CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Proxy vs VPN
DjamgaMind - AI Unraveled Podcast

DjamgaMind: Audio Intelligence for the C-Suite (Daily AI News, Energy, Healthcare, Finance)

Full-Stack AI Intelligence. Zero Noise.The definitive audio briefing for the C-Suite and AI Architects. From Daily News and Strategic Deep Dives to high-density Industrial & Regulatory Intelligence—decoded at the speed of the AI era. . 👉 Start your specialized audio briefing today at Djamgamind.com


AI Jobs and Career

I wanted to share an exciting opportunity for those of you looking to advance your careers in the AI space. You know how rapidly the landscape is evolving, and finding the right fit can be a challenge. That's why I'm excited about Mercor – they're a platform specifically designed to connect top-tier AI talent with leading companies. Whether you're a data scientist, machine learning engineer, or something else entirely, Mercor can help you find your next big role. If you're ready to take the next step in your AI career, check them out through my referral link: https://work.mercor.com/?referralCode=82d5f4e3-e1a3-4064-963f-c197bb2c8db1. It's a fantastic resource, and I encourage you to explore the opportunities they have available.

Job TitleStatusPay
Full-Stack Engineer Strong match, Full-time $150K - $220K / year
Developer Experience and Productivity Engineer Pre-qualified, Full-time $160K - $300K / year
Software Engineer - Tooling & AI Workflows (Contract) Contract $90 / hour
DevOps Engineer (India) Full-time $20K - $50K / year
Senior Full-Stack Engineer Full-time $2.8K - $4K / week
Enterprise IT & Cloud Domain Expert - India Contract $20 - $30 / hour
Senior Software Engineer Contract $100 - $200 / hour
Senior Software Engineer Pre-qualified, Full-time $150K - $300K / year
Senior Full-Stack Engineer: Latin America Full-time $1.6K - $2.1K / week
Software Engineering Expert Contract $50 - $150 / hour
Generalist Video Annotators Contract $45 / hour
Generalist Writing Expert Contract $45 / hour
Editors, Fact Checkers, & Data Quality Reviewers Contract $50 - $60 / hour
Multilingual Expert Contract $54 / hour
Mathematics Expert (PhD) Contract $60 - $80 / hour
Software Engineer - India Contract $20 - $45 / hour
Physics Expert (PhD) Contract $60 - $80 / hour
Finance Expert Contract $150 / hour
Designers Contract $50 - $70 / hour
Chemistry Expert (PhD) Contract $60 - $80 / hour

CyberSecurity - What are some things that get a bad rap, but are actually quite secure?

CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.

There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.

1- PGP

PGP is a Form of Minimalism

As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:

  1. You get from them a PGP identity (public key). How you do that is entirely up to you.
  2. Your PGP program uses that identity to perform a single public key encryption of a message key.
  3. Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
  4. Your correspondent does the opposite operations to get the message.

If you want to sign your message then you:

  1. Hash the message.
  2. Do a public key signature operation on the hash and attach the result to the message.
  3. Your correspondent checks the signature from your PGP identity, which they have acquired somehow.

The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.

As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:

  • Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
  • A Signal session requires the storage and maintenance of a lot of state information.
  • Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
  • Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
  • Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.

The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.

I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.

2- Very long passwords that are actually a sentence

It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”

AI-Powered Professional Certification Quiz Platform
Crack Your Next Exam with Djamgatech AI Cert Master

Web|iOs|Android|Windows

Are you passionate about AI and looking for your next career challenge? In the fast-evolving world of artificial intelligence, connecting with the right opportunities can make all the difference. We're excited to recommend Mercor, a premier platform dedicated to bridging the gap between exceptional AI professionals and innovative companies.

Whether you're seeking roles in machine learning, data science, or other cutting-edge AI fields, Mercor offers a streamlined path to your ideal position. Explore the possibilities and accelerate your AI career by visiting Mercor through our exclusive referral link:

Find Your AI Dream Job on Mercor

Your next big opportunity in AI could be just a click away!

