CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Proxy vs VPN
DjamgaMind

DjamgaMind: Audio Intelligence for the C-Suite (Energy, Healthcare, Finance)

Are you drowning in dense legal text? DjamgaMind is the new audio intelligence platform that turns 100-page healthcare or Energy mandates into 5-minute executive briefings. Whether you are navigating Bill C-27 (Canada) or the CMS-0057-F Interoperability Rule (USA), our AI agents decode the liability so you don’t have to. 👉 Start your specialized audio briefing today at Djamgamind.com


AI Jobs and Career

I wanted to share an exciting opportunity for those of you looking to advance your careers in the AI space. You know how rapidly the landscape is evolving, and finding the right fit can be a challenge. That's why I'm excited about Mercor – they're a platform specifically designed to connect top-tier AI talent with leading companies. Whether you're a data scientist, machine learning engineer, or something else entirely, Mercor can help you find your next big role. If you're ready to take the next step in your AI career, check them out through my referral link: https://work.mercor.com/?referralCode=82d5f4e3-e1a3-4064-963f-c197bb2c8db1. It's a fantastic resource, and I encourage you to explore the opportunities they have available.

Job TitleStatusPay
Full-Stack Engineer Strong match, Full-time $150K - $220K / year
Developer Experience and Productivity Engineer Pre-qualified, Full-time $160K - $300K / year
Software Engineer - Tooling & AI Workflows (Contract) Contract $90 / hour
DevOps Engineer (India) Full-time $20K - $50K / year
Senior Full-Stack Engineer Full-time $2.8K - $4K / week
Enterprise IT & Cloud Domain Expert - India Contract $20 - $30 / hour
Senior Software Engineer Contract $100 - $200 / hour
Senior Software Engineer Pre-qualified, Full-time $150K - $300K / year
Senior Full-Stack Engineer: Latin America Full-time $1.6K - $2.1K / week
Software Engineering Expert Contract $50 - $150 / hour
Generalist Video Annotators Contract $45 / hour
Generalist Writing Expert Contract $45 / hour
Editors, Fact Checkers, & Data Quality Reviewers Contract $50 - $60 / hour
Multilingual Expert Contract $54 / hour
Mathematics Expert (PhD) Contract $60 - $80 / hour
Software Engineer - India Contract $20 - $45 / hour
Physics Expert (PhD) Contract $60 - $80 / hour
Finance Expert Contract $150 / hour
Designers Contract $50 - $70 / hour
Chemistry Expert (PhD) Contract $60 - $80 / hour

CyberSecurity - What are some things that get a bad rap, but are actually quite secure?

CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.

There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.

1- PGP

PGP is a Form of Minimalism

As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:

  1. You get from them a PGP identity (public key). How you do that is entirely up to you.
  2. Your PGP program uses that identity to perform a single public key encryption of a message key.
  3. Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
  4. Your correspondent does the opposite operations to get the message.

If you want to sign your message then you:

  1. Hash the message.
  2. Do a public key signature operation on the hash and attach the result to the message.
  3. Your correspondent checks the signature from your PGP identity, which they have acquired somehow.

The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.

As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:

  • Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
  • A Signal session requires the storage and maintenance of a lot of state information.
  • Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
  • Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
  • Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.

The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.

I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.

2- Very long passwords that are actually a sentence

It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”

AI-Powered Professional Certification Quiz Platform
Crack Your Next Exam with Djamgatech AI Cert Master

Web|iOs|Android|Windows

Are you passionate about AI and looking for your next career challenge? In the fast-evolving world of artificial intelligence, connecting with the right opportunities can make all the difference. We're excited to recommend Mercor, a premier platform dedicated to bridging the gap between exceptional AI professionals and innovative companies.

Whether you're seeking roles in machine learning, data science, or other cutting-edge AI fields, Mercor offers a streamlined path to your ideal position. Explore the possibilities and accelerate your AI career by visiting Mercor through our exclusive referral link:

Find Your AI Dream Job on Mercor

Your next big opportunity in AI could be just a click away!

