CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Proxy vs VPN
DjamgaMind

DjamgaMind: Audio Intelligence for the C-Suite (Energy, Healthcare, Finance)

Are you drowning in dense legal text? DjamgaMind is the new audio intelligence platform that turns 100-page healthcare or Energy mandates into 5-minute executive briefings. Whether you are navigating Bill C-27 (Canada) or the CMS-0057-F Interoperability Rule (USA), our AI agents decode the liability so you don’t have to. 👉 Start your specialized audio briefing today at Djamgamind.com


AI Jobs and Career

I wanted to share an exciting opportunity for those of you looking to advance your careers in the AI space. You know how rapidly the landscape is evolving, and finding the right fit can be a challenge. That's why I'm excited about Mercor – they're a platform specifically designed to connect top-tier AI talent with leading companies. Whether you're a data scientist, machine learning engineer, or something else entirely, Mercor can help you find your next big role. If you're ready to take the next step in your AI career, check them out through my referral link: https://work.mercor.com/?referralCode=82d5f4e3-e1a3-4064-963f-c197bb2c8db1. It's a fantastic resource, and I encourage you to explore the opportunities they have available.

Job TitleStatusPay
Full-Stack Engineer Strong match, Full-time $150K - $220K / year
Developer Experience and Productivity Engineer Pre-qualified, Full-time $160K - $300K / year
Software Engineer - Tooling & AI Workflows (Contract) Contract $90 / hour
DevOps Engineer (India) Full-time $20K - $50K / year
Senior Full-Stack Engineer Full-time $2.8K - $4K / week
Enterprise IT & Cloud Domain Expert - India Contract $20 - $30 / hour
Senior Software Engineer Contract $100 - $200 / hour
Senior Software Engineer Pre-qualified, Full-time $150K - $300K / year
Senior Full-Stack Engineer: Latin America Full-time $1.6K - $2.1K / week
Software Engineering Expert Contract $50 - $150 / hour
Generalist Video Annotators Contract $45 / hour
Generalist Writing Expert Contract $45 / hour
Editors, Fact Checkers, & Data Quality Reviewers Contract $50 - $60 / hour
Multilingual Expert Contract $54 / hour
Mathematics Expert (PhD) Contract $60 - $80 / hour
Software Engineer - India Contract $20 - $45 / hour
Physics Expert (PhD) Contract $60 - $80 / hour
Finance Expert Contract $150 / hour
Designers Contract $50 - $70 / hour
Chemistry Expert (PhD) Contract $60 - $80 / hour

CyberSecurity - What are some things that get a bad rap, but are actually quite secure?

CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.

There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.

1- PGP

PGP is a Form of Minimalism

As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:

  1. You get from them a PGP identity (public key). How you do that is entirely up to you.
  2. Your PGP program uses that identity to perform a single public key encryption of a message key.
  3. Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
  4. Your correspondent does the opposite operations to get the message.

If you want to sign your message then you:

  1. Hash the message.
  2. Do a public key signature operation on the hash and attach the result to the message.
  3. Your correspondent checks the signature from your PGP identity, which they have acquired somehow.

The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.

As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:

  • Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
  • A Signal session requires the storage and maintenance of a lot of state information.
  • Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
  • Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
  • Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.

The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.

I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.

2- Very long passwords that are actually a sentence

It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”

AI-Powered Professional Certification Quiz Platform
Crack Your Next Exam with Djamgatech AI Cert Master

Web|iOs|Android|Windows

Are you passionate about AI and looking for your next career challenge? In the fast-evolving world of artificial intelligence, connecting with the right opportunities can make all the difference. We're excited to recommend Mercor, a premier platform dedicated to bridging the gap between exceptional AI professionals and innovative companies.

Whether you're seeking roles in machine learning, data science, or other cutting-edge AI fields, Mercor offers a streamlined path to your ideal position. Explore the possibilities and accelerate your AI career by visiting Mercor through our exclusive referral link:

Find Your AI Dream Job on Mercor

Your next big opportunity in AI could be just a click away!