3- Writing passwords down.

I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.

We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.

Did I say passwords? I meant encryption keys.

4- Changing default ports for certain services like dbs

Most of the gangs out there use tools that don’t do a full search, so they go through the default port list

AI Jobs and Career

And before we wrap up today's AI news, I wanted to share an exciting opportunity for those of you looking to advance your careers in the AI space. You know how rapidly the landscape is evolving, and finding the right fit can be a challenge. That's why I'm excited about Mercor – they're a platform specifically designed to connect top-tier AI talent with leading companies. Whether you're a data scientist, machine learning engineer, or something else entirely, Mercor can help you find your next big role. If you're ready to take the next step in your AI career, check them out through my referral link: https://work.mercor.com/?referralCode=82d5f4e3-e1a3-4064-963f-c197bb2c8db1. It's a fantastic resource, and I encourage you to explore the opportunities they have available.

5- MFA in general.

Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.

If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.

If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.

6- Oauth for 3rd party apps.

Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.

7- Two-step verification.

Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.

8-Biometric Authentication.

The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.

Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Gemini, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

One example of this is https://passage.id/ which is about as secure as you can get.

9- Zoom.

Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.

10- Unplugging the ethernet cable.

11- Browser password managers?

Rant moment: reasons cybersecurity fails

<Rant>

People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.

No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.

This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.

</Rant>

Why do cyber attackers commonly use social engineering attacks?

Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.

Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.

To conclude:

Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.

source: r/cybersecurity

Source: r/cybersecurity

  • Benign | TryHackMe — Challenge | Writeup — Splunk-Investigation
    by Amr (Cybersecurity on Medium) on April 22, 2026 at 5:50 am

    hey all , hope you are doing well, in this write up we will cover the fifth room on the SIEM Triage for soc module in the soc level 1 path…Continue reading on Medium »

  • One Ring to Rule All Your Data: How Sauron’s Eye Predicted Centralized Surveillance and Big Data…
    by Nazli Aydin (Misselbereth) (Cybersecurity on Medium) on April 22, 2026 at 5:47 am

    Or, why your smart doorbell, work Slack, and government facial recognition all share a Dark Lord’s blind spot and what a hairy-footed…Continue reading on ILLUMINATION Scholar »

  • Beyond the Hype: My Experience with the TryHackMe AI Security Path
    by Candiee (Security on Medium) on April 22, 2026 at 5:43 am

    The rapid integration of Large Language Models (LLMs) has left a massive gap in traditional security frameworks. To better understand this…Continue reading on Medium »

  • The $60 Billion Blind Spot: Is Your Foundation a Trojan Horse?
    by Rahul Juyal (Cybersecurity on Medium) on April 22, 2026 at 5:33 am

    In the business world, we are used to worrying about competitors or market shifts. But in 2025–26, a different kind of threat hit the…Continue reading on Medium »

  • Securing the Backbone of Industry: Why OT Cybersecurity Training is Your Next Big Career Move
    by TheEvolvEdge (Cybersecurity on Medium) on April 22, 2026 at 5:25 am

    In an era where digital connectivity drives physical production, the line between the virtual and the material has vanished. While IT…Continue reading on Medium »

  • Unused tech - Cybersecurity student needs help consolidating/upgrading.
    by /u/SpeedzMC (cybersecurity) on April 22, 2026 at 5:17 am