3- Writing passwords down.

I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.

We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.

Did I say passwords? I meant encryption keys.

4- Changing default ports for certain services like dbs

Most of the gangs out there use tools that don’t do a full search, so they go through the default port list

AI Jobs and Career

And before we wrap up today's AI news, I wanted to share an exciting opportunity for those of you looking to advance your careers in the AI space. You know how rapidly the landscape is evolving, and finding the right fit can be a challenge. That's why I'm excited about Mercor – they're a platform specifically designed to connect top-tier AI talent with leading companies. Whether you're a data scientist, machine learning engineer, or something else entirely, Mercor can help you find your next big role. If you're ready to take the next step in your AI career, check them out through my referral link: https://work.mercor.com/?referralCode=82d5f4e3-e1a3-4064-963f-c197bb2c8db1. It's a fantastic resource, and I encourage you to explore the opportunities they have available.

5- MFA in general.

Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.

If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.

If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.

6- Oauth for 3rd party apps.

Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.

7- Two-step verification.

Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.

8-Biometric Authentication.

The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.

Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Gemini, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

One example of this is https://passage.id/ which is about as secure as you can get.

9- Zoom.

Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.

10- Unplugging the ethernet cable.

11- Browser password managers?

Rant moment: reasons cybersecurity fails

<Rant>

People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.

No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.

This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.

</Rant>

Why do cyber attackers commonly use social engineering attacks?

Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.

Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.

To conclude:

Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.

source: r/cybersecurity

Source: r/cybersecurity

  • The Quiet Upgrade That Turns Web Projects into Monthly Revenue
    by Janet Watson (Security on Medium) on January 22, 2026 at 8:41 am

    In the world of webdesign, most creators focus on launches, layouts, and one-time project fees. A website goes live, the invoice is paid…Continue reading on Medium »

  • Short-Lived Credentials on AWS: Eliminating Long-Term Access Keys
    by Davebhargavi (Security on Medium) on January 22, 2026 at 8:39 am

    How modern AWS teams stop credential leaks before they happen.Continue reading on Medium »

  • The 2026 Android Security Playbook: Practical Techniques to Prevent Data Leaks and Reverse…
    by Ali Mansour (Cybersecurity on Medium) on January 22, 2026 at 8:37 am

    Imagine this scenario: you launch a new application, and within a few months, it explodes to 100,000 users. Ratings are high, the…Continue reading on Android Alchemy »

  • PVS-Studio, Java and OWASP Top Ten 2021
    by Unicorn Developer (Security on Medium) on January 22, 2026 at 8:30 am

    Hi there! Java remains one of the main languages for server-side development. And for server applications, the most important thing is to…Continue reading on Medium »

  • ประจำวันพฤหัสบดีที่ 22 มกราคม 2569
    by ThaiCERT By NCSA (Cybersecurity on Medium) on January 22, 2026 at 8:21 am

    เตือนภัย Ad Blocker ปลอมระบาด แกล้งทำ Chrome ล่ม หลอกให้กดแก้เองเพื่อฝังมัลแวร์Continue reading on Medium »

  • 7 Urgent Steps: CVE-2026–20805 Windows DWM (Actively Exploited)
    by Pentest_Testing_Corp (Cybersecurity on Medium) on January 22, 2026 at 8:20 am

    Read time: ~9–12 minutes Audience: IT admins, security leads, SOC/IR, MSPs, and SMB owners who need a “patch + prove + preserve” playbook.Continue reading on MeetCyber »

  • Understanding Payment Method Bypass Vulnerabilities | Business logic |
    by M o $ t a (Cybersecurity on Medium) on January 22, 2026 at 8:16 am

    Payment Bypass Guide..Continue reading on Medium »

  • Como desaparecer de la red
    by La Trama Del Caos (Cybersecurity on Medium) on January 22, 2026 at 8:16 am

    Si consideras cada uno de estos puntos puedes volverte invisible en la red por el tiempo que mantengas en linea tu propia lineaContinue reading on Medium »

