Cyber SubReddits

Cyber SubReddits

17769 bookmarks
Custom sorting
Development Principles For Secure SDLC Process
Development Principles For Secure SDLC Process
Hello, I’m currently revamping the SDLC framework at my company and I’m trying to establish some good development principles. I have already got…
·reddit.com·
Development Principles For Secure SDLC Process
USB Strict Control with encryption of data.
USB Strict Control with encryption of data.
Hello everyone, I am looking for a solution or method to enforce strict controls on USB usage. Our organization has specific business requirements…
·reddit.com·
USB Strict Control with encryption of data.
Should CREST remove multiple choice elements of exams
Should CREST remove multiple choice elements of exams
Surely I'm not alone in thinking the multiple choice element of CRT/CCT/SAS/SAM are just awful. And the stubborn refusal to remove these elements…
·reddit.com·
Should CREST remove multiple choice elements of exams
Understanding a Bank Hack
Understanding a Bank Hack
Hi, Sorry, for the clearly written AI post, but I tend to ramble, and I needed to condense my post. A hacker successfully skimmed my wife's debit…
·reddit.com·
Understanding a Bank Hack
Cert Path - Entry Level - AWS or Azure?
Cert Path - Entry Level - AWS or Azure?
Hello, I'm currently working in IT Service Desk and I'm looking to break into Cybersecurity. I got my Security+ and was about to start the process to…
·reddit.com·
Cert Path - Entry Level - AWS or Azure?
Is there a way to hack an old E-Mail adress of mine?
Is there a way to hack an old E-Mail adress of mine?
I changed the password of my old E-Mail 2 years ago and forgot it and after being able to change the E-Mail on most accounts without having to have…
·reddit.com·
Is there a way to hack an old E-Mail adress of mine?
WhatsApp GIF Auto-forwarding
WhatsApp GIF Auto-forwarding
I have a user who has been sent a GIF on WhatsApp (a Tenor sports related GIF) who claims once he opened it the GIF then automatically sent to all…
·reddit.com·
WhatsApp GIF Auto-forwarding
Revisiting the 'Human Firewall' Idea in Security Awareness
Revisiting the 'Human Firewall' Idea in Security Awareness
Hi all, Longtime lurker, first-time poster here. I recently republished a blog post from last year on Substack, where I took a closer look at the…
·reddit.com·
Revisiting the 'Human Firewall' Idea in Security Awareness
Indodax, a leading cryptocurrency exchange in Indonesia, experienced a significant security breach between September 11 and September 13, 2024 resulted in the theft of approximately $20 to $22 million by the notorious North Korean hacking group, Lazarus Group
Indodax, a leading cryptocurrency exchange in Indonesia, experienced a significant security breach between September 11 and September 13, 2024 resulted in the theft of approximately $20 to $22 million by the notorious North Korean hacking group, Lazarus Group
2.7M subscribers in the hacking community. A subreddit dedicated to hacking and hackers. Constructive collaboration and learning about exploits…
·reddit.com·
Indodax, a leading cryptocurrency exchange in Indonesia, experienced a significant security breach between September 11 and September 13, 2024 resulted in the theft of approximately $20 to $22 million by the notorious North Korean hacking group, Lazarus Group
Developer in Cyber Security company. What to specialize?
Developer in Cyber Security company. What to specialize?
Hi all, I've been a developer for a Cyber Security company for around 7+ years doing backend development. I wonder if there's a specialization that I…
·reddit.com·
Developer in Cyber Security company. What to specialize?
Terraform for automating security tasks
Terraform for automating security tasks
Hello, I’m a cloud security engineer currently working in a AWS environment with a full severless setup (Lambda’s, dynmoDb’s, API Gateways). I’m…
·reddit.com·
Terraform for automating security tasks
AI vs Traditional Approach
AI vs Traditional Approach
I’ve started a new role as a SOC manager. Our senior leadership team is pushing to integrate AI into our operations. I’m hesitant because in my…
·reddit.com·
AI vs Traditional Approach
how to get advanced on my future job
how to get advanced on my future job
i came from CS background and now i got accepted in cyber security field and i want double learn,so started learning some introduction…
·reddit.com·
how to get advanced on my future job
Asking too much of SOC?
Asking too much of SOC?
Hi all, wanted to throw this question into the ether as it's a hurdle my team is currently facing with our SOC contractors. We outsource this work to…
·reddit.com·
Asking too much of SOC?
Exposed: How Israeli Spies Control Your VPN
Exposed: How Israeli Spies Control Your VPN
2.7M subscribers in the hacking community. A subreddit dedicated to hacking and hackers. Constructive collaboration and learning about exploits…
·reddit.com·
Exposed: How Israeli Spies Control Your VPN
backdoor in ballot scanner?
backdoor in ballot scanner?
Hello, I'm looking for expert input regarding a set of discovery documents I am creating. I am in discovery regarding a 2020 election related…
·reddit.com·
backdoor in ballot scanner?
How do you setup the DLP?
How do you setup the DLP?
Could you please advise how you implemented DLP? We have DLP from Microsoft and an E3 license, but we don't have a clear understanding of which rules…
·reddit.com·
How do you setup the DLP?
Continuing Professional Education (CPE) credits
Continuing Professional Education (CPE) credits
To keep on top of the changes in security as well as maintain certifications, I'm researching services that issue a `Certificate of continuing…
·reddit.com·
Continuing Professional Education (CPE) credits
Vulnerabilities Not Detected By Scanners
Vulnerabilities Not Detected By Scanners
What kinds of vulnerabilities cannot be detected by vulnerability scanners? How would you typically go about identifying and mitigating these kinds…
·reddit.com·
Vulnerabilities Not Detected By Scanners