    I’m a sophomore Cybersecurity student currently stuck with three different machines that all overlap in weird ways. I’m trying to figure out what to sell, what to return, and what to upgrade to have devices that best suit my use case. My Current Lineup: MacBook Pro M5 (16GB/512GB): Just got this a month ago for $1400. Already in the ecosystem but not forced to stay in it (iPhone, Watch, iPad, AirPods). I’ve already used 350gb of storage and I’m worried about the 16gb ram for cyber labs/VMs. Lenovo Legion Slim 5 (14.5" OLED): r7 7840hs, 16gb (soldered), RTX 4060. This was supposed to be my "everything" machine originally but was allowed to bring my pc. The chassis is annoying (creaky), the glossy screen is a nightmare in bright rooms, and the battery only lasts 3-4 hours at the brightness I need. I end up constantly worrying about closing any apps that might drain battery and kind of acts as a distraction. Custom Desktop: i5-12400 (have a 13600kf waiting to be tested), 32gb RAM ddr4, RX 6650xt. Running CachyOS. I recently moved to 1440p/165hz, and this build is struggling with Wuthering Waves and The Finals at that resolution. The Dilemma: The Mac Problem: I’m not sure if macOS is the right move for my major. It’s also annoying that I can’t play lighter games (like Ember Knights) on the go due to compatability. If I keep a Mac, I’m considering returning this one for a higher spec (24gb RAM/1tb) or maybe even the nano-texture display for the glare. I could help fund this by selling my lenovo laptop too. The Laptop Problem: My Lenovo actually runs games better than my desktop right now in some situations (likely the DLSS), but the 16gb soldered ram is a constant bottleneck. I’m considering selling it (and the mac) and getting a more "work-focused" Windows laptop (maybe Panther Lake?) that has similar battery to my macbook but better compatibility for the indie games I play on the go and future work. The PC Problem: I need to upgrade the GPU for 1440p gaming. If my 13600kf actually works, the 6650xt isn't cutting it anymore. What I need advice on: Cybersecurity majors: How is the macOS experience? Did you regret not having a native Windows/Linux environment for certain tools/VMs? The "One Laptop" Dream: Should I sell the Legion AND return the Mac to buy one high-end Windows ultrabook/workstation? Or keep the Mac (getting higher spec) for school/battery and just beef up the desktop? The Desktop: If I keep the Mac, what GPU should I pair with a 13600kf for smooth 1440p gaming in WuWa and The Finals? Budget/Context: Already in the Apple ecosystem. I live in a dorm, but I have my PC with me. If I were to return the mac and sell my laptop, my total budget for a new computer would be about $1500-1700 for a new laptop. Im open to openbox and refurbished, not used. On the laptop I only want to be able to run light games on battery like btd6, hollow knight, ember knights etc, but I do need it to be good enough for cybersecurity for 2 years. If I were to get a new laptop, I want it to have a decent build and a screen with 90hz+ and good enough brightness for outdoor use (preferably mini-led or oled). Some other things that are nice to haves are haptic trackpad and upward firing speakers. No screen size or thickness preferences What would you do in my shoes? submitted by /u/SpeedzMC [link] [comments]

  • The Importance of Two-Factor Authentication (2FA)
    by Novan Dwi Yulianda (Cybersecurity on Medium) on April 22, 2026 at 5:17 am

    “This article will discuss the importance of Two-Factor Authentication (2FA) in protecting online accounts.”Continue reading on Medium »

  • The Importance of Two-Factor Authentication (2FA)
    by Novan Dwi Yulianda (Security on Medium) on April 22, 2026 at 5:17 am

    “This article will discuss the importance of Two-Factor Authentication (2FA) in protecting online accounts.”Continue reading on Medium »

  • Coinbase Quantum Advisory Council Publishes Position Paper on Quantum Computing and Blockchain
    by /u/donutloop (cybersecurity) on April 22, 2026 at 5:12 am

    submitted by /u/donutloop [link] [comments]

  • From Reluctant to Reignited: My Honest Review of SANS Introductory Python for Cybersecurity
    by Sean Kettering (Cybersecurity on Medium) on April 22, 2026 at 5:05 am

    A veteran transitioning into cybersecurity shares what to expect from the SANS Introductory Python course — projects, lessons, and honest…Continue reading on Medium »

  • Building a TweetFeed IoC Fetcher: From Zero to Discord Webhook
    by meganuke_ (Cybersecurity on Medium) on April 22, 2026 at 4:59 am

    So I wanted to automate something that I was doing manually for way too long. Every day I would open TweetFeed, look at the latest IoCs…Continue reading on Medium »