  • How Most Attacks Actually Start (And Why Antivirus Won’t Save You)
    by Sam Writes Security (Cybersecurity on Medium) on January 22, 2026 at 8:13 am

    For a successful cyber-attack we need access and not malware.Continue reading on Medium »

  • Lesson 2: How Authentication Works Passwords, Hashing, Sessions, and Tokens
    by Cyberspace Bulletin (Cybersecurity on Medium) on January 22, 2026 at 8:07 am

    Learn how authentication works, why passwords are hashed, and how to spot suspicious activity on your computer.Continue reading on Medium »

  • Securing Connected Industrial Systems in an Era of Mandatory Cyber Resilience
    by ACL Digital (Cybersecurity on Medium) on January 22, 2026 at 8:04 am

    Industrial automation systems are no longer isolated control environments. Today’s PLCs, industrial controllers, gateways, sensors, HMIs…Continue reading on Medium »

  • This incident is a good reminder that abuse does not always come from exploiting code vulnerabilities
    by /u/rangeva (cybersecurity) on January 22, 2026 at 7:57 am

    Sometimes it comes from exploiting trust assumptions. Zendesk worked exactly as designed, but the design optimized for frictionless support over adversarial thinking. submitted by /u/rangeva [link] [comments]

  • Zero Day Initiative — Pwn2Own Automotive 2026 - Day One Results
    by /u/NISMO1968 (cybersecurity) on January 22, 2026 at 7:54 am

    submitted by /u/NISMO1968 [link] [comments]

  • Joint report outlines practical approach to prioritising post-quantum cryptography migration in financial services – Framework supports early action and long-term planning as quantum computing challenges existing encryption methods
    by /u/donutloop (cybersecurity) on January 22, 2026 at 7:46 am

    submitted by /u/donutloop [link] [comments]

  • International Relations Series #1 Power and Restraint: Rethinking Hegemony, Order, and Real…
    by bobosjourney1 (Security on Medium) on January 22, 2026 at 7:43 am

    Why Lasting Strength Lies in Knowing What Not to DoContinue reading on Medium »

  • Why Online Harm Is a Human Security Problem, Not a Content Problem
    by Numburi (Cybersecurity on Medium) on January 22, 2026 at 7:34 am

    Over the past few years, society has become increasingly aware of deepfakes, online scams, impersonation, and coordinated digital abuse…Continue reading on Medium »

  • DMARC report tool
    by /u/Fresh_Heron_3707 (cybersecurity) on January 22, 2026 at 7:33 am

    I have a good number of Dmarc reports that I have to review. However I am need to download the report unzip the file and then read the reports. I was wondering how could I script something to aggregate many reports into one XML file that I could read on a weekly basis. submitted by /u/Fresh_Heron_3707 [link] [comments]

  • 7 Crypto Scams Beginners Still Fall For (Avoid These in 2026)
    by Emmanuel Obumneke Njoku (Security on Medium) on January 22, 2026 at 7:32 am

    Cryptocurrency offers huge opportunities, but the truth is that scams continue to trap thousands of beginners every year. In 2026, as the…Continue reading on Medium »

  • Construction Site Security: Safeguarding Your Projects
    by Travel time (Security on Medium) on January 22, 2026 at 7:29 am

    Construction sites are bustling hubs of activity, but they can also be vulnerable to theft, vandalism, and safety hazards. Ensuring the…Continue reading on Medium »

  • The Role of Security Services in Protecting Construction Sites
    by world guardian (Security on Medium) on January 22, 2026 at 6:52 am

    IntroductionContinue reading on Medium »

  • Celebrating Sovereignty with Smart Security: Why Your Gear Deserves an Upgrade This Republic Day!
    by Ramesh Raj (Security on Medium) on January 22, 2026 at 6:50 am

    As India celebrates another year of independence and progress, the definition of freedom has evolved. In today’s fast-paced world, true…Continue reading on Medium »

