Cisco Catalyst SD WAN just got hit with active exploits, seriously reconsidering our whole setup now, Done with it.
@cybersecurity.page
Summarizes the hottest content on r/cybersecurity once per hour. Warning, the summaries are generated by an LLM and are not guaranteed to be 100% correct. Operated by @tweedge.net, open source @ https://github.com/r-cybersecurity/best-of-bot
Cisco Catalyst SD WAN just got hit with active exploits, seriously reconsidering our whole setup now, Done with it.
Workers report watching Ray-Ban Meta-shot footage of people using the bathroom
I red-teamed GPT-5.4 on launch day. 10 polite questions leaked everything. Here's the methodology.
Self-taught in infosec, whatβs the one resource youβd recommend above everything else, and why?
Threat actors are using fake Claude Code download pages to deploy a fileless infostealer via mshta.exe β developers should be aware
A Reddit user questions why their managed MDR service, Arctic Wolf, failed to alert them about a password spraying attack targeting 16 users over a 48-hour period. The attack involved 271 unique passwords, over 3600 failed attempts, and 300 lockouts, but no alert was issued.
Proton Mail Helped FBI Unmask Anonymous βStop Cop Cityβ Protester
The first security awareness training revealed that basic practices like checking sender domains and hovering over links were new to many. The poster seeks to gather more personal cybersecurity practices to share with their team.
My friend and I built a free app where you learn IT by solving real troubleshooting scenarios, looking for feedback
A new CVSS 10.0 vulnerability, CVE-2026-29000, allows attackers to impersonate users with just the server's public key. Other notable CVSS 10.0 vulnerabilities include Log4Shell, EternalBlue, Heartbleed, and BlueKeep. What are other notable vulnerabilities, and which had the most impact?
Check Point is hosting a live 24-hour AMA on CTEM, with experts discussing how CTEM functions in the real world, addressing exposure risks, attacker tactics, and organizational challenges. Experts include senior threat researchers, CISOs, and cyber evangelists. Drop questions!
Waste Management is a Cybersecurity Job: An Awareness P.S.A.
A pentester feels uncertain about the future of secure coding as AI models are increasingly better at identifying vulnerabilities during code reviews. They wonder if focusing on high-level tasks like architecture and threat modeling might be more beneficial and seek advice on shifting career paths.
A leaked US government tool allegedly capable of breaking into iPhones has surfaced, raising concerns about privacy and security. Details about the tool's origin and capabilities remain unclear, generating speculation and worries about governmental surveillance on personal devices.
A report indicates that online ads have become one of the largest sources of malware on the internet, posing significant cybersecurity risks to users.
A newly merged company with a nascent InfoSec team is struggling to define the boundaries between security and IT incidents. They seek clarity on categorizing incidents based on impact, root cause, or intent. Practical guidance, beyond textbook definitions, is needed to address these challenges.
John Strand AMA - Five years ago, I did an AMA here about Pay What You Can training. A lot has changed in cybersecurity since then. Ask Me Anything.
A manager sharing concerns about AI misuse at work discovered employees were using unauthorized AI tools with customer data, believing it enhanced productivity. No malice involved, but highlights the need for better data security measures and awareness of AI tool usage policies.
Cybersecurity professionals in the U.S. are experiencing burnout due to excessive overtime. On average, they work 10.8 extra hours weekly, effectively adding a sixth working day. Nearly half reported 11+ overtime hours, and 20% logged more than 16 additional hours.
A potentially compromised POS company, HungerRush, received a threatening email claiming millions of restaurant and customer data are at risk. The sender demands contact, hinting at previous ignored requests and the possibility of malicious actions if unaddressed.
Israel allegedly hacked Iran's traffic camera networks to monitor Ayatollah Ali Khamenei and other officials, potentially contributing to intelligence gathering leading to Khamenei's assassination.
A recruiter from a previous employer shared that the number of applicants for cybersecurity roles in the UK has skyrocketed. Compared to 2020/21, where only a few applied, a recent senior role now received over 200 applications, with 70 meeting criteria, signaling a highly competitive market.
LexisNexis has confirmed a breach affecting both internal and customer data. The company, known for holding extensive data on individuals and entities, has been a key resource for background investigations since the late 1990s. This breach could have widespread implications.
Mentorship Monday - Post All Career, Education and Job questions here!
Public exposure of 2,863 Google API keys allows silent authentication to Gemini services. One user faced an unexpected $82,314 charge in two days. Google's initial response labeled it as "Intended Behavior."
An IT professional with 30+ years of experience was nearly compromised by a sophisticated phishing attack but used AI tool Claude to investigate and manage the incident within 48 hours. Compartmentalized security, FIDO tokens, and Claude enabled a swift response and prevented major damage.