What Are the Most Overlooked Security Vulnerabilities in Application Development?In your experience, what are some of the most commonly overlooked or underestimated security vulnerabilities when developing applications, and how…·reddit.com·Sep 25, 2024What Are the Most Overlooked Security Vulnerabilities in Application Development?
Network security Architecture Vs Network security OperationHello everybody, I'm a fresh Computer and Network engineering graduate, done an internship and got 2 offers from it as the title says which option is…·reddit.com·Sep 23, 2024Network security Architecture Vs Network security Operation
Phishing Attacks Using Header Refresh Techniquehttps://unit42.paloaltonetworks.com/rare-phishing-page-delivery-header-refresh/ Excellent article - Novel Attack Method: Phishing attackers are…·reddit.com·Sep 23, 2024Phishing Attacks Using Header Refresh Technique
Announcing the Bug Bounty program pack 1.0The goal of this release is to provide you with everything you need to establish a bug bounty program. This includes alignment with stakeholders…·reddit.com·Sep 23, 2024Announcing the Bug Bounty program pack 1.0
Insecure software makers are the real cyber villains – CISA944K subscribers in the cybersecurity community. This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.·reddit.com·Sep 22, 2024Insecure software makers are the real cyber villains – CISA
Penetration tester in transitionHey everyone, I've been a pentester for five years, primarily focusing on web applications, infrastructure, and code reviews. I also provide security…·reddit.com·Sep 21, 2024Penetration tester in transition
Cybersecurity & Cryptographers Looking for a New Challenge? | Join the Community N.S.A., Annual Challenge!943K subscribers in the cybersecurity community. This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.·reddit.com·Sep 20, 2024Cybersecurity & Cryptographers Looking for a New Challenge? | Join the Community N.S.A., Annual Challenge!
First day as a cybersecurity instructorI recently started a job as a cybersecurity instructor teaching FEMA/DHS-certified cybersecurity courses to police, fire, emergency management, and…·reddit.com·Sep 20, 2024First day as a cybersecurity instructor
What are the similarities and differences between Internal IT Audit and IT GRC? How does one transition from one to the other?Like the title says. I am an Internal IT Auditor and looking to move into IT GRC and want to know what I should work on to make the transition. Does…·reddit.com·Sep 18, 2024What are the similarities and differences between Internal IT Audit and IT GRC? How does one transition from one to the other?
Is this possible?Is it possible to explode a phone's battery remotely causing the device to explode and damage its handler? This is something being claimed in Lebanon…·reddit.com·Sep 18, 2024Is this possible?
Can I get an email from @gmail.conm instead of @gmail.comI forgot my twitch password and realized the email I put in was from gmail.conm instead of gmail.com and therefore cannot send a reset password link…·reddit.com·Sep 18, 2024Can I get an email from @gmail.conm instead of @gmail.com
Sniffing Bluetooth from phones for theft detectionWe are developing a platform that allows stores to tag thieves from cctv footage and alert employees if the thief returns. We are investigating…·reddit.com·Sep 18, 2024Sniffing Bluetooth from phones for theft detection
Extracting Credentials from Windows Event Logs (with 100% more URL)Apparently I just suck at using Reddit. I tried to cross post this earlier, but failed to provide the link. This is what I meant to post. — Original…·reddit.com·Sep 18, 2024Extracting Credentials from Windows Event Logs (with 100% more URL)
New mods will be added to Hacking in the next few daysHi there, I have active mod status back, so I can add more moderators to the sub to keep it in reddit's good graces. First I'm going to wait for…·reddit.com·Sep 18, 2024New mods will be added to Hacking in the next few days
Hacker continuous attempt to get my accountI keep getting these emails, there’s someone trying to break into my account. It’s been months now, the email itself looks a bit vague how can you…·reddit.com·Sep 18, 2024Hacker continuous attempt to get my account
in depth tutorial on installing setting up and using Evilginx3I am looking to use Evilginx3 but I can't seem to find any great videos or written tutorials on how to use this promising tool, can anyone refer me…·reddit.com·Sep 18, 2024in depth tutorial on installing setting up and using Evilginx3
An apk which if you want to genuinely troll someoneInstalling it will turn off dnd , set volume to max and play moaning sex sounds. If you will try to reduce the volume it will set it to max again…·reddit.com·Sep 17, 2024An apk which if you want to genuinely troll someone
Almost 3,000 people hurt and some killed after Hezbollah pagers explode2.7M subscribers in the hacking community. A subreddit dedicated to hacking and hackers. Constructive collaboration and learning about exploits…·reddit.com·Sep 17, 2024Almost 3,000 people hurt and some killed after Hezbollah pagers explode
Do you guys know any good tools for horizontal enumeration ? (I want to list associated domains of a domain)I have used CLI tools like sublist3r , subfinder and assetfinder for subdomain enumeration.·reddit.com·Sep 17, 2024Do you guys know any good tools for horizontal enumeration ? (I want to list associated domains of a domain)
Israel hacks into Hezbollah personal communication devices and detonates them remotely. Hundreds of Hezbollah members injured or dead.2.7M subscribers in the hacking community. A subreddit dedicated to hacking and hackers. Constructive collaboration and learning about exploits…·reddit.com·Sep 17, 2024Israel hacks into Hezbollah personal communication devices and detonates them remotely. Hundreds of Hezbollah members injured or dead.
They injured 3000+ and killed 8 by exploding their pagers, how did they do ti?2.7M subscribers in the hacking community. A subreddit dedicated to hacking and hackers. Constructive collaboration and learning about exploits…·reddit.com·Sep 17, 2024They injured 3000+ and killed 8 by exploding their pagers, how did they do ti?
Reverse Engineer Network Traffic of an applicationHey :) I'm not new when it comes to reverse engineering network traffic, but I just wanted to ask around what others do or use to reverse engineer a…·reddit.com·Sep 17, 2024Reverse Engineer Network Traffic of an application
Anyone else hit with malware last Thursday?936K subscribers in the cybersecurity community. This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.·reddit.com·Sep 16, 2024Anyone else hit with malware last Thursday?
DIY WiFi pineapple57 votes, 17 comments. 2.7M subscribers in the hacking community. A subreddit dedicated to hacking and hackers. Constructive collaboration and…·reddit.com·Sep 15, 2024DIY WiFi pineapple
Direct System Calls For Hackers (EDR Evasion)2.7M subscribers in the hacking community. A subreddit dedicated to hacking and hackers. Constructive collaboration and learning about exploits…·reddit.com·Sep 15, 2024Direct System Calls For Hackers (EDR Evasion)
Password Management vs IAMI've implemented an IAM solution at my organization. However this tool was not intended for nor does the job of a password manager. Most of the apps…·reddit.com·Sep 13, 2024Password Management vs IAM
The Dark Nexus Between Harm Groups and ‘The Com’934K subscribers in the cybersecurity community. This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.·reddit.com·Sep 13, 2024The Dark Nexus Between Harm Groups and ‘The Com’
Am I being too picky about location when looking at new opportunities?I've been working about 4 years in the cybersecurity field and I'm 25. My hometown is DC but I live outside of it for work. I wanna explore other…·reddit.com·Sep 13, 2024Am I being too picky about location when looking at new opportunities?
5 interviews5 fucking interviews 4 technical interviews with different managers of the security side of the organization and the final interview with a VP…·reddit.com·Sep 13, 20245 interviews
Increasing security and users/departments are being territorial against change and convenience over security.What's your story about the headwind for making changes for the better. What did you and the company do to mitigate the problem? I have to call for a…·reddit.com·Sep 13, 2024Increasing security and users/departments are being territorial against change and convenience over security.