  • The AI Kill Switch: How to Hard-Block Models from Touching Private Data
    by Dorian Sotpyrc (Security on Medium) on January 22, 2026 at 6:31 am

    A real AI kill switch isn’t a privacy promise — it’s technical denial. If the assistant can’t connect, can’t fetch, and can’t send, it…Continue reading on Medium »

  • Unified Endpoint Management (UEM) Software Market: Trends, Growth, and Future Outlook
    by Michel mathew (Security on Medium) on January 22, 2026 at 6:24 am

    Unified Endpoint Management (UEM) Software market is entering a period of dynamic growth, fueled by the increasing complexity of IT…Continue reading on Medium »

  • Resurgence of a multi‑stage AiTM phishing and BEC campaign abusing SharePoint | Microsoft Security Blog
    by /u/thejournalizer (cybersecurity) on January 22, 2026 at 5:30 am

    submitted by /u/thejournalizer [link] [comments]

  • Satya Nadella at Davos: a masterclass in saying everything while promising nothing
    by /u/jpcaparas (cybersecurity) on January 22, 2026 at 4:40 am

    Microsoft's "responsible AI" commitment: They fired their entire Ethics and Society team in 2023, then shipped Windows Recall storing continuous screenshots in an unencrypted SQLite database accessible to any malware. It took 8+ months to add basic security measures that should have been obvious from the start. Independent Copilot research found 41% more bugs introduced into codebases. Emissions up 29.1% since their carbon negative pledge. I fact-checked 8 of Nadella's Davos claims. Only 1 held up. submitted by /u/jpcaparas [link] [comments]

  • Meaningful search spaces
    by /u/Tristanico (cybersecurity) on January 22, 2026 at 2:38 am

    Hello friends. Is it useful to have meaningful looking decoys during a brute-force attack? Say the secret message is “Hola.” The attacker brute forces and ends up finding variants like “Aló.” or “Mato”. The attacker can't know if they got the 'real' message or a decoy. Is there any real advantage to generating these “search spaces with meaning” instead of just random strings like “xjkl,”? submitted by /u/Tristanico [link] [comments]

  • Which DLP to get just to check the box?
    by /u/passionlesse (cybersecurity) on January 22, 2026 at 1:37 am

    Due to some circumstances a fintech SMB of 40-80 employees needs to get Data Leakage Prevention soft just for the sake of having it. Which DLP solution would you get to deploy on user workstations? Priority is - easy to set up, not too expensive, not too useless. (These levers can be tuned if nothing fits the bill) submitted by /u/passionlesse [link] [comments]

  • Best cloud security platform for 100 person org?
    by /u/Comfortable_Front561 (cybersecurity) on January 21, 2026 at 9:20 pm

    Hey people maybe a very frequently asked question but I’m trying to pick a solid cloud security platform for a 100 person company and could use some input. We’re looking for something that’s good at threat detection, helps with compliance stuff (SOC 2, ISO, etc.) and isn’t a nightmare to manage or super expensive. We don’t have a huge security team so ease of use and good integrations are pretty important too. Appreciate any thoughts! submitted by /u/Comfortable_Front561 [link] [comments]

  • Fortinet admins report patched FortiGate firewalls getting hacked
    by /u/rkhunter_ (cybersecurity) on January 21, 2026 at 8:03 pm

    Fortinet customers are seeing attackers exploiting a patch bypass for a previously fixed critical FortiGate authentication vulnerability (CVE-2025-59718) to hack patched firewalls. submitted by /u/rkhunter_ [link] [comments]

  • 2025’s most common passwords were as predictable as ever
    by /u/tekz (cybersecurity) on January 21, 2026 at 7:49 pm

    Once again, data shows an uncomfortable truth: the habit of choosing eminently hackable passwords is alive and well submitted by /u/tekz [link] [comments]

  • Fully patched FortiGate firewalls are getting compromised via CVE-2025-59718?
    by /u/tekz (cybersecurity) on January 21, 2026 at 7:49 pm

