CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Proxy vs VPN

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

CyberSecurity - What are some things that get a bad rap, but are actually quite secure?

CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.

There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.

1- PGP

PGP is a Form of Minimalism

As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:

  1. You get from them a PGP identity (public key). How you do that is entirely up to you.
  2. Your PGP program uses that identity to perform a single public key encryption of a message key.
  3. Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
  4. Your correspondent does the opposite operations to get the message.

If you want to sign your message then you:

  1. Hash the message.
  2. Do a public key signature operation on the hash and attach the result to the message.
  3. Your correspondent checks the signature from your PGP identity, which they have acquired somehow.

The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.

As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:

  • Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
  • A Signal session requires the storage and maintenance of a lot of state information.
  • Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
  • Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
  • Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.

The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.

2- Very long passwords that are actually a sentence

It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”

3- Writing passwords down.

I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.

Did I say passwords? I meant encryption keys.

4- Changing default ports for certain services like dbs

Most of the gangs out there use tools that don’t do a full search, so they go through the default port list

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

5- MFA in general.

Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.

If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.

If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.

6- Oauth for 3rd party apps.

Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.

7- Two-step verification.

Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.

8-Biometric Authentication.

The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.

Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.

One example of this is https://passage.id/ which is about as secure as you can get.

9- Zoom.

Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.

10- Unplugging the ethernet cable.

11- Browser password managers?

Rant moment: reasons cybersecurity fails

<Rant>

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.

No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.

This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.

</Rant>

Why do cyber attackers commonly use social engineering attacks?

Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.

Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.

To conclude:

Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.

source: r/cybersecurity

Source: r/cybersecurity

  • Onboarding SIEM solutions Best and Worst
    by /u/AverageAdmin (cybersecurity) on April 17, 2024 at 9:00 pm

    What’s your best and worst experiences onboarding a SIEM solution for a client? submitted by /u/AverageAdmin [link] [comments]

  • What were the best cybersecurity courses you ever had?
    by /u/athanielx (cybersecurity) on April 17, 2024 at 8:43 pm

    I periodically look for various information about new training courses or educational material. I've been in cybersecurity for many years, but I'm still curious about what's on the market now. I worked as a SOC Engineer-Analyst, then moved to SecOps and this training material had a high impact on me and my career: networkdefense.io: Investigation theory Practical threat hunting Also, Network Security Monitoring book by Chris Sanders Active Countermeasures: Practical Network Threat Hunting Antisyphon: SOC core skills Offensive Countermeasures book by John Strand submitted by /u/athanielx [link] [comments]

  • Discussion Thread: Enterprise Passkeys
    by /u/bespoke_redditor (cybersecurity) on April 17, 2024 at 7:45 pm

    Are companies adopting passkeys for work settings and what is your personal take on this mess? ​ From my perspective FIDO let the floodgates open too soon which led ecosystems (apple, google, and microsoft) to make their own custom flavor and UI that doesn't interact well in a enterprise setting. I'll give it a thumbs up so far for consumers now that it's safe, syncable and recoverable now but I'd like to hear more from fellow redditors. Especially if your organization has tried to adopt passkeys but come across blockers or even success stories. submitted by /u/bespoke_redditor [link] [comments]

  • Code Scanning - best practices for working with eng teams
    by /u/Hoselam-sar-rafteh (cybersecurity) on April 17, 2024 at 7:28 pm

    How do you use source code analysis tools in your company? Do you use separate products for SAST, IaC, Secrets Scanning? How do you deal with false positives? What would you wish was different (tools, workflows, eng teams collaboration, etc.) I'm on the engineering side, but am interested in rolling out a code analysis tool for our team. We don't have a dedicated AppSec team yet. What are the chances that we (as an eng team) can run any of the code scanner tools on our own? I'd appreciate your ideas! submitted by /u/Hoselam-sar-rafteh [link] [comments]

  • Malwares as a plural
    by /u/rootxploit (cybersecurity) on April 17, 2024 at 7:26 pm

    I’ve been dumbfounded by the rise of “malwares” as a plural to malware. Obviously malware is a portmanteau of malicious and software, and the plural of software is software. At first I just thought it was some people being wrong and they’d learn. But is this becoming a new normal? Like how cracker technically means malicious and hacker does not but everyone just uses hacker instead. submitted by /u/rootxploit [link] [comments]

  • Multiple botnets exploiting one-year-old TP-Link flaw to hack routers
    by /u/CYRISMA_Buddy (cybersecurity) on April 17, 2024 at 5:54 pm

    submitted by /u/CYRISMA_Buddy [link] [comments]