  • 22 flaws in obscure “bridge” devices could let attackers mess with real-world systems
    by /u/PlaneTension1579 (cybersecurity) on April 22, 2026 at 4:58 am

    They’re basically used to connect older machines (like industrial or medical equipment) to modern networks… and they sit right in between digital systems and physical processes. Turns out 22 vulnerabilities were found in some of these devices, and thousands are still exposed online. Some of the flaws even allow unauthenticated access or full device takeover. What’s interesting is that these aren’t the kind of devices most people think about when it comes to security… but they can directly affect real-world systems. Feels like another example of how the biggest risks aren’t always the obvious ones. (linking the article for anyone interested) Let me know what ya'll think about this. submitted by /u/PlaneTension1579 [link] [comments]

  • WriteUp: Old Sessions — PicoCTF
    by Ali Amed (Cybersecurity on Medium) on April 22, 2026 at 4:54 am

    ChallengeContinue reading on Medium »

  • pgserve 1.1.11 through 1.1.13 are compromised, and the code is surprisingly clean
    by /u/-Devlin- (cybersecurity) on April 22, 2026 at 4:51 am

    Supply chain attacks are having a moment. The postinstall script is a 41KB credential stealer. What's interesting is there's no obfuscation at all. No eval, no atob, no curl piped to shell. Just well written javascript using standard node APIs. require('https'), execSync, fs.readFileSync, crypto.publicEncrypt. It grabs ~/.npmrc, ~/.aws/credentials, ~/.ssh/, chrome login databases, crypto wallets. Encrypts with a bundled public key and sends it to an ICP canister so you can't take it down with a domain seizure. Most tooling that flags postinstall scripts looks for obfuscation patterns. This wouldn't trigger any of them. The actual red flags are behavioral, a postinstall that reads credential files and makes network calls on a package with no native build dependencies. 1.1.14 is clean. The three bad versions are still on the registry. submitted by /u/-Devlin- [link] [comments]

  • Why is application security testing critical for modern business?
    by Meerab Khan (Cybersecurity on Medium) on April 22, 2026 at 4:49 am

    With the rapid advancement of technology, businesses worldwide have to rely on applications to work, scale, and serve customers. From the…Continue reading on Medium »

  • Cisco notes Network Basics — Module 14:Routing between the Networks
    by ExploitHunter (Cybersecurity on Medium) on April 22, 2026 at 4:39 am

    IP-pakket ingekapseld in een Ethernet-frame In most situations we want our devices to able to connect beyond our local network: out to…Continue reading on Medium »

  • How to Select the Best Security and Facility Management Services in Bangalore?
    by NSS Guarding & Facility Management Pvt Ltd (Security on Medium) on April 22, 2026 at 4:10 am

    Choosing the right Facility Management Services in Bangalore is very important for both homes and businesses. A clean and organized…Continue reading on Medium »

  • AI Governance Is Moving Into the Machinery
    by /u/Indie-Intervalist (cybersecurity) on April 22, 2026 at 2:21 am

    submitted by /u/Indie-Intervalist [link] [comments]

  • How Being Broke Can Enhance Your Digital Security
    by Katie McMillan (Security on Medium) on April 22, 2026 at 2:11 am

    Being broke doesn’t necessarily lead to security compromisesContinue reading on Medium »

  • HTTP Request/Response Lifecycle
    by Reda Mohamed (Security on Medium) on April 22, 2026 at 1:22 am

    1. دورة حياة الطلب والاستجابة (HTTP Request/Response)Continue reading on Medium »

  • My Mac Kept Losing Internet — The Real Culprit Was Hiding in My Own Network
    by Felipe Espinoza V. (Security on Medium) on April 22, 2026 at 1:01 am

    A step-by-step guide to diagnosing mDNS storms, closing security holes, hardening a Linux home server, and designing a network that…Continue reading on Medium »

  • The MFA Paradox: Designing Account Recovery When Users Lock Themselves Out
    by Hafiq Iqmal (Security on Medium) on April 22, 2026 at 1:01 am