    CVE-2025-59718, a critical authentication bypass flaw that attackers exploited in December 2025 to compromise FortiGate appliances, appears to persist in newer, purportedly fixed releases of the underlying FortiOS. submitted by /u/tekz [link] [comments]

  • Assessment ProxMoxBox
    by /u/Matt_CyberGuy (cybersecurity) on January 21, 2026 at 7:34 pm

    Hey all, first time joining here... was wondering if I could get opinions on a system I'm putting together and am ready to begin cloning for internal use for doing our paid internal assessments (not pentests). TLDR: From my pic, do you think there's anything essential I should add? In the past when we would do network scans and audits for clients, we would generally have our clients either set up an unused desktop/laptop or VM for us to run our RapidFireTools scans on, but I always felt like it was really lacking in scope for everything else we could do, so I began doing bloodhound scans and stuff like responder when possible... but it was always hit and miss because the system(s) they would provide us would often be locked down with EDR and/or we would only be able to connect through VPN, which has it's own limitations. So I was able to convince my boss to start buying these little MiniPC's with a high core/thread count and lots of RAM. Only mod was adding a 2tb NVME for extra space. The first one arrived last week and I got to work. It's got the below installed/configured: - Proxmox w/ 2 NICs and 3 virtual bridges vmbr0 - faces client network for direct interaction ideally with all VLAN tags available to us vmbr1 - internally facing with virtual network vmbr2 - paired w/ second NIC to connect to TAP/Spanned port for traffic monitoring - Virtual Firewall Has 2 virtual NICs... one WAN to vmbr0, LAN to vmbr1 Fulfills two needs: provides a controlled network w/ static leases for VMs with web UIs, and connects select services through a full site-to-site VPN to our data center if the client network has restrictive outbound filtering (e.g., QUIC). - Windows 11 VM I installed our usual go to Rapid Fire Tools suite here SharpHound, AzureHound Ping Castle Purple Knight - Kali VM We only plan on using a few tools here, we are not generally paid to do pentests, just scan assessments, so in general I plan on just using tools like responder to get a view of what is what... but if any of you have suggestions for simple tests to do here that doesn't drift in scope too much, I'd be happy to get input here - Ubuntu Container Host VM Technically I could have spun this up on the Kali VM, but preferred to do it in a separate instance since it's the system we're standing on for accessing this entire platform externally outside our clients network Containers include: Cloudflared Tunnel with SSO protected access to all WebUi's Nginx Reverse Proxy Manager - for routing to Web Ui's of various platforms and Interfaces SysReptor - For creating the markdown version of the report we'll be generating. The Ui is a little clunky, but I LOVE what it can do... if there's something better out there, I'd love to get input BloodHound for ingesting the Sharphound and Azurehound data KASM front end interface for RDP and KasmVNC access to the Windows and Kali VM's, plus I stood up a Kasm workspace for ParrotOS and Maltego (just for fun). OpenVAS - Security Onion (I haven't played w/ this in years, excited to use it for this) Set this up to monitor our activity and present it with our findings at the end in case our clients don't have anything seeing/alerting for our activity. vmbr1 is used for it's management interface, vmbr2 is the monitoring interface it's been a long time since I touched SO, so I'm still relearning the interface Note about SecurityOnion: I'm actually having some difficulty with the SecurityOnion setup on proxmox. By default it binds bond0 with the scanning NIC, but on install on ProxMox it always fails to complete and from what I can tell never finishes the bond0 to monitoring NIC configuration. I tried getting it set up manually, but TCP dumps always show there's nothing happening on bond0, whereas ens19 (the vmbr2 monitoring NIC) shows all the live data from the spanned port I'm plugged into. For now I've manually forced SecurityOnion to use ens19, but I don't think it's ideal. Anyways, please let me know your guys thoughts and suggestions. I'm excited to deploy this to our client's location (probably end of this week), and to get this going as a standardized toolbox for us doing other assessments with other clients. submitted by /u/Matt_CyberGuy [link] [comments]