3- Writing passwords down.

I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.

We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.

Did I say passwords? I meant encryption keys.

4- Changing default ports for certain services like dbs

Most of the gangs out there use tools that don’t do a full search, so they go through the default port list

AI Jobs and Career

And before we wrap up today's AI news, I wanted to share an exciting opportunity for those of you looking to advance your careers in the AI space. You know how rapidly the landscape is evolving, and finding the right fit can be a challenge. That's why I'm excited about Mercor – they're a platform specifically designed to connect top-tier AI talent with leading companies. Whether you're a data scientist, machine learning engineer, or something else entirely, Mercor can help you find your next big role. If you're ready to take the next step in your AI career, check them out through my referral link: https://work.mercor.com/?referralCode=82d5f4e3-e1a3-4064-963f-c197bb2c8db1. It's a fantastic resource, and I encourage you to explore the opportunities they have available.

5- MFA in general.

Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.

If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.

If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.

6- Oauth for 3rd party apps.

Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.

7- Two-step verification.

Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.

8-Biometric Authentication.

The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.

Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Gemini, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

One example of this is https://passage.id/ which is about as secure as you can get.

9- Zoom.

Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.

10- Unplugging the ethernet cable.

11- Browser password managers?

Rant moment: reasons cybersecurity fails

<Rant>

People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.

No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.

This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.

</Rant>

Why do cyber attackers commonly use social engineering attacks?

Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.

Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.

To conclude:

Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.

source: r/cybersecurity

Source: r/cybersecurity

  • Which OS to learn cybersecurity
    by /u/Training-Sun-8097 (cybersecurity) on January 15, 2026 at 10:45 am

    Hi, I am new here, and I want to learn cybersecurity by myself, I have 2 pc, a recent one (2024) with windows, and an old one (2016) with nothing on it. I d like to use the old one to try and learn stuff but I don't know which OS I should use. I had Linux Unbutu but I thought that in professional life people don't use Linux. Should I reinstall Windows on my old PC ? Knowing that it has 8Go RAM so not enough to install the latest versions of windows. I ve seen "windows server" like windows but without the UI (which is fine for me, I just want to attack it) Any thoughts ? Thanks ! submitted by /u/Training-Sun-8097 [link] [comments]

  • Dutch cops cuff alleged AVCheck malware kingpin in Amsterdam
    by /u/rkhunter_ (cybersecurity) on January 15, 2026 at 10:31 am

    submitted by /u/rkhunter_ [link] [comments]

  • Why Python Is the Best Way to Start Ethical Hacking (Especially If You’re a Beginner)
    by Vignesh Selvaraj (Cybersecurity on Medium) on January 15, 2026 at 10:24 am

    Most Beginners Learn Ethical Hacking the Wrong Way — Python Fixed That for MeContinue reading on Python in Plain English »

  • Professional Security Guard Services for Residential & Commercial Needs
    by Secure 24 Seven (Security on Medium) on January 15, 2026 at 10:23 am

    Security is a critical requirement for both homes and businesses in today’s environment. From protecting families and residents to…Continue reading on Medium »

  • Microsoft disrupts massive RedVDS cybercrime virtual desktop service
    by /u/rkhunter_ (cybersecurity) on January 15, 2026 at 10:23 am

    submitted by /u/rkhunter_ [link] [comments]

  • Top 10 AI Cyber Security Tools to Protect Your Organisation in 2026
    by cyber security Updates (Cybersecurity on Medium) on January 15, 2026 at 10:22 am

    Do you know how AI Cyber Security Tools support organisations to protect their data and devices against unknown online threats? If not…Continue reading on Medium »

  • Search HTB: A Complete Walkthrough
    by Legenddhruv (Cybersecurity on Medium) on January 15, 2026 at 10:13 am

    Mastering Active Directory Exploitation Through Methodical PersistenceContinue reading on Medium »