  • Cerebral to pay $7 million settlement in Facebook pixel data leak case
    by /u/CYRISMA_Buddy (cybersecurity) on April 17, 2024 at 5:53 pm

    submitted by /u/CYRISMA_Buddy [link] [comments]

  • How does KnowBe4 spoof the company domain?
    by /u/AppearanceAgile2575 (cybersecurity) on April 17, 2024 at 5:52 pm

    Is there anything I can do to make it so they, and attackers by extension, wouldn’t be able to do this? submitted by /u/AppearanceAgile2575 [link] [comments]

  • Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters
    by /u/SCI_Rusher (cybersecurity) on April 17, 2024 at 5:34 pm

    submitted by /u/SCI_Rusher [link] [comments]

  • Survey on Phishing/Phishing Attacks
    by /u/Black_Space5000 (cybersecurity) on April 17, 2024 at 5:08 pm

    Hello all, here is a survey that I need responses for, for a college course in technical and report writing. The assignment related to this survey has to be related to whatever we are majoring in, and I am major in cyber security. So this survey is on the subject of phishing. The survey consists of 10 questions mostly yes or no questions. Any responses will be greatly appreciated Link: https://www.surveymonkey.com/r/VV755VN submitted by /u/Black_Space5000 [link] [comments]

  • Malicious cyber activity spiking in Philippines, analysts say
    by /u/TheRecord_Media (cybersecurity) on April 17, 2024 at 4:57 pm

    submitted by /u/TheRecord_Media [link] [comments]

  • Trust but Verify approach
    by /u/techaspirant (cybersecurity) on April 17, 2024 at 4:54 pm

    I have a feeling the answer to this is going to be "depends on the company" as is always the case, but I thought I'd gather input anyway. I'm curious to know how common it is for an infosec/secops team to be auditing/verifying changes to infrastructure themselves. With the recent palo-alto vuln for example, we talked to the team that manages those devices about whether or not we're vulnerable. They checked and said we are not... and I figured that's good enough for us. But my boss said we need to be verifying patch levels and exposure ourselves. Now to be clear, I don't think my boss is just being randomly mistrustful. Other teams we work with (granted w/more complex systems like fleets of linux hosts) have told us before some change or other was made to close vulnerabilities that weren't in fact done. But a lot of those types of systems are also easier to verify (due to agents or cloud-based tools that just require a glance at a dashboard for verification). It seems to me that having to log into production devices to double-check what the responsible team said is true is not only extra work but kinda showing an extra level of mistrust + taking responsibility for something that we don't need to. (i.e. if something bad did happen and it's because that team said they were on version X but weren't really, is it really the infosec teams fault?) The need for production access to all our firewalls/LBs/etc. also seems a bit concerning, though obviously we only need read-only, but I'm new enough to this field I just want to better understand typical best practices. Anyhow, just curious to know what people think. submitted by /u/techaspirant [link] [comments]

  • What Are Some Things To Include For Effective Report Writing?
    by /u/squidJG (cybersecurity) on April 17, 2024 at 4:10 pm

    Exactly as the title says. One of my higher-ups tasked me to look into a recent vulnerability that could affect our org. I have all the information I need to write the report so that's all set. This would be my first time writing an attestation to present to 3rd parties, C-suite, etc., even though I've written reports in the past. Those reports were performing research on existing security tools/products to introduce into our environment. Since this is a new endeavor for me, what are some things that I should look out for? I understand that bias should be kept out of report due to how dangerous it could be, and also to be clear and concise in my writings so there isn't any room for misinterpretation. I'm more concerned about structuring the report in a way that readers/listeners can follow along without difficulty. Any help is appreciated, I have about a week to get this completed but the sooner the better(thank god). Love this sub, thank you guys. submitted by /u/squidJG [link] [comments]

  • The Complete Guide to Home Security Systems: Protecting Your Peace of Mind
    by James Mathews (Security on Medium) on April 17, 2024 at 3:24 pm

    In today’s modern world safety and security of our houses have become so important.Continue reading on Medium »

  • Elastic SIEM —  Lab Guide 2: Getting security data in
    by Hassen Hannachi (Cybersecurity on Medium) on April 17, 2024 at 3:22 pm

    Second part series to cover Elastic SIEM Security Fundamentals labs using Elastichsearch and Kabana.Continue reading on Medium »

  • Unveiling CVE-2024–3094 (xz): A Deep Dive into Supply Chain Compromise
    by deva_rsa (Cybersecurity on Medium) on April 17, 2024 at 3:15 pm