  • Don’t click the LastPass 'create backup' link
    by /u/NISMO1968 (cybersecurity) on January 21, 2026 at 7:24 pm

    submitted by /u/NISMO1968 [link] [comments]

  • Discussing the threat model of centralized password breach checking services.
    by /u/Take_A_Shower_7556 (cybersecurity) on January 21, 2026 at 6:48 pm

    Hi everyone. I'm doing some school research into the threat models and trust assumptions of current password breach checking methodologies for e.g., the HIBP API model. The prevailing model is centralized: the client sends a hash prefix (k-anonymity model), server returns a list of full hashes for the client to check locally. This is a great improvement over sending plain text. However, from a strict adversarial or "Zero Trust" standpoint, the server still receives a unique identifier (the hash prefix) and can link requests. In a high-sensitivity environment, even this metadata might be a concern. I'm hoping to spark a technical discussion: Protocol Design: Is there a practical way to design a breach check where the server learns nothing about the query (not the prefix, not the result)? Could techniques like Private Set Intersection (PSI) or Oblivious HTTP be applicable here, or are they too computationally heavy? Risk Assessment: How do you, as professionals, weigh the actual risk of metadata leakage from hash prefixes against the immense benefit of widespread breach checking? Is this a priority for enterprise security architectures? Adoption Barrier: If a more private protocol existed but required slightly more client-side computation or a different architecture, what would be the key factors for an organization like yours to consider adopting it? Looking for informed opinions, critiques of the premise, or references to relevant academic/industry work in this space. Thanks in advance! submitted by /u/Take_A_Shower_7556 [link] [comments]

  • FBI’s WaPo Investigation Shows How Your Printer Can Snitch on You
    by /u/eatfruitallday (cybersecurity) on January 21, 2026 at 5:29 pm

    submitted by /u/eatfruitallday [link] [comments]

  • The EU has launched its own CVE-style vulnerability database to reduce reliance on the US-run MITRE system
    by /u/Cybernews_com (cybersecurity) on January 21, 2026 at 5:17 pm

    https://cybernews.com/security/eu-launches-cve-alternative-gcve-vulnerability-database/ submitted by /u/Cybernews_com [link] [comments]

  • Learning cybersecurity in my 40s looking for real advice
    by /u/Odd-Conversation5108 (cybersecurity) on January 21, 2026 at 5:05 pm

    Hey everyone, I’ve been thinking about learning cybersecurity and wanted to ask for some honest advice. I’m an Afghan war veteran and I currently work in the social work field. I see people getting scammed all the time mostly because they don’t have basic computer skills. I’m not an expert myself either, but seeing this every day made me curious about cybersecurity and how this stuff actually works. I’m in my 40s and I’m trying to be realistic. I’m not trying to switch careers overnight or pretend I’m going to be some kind of hero. I just want to actually understand the basics properly and keep learning at my own pace. What I’m hoping to do is: Learn the fundamentals of cybersecurity in a way that makes sense Learn some Python at a beginner level but in a practical way Maybe get a certificate at some point If it works out, possibly do something part time or learning focused later on A few questions I have: Books Are there any books you’d recommend that explain cybersecurity in a big picture way without being overly technical or full of hype Also any Python books that are good for someone who is still learning computers in general Hardware I’m currently using a MacBook with an M1 chip Is that fine for learning and practice or would it be better to get a cheap used laptop just for labs Linux virtual machines etc Courses or certificates Are there any self paced courses or beginner friendly certs that are actually worth the time Something that doesn’t assume a strong tech background and is doable while working full time I know Reddit can be sarcastic sometimes and that’s fine. Just putting this out there that due to service related injuries I sometimes take things more literally than intended. Straightforward answers would really help. Thanks for reading and I appreciate any advice. submitted by /u/Odd-Conversation5108 [link] [comments]