  • Technical Whitepaper: The EIN Framework
    by Zeyd Aar Team Algo (Cybersecurity on Medium) on January 15, 2026 at 10:05 am

    Title: Eliminating Client-Side Code Execution via Execution Isolation Nexus (EIN)Continue reading on Medium »

  • The Hidden Price of Data Breaches
    by Hays Communication (Cybersecurity on Medium) on January 15, 2026 at 10:01 am

    In today’s digital-first economy, data is one of the most valuable assets a business can own and one of the most vulnerable. For companies…Continue reading on Medium »

  • A Web2.5 Vulnerability Story
    by Bogdan Kondratev (Security on Medium) on January 15, 2026 at 10:00 am

    Between Backend and OnchainContinue reading on Decurity »

  • Write-up: Relevant lab on THM
    by cLODIUS cOCK (Cybersecurity on Medium) on January 15, 2026 at 9:54 am

    This document is a structured security write-up based on hands-on exploitation of the Relevant lab on TryHackMe website…Continue reading on Medium »

  • An Image That Shares Grief Through Helpless Eyes
    by Sugunbhaskar (Security on Medium) on January 15, 2026 at 9:52 am

    I wonder, are we really in civilized world?Continue reading on Medium »

  • Beyond Time Travel: Why Snowflake’s New Immutable Backups Are a Game Changer for Cyber-Resilience
    by Pascal Pfäffle (Security on Medium) on January 15, 2026 at 9:47 am

    IntroductionContinue reading on Medium »

  • Information Security on behalf of Business Continuity
    by Ziya Gokalp (Cybersecurity on Medium) on January 15, 2026 at 9:45 am

    With existing audit and control mechanisms, the potential financial losses that may arise when business operations and operational…Continue reading on Medium »

  • Decision Making Battle Between Attacker and Defender: Game Theory in Cybersecurity
    by Ziya Gokalp (Cybersecurity on Medium) on January 15, 2026 at 9:45 am

    Today, cybersecurity is often discussed in terms of new technologies, products, and automation solutions. However, the reality we observe…Continue reading on Medium »

  • Crypto and malware investigations: what’s a realistic “entry-level” skill stack?
    by /u/Gunnilingus (cybersecurity) on January 15, 2026 at 9:44 am

    A lot of people want to jump straight into cryptoasset tracing or malware RE, what do you consider the minimum viable skills n tools for a junior to be actually useful (OS internals, basic reversing etc)? What would be the top priorities or common traps to avoid? submitted by /u/Gunnilingus [link] [comments]

  • The Visual Ghost: How a Single Unicode Character Led to a Critical Account Takeover
    by Be nice insabat (Cybersecurity on Medium) on January 15, 2026 at 9:41 am

    Assalam o alaikum muslims and hello for non muslims i hope all of u are doing great and keep learning every day, i am back with another…Continue reading on Medium »

  • How I Secured My Entire Digital Life in 24 Hours?
    by Team TIE (Security on Medium) on January 15, 2026 at 9:33 am

    A year ago, I would have laughed if someone told me I could secure my entire digital life in a single day.Continue reading on OZ Buzz »

  • Governance, Risk, & Compliance (WGU D486)
    by Irene A. Gil (Cybersecurity on Medium) on January 15, 2026 at 9:29 am

    Why I Chose a GRC Course After Passing CySA+Continue reading on MeetCyber »

  • DEFIANCE Act Bipartisan bill strengthens the rights of sexually explicit deepfake victims
    by /u/EntranceWarm3918 (cybersecurity) on January 15, 2026 at 8:29 am

    submitted by /u/EntranceWarm3918 [link] [comments]

  • Challenges Faced by the Indonesian Army (TNI AD) in the Case Study of Illegal Wildlife Trade in…
    by Laras Asi (Security on Medium) on January 15, 2026 at 8:24 am

    As Indonesia strives to maintain national stability and security, threats increasingly arise from areas often underestimated, such as…Continue reading on Medium »