    Why losing your TOTP device reveals your security architecture and how Laravel developers should build recovery systems that truly protect…Continue reading on Nerd For Tech »

  • Rego is Good. But It Comes at a Cost.
    by Anees Mehdi (Security on Medium) on April 22, 2026 at 12:49 am

    The tradeoffs nobody warned me about before I went all-in on OPAContinue reading on Medium »

  • My team needs to get started with CTEM, but I genuinely don't know what to do. What did your first 90 days look like?
    by /u/theavailablejuror (cybersecurity) on April 21, 2026 at 11:40 pm

    So our CISO came back from a conference about six months ago fully locked in on CTEM and I've been tasked with figuring out how we actually do it. And I get the concept, I really do. Continuous exposure management, prioritize what's actually exploitable, close the loop with remediation, great. Love it. Very cool framework. But like... what does day one actually look like? Because right now our stack is Tenable for VM, we've got some cloud stuff in Wiz, and honestly our external attack surface is kind of a mystery to us. We grew through a few acquisitions and I'm not even 100% sure we know everything that's out there with our name on it. Shadow IT is real and it haunts me. The way I see it, our problem isn't that we don't have data. We have too much data and none of it talks to each other. Tenable gives us one list, Wiz gives us another, and then someone finds something via a pen test that wasn't in either. It's a mess. And our IT team is already drowning so when we send them a remediation list, realistically maybe 20% of it gets touched. I've been reading about CTEM and every vendor deck makes it sound super clean and linear (discover, assess, prioritize, validate, mobilize, okay sure) but I feel like in the real world you'd just immediately get stuck at step one because you don't even have a complete picture of your external surface. So I guess my actual questions are: Did you start with getting your external attack surface nailed down first, or did you try to tackle everything at once? How do you handle the asset inventory problem if you're a mid-size org with some M&A baggage? Is there a realistic way to do this without hiring three more people? Would love to hear what actually worked vs. what sounded good in a vendor presentation. Especially if you've been through this at an org with 5-10k employees, that's roughly our size. submitted by /u/theavailablejuror [link] [comments]

  • Davis Security Guard Services: Your Complete Guide to Professional Protection in Davis, CA
    by Uniworth security Editorial (Security on Medium) on April 21, 2026 at 11:40 pm

    How Uniworth Security delivers licensed, 24/7 armed and unarmed security guard services across Davis — from UC Davis campus areas and…Continue reading on Medium »

  • Looking for cyber advice/ first cybersecurity job
    by /u/No-Kaleidoscope-8925 (cybersecurity) on April 21, 2026 at 11:36 pm

    Looking for advice in order to land first job in cybersecurity. Little about me … military veteran, currently working armed security for the federal government with a high risk security clearance (hopefully this plays in my favor) I’m also about halfway through my masters degree in cybersecurity but took a break due to personal issues. I recently got back into studying for the security plus exam and plan to take that next month but would love some advice by people in the industry to land a first job. I know how difficult it is currently and want to make sure I’m making the best use of my time. Should I finish my masters? Just get security + and start applying? Other suggestions? submitted by /u/No-Kaleidoscope-8925 [link] [comments]

  • How often do clients ask for SOC 2 before they actually need it?
    by /u/VerifAITrust (cybersecurity) on April 21, 2026 at 11:15 pm

    For consultants / auditors / advisors: How often do you see companies decide "we need SOC 2 now" when the real issue is something else first (questionnaires, one enterprise prospect, immature ops, investor pressure, unclear scope, etc.)? Curious how common premature SOC 2 really is. submitted by /u/VerifAITrust [link] [comments]

  • Anthropic's Mythos model accessed by unauthorized users, Bloomberg News reports
    by /u/Neymar11rose (cybersecurity) on April 21, 2026 at 11:07 pm

    submitted by /u/Neymar11rose [link] [comments]