  • I'm terrified!
    by /u/jasee3 (cybersecurity) on January 21, 2026 at 4:19 pm

    Hey everyone. I recently made it to the third round of interviews with a large holdings company for a cybersecurity analyst role. On paper, the position seemed focused on phishing and malware triage and incident response. After the second interview, though, I found myself feeling pretty intimidated. The interviewer spoke at length about how strong and experienced the team is and how demanding this role can be. The position involves owning projects and areas of subject matter, serving as a resident expert in certain domains, coordinating with vendors and internal teams to meet project goals, participating in daily meetings, and providing weekly progress updates directly to the CISO. For some background, I currently work at a smaller company where I have a lot of autonomy and flexibility. I am confident in my skills and performance, but everything I do is on a much smaller scale than what this role would require. I am only three years into my career, and honestly, I do not feel fully qualified for this position. That said, they keep moving me forward in the process, which makes me think they see potential in me that I do not quite see myself. The offer would be nearly double my current salary and includes a hybrid schedule, which makes it very tempting. At the same time, I am worried about leaving a comfortable role only to be overwhelmed in a much more demanding environment and risk not succeeding. Has anyone else been in a similar situation, or dealt with this kind of career leap before? submitted by /u/jasee3 [link] [comments]

  • Cyber security internships
    by /u/Apprehensive_Mud864 (cybersecurity) on January 21, 2026 at 4:14 pm

    there are none, swear I've searched a ton, it's like 1/50 internships as of right now and the qualifications and requirements go bazonnga, most of them require you to be fully graduated, or have won multiple ctf competitions, I gave up searching and accepted an offer for IT infrastructure, this is just my experience, what about you guys? submitted by /u/Apprehensive_Mud864 [link] [comments]

  • Looks Like Yahoo is Down
    by /u/Bad_Grammer_Girl (cybersecurity) on January 21, 2026 at 3:01 pm

    submitted by /u/Bad_Grammer_Girl [link] [comments]

  • Suspicious file investigation
    by /u/rick_Sanchez-369 (cybersecurity) on January 21, 2026 at 11:37 am

    Sophos XDR detected a file named svhost.exe located at: C:\Windows\System32\svhost.exe A few things about this file feel off, and I’m trying to determine whether this is a true red flag or some edge-case behavior. Observations: The filename is svhost.exe (not svchost.exe), which already raises suspicion. It’s located in System32. The file has the AHS attributes. It’s hidden and not visible in File Explorer. It can only be seen via CMD using dir /a. File size is approximately ~802 MB, which seems extremely unusual for anything named like a system binary. unable to retrieve File hash & owner The file is not actively running as a process. However, there are file system interactions associated with a Sophos PID. Observed DLL interactions: hmpalert.dll user32.dll sophosED.dll comctl32.dll winmm.dll cryptbase.dll powrprof.dll umpdc.dll At the moment, I’m trying to identify: Persistence mechanisms - registry, services, scheduled tasks, WMI Execution history - was it ever launched, by what, and when I’m unable to calculate the hash or determine ownership, which is making deeper analysis difficult. Questions: Has anyone encountered a similar scenario with Sophos XDR? Would you consider a hidden ~800 MB executable in System32 with a typo-squatted name to be a strong indicator of compromise? What would be the recommended hunting approach here beyond the usual persistence checks? Any Sophos-specific telemetry or Windows artifacts you’d suggest focusing on? Appreciate any insights or real-world experiences with cases like this. submitted by /u/rick_Sanchez-369 [link] [comments]

  • Are large cybersecurity conferences still useful for practitioners?
    by /u/Educational-Split463 (cybersecurity) on January 21, 2026 at 7:44 am

    With so many cybersecurity events happening across Asia in 2026, I’m curious whether people still find big conferences valuable. Do they offer real technical insights, or are they mostly vendor-driven now? Interested in perspectives from folks who’ve attended regional cyber events recently. submitted by /u/Educational-Split463 [link] [comments]

  • If you had to restart, what would you do differently to land a job in 2026?
    by /u/Dramatic_Thought_259 (cybersecurity) on January 21, 2026 at 2:53 am

    submitted by /u/Dramatic_Thought_259 [link] [comments]

  • Mentorship Monday - Post All Career, Education and Job questions here!
    by /u/AutoModerator (cybersecurity) on January 19, 2026 at 12:00 am

    This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]

What is Google Workspace?
Google Workspace is a cloud-based productivity suite that helps teams communicate, collaborate and get things done from anywhere and on any device. It's simple to set up, use and manage, so your business can focus on what really matters.