  • Residential Security Services in Dubai — Protecting Homes with Magnum Security
    by Magnum Security (Security on Medium) on January 15, 2026 at 8:01 am

    Dubai is known for its luxury villas, gated communities, and high-rise residential towers. With this rapid urban growth, ensuring the…Continue reading on Medium »

  • What should organizations look for when choosing a VAPT provider in 2026?
    by /u/Educational-Split463 (cybersecurity) on January 15, 2026 at 7:53 am

    Hello everyone, Cyber threats and data breaches are increasing, and our organization is gearing up to do VAPT: Vulnerability Assessment & Penetration Testing, by the year 2026. India-based providers are being considered more so for the costs and time zones. Rather than advertisements, I'd really love to learn from personal experiences and points of view on how practitioners assess the effectiveness of the VAPT vendors they're dealing with. Points of concern: -Even depth of testing (manual vs. automated) -The meaning of report quality and remediation guidance -Responsiveness during and post-engagement -Experience with compliance-driven testing (ISO 27001, PCI DSS, etc.) -Post-assessment support scope: websites, APIs, network infrastructure, and cloud environments (AWS/Azure). For those who have experience with offshore or India-based pen testing teams: What mattered the most on your checklist? Any common pitfalls to be avoided? Thanks in advance for any insights! submitted by /u/Educational-Split463 [link] [comments]

  • Part -2 (React2Shell): Understanding a Critical React Server Components Vulnerability
    by Nithishraina (Security on Medium) on January 15, 2026 at 7:14 am

    A simple breakdown of how React fixed React2Shell and what developers should learn from it.Continue reading on JavaScript in Plain English »

  • Part I: Vault PKI on My Machine
    by Raymon Epping (Security on Medium) on January 15, 2026 at 7:02 am

    A Hands-On Lab with Podman, nginx, and a Live Certificate DashboardContinue reading on Medium »

  • OffensiveCon 2026 is sold out. Trainings are still available.
    by /u/CrimsonNorseman (cybersecurity) on January 15, 2026 at 7:02 am

    Registration for OffensiveCon 2026 was open last night (European time) and tickets for one of the best events, if not *the* best for offensive security in Europe sold out within a few hours. It will take place in May in Berlin. Currently, there are some tickets for the trainings *only*, so if you want to learn about kernel and IOS exploits and baseband exploitation (among others), you should probably book now. (Disclaimer for mods: I am in no way, shape or form affiliated with OffensiveCon or Binary Gecko.) submitted by /u/CrimsonNorseman [link] [comments]

  • U.S. Federal Agencies Are Stepping Up for the Quantum Security Transition
    by /u/donutloop (cybersecurity) on January 15, 2026 at 7:01 am

    submitted by /u/donutloop [link] [comments]

  • The Supreme Court Just Left $130 Billion Hanging. Here’s What It Means for Freight.
    by Heesham Naji (Security on Medium) on January 15, 2026 at 6:55 am

    The freight industry woke up today expecting clarity.Continue reading on The Broker Briefing by fenderr »

  • svchost.exe is looking up .onion domains
    by /u/Incommunicado_xix (cybersecurity) on January 15, 2026 at 6:40 am

    Hi Folks, I just found out a Host is looking up .onion domains and that process that looks at it is svchost.exe and the cmd line is mentioned below: svchost.exe -k netsvcs -p -s SharedAccess Help me in my investigation what should I look further on this? submitted by /u/Incommunicado_xix [link] [comments]

  • The Triton System Attack: The Most Dangerous Malware Ever Discovered
    by /u/nu11po1nt3r (cybersecurity) on January 15, 2026 at 6:07 am

    submitted by /u/nu11po1nt3r [link] [comments]

  • Reprompt attack hijacked Microsoft Copilot sessions for data theft
    by /u/Leak_Leech (cybersecurity) on January 15, 2026 at 5:05 am

    As AI continues to become more prevalent threat actors will find new ways to compromise it https://www.bleepingcomputer.com/news/security/reprompt-attack-let-hackers-hijack-microsoft-copilot-sessions/ submitted by /u/Leak_Leech [link] [comments]