  • Early version of EU's age verification app is apparently hackable in less than two minutes
    by /u/Fcking_Chuck (cybersecurity) on April 21, 2026 at 11:04 pm

    submitted by /u/Fcking_Chuck [link] [comments]

  • Lab review
    by /u/chrisbliss13 (cybersecurity) on April 21, 2026 at 10:52 pm

    Hey everyone, just wanted to see if I could get another set of eyes on a lab that I've been trying to build for a few months. There is a few bugs out there. Still trying to get most of the llm vulnerabilities and build out the labs for half of them. One man team so bear with me. DM me if you have any questions. Concerns do you want to report a bug? Just press the button on the bottom of each lab https://www.aipwn.me/ submitted by /u/chrisbliss13 [link] [comments]

  • CyberCX academy
    by /u/Nz_Kasadiya (cybersecurity) on April 21, 2026 at 10:27 pm

    Going through the recruiting process right now, super nervous, Anyone in here got any experience? submitted by /u/Nz_Kasadiya [link] [comments]

  • Iran claims US used backdoors in networking equipment
    by /u/rkhunter_ (cybersecurity) on April 21, 2026 at 8:51 pm

    Iranian media is claiming that the US used backdoors and/or botnets to disable networking equipment during the current war, and Chinese state media is dining out on the allegations. submitted by /u/rkhunter_ [link] [comments]

  • Job interview in 2 days - Installation Technician
    by /u/Far_Indication_1682 (cybersecurity) on April 21, 2026 at 8:26 pm

    Today I secured a job interview for an installation technician position, and I am wondering if anyone within any field relative to this has any insight on what I might expect in the interview process. I understand, and am comfortable explaining networking concepts. I can explain them both technically and simply, but is there any certain thing I should be preparing for? I tend to overthink and like to look for every sort of situation I might get hit with (I know this is nearly impossible). I feel I have enough base knowledge of the entire field, but welcome any input/suggestions. submitted by /u/Far_Indication_1682 [link] [comments]

  • Storing OTP Securely in Salesforce Platform Cache — A Production-Grade Architecture Guide
    by Mani (Security on Medium) on April 21, 2026 at 8:17 pm

    How to build a fast, secure, and reliable OTP verification system for Salesforce Experience Cloud using Platform Cache, SHA-256 hashing…Continue reading on Medium »

  • I am down to my final interview and I'm nervous
    by /u/IllDuty1690 (cybersecurity) on April 21, 2026 at 7:37 pm

    Hello, I have been working as an analyst for about a year, and I have recently made it to the last round for a position. I am aware that the person I am going against has more experience, better certs, and just better overall imo. I'm very enthusiastic about this type of work, and that's what I'm leaning on going into this final interview. I really want this gig, and I feel that it's a great opportunity for me to grow. I guess I am asking for advice on how I should approach this final interview and what the hiring team values over just experience. submitted by /u/IllDuty1690 [link] [comments]

  • BLS Cybersecurity Job Outlook vs reality
    by /u/YourSexyStepSis (cybersecurity) on April 21, 2026 at 7:03 pm

    I'm curious to get everyone's take on this. The U.S. Bureau of Labor Statistics has a projection of 29% growth for Information Security Analysts in the next decade. From my research, it seems that the BLS statistics tend to be fairly accurate. They have a low margin of error, but they tend to be fairly on point, and this projection is one of their highest, which I feel shows a level of confidence in its accuracy. https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-1 However, everything I've seen in the field and from talking to others indicates the opposite. It seems that AI has already culled a large number of SOC positions and will likely continue to do so. Are these jobs indicative of a shift towards AI compliance? How do you see the market shifting? Personally, I see it leaning more towards what cybersecurity used to be as a mid-late career transition for existing IT professionals. Although now it's hard to say what mid-late IT looks like for people in the future, since I feel most traditional sys admin roles will shrink. submitted by /u/YourSexyStepSis [link] [comments]

