7GTN6
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
63KKR9EULQRR7VE
63KNY4N7VHCUA9R
63LDXXFYU6VXDG9
63MGNRCKXURAYWC
63NGNDVVXJP4N99
63P4G3ELRPADKQU
With Google Workspace, Get custom email @yourcompany, Work from anywhere; Easily scale up or down
Google gives you the tools you need to run your business like a pro. Set up custom email, share files securely online, video chat from any device, and more.
Google Workspace provides a platform, a common ground, for all our internal teams and operations to collaboratively support our primary business goal, which is to deliver quality information to our readers quickly.
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE
C37HCAQRVR7JTFK
C3AE76E7WATCTL9
C3C3RGUF9VW6LXE
C3D9LD4L736CALC
C3EQXV674DQ6PXP
C3G9M3JEHXM3XC7
C3GGR3H4TRHUD7L
C3LVUVC3LHKUEQK
C3PVGM4CHHPMWLE
C3QHQ763LWGTW4C
Even if you’re small, you want people to see you as a professional business. If you’re still growing, you need the building blocks to get you where you want to be. I’ve learned so much about business through Google Workspace—I can’t imagine working without it.
(Email us for more codes)