  • Starting at a new company on Monday. How do you approach a new environment?
    by /u/ancientpsychicpug (cybersecurity) on January 15, 2026 at 4:59 am

    I am a senior cyber security analyst. With 14 years of IT under my belt. My current position was my first cyber security job and was hired in 2020. Got a new job as a mid level cyber security engineer, helping a company break away from overseas/contact cyber sec work. The team seems great, everyone is excited to have the security team be local. I have a loose itinerary for my first 90 days and a part of that is discovery. In my current position, I oversee a lot of end user items such as device security, policies, evidence, training, etc. So I think i will start there and work my way through to the backend. How would YOU approach discovery? submitted by /u/ancientpsychicpug [link] [comments]

  • Signal’s founder launches an end-to-end encrypted AI assistant for fully private conversations
    by /u/rkhunter_ (cybersecurity) on January 15, 2026 at 4:59 am

    submitted by /u/rkhunter_ [link] [comments]

  • Those who got hybrid/remote roles, what's your advice? I suck at small talk but I am experienced etc.
    by /u/Patient_Calendar9011 (cybersecurity) on January 15, 2026 at 3:26 am

    submitted by /u/Patient_Calendar9011 [link] [comments]

  • U.S. Weighs Expanding Private Companies’ Role in Cyberwarfare
    by /u/FreemanCantJump (cybersecurity) on January 15, 2026 at 1:08 am

    The Trump administration is weighing a substantial shift in its cyberstrategy, including by enlisting private companies to assist with offensive cyberattacks, according to four former senior U.S. officials familiar with the administration’s thinking. The proposals have been included in drafts of the administration’s coming National Cybersecurity Strategy, which will set out general priorities and be accompanied by a plan to carry out the policies, said the former officials, who spoke on the condition of anonymity to discuss a document that was not yet public. The government can currently contract private companies to develop elements of its cyberoperations. But the initiative would drastically expand the role of private companies in cyberwarfare, raising a host of questions about the legality and practicality of their involvement. It would be a more aggressive approach that is likely to be the subject of a confirmation hearing on Thursday for President Trump’s nominee to lead United States Cyber Command and the National Security Agency, Lt. Gen. Joshua M. Rudd. Under the law, private companies are prohibited from conducting offensive campaigns online, which can range from the breach that paralyzed Britain’s largest carmaker to persistent assaults targeting an opponent, like Russia’s reported attacks on Ukraine and its allies. Changing the law to permit private companies to execute offensive cyberattacks would require congressional approval. In the past, representatives in Congress have proposed legislation that would do just that. Recently, those proposals have re-emerged on Capitol Hill. Some lawmakers have called for private companies to be allowed to “hack back” when they come under attack, while others have suggested repurposing the Letters of Marque for cyberspace. Last authorized during the Civil War, a Letter of Marque is a constitutional provision that allows private citizens to seize enemy ships. But the measures raise the specter of U.S.