Cyber SubReddits

Cyber SubReddits

17943 bookmarks
Custom sorting
First day as a cybersecurity instructor
First day as a cybersecurity instructor
I recently started a job as a cybersecurity instructor teaching FEMA/DHS-certified cybersecurity courses to police, fire, emergency management, and…
·reddit.com·
First day as a cybersecurity instructor
Is this possible?
Is this possible?
Is it possible to explode a phone's battery remotely causing the device to explode and damage its handler? This is something being claimed in Lebanon…
·reddit.com·
Is this possible?
Can I get an email from @gmail.conm instead of @gmail.com
Can I get an email from @gmail.conm instead of @gmail.com
I forgot my twitch password and realized the email I put in was from gmail.conm instead of gmail.com and therefore cannot send a reset password link…
·reddit.com·
Can I get an email from @gmail.conm instead of @gmail.com
Sniffing Bluetooth from phones for theft detection
Sniffing Bluetooth from phones for theft detection
We are developing a platform that allows stores to tag thieves from cctv footage and alert employees if the thief returns. We are investigating…
·reddit.com·
Sniffing Bluetooth from phones for theft detection
New mods will be added to Hacking in the next few days
New mods will be added to Hacking in the next few days
Hi there, I have active mod status back, so I can add more moderators to the sub to keep it in reddit's good graces. First I'm going to wait for…
·reddit.com·
New mods will be added to Hacking in the next few days
Hacker continuous attempt to get my account
Hacker continuous attempt to get my account
I keep getting these emails, there’s someone trying to break into my account. It’s been months now, the email itself looks a bit vague how can you…
·reddit.com·
Hacker continuous attempt to get my account
An apk which if you want to genuinely troll someone
An apk which if you want to genuinely troll someone
Installing it will turn off dnd , set volume to max and play moaning sex sounds. If you will try to reduce the volume it will set it to max again…
·reddit.com·
An apk which if you want to genuinely troll someone
Reverse Engineer Network Traffic of an application
Reverse Engineer Network Traffic of an application
Hey :) I'm not new when it comes to reverse engineering network traffic, but I just wanted to ask around what others do or use to reverse engineer a…
·reddit.com·
Reverse Engineer Network Traffic of an application
Anyone else hit with malware last Thursday?
Anyone else hit with malware last Thursday?
936K subscribers in the cybersecurity community. This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
·reddit.com·
Anyone else hit with malware last Thursday?
DIY WiFi pineapple
DIY WiFi pineapple
57 votes, 17 comments. 2.7M subscribers in the hacking community. A subreddit dedicated to hacking and hackers. Constructive collaboration and…
·reddit.com·
DIY WiFi pineapple
Direct System Calls For Hackers (EDR Evasion)
Direct System Calls For Hackers (EDR Evasion)
2.7M subscribers in the hacking community. A subreddit dedicated to hacking and hackers. Constructive collaboration and learning about exploits…
·reddit.com·
Direct System Calls For Hackers (EDR Evasion)
Password Management vs IAM
Password Management vs IAM
I've implemented an IAM solution at my organization. However this tool was not intended for nor does the job of a password manager. Most of the apps…
·reddit.com·
Password Management vs IAM
The Dark Nexus Between Harm Groups and ‘The Com’
The Dark Nexus Between Harm Groups and ‘The Com’
934K subscribers in the cybersecurity community. This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
·reddit.com·
The Dark Nexus Between Harm Groups and ‘The Com’
5 interviews
5 interviews
5 fucking interviews 4 technical interviews with different managers of the security side of the organization and the final interview with a VP…
·reddit.com·
5 interviews
Development Principles For Secure SDLC Process
Development Principles For Secure SDLC Process
Hello, I’m currently revamping the SDLC framework at my company and I’m trying to establish some good development principles. I have already got…
·reddit.com·
Development Principles For Secure SDLC Process
USB Strict Control with encryption of data.
USB Strict Control with encryption of data.
Hello everyone, I am looking for a solution or method to enforce strict controls on USB usage. Our organization has specific business requirements…
·reddit.com·
USB Strict Control with encryption of data.
Should CREST remove multiple choice elements of exams
Should CREST remove multiple choice elements of exams
Surely I'm not alone in thinking the multiple choice element of CRT/CCT/SAS/SAM are just awful. And the stubborn refusal to remove these elements…
·reddit.com·
Should CREST remove multiple choice elements of exams
Understanding a Bank Hack
Understanding a Bank Hack
Hi, Sorry, for the clearly written AI post, but I tend to ramble, and I needed to condense my post. A hacker successfully skimmed my wife's debit…
·reddit.com·
Understanding a Bank Hack
Cert Path - Entry Level - AWS or Azure?
Cert Path - Entry Level - AWS or Azure?
Hello, I'm currently working in IT Service Desk and I'm looking to break into Cybersecurity. I got my Security+ and was about to start the process to…
·reddit.com·
Cert Path - Entry Level - AWS or Azure?