    Overview:Continue reading on Medium »

  • OTP Bruteforce Chained with Response Manipulation Leads to Zero Click Account Takeover
    by cyberpro151 (Cybersecurity on Medium) on April 17, 2024 at 3:12 pm

    Hey there! It’s cyberpro151 back with another PoC writeup for y’all.Continue reading on Medium »

  • Guardians of Academia: Battling Cyber Threats in Higher Education
    by Matthew.Rosenquist (Cybersecurity on Medium) on April 17, 2024 at 3:05 pm

    The Cybersecurity Vault episode #31 w/guest Donna KidwellContinue reading on Medium »

  • Online Identities: Privacy, Anonymity, or Pseudonymity?
    by Unimke Akeh (Cybersecurity on Medium) on April 17, 2024 at 3:03 pm

    A lot of professionals often get confused about these terms. Sometimes, privacy can be mistaken for anonymity, or pseudonymity can be…Continue reading on Medium »

  • API Mis configuration: How Employee can change Manager’s review for him. (Part 2)
    by Aneesha D (Cybersecurity on Medium) on April 17, 2024 at 3:02 pm

    Hellooooo hakurzzzz,Continue reading on Medium »

  • Cybersecurity DataFrens
    by Dr. Alvin Ang (Cybersecurity on Medium) on April 17, 2024 at 2:59 pm

    Cybersecs Experts by Dr. Alvin AngContinue reading on DataFrens.sg »

  • Zambia arrests 77 people in swoop on "scam" call centre
    by Samina Chikode (Cybersecurity on Medium) on April 17, 2024 at 2:59 pm

    Cyber Security NewsContinue reading on Medium »

  • Configuration Of Router Using Cisco packet Tracer
    by Namita Nayak (Cybersecurity on Medium) on April 17, 2024 at 2:44 pm

    Router ConfigurationContinue reading on Medium »

  • Navigating the Aftermath of AT&T’s Massive Data Breach
    by Authentic Royalty (Cybersecurity on Medium) on April 17, 2024 at 2:39 pm

    Learn about the recent AT&T data breach, its impact, and steps to safeguard your information. Stay informed! 🛡️🔍Continue reading on Medium »

  • Navigating the Aftermath of AT&T’s Massive Data Breach
    by Authentic Royalty (Security on Medium) on April 17, 2024 at 2:39 pm

    Learn about the recent AT&T data breach, its impact, and steps to safeguard your information. Stay informed! 🛡️🔍Continue reading on Medium »

  • Need a solid Project Sugg.
    by /u/eoverthink (cybersecurity) on April 17, 2024 at 2:38 pm

    With all these YouTube videos I’m getting option fatigue. I’m about to finish up with my WGU degree and feel like the labs they give you are cool but put in the real world I don’t think they translate much. I still feel as much as a newbie as I did when I started school Aug 2022. And youtube has so many fluff tutorials that it’s hard to finish one that’ll really help gain that hands on experience Suggestions? submitted by /u/eoverthink [link] [comments]

  • Picking the Perfect Indoor Security Camera : A Simple Guide
    by BOOSTER FINDS (Security on Medium) on April 17, 2024 at 2:11 pm

    Getting a smart security camera to keep your home safe !Continue reading on Medium »

  • Learning a new Query Language
    by /u/Munkky (cybersecurity) on April 17, 2024 at 2:03 pm

    Hello everyone, like many out there my company has many different software solutions that all like to use different query languages for their searches. I am attempting to find better ways of learning these different languages for myself and for teaching my coworkers. This is more of a "learning how to learn" question. I have thought about making standard naming convention charts (hostname is called x in this platform, y in this one), as well as other documents with "key" features used across platforms, stats/join/etc. I know that the main advice is just "do it more, get more hours in the platform" but I am also a believer in there being better ways that others have come up with other than brute force. The other issue is that while some languages like Splunk have a million tutorials, many solutions have just vendor documentation and nothing deeper outside of paid vendor stuff. How do you personally learn languages like this? submitted by /u/Munkky [link] [comments]

  • SECURING FRONTEND APPLICATIONS
    by Volodymyr F (Security on Medium) on April 17, 2024 at 1:57 pm

    Security is an important factor when creating frontend applications, as they are often the starting point for attacks.Continue reading on Medium »

  • Prompt Injection 101. What do you think?
    by /u/nicomarcan (cybersecurity) on April 17, 2024 at 1:26 pm

    https://nico-autonoma.medium.com/beyond-the-prompt-a81fc9081091 submitted by /u/nicomarcan [link] [comments]