-approved piracy in cyberspace, said Lt. Gen. Charles L. Moore Jr., a retired deputy commander of U.S. Cyber Command and an author of a recent report about the role private companies could play in U.S. cyberoperations. “If you just have companies out there hacking back, what you end up with is potential chaos in the environment,” he said. General Moore and his co-author, Brett Goldstein, a cybersecurity expert who held senior positions in the Defense Department, pointed to those potential complications in their report, published by Vanderbilt University’s Institute of National Security. Without Cyber Command overseeing all operations, General Moore said in an interview, “you’re going to have actions that take place by private companies against nation-states that believe that was the formal position of the United States, and now you see escalation, and potentially even kinetic conflict come of that. You’re going to see chaos.” Having private companies answer to Cyber Command would ward against that, the authors added. Without changing the law that prohibits private companies from engaging in offensive cyberoperations, there are several ways private-sector teams could supplement traditional military and intelligence forces, General Moore said in the interview. The military could embed a uniformed cyberoperator in a private company to be the one who actually executes the cyberattack. Or a private company, under virtual oversight, could write code for an operation and then hand it over to Cyber Command. General Moore and Mr. Goldstein contend that scaling up the nation’s cybercapabilities with experience from the private sector is necessary to meet the moment. “The demand signal is too large, the threat landscape too dynamic and the technical talent pool too competitive for the department to meet future requirements with government personnel alone,” they said, referring to the Defense Department. Turning to the private sector would allow for “a very rapid increase in scale,” which would result in more cyberattacks, General Moore said. This in turn could throw sand into the gears of enemy cyberoperations and position the United States for potential wartime actions, he added. But whatever the role of private companies, it will still signal a significant shift in the U.S. military’s long history of teaming up with the private sector. “As a general rule, you don’t have your private-sector, defense-industrial-based companies sitting side by side with operators, conducting” offensive operations, General Moore said. While some former officials expressed a measure of concern about the Trump administration’s plan to rely on the private sector, they welcomed its emphasis on offensive cybersecurity. The United States has successfully conducted largely isolated offensive cybermissions, like cutting power in Venezuela’s capital during an operation to capture Nicolás Maduro, the country’s leader. But the cyberattacks have generally not amounted to broader campaigns, akin to the Salt Typhoon attack linked to the Chinese government that targeted critical U.S. infrastructure over many years. To meet the capacity and scale of cyberattacks by American adversaries, the United States must shift the frequency of its response, moving from periodic action to persistent campaigning, General Moore said. He added that private-sector expertise was essential to achieving that goal. Joe Lin, a former Navy Reserve officer who runs a cyberwarfare start-up called Twenty, similarly said the United States needed to be “much more proactive and pre-emptive in disrupting our adversaries, in going after our adversaries, in imposing costs on our adversaries.” Previous administrations have not taken such an offensive approach, he said. One reason that could be changing is that “there is much more of a consensus now that offensive cyberoperations are actually much less escalatory than people previously believed that they were,” Mr. Lin said. As someone who has experience in the military and the private sector, Mr. Lin said he saw the potential for innovative cyber start-ups to contribute to the U.S. military. If the Trump administration indeed solicits help from private companies to augment offensive cyberoperations, Mr. Lin said, “my hope is that we won’t be the only U.S. venture-backed cyberwarfare start-up in this space, which is what we are today.” submitted by /u/FreemanCantJump [link] [comments]

