Advertisement · 728 × 90

Posts by Best of r/cybersecurity

CPU-Z and HWMonitor watering hole infection – a copy-pasted attack View post on Reddit.

A watering hole attack was discovered involving malicious versions of CPU-Z and HWMonitor, where targeted individuals downloaded tampered versions of these programs from compromised websites, leading to potential infections on their systems.

3 hours ago 0 0 0 0
Iran's forced nationwide internet blackout becomes second-longest on record as it passes 1,000 hours offline — possessing Starlink terminals punishable by death, country using 'military-grade jamming' against service View post on Reddit.

Iran's internet blackout has become the second-longest in history, lasting over 1,000 hours. Starlink terminal possession is punishable by death, and the country is using military-grade jamming to counter the service.

8 hours ago 2 0 0 0
"I Built" - Mods, can we please get a "built with A.I" tag and enforce it. The sheer amount of slop being posted under the guise of "I built" is off the chain. Its actually quite deciving. Mods, can we PLEASE have an enforced rule that if you're posting a tool you have to...

The Reddit post requests mods to introduce a "built with A.I" tag for tools shared on the site. The user criticizes the influx of substandard projects claimed as "I built," suggesting they often involve minimal effort and rely heavily on AI, leading to insecure and low-quality outcomes.

12 hours ago 1 0 1 0
Hackers claim control over Venice San Marco anti-flood pumps View post on Reddit.

Hackers reportedly seized control of the anti-flood pumps at Venice's San Marco, according to a group's statement.

14 hours ago 1 0 0 0
Are vulnerability scanners giving too much noise or is it just us? View post on Reddit.

A Reddit post questions if vulnerability scanners generate excessive noise or if the issue lies with users. It suggests that the overwhelming amount of data might dilute the value of these tools, indicating a need for better filtering or management of scanner outputs.

18 hours ago 3 0 1 0
FAANG security engineer getting ready for layoffs. For senior folks in this sub, how is my studying plan? There is massive talk internally that Mythos is moving fast and mass layoffs is one of those general topics that everyone is talking about Even if it does not happen, I'm getting prepared now for l...

A FAANG security engineer is preparing for potential layoffs by studying for the OSAI OffSec certification, practicing easy/medium LeetCode problems, focusing on system design, threat modeling, and appsec concepts. They are seeking additional advice from senior members.

1 day ago 0 0 0 0
Blue team question: How would you detect a low-and-slow attacker blending into normal traffic? Hey all, I’ve been thinking about detection strategies for attackers who deliberately avoid obvious signals. Scenario: Attacker uses legitimate credentials (no brute force, no alerts) Activity spre...

Blue team question: How would you detect a low-and-slow attacker blending into normal traffic?

1 day ago 0 0 0 0
ShinyHunters Claims Rockstar Games Breach via Snowflake Integration ShinyHunters is claiming a breach of Rockstar Games, allegedly involving access to a Snowflake environment via a third-party SaaS integration. Reports suggest the attack may have leveraged stolen a...

ShinyHunters claims they accessed Rockstar Games' data via a Snowflake integration, allegedly using stolen authentication tokens rather than a direct exploit. They've threatened a data leak, with a deadline set for mid-April.

1 day ago 0 0 0 0
Advertisement
Is LinkedIn actually worth it, or does it just make you feel behind? I started using LinkedIn to grow my network in cybersecurity connecting with experienced people, learning from them, finding opportunities. Seemed like the right move. But honestly? It's been makin...

Is LinkedIn actually worth it, or does it just make you feel behind?

1 day ago 0 0 0 0
Mythos announcement hit different if you work in cyber I work in cybersecurity and been building a threat intel platform on the side. Read the full Mythos writeup this week and honestly my first reaction wasnt excitement it was dread An AI that finds a...

A cybersecurity professional expresses concern over the Mythos announcement about an AI that autonomously discovers and exploits zero-days in major OSs and browsers. The professional fears it could render human expertise less relevant and questions the future of human-oriented security platforms.

2 days ago 1 0 0 0
Built Claude Skills for Governance, Risk, and Compliance frameworks (SO 27001, SOC 2, FedRAMP, GDPR, HIPAA, NIST CSF, PCI DSS, TSA Cybersecurity, and ISO 42001) Hello community, I work with Governance, Risk, and Compliance (GRC) and I’ve been experimenting with the new Claude Skills. We’ve built a collection of 9 specialized skills for Governance, Risk, an...

I've developed Claude Skills for nine GRC frameworks including ISO 27001 and GDPR, offering expert compliance guidance. Seeking feedback from community experts. Check the project on GitHub and the live site for details.

2 days ago 0 0 0 0
No VPN for cloud-first approach? I recently started at a new company. This company does not use VPN, with the justification that the workforce is dispersed and there are no on-prem servers. In their mind, not having a VPN is part ...

A new employee at a company without a VPN is questioning the security of this approach, as the company relies on strict IAM controls and cloud monitoring instead. They wonder if this method, part of a Zero Trust Architecture, is becoming more common and whether their unease is outdated.

2 days ago 0 0 0 0
CPUID site hijacked to serve malware instead of HWMonitor downloads View post on Reddit.

The CPUID website was compromised to distribute malware instead of legitimate HWMonitor downloads.

2 days ago 0 0 0 0
Mythos Is Likely Not As Great As Claimed But That Doesn’t Matter Anthropic announced to great acclaim (https://www.anthropic.com/glasswing) that its most recent AI frontier model, Mythos, was able to find so many previously undiscovered vulnerabilities in softwa...