  • A Clear Advantage: The Benefits of Choosing Reputable Clearview Fencing Suppliers
    by Top Fence (Security on Medium) on April 17, 2024 at 1:00 pm

    Securing your property requires careful consideration when selecting a fencing supplier. Clearview fencing has gained popularity among…Continue reading on Medium »

  • Which Global Cities Offer the Safest Urban Sanctuaries? (The Most Secure Cities)
    by Eve Watson (Security on Medium) on April 17, 2024 at 12:54 pm

    In our ever-changing world, where chaos and uncertainty seem to lurk around every corner, the quest for safe havens has become a paramount…Continue reading on Medium »

  • Security Company Australia: VCPG Security Excellence
    by Vcpgsecgroup (Security on Medium) on April 17, 2024 at 12:53 pm

    VCPG Security is a premier security company in Australia, dedicated to providing top-tier protection services. Based in Melbourne, they…Continue reading on Medium »

  • Beyond the Prompt
    by Nicolas Marcantonio (Security on Medium) on April 17, 2024 at 12:46 pm

    Understanding Injection Threats in GenAI AppsContinue reading on Medium »

  • Essential Security Configurations for Containers in the AWS Cloud
    by Rehmanabdul (Security on Medium) on April 17, 2024 at 12:36 pm

    This article will explain the essential security configurations for containers running in the AWS cloud.Continue reading on AWS in Plain English »

  • Security Companies Melbourne: Trust 247 Security Group
    by 247 Service Group (Security on Medium) on April 17, 2024 at 12:33 pm

    Security Companies Melbourne: Trust 247 Security Group for top-tier protection, cutting-edge technology, and tailored service.Continue reading on Medium »

  • OPEN-SOURCE OR VERY LOW-COST CYBERSECURITY CONTROLS
    by /u/CyberGrizzly360 (cybersecurity) on April 17, 2024 at 12:13 pm

    Hello all, Thought to post here to see if any of you knew about any relevant info like open-source (or very low cost) security controls that can be used in place of the traditional big brands found in our everyday enterprise. Alternatively if you can point me in the right direction to someone or source that I can connect with to get such info. A dozen high-fives ladies and gentlemen for potential suggestions, comments, or tips. submitted by /u/CyberGrizzly360 [link] [comments]

  • Hacker claims to have leaked 85,981 customers of T2.
    by /u/RansomBook (cybersecurity) on April 17, 2024 at 11:02 am

    Every day we see more and more data breaches and it seems like the chances of experiencing a data breach, no matter who you are, is practically one. Why has it become so easy? Source: https://x.com/H4ckManac/status/1780547955381895172 submitted by /u/RansomBook [link] [comments]

  • Dark Web Monitoring Vulnerabilities
    by /u/ckarkui (cybersecurity) on April 17, 2024 at 5:19 am

    There are a lot of services that now claim to monitor the dark web for leaked information. I was recently looking at a Norton product and it involves inputting a lot of sensitive information such as address, drivers licence number, credit card number and so on. It got me thinking, could people be inadvertently putting themselves at risk by using these services? Firstly there's the integrity of the database which holds all this personal information to be used for crosschecking. Then there's the act of crosschecking also, so how can the client be sure that the information they provide remains secure in the process of these constant dark web checks? submitted by /u/ckarkui [link] [comments]

  • How important is your SIEM?
    by /u/Threezeley (cybersecurity) on April 17, 2024 at 4:16 am

    Obvious aspects aside like to satisfy regulatory compliance, and also putting cost aside as SIEMs can be quite expensive, how would you gauge how effective or useful your SIEM is compared to all other security/alerting tools in your organizations? The reason I ask is because my team manages a large SIEM in a very large organization. Because it's so large, duties are silo'd. A different team leverages the SIEM to create alerts which get fed into a SOAR product (managed by another team) before being presented to SOC. I am certain that other security tools are feeding alerts into the SOAR tool but I don't have any sense of that scope. We are so far removed from SOC that it really makes it difficult to assess the value of the work we do. Execs also don't seem to be very interested in improving processes or expanding capabilities, which makes me further question how important our SIEM is compared to the other security products in our landscape. Curious to hear perspectives of others. (I sometimes wish my role was broader so I could have a hand in the full chain, from identifying valuable data sources to ingest through to investigation/resolution.) submitted by /u/Threezeley [link] [comments]

  • Securely disposing of old IT equipment
    by /u/Adventurous-Dog-6158 (cybersecurity) on April 17, 2024 at 2:39 am