  • Extreme demotivation
    by /u/Yand7_7 (cybersecurity) on January 14, 2026 at 7:59 pm

    like seriously jobs are non existent when starting out? no jobs even with internships and degrees? i was so interested but now it doesn’t look worth it after just searching about job market here whats the point of learning all the deep technical etc stuff if its this bad i thought fields in cyber security were the most ai resilient and its only gonna grow in demand but lookin here it’s just despair what do i do? if cyber is this bad , cs swe whats the future of tech careers, and tf is the ai bubble gonna burst submitted by /u/Yand7_7 [link] [comments]

  • Hacking a Spytec Chinese GPS Tracker - Spoofing Location Data
    by /u/mattbrwn0 (cybersecurity) on January 14, 2026 at 7:38 pm

    Honestly one of the most fun finds I've had recently 🙂 submitted by /u/mattbrwn0 [link] [comments]

  • DeadLock ransomware is hiding C2 infrastructure in Polygon smart contracts (and it's working)
    by /u/tutezapf (cybersecurity) on January 14, 2026 at 6:39 pm

    Just came across some interesting research from Group-IB on a ransomware group called DeadLock that's been operating since mid-2025. The twist? They're storing their proxy server URLs inside smart contracts on Polygon, which lets them rotate addresses constantly. Makes it a nightmare for defenders trying to block their infrastructure permanently. One researcher said "imagination is the limit" for how this technique could evolve. Other things that stand out: No leak site. Instead of the usual "pay or we publish" approach, they claim they'll sell your data on underground markets. Whether that's a real threat or just bluffing is up for debate They use Session (the decentralized messenger) for ransom negotiations, delivered via an HTML wrapper Cisco Talos previously linked them to BYOVD and EDR-killing techniques, but their initial access methods are still unclear This isn't completely new – Google reported North Korean groups doing something similar ("EtherHiding") since early 2025. But it seems like more actors are catching on to blockchain as a way to build takedown-resistant infrastructure. Curious what others think: Anyone seeing more of this blockchain-based evasion in the wild? Without a leak site, how seriously would you take the "we'll sell your data" threat? What's even the defensive play here? submitted by /u/tutezapf [link] [comments]

  • NSA Releases First in Series of Zero Trust Implementation Guidelines
    by /u/kyle4beantown (cybersecurity) on January 14, 2026 at 5:07 pm

    submitted by /u/kyle4beantown [link] [comments]

  • Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say
    by /u/AmateurishExpertise (cybersecurity) on January 14, 2026 at 2:53 pm

    submitted by /u/AmateurishExpertise [link] [comments]

  • Reprompt attack let hackers hijack Microsoft Copilot sessions
    by /u/Doug24 (cybersecurity) on January 14, 2026 at 2:14 pm

    submitted by /u/Doug24 [link] [comments]

  • I built a “personal Shodan” you can run on your own machine for network reconnaissance
    by /u/Y0oshi_1 (cybersecurity) on January 14, 2026 at 1:44 pm

    I’ve been working on a new tool and wanted to share it here. It’s called Project Deep Focus, and the idea behind it is to act like a personal Shodan that runs locally on your own computer. Instead of relying on external databases, it scans IP ranges directly and discovers exposed services in real time. It can identify services like HTTP, SSH, FTP, RTSP, VNC, and more, detect authentication requirements, and fingerprint devices and models where possible. There’s also a live terminal dashboard so you can watch results come in as the scan runs. I built it mainly for asset discovery, lab environments, and authorized security testing. Think of it as Shodan-style visibility, but fully local and under your control. It’s lightweight, fast, and designed to scale without being painful to use. The project is open-source and runs on macOS, Linux, and Windows. I’d appreciate any feedback, ideas, or suggestions for improvement. submitted by /u/Y0oshi_1 [link] [comments]

  • AI Security Skills Worth our Time in 2026
    by /u/Bizzare_Mystery (cybersecurity) on January 14, 2026 at 12:58 pm

    Hey everyone, I've been thinking a lot lately about where AI security is actually going, what we're dealing with day-to-day. More and more LLM and GenAI features are getting shoved into production, and a lot of it feels rushed. Someone duct-tapes a solution together, plugs it into internal tools or company data, and security is an afterthought at best. When stuff breaks, it's rarely some sophisticated attack. It's the basics that get us. Prompt injections that nobody saw coming. Agents with way too many permissions. Connectors leaking sensitive data. RAG systems accidentally exposing information they shouldn't. And people just trusting whatever the AI says because it sounds confident, even when it's completely wrong. All of this has me rethinking how we should build our skills. Most advice still pushes you toward ML or data science, which matters but what I'm seeing looks way more like traditional appsec and cloud security problems, just with some new twists. So I'm curious: what's been working for you? Which skills have turned out to be actually useful? Have you found that getting your hands dirty with labs and breaking real systems beats sitting through theory? And how are you thinking about threat modeling now that this stuff is everywhere? Would love to hear what's been valuable, what's been a waste of time, and where you're focusing your energy. Any Course Suggestions ? submitted by /u/Bizzare_Mystery [link] [comments]

  • What’s the most expensive security control you’ve seen that added zero security?
    by /u/Any_Good_2682 (cybersecurity) on January 14, 2026 at 2:57 am

    Without naming companies or breaching NDAs: What’s the most expensive security control you’ve seen that added no real risk reduction? Bonus points if it made things worse submitted by /u/Any_Good_2682 [link] [comments]

  • Mentorship Monday - Post All Career, Education and Job questions here!
    by /u/AutoModerator (cybersecurity) on January 12, 2026 at 12:00 am

    This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]

What is Google Workspace?
Google Workspace is a cloud-based productivity suite that helps teams communicate, collaborate and get things done from anywhere and on any device. It's simple to set up, use and manage, so your business can focus on what really matters.