Mythos Is Likely Not As Great As Claimed But That Doesn’t Matter

2 days ago 1 1 0 0
Claude Mythos Thread Investors seem to be selling cybersecurity stocks following the announcement of Claude Mythos and project Glasswing. Can someone illustrate the case for decreasing demand for edge security such as ...

Claude Mythos Thread

2 days ago 0 0 0 0
SANS classes are $8700!? Why on earth does SANS charge +8700 for a week/weekend in person classes? Do corporations really spend that much for an employee to sit for just one weekend/week of training? This is insane how do...

SANS classes cost over $8,700 for a week/weekend session, sparking outrage about affordability amid inflation and tech layoffs. Questions arise on whether corporations are willing to pay such high fees for short-term training with industry instructors.

2 days ago 4 0 0 0
Advertisement
Quitting cyber after 7 years 4 months ago I decided that quitting was the best option, after 7 years working for mid/low consulting companies on Archtecting and Engineering cyber infrastructure I coudn't bear anymore, and is n...

After seven years in cybersecurity, OP quits due to frustration with thankless work, management undervaluing security, and reliance on AI. They criticize the industry's focus on certifications over skills and warn juniors about challenges, emphasizing that their decision is personal.

2 days ago 0 0 0 0
Anthropic Model Scare Sparks Urgent Bessent, Powell Warning to Bank CEOs View post on Reddit.

Anthropic Model Scare Sparks Urgent Bessent, Powell Warning to Bank CEOs

2 days ago 1 0 0 0
Hackers exploiting Acrobat Reader zero-day flaw since December View post on Reddit.

A zero-day vulnerability in Acrobat Reader has been exploited by hackers since December.

2 days ago 0 0 0 0
Chrome introduces hardware-bound session protection to fight infostealer malware. View post on Reddit.

Chrome is implementing hardware-bound session protection to combat infostealer malware, aiming to enhance security by tying session data to specific hardware, making it harder for attackers to misuse stolen credentials.

3 days ago 1 1 0 0
Recycled phone numbers pose a major security risk today and should not be tolerated despite their downsides. Today, nearly every carrier resells numbers canceled by customers after a “cooling” period of around three months to one year. This might have been tolerable if we were living in 2003, because back...

Recycled phone numbers pose a major security risk today and should not be tolerated despite their downsides.

3 days ago 0 0 0 0
What are the best job sites to use when looking for cybersecurity jobs, or just IT jobs (in general)?? I know a lot of people use LinkedIn and Indeed. Are there any other (or better) sites worth using for jobs?

The post asks for recommendations on job sites for finding cybersecurity or IT jobs, mentioning LinkedIn and Indeed as known options. It seeks suggestions for other or possibly better platforms.

3 days ago 0 0 0 0
Hackers steal and leak sensitive LAPD police documents View post on Reddit.

Hackers steal and leak sensitive LAPD police documents

3 days ago 5 1 0 0
Advertisement
PCGAMER: LOL, Microsoft shutting down WireGaurd, VeraCrypt and other was just an email oopsie! How silly that people are making a big deal of it! View post on Reddit.

Microsoft accidentally flagged WireGuard, VeraCrypt, and others in an email, causing temporary concern. It's seen as a trivial mistake blown out of proportion.

3 days ago 0 0 0 0
‘Snoopy’, ‘Adolf’ and ‘Password’: The Hungarian Government Passwords Exposed Online View post on Reddit.

Hungarian government passwords, including weak ones like "Snoopy," "Adolf," and "Password," have been leaked online, exposing vulnerabilities due to poor password choices.

3 days ago 1 0 0 0
FBI extracted the notification database of Suspect's iPhone to read Signal messages View post on Reddit.

The FBI accessed a suspect's iPhone notification database to read Signal messages.

3 days ago 1 0 1 0
PSA: if you're on the receiving end of a red team test, the authorization letter protects you too this doesn't get talked about enough from the blue team side. if a red team engagement is properly authorized, there should be a sealed envelope held by legal that validates the whole thing. if you...

A properly authorized red team test should include a detailed authorization letter held by legal, protecting both the red and blue teams. It defines actions at each detection stage, preventing blame and legal issues. It's crucial for both teams’ protection, not just the red team's.

4 days ago 0 0 0 0
Two former heads of CISA and NCSC now work at a program funded by the Ukraine-sanctioned, Soviet-born billionaire owner of Warner Music View post on Reddit.

Former heads of CISA and NCSC now work for a program funded by a Ukraine-sanctioned billionaire who owns Warner Music.

4 days ago 0 0 0 0
AI is creating more cybersecurity work I think this has to be the opposite of what most people expected, but from an appsec and security engineer perspective, my workload has been significantly greater. Its not like AI came in and repla...

AI has led to a significant increase in cybersecurity workloads instead of reducing them. While AI boosts efficiency, it also accelerates output, resulting in more code and application reviews. Consequently, the team is expanding to manage the increased workload.

4 days ago 0 0 0 0
Russian state hackers are hijacking TP-Link and MicroTik routers to steal Outlook credentials, cybersecurity center warns — APT28 group targets DNS and redirects traffic to attacker-controlled servers View post on Reddit.

Russian state hackers APT28 are compromising TP-Link and MicroTik routers to intercept and steal Outlook credentials. They achieve this by manipulating DNS settings to redirect user traffic to attacker-controlled servers, warns a cybersecurity center.

4 days ago 2 0 0 0
Advertisement