    If we want to dispose of a server, how can we ensure that any areas that may contain passwords or sensitive data (BIOS, etc) are sanitized/purged without physically shredding all electronic components? It’d be environmentally unfriendly to shred an entire motherboard, which would reduce its recyclability. I think some vendors my publish instructions but others may not, particularly for older equipment. Is there any reliable resource, even a paid one, that gathers this info? I understand that with some classifications of data, physical destruction is the only acceptable disposal method, but that does not apply to my industry. What do you folks normally do? Do you require that the disposal company shred SSDs/HDDs and all circuit boards? I did some research before and there's a lot of info on SSD/HDD disposal but I didn't see much about chips such as the BIOS. submitted by /u/Adventurous-Dog-6158 [link] [comments]

  • Palo Alto CVE-2024-3400 Mitigations Not Effective
    by /u/maceinjar (cybersecurity) on April 16, 2024 at 9:32 pm

    For those of you who previously applied mitigations (disabling telemetry), this was not effective. Devices may have still been exploited with mitigations in place. Content signatures updated to theoretically block newly discovered exploit paths. The only real fix is to put the hotfix, however these are not released yet for all affected versions. Details: https://security.paloaltonetworks.com/CVE-2024-3400 ​ submitted by /u/maceinjar [link] [comments]

  • Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
    by /u/DerBootsMann (cybersecurity) on April 16, 2024 at 9:16 pm

    submitted by /u/DerBootsMann [link] [comments]

  • Are forums still a thing?
    by /u/Standard-Art-1967 (cybersecurity) on April 16, 2024 at 4:20 pm

    I have heard that lot of hackers in the early 2000s learnt hacking from forums. Some met others from forums and stuffs like that? Are forums still a thing or are the sites like reddit, discord the new "forums"? submitted by /u/Standard-Art-1967 [link] [comments]

  • Microsoft is "ground zero" for foreign state-sponsored hackers and "It’s very difficult to defend against" a top Microsoft executive for security says
    by /u/B-HDR (cybersecurity) on April 16, 2024 at 7:44 am

    And that's why more and more countries are looking to Germany as 'a pilot project' which is seriously taking careful and steady steps to ditch Windows for Linux. submitted by /u/B-HDR [link] [comments]

  • Mentorship Monday - Post All Career, Education and Job questions here!
    by /u/AutoModerator (cybersecurity) on April 15, 2024 at 12:00 am

    This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]

Pass the 2023 AWS Cloud Practitioner CCP CLF-C02 Certification with flying colors Ace the 2023 AWS Solutions Architect Associate SAA-C03 Exam with Confidence Pass the 2023 AWS Certified Machine Learning Specialty MLS-C01 Exam with Flying Colors

List of Freely available programming books - What is the single most influential book every Programmers should read



#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks

Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
zCanadian Quiz and Trivia, Canadian History, Citizenship Test, Geography, Wildlife, Secenries, Banff, Tourism

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Africa Quiz, Africa Trivia, Quiz, African History, Geography, Wildlife, Culture

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA


Health Health, a science-based community to discuss health news and the coronavirus (COVID-19) pandemic

Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.

Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.

Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, and leagues around the world.

Turn your dream into reality with Google Workspace: It’s free for the first 14 days.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6 96DRHDRA9J7GTN6
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
63KKR9EULQRR7VE
63KNY4N7VHCUA9R
63LDXXFYU6VXDG9
63MGNRCKXURAYWC
63NGNDVVXJP4N99
63P4G3ELRPADKQU
With Google Workspace, Get custom email @yourcompany, Work from anywhere; Easily scale up or down
Google gives you the tools you need to run your business like a pro. Set up custom email, share files securely online, video chat from any device, and more.
Google Workspace provides a platform, a common ground, for all our internal teams and operations to collaboratively support our primary business goal, which is to deliver quality information to our readers quickly.
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE
C37HCAQRVR7JTFK
C3AE76E7WATCTL9
C3C3RGUF9VW6LXE
C3D9LD4L736CALC
C3EQXV674DQ6PXP
C3G9M3JEHXM3XC7
C3GGR3H4TRHUD7L
C3LVUVC3LHKUEQK
C3PVGM4CHHPMWLE
C3QHQ763LWGTW4C
Even if you’re small, you want people to see you as a professional business. If you’re still growing, you need the building blocks to get you where you want to be. I’ve learned so much about business through Google Workspace—I can’t imagine working without it.
(Email us for more codes)

error: Content is protected !!