Cyber SubReddits

Cyber SubReddits

17769 bookmarks
Custom sorting
Vulnerability Management workflow - Tenable Nessus
Vulnerability Management workflow - Tenable Nessus
Is there a Vulnerability Management workflow baked in with Tenable. I am looking at the following capabilties. I know that some vulnerabilties will…
·reddit.com·
Vulnerability Management workflow - Tenable Nessus
What options do I have in my cybersecurity career
What options do I have in my cybersecurity career
I want to do compliance but the money isn’t there so I’m doing mostly engineering/SOC management. I’ve been having a hard time for the past two years…
·reddit.com·
What options do I have in my cybersecurity career
Letter of Recommendation Question
Letter of Recommendation Question
922K subscribers in the cybersecurity community. This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
·reddit.com·
Letter of Recommendation Question
Working at KPMG?
Working at KPMG?
I'm curious, what's it like working at KPMG as a penetration tester or rather a senior cyber security consultant? I'm mainly interested in career…
·reddit.com·
Working at KPMG?
Urgent help- reported Company providing exam dumps
Urgent help- reported Company providing exam dumps
Hi, I recently joined a company providing jon guarantee program. Upon completion of the program, I was required to pass md-102 exam. I was provided…
·reddit.com·
Urgent help- reported Company providing exam dumps
Error while installing Kali netunter on termux
Error while installing Kali netunter on termux
Does anyone faced this issue while installing nethunter on termux? Issue - ./install-nethunter-termux: line 360: kali-arm64/etc/resolv.conf: No such…
·reddit.com·
Error while installing Kali netunter on termux
Where to start HTB and THM?
Where to start HTB and THM?
Hey experts, I'm new to TryHackMe and Hack The Box and would love some guidance on where to start. Could anyone recommend courses or hands on labs…
·reddit.com·
Where to start HTB and THM?
Collection of detailed incident stories
Collection of detailed incident stories
In aviation, every incident is researched in detail to provide active and new pilots with new training material based on the resulting lessons…
·reddit.com·
Collection of detailed incident stories
How do I get Wi-Fi passwords from windows on external drive
How do I get Wi-Fi passwords from windows on external drive
I have windows on an HDD which doesn’t work, I’d like to get all the Wi-Fi passwords and certificates off of it from another windows PC It’s windows…
·reddit.com·
How do I get Wi-Fi passwords from windows on external drive
C v C++
C v C++
I want to hear input on anyone who programs in these languages or both in the context of hacking. To start with I want to make it perfectly clear…
·reddit.com·
C v C++
Detection testing
Detection testing
In short, I am in a difficult situation. While not studying cybersecurity I was offered the opportunity to write my bachelor's thesis in the field. I…
·reddit.com·
Detection testing
Computer engineer to cybersecurity
Computer engineer to cybersecurity
I have a degree in computer engineering i work as a software engineer i develop desktop applications, i want to start learning cybersecurity i don’t…
·reddit.com·
Computer engineer to cybersecurity
Yet another WinRar conundrum
Yet another WinRar conundrum
Me from 15 years ago made a winrar archive, and saved said archive to an external drive that’s been sitting in a box in my closet for several years…
·reddit.com·
Yet another WinRar conundrum
Solana Avoids Catastrophe: rBPF Vulnerability Resolved
Solana Avoids Catastrophe: rBPF Vulnerability Resolved
A recent in-depth analysis revealed a critical vulnerability that was discreetly addressed in Solana validators, which had the potential to cripple…
·reddit.com·
Solana Avoids Catastrophe: rBPF Vulnerability Resolved
August's Most Prevalent Phishing Tactics
August's Most Prevalent Phishing Tactics
32 votes, 10 comments. Hi, everyone! I’ve identified several phishing campaigns exploiting various platforms to trick users into revealing their…
·reddit.com·
August's Most Prevalent Phishing Tactics
Looking to dive deep into deep blue
Looking to dive deep into deep blue
So I am looking for the one piece. Otherwise known as a list of attacks and also some information around security architecture. More specifically I…
·reddit.com·
Looking to dive deep into deep blue
What do you think of pursuing master in cybersecurity
What do you think of pursuing master in cybersecurity
As the title said, anyone who's had taken their master or higher level, do you guys think it's worth it? I'm looking for a coursework programme but…
·reddit.com·
What do you think of pursuing master in cybersecurity
Clientless industrial remote access
Clientless industrial remote access
Hello all, We would like to provide our suppliers remote access to a couple of our sites (majority of them connects to PLCs), but our current vpn…
·reddit.com·
Clientless industrial remote access
How relevant is AI in Cybersecurity?
How relevant is AI in Cybersecurity?
I am currently studying network security with a plan to go into cybersecurity thereafter, and have the option to take linear algebra which then…
·reddit.com·
How relevant is AI in Cybersecurity?
CISM PMP Azure Cloud - Hi I have 15 years experience
CISM PMP Azure Cloud - Hi I have 15 years experience
Hi I have 15 years in experience mostly in IAM and now working in Cybersecurity in Incident management and operations I have above certifications how…
·reddit.com·
CISM PMP Azure Cloud - Hi I have 15 years experience
Use of Russian Servers for commercial email & CRM
Use of Russian Servers for commercial email & CRM
We have been working with a company with that originated in Russia but relocated to the EU roughly 3 years ago before the war with Ukraine. The…
·reddit.com·
Use of Russian Servers for commercial email & CRM