  • “I discovered a covert Wi-Fi–enabled camera concealed inside a power adapter in a hotel room. The device was transmitting live footage to an overseas server (likely China-based). No cctv footage, used vpn, hotel denies their involvement
    by /u/Gautam7009376762 (cybersecurity) on April 21, 2026 at 5:17 pm

    The hotel management is cooperative and denies any involvement, and there is no CCTV footage available. Given that I have access to the hotel’s network, what would be the most effective approach to identify the individual responsible for placing and operating this device? even if the operator used VPNs for watching live video submitted by /u/Gautam7009376762 [link] [comments]

  • I needed a replacement for Paul Jerimy's roadmap so I built one for my students
    by /u/Soft-Ad3507 (cybersecurity) on April 21, 2026 at 2:50 pm

    Hi, I have been in the field for a while, and when I started my journey I saw and used paul Jerimy cert which really help me view all my options and plan ahead. After couple of years I also started teaching cybersecurity on the side. Now I always use Paul Jerimy roadmap to show my students the size of the industry and help them plan but the last update was in 2024 and I did not find any alternative which felt quite right. So I decided to build my own and also make it publicly in the end in case it helps others the same way Paul's map helped me and also get some feedback. Now about the current features - 385 certs across 15 domains, each with actual data (each has a profile) and difficulty, practical weight(debatable), cost, DoD 8140 status and what roles it opens(there are also role possible paths). features sum: Cert view with filters by domain, level, cost, DoD 8140, and practical % Skills view: find certs by their need/giving skills Role paths for 40+ careers with estimated times Would love feedback and opinions from the community and I will note that its still in early days and there is more planned. Here it is - ebcertmap.com submitted by /u/Soft-Ad3507 [link] [comments]

  • White House integrating Anthropic’s Mythos AI into federal cybersecurity strategy to harden critical infrastructure
    by /u/danielminds (cybersecurity) on April 21, 2026 at 2:19 pm

    submitted by /u/danielminds [link] [comments]

  • Webpage takedown
    by /u/DanyaDramaLlama97 (cybersecurity) on April 21, 2026 at 2:10 pm

    Hello Does anyone have any advice on how to get a webpage taken down? Ive found a few webpage with non consensual explicit content uploaded, they have no DMCA or report pages and the ones that did lead to a 404 page. Ive emailed the hosting providers multiple times and even the police department of the country that the IP addresses are in yet ive recieved no response from any of them. Ive also reported the IP addresses multiple times to cybercrime sites etc Is there any other route i can go? submitted by /u/DanyaDramaLlama97 [link] [comments]

  • Do users rage on you after failing phishing campaign? "I didn't click the link" etc?
    by /u/MiKeMcDnet (cybersecurity) on April 21, 2026 at 1:48 pm

    submitted by /u/MiKeMcDnet [link] [comments]

  • CISA flags new SD-WAN flaw as actively exploited in attacks
    by /u/Doug24 (cybersecurity) on April 21, 2026 at 1:35 pm

    submitted by /u/Doug24 [link] [comments]

  • Full day technical test for a penetration tester role - is that normal?
    by /u/thicchkd (cybersecurity) on April 21, 2026 at 9:53 am

    Hi everyone, I have been working as a pentester at one company for the last 4 years or so, and have recently started looking at other job openings. So far I had interviews for 3 different places. The first one, I was told that at the second stage I will be doing a simulated web app assessment + report writing, which they would give me a week to complete. Although I didn't get through to the second stage for that place. The most recent one I did, had a nice chat on the initial interview call, they have now asked me if I could spend a full day at the weekend (or 2 sessions on weekday evenings) to complete a test + reporting. I know I probably sound lazy, but it's a significant amount of time to spend, unpaid, and potentially just for them to say that they will not hire me. Should I even bother? Or is this very normal part of the process? Any advice is appreciated. Thanks all. submitted by /u/thicchkd [link] [comments]

  • Vercel's security breach started with malware disguised as Roblox cheats
    by /u/drewchainzz (cybersecurity) on April 20, 2026 at 8:38 pm

    submitted by /u/drewchainzz [link] [comments]

  • Mentorship Monday - Post All Career, Education and Job questions here!
    by /u/AutoModerator (cybersecurity) on April 20, 2026 at 12:00 am

    This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]

What is Google Workspace?
Google Workspace is a cloud-based productivity suite that helps teams communicate, collaborate and get things done from anywhere and on any device. It's simple to set up, use and manage, so your business can focus on what really matters.

