Cyber SubReddits

Cyber SubReddits

17769 bookmarks
Custom sorting
Network security Architecture Vs Network security Operation
Network security Architecture Vs Network security Operation
Hello everybody, I'm a fresh Computer and Network engineering graduate, done an internship and got 2 offers from it as the title says which option is…
·reddit.com·
Network security Architecture Vs Network security Operation
Phishing Attacks Using Header Refresh Technique
Phishing Attacks Using Header Refresh Technique
https://unit42.paloaltonetworks.com/rare-phishing-page-delivery-header-refresh/ Excellent article - Novel Attack Method: Phishing attackers are…
·reddit.com·
Phishing Attacks Using Header Refresh Technique
Announcing the Bug Bounty program pack 1.0
Announcing the Bug Bounty program pack 1.0
The goal of this release is to provide you with everything you need to establish a bug bounty program. This includes alignment with stakeholders…
·reddit.com·
Announcing the Bug Bounty program pack 1.0
Penetration tester in transition
Penetration tester in transition
Hey everyone, I've been a pentester for five years, primarily focusing on web applications, infrastructure, and code reviews. I also provide security…
·reddit.com·
Penetration tester in transition
First day as a cybersecurity instructor
First day as a cybersecurity instructor
I recently started a job as a cybersecurity instructor teaching FEMA/DHS-certified cybersecurity courses to police, fire, emergency management, and…
·reddit.com·
First day as a cybersecurity instructor
Is this possible?
Is this possible?
Is it possible to explode a phone's battery remotely causing the device to explode and damage its handler? This is something being claimed in Lebanon…
·reddit.com·
Is this possible?
Can I get an email from @gmail.conm instead of @gmail.com
Can I get an email from @gmail.conm instead of @gmail.com
I forgot my twitch password and realized the email I put in was from gmail.conm instead of gmail.com and therefore cannot send a reset password link…
·reddit.com·
Can I get an email from @gmail.conm instead of @gmail.com
Sniffing Bluetooth from phones for theft detection
Sniffing Bluetooth from phones for theft detection
We are developing a platform that allows stores to tag thieves from cctv footage and alert employees if the thief returns. We are investigating…
·reddit.com·
Sniffing Bluetooth from phones for theft detection
New mods will be added to Hacking in the next few days
New mods will be added to Hacking in the next few days
Hi there, I have active mod status back, so I can add more moderators to the sub to keep it in reddit's good graces. First I'm going to wait for…
·reddit.com·
New mods will be added to Hacking in the next few days
Hacker continuous attempt to get my account
Hacker continuous attempt to get my account
I keep getting these emails, there’s someone trying to break into my account. It’s been months now, the email itself looks a bit vague how can you…
·reddit.com·
Hacker continuous attempt to get my account
An apk which if you want to genuinely troll someone
An apk which if you want to genuinely troll someone
Installing it will turn off dnd , set volume to max and play moaning sex sounds. If you will try to reduce the volume it will set it to max again…
·reddit.com·
An apk which if you want to genuinely troll someone
Reverse Engineer Network Traffic of an application
Reverse Engineer Network Traffic of an application
Hey :) I'm not new when it comes to reverse engineering network traffic, but I just wanted to ask around what others do or use to reverse engineer a…
·reddit.com·
Reverse Engineer Network Traffic of an application
Anyone else hit with malware last Thursday?
Anyone else hit with malware last Thursday?
936K subscribers in the cybersecurity community. This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
·reddit.com·
Anyone else hit with malware last Thursday?
DIY WiFi pineapple
DIY WiFi pineapple
57 votes, 17 comments. 2.7M subscribers in the hacking community. A subreddit dedicated to hacking and hackers. Constructive collaboration and…
·reddit.com·
DIY WiFi pineapple
Direct System Calls For Hackers (EDR Evasion)
Direct System Calls For Hackers (EDR Evasion)
2.7M subscribers in the hacking community. A subreddit dedicated to hacking and hackers. Constructive collaboration and learning about exploits…
·reddit.com·
Direct System Calls For Hackers (EDR Evasion)
Password Management vs IAM
Password Management vs IAM
I've implemented an IAM solution at my organization. However this tool was not intended for nor does the job of a password manager. Most of the apps…
·reddit.com·
Password Management vs IAM
The Dark Nexus Between Harm Groups and ‘The Com’
The Dark Nexus Between Harm Groups and ‘The Com’
934K subscribers in the cybersecurity community. This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
·reddit.com·
The Dark Nexus Between Harm Groups and ‘The Com’
5 interviews
5 interviews
5 fucking interviews 4 technical interviews with different managers of the security side of the organization and the final interview with a VP…
·reddit.com·
5 interviews