Watch a video or find out more here.

Here are some highlights:
Business email for your domain
Look professional and communicate as you@yourcompany.com. Gmail's simple features help you build your brand while getting more done.

Access from any location or device
Check emails, share files, edit documents, hold video meetings and more, whether you're at work, at home or on the move. You can pick up where you left off from a computer, tablet or phone.

Enterprise-level management tools
Robust admin settings give you total command over users, devices, security and more.

Sign up using my link https://referworkspace.app.goo.gl/Q371 and get a 14-day trial, and message me to get an exclusive discount when you try Google Workspace for your business.

Google Workspace Business Standard Promotion code for the Americas 63F733CLLY7R7MM 63F7D7CPD9XXUVT 63FLKQHWV3AEEE6 63JGLWWK36CP7WM
Email me for more promo codes

Active Hydrating Toner, Anti-Aging Replenishing Advanced Face Moisturizer, with Vitamins A, C, E & Natural Botanicals to Promote Skin Balance & Collagen Production, 6.7 Fl Oz

Age Defying 0.3% Retinol Serum, Anti-Aging Dark Spot Remover for Face, Fine Lines & Wrinkle Pore Minimizer, with Vitamin E & Natural Botanicals

Firming Moisturizer, Advanced Hydrating Facial Replenishing Cream, with Hyaluronic Acid, Resveratrol & Natural Botanicals to Restore Skin's Strength, Radiance, and Resilience, 1.75 Oz

Skin Stem Cell Serum

Smartphone 101 - Pick a smartphone for me - android or iOS - Apple iPhone or Samsung Galaxy or Huawei or Xaomi or Google Pixel

Can AI Really Predict Lottery Results? We Asked an Expert.

Ace the 2025 AWS Solutions Architect Associate SAA-C03 Exam with Confidence Pass the 2025 AWS Certified Machine Learning Specialty MLS-C01 Exam with Flying Colors

List of Freely available programming books - What is the single most influential book every Programmers should read



#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks

Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
zCanadian Quiz and Trivia, Canadian History, Citizenship Test, Geography, Wildlife, Secenries, Banff, Tourism

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Africa Quiz, Africa Trivia, Quiz, African History, Geography, Wildlife, Culture

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA


Health Health, a science-based community to discuss human health

Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.

Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, NCAA, F1, and other leagues around the world.

Turn your dream into reality with Google Workspace: It’s free for the first 14 days.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6 96DRHDRA9J7GTN6
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
63KKR9EULQRR7VE
63KNY4N7VHCUA9R
63LDXXFYU6VXDG9
63MGNRCKXURAYWC
63NGNDVVXJP4N99
63P4G3ELRPADKQU
With Google Workspace, Get custom email @yourcompany, Work from anywhere; Easily scale up or down
Google gives you the tools you need to run your business like a pro. Set up custom email, share files securely online, video chat from any device, and more.
Google Workspace provides a platform, a common ground, for all our internal teams and operations to collaboratively support our primary business goal, which is to deliver quality information to our readers quickly.
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE
C37HCAQRVR7JTFK
C3AE76E7WATCTL9
C3C3RGUF9VW6LXE
C3D9LD4L736CALC
C3EQXV674DQ6PXP
C3G9M3JEHXM3XC7
C3GGR3H4TRHUD7L
C3LVUVC3LHKUEQK
C3PVGM4CHHPMWLE
C3QHQ763LWGTW4C
Even if you’re small, you want people to see you as a professional business. If you’re still growing, you need the building blocks to get you where you want to be. I’ve learned so much about business through Google Workspace—I can’t imagine working without it.
(Email us for more codes)