Watch a video or find out more here.

Here are some highlights:
Business email for your domain
Look professional and communicate as you@yourcompany.com. Gmail's simple features help you build your brand while getting more done.

Access from any location or device
Check emails, share files, edit documents, hold video meetings and more, whether you're at work, at home or on the move. You can pick up where you left off from a computer, tablet or phone.

Enterprise-level management tools
Robust admin settings give you total command over users, devices, security and more.

Sign up using my link https://referworkspace.app.goo.gl/Q371 and get a 14-day trial, and message me to get an exclusive discount when you try Google Workspace for your business.

Google Workspace Business Standard Promotion code for the Americas 63F733CLLY7R7MM 63F7D7CPD9XXUVT 63FLKQHWV3AEEE6 63JGLWWK36CP7WM
Email me for more promo codes

Active Hydrating Toner, Anti-Aging Replenishing Advanced Face Moisturizer, with Vitamins A, C, E & Natural Botanicals to Promote Skin Balance & Collagen Production, 6.7 Fl Oz

Age Defying 0.3% Retinol Serum, Anti-Aging Dark Spot Remover for Face, Fine Lines & Wrinkle Pore Minimizer, with Vitamin E & Natural Botanicals

Firming Moisturizer, Advanced Hydrating Facial Replenishing Cream, with Hyaluronic Acid, Resveratrol & Natural Botanicals to Restore Skin's Strength, Radiance, and Resilience, 1.75 Oz

Skin Stem Cell Serum

Smartphone 101 - Pick a smartphone for me - android or iOS - Apple iPhone or Samsung Galaxy or Huawei or Xaomi or Google Pixel

Can AI Really Predict Lottery Results? We Asked an Expert.

Ace the 2025 AWS Solutions Architect Associate SAA-C03 Exam with Confidence Pass the 2025 AWS Certified Machine Learning Specialty MLS-C01 Exam with Flying Colors

List of Freely available programming books - What is the single most influential book every Programmers should read



#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks

Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
zCanadian Quiz and Trivia, Canadian History, Citizenship Test, Geography, Wildlife, Secenries, Banff, Tourism

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Africa Quiz, Africa Trivia, Quiz, African History, Geography, Wildlife, Culture

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA


Health Health, a science-based community to discuss human health

Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.

Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.

Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, NCAA, F1, and other leagues around the world.

Turn your dream into reality with Google Workspace: It’s free for the first 14 days.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6 96DRHDRA9J7GTN6
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
63KKR9EULQRR7VE
63KNY4N7VHCUA9R
63LDXXFYU6VXDG9
63MGNRCKXURAYWC
63NGNDVVXJP4N99
63P4G3ELRPADKQU
With Google Workspace, Get custom email @yourcompany, Work from anywhere; Easily scale up or down
Google gives you the tools you need to run your business like a pro. Set up custom email, share files securely online, video chat from any device, and more.
Google Workspace provides a platform, a common ground, for all our internal teams and operations to collaboratively support our primary business goal, which is to deliver quality information to our readers quickly.
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE
C37HCAQRVR7JTFK
C3AE76E7WATCTL9
C3C3RGUF9VW6LXE
C3D9LD4L736CALC
C3EQXV674DQ6PXP
C3G9M3JEHXM3XC7
C3GGR3H4TRHUD7L
C3LVUVC3LHKUEQK
C3PVGM4CHHPMWLE
C3QHQ763LWGTW4C
Even if you’re small, you want people to see you as a professional business. If you’re still growing, you need the building blocks to get you where you want to be. I’ve learned so much about business through Google Workspace—I can’t imagine working without it.
(Email us for more codes)