Watch a video or find out more here.

Here are some highlights:
Business email for your domain
Look professional and communicate as you@yourcompany.com. Gmail's simple features help you build your brand while getting more done.

Access from any location or device
Check emails, share files, edit documents, hold video meetings and more, whether you're at work, at home or on the move. You can pick up where you left off from a computer, tablet or phone.

Enterprise-level management tools
Robust admin settings give you total command over users, devices, security and more.

Sign up using my link https://referworkspace.app.goo.gl/Q371 and get a 14-day trial, and message me to get an exclusive discount when you try Google Workspace for your business.

Google Workspace Business Standard Promotion code for the Americas 63F733CLLY7R7MM 63F7D7CPD9XXUVT 63FLKQHWV3AEEE6 63JGLWWK36CP7WM
Email me for more promo codes

Active Hydrating Toner, Anti-Aging Replenishing Advanced Face Moisturizer, with Vitamins A, C, E & Natural Botanicals to Promote Skin Balance & Collagen Production, 6.7 Fl Oz

Age Defying 0.3% Retinol Serum, Anti-Aging Dark Spot Remover for Face, Fine Lines & Wrinkle Pore Minimizer, with Vitamin E & Natural Botanicals

Firming Moisturizer, Advanced Hydrating Facial Replenishing Cream, with Hyaluronic Acid, Resveratrol & Natural Botanicals to Restore Skin's Strength, Radiance, and Resilience, 1.75 Oz

Skin Stem Cell Serum

Smartphone 101 - Pick a smartphone for me - android or iOS - Apple iPhone or Samsung Galaxy or Huawei or Xaomi or Google Pixel

Can AI Really Predict Lottery Results? We Asked an Expert.

Ace the 2025 AWS Solutions Architect Associate SAA-C03 Exam with Confidence Pass the 2025 AWS Certified Machine Learning Specialty MLS-C01 Exam with Flying Colors

List of Freely available programming books - What is the single most influential book every Programmers should read



#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks

Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
zCanadian Quiz and Trivia, Canadian History, Citizenship Test, Geography, Wildlife, Secenries, Banff, Tourism

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Africa Quiz, Africa Trivia, Quiz, African History, Geography, Wildlife, Culture

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA


Health Health, a science-based community to discuss human health

Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.

Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.

Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, NCAA, F1, and other leagues around the world.

Turn your dream into reality with Google Workspace: It’s free for the first 14 days.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6 96DRHDRA9J7GTN6
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
63KKR9EULQRR7VE
63KNY4N7VHCUA9R
63LDXXFYU6VXDG9
63MGNRCKXURAYWC
63NGNDVVXJP4N99
63P4G3ELRPADKQU
With Google Workspace, Get custom email @yourcompany, Work from anywhere; Easily scale up or down
Google gives you the tools you need to run your business like a pro. Set up custom email, share files securely online, video chat from any device, and more.
Google Workspace provides a platform, a common ground, for all our internal teams and operations to collaboratively support our primary business goal, which is to deliver quality information to our readers quickly.
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE
C37HCAQRVR7JTFK
C3AE76E7WATCTL9
C3C3RGUF9VW6LXE
C3D9LD4L736CALC
C3EQXV674DQ6PXP
C3G9M3JEHXM3XC7
C3GGR3H4TRHUD7L
C3LVUVC3LHKUEQK
C3PVGM4CHHPMWLE
C3QHQ763LWGTW4C
Even if you’re small, you want people to see you as a professional business. If you’re still growing, you need the building blocks to get you where you want to be. I’ve learned so much about business through Google Workspace—I can’t imagine working without it.
(Email us for more codes)