Threat landscape for industrial automation systems. H2 2023

Cyber SubReddits
Tips for Profile Candidate Research in SOC Analyst Positions.
To those who work at small businesses (
What wifi adapter should I buy?
Same password for everything ftw 🚀
Mid-Atlantic CTF events/conventions/etc
Cloud Email Filtering Bypass Attack Works 80% of the Time
KnowBe4's PhishER Plus Add-On for Cybersecurity Awareness Training
AI Hallucinated dependencies Open A New Door For Malware
Linux has been hacked at last!
Intercepting cloud traffic from local device
What sets off a deauth detector?
AT&T confirms data for 73 million customers leaked on hacker forum
Risk Assessment Guidance - having a hard time understanding what needs to be done
Resources to build good foundation
Related to a post I saw here about a month back: CISA and FBI urge mfgs. to eliminate SQL injection vulnerabilities
Short Survey for College Research Paper
How to pivot from offensive cyber/gov contracting to commercial
FTC: Americans lost $1.1 billion to impersonation scams in 2023. 26% scams conducted via email
The Cyber Deception Day
Has anyone here ever used UAC bypass on an actual red team operation? If so, what was the scenario that required you to do a UAC bypass?
CVE-2024-3094 help understanding
NCC Group Interview
From OneNote to RansomNote: An Ice Cold Intrusion
Imperva Web Application Firewall Flaw Let Attackers Bypass WAF Rules
Enterprise Password Manager
Do you allow employees to use your company email on iPhone/Android native email apps?
Addressing bot traffic and network recon traffic
QR Code Fun
GRC Analyst Training