cybersecurity

16 readers
2 users here now

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

founded 2 years ago
MODERATORS
351
 
 
The original post: /r/cybersecurity by /u/Ancient-Principle878 on 2024-10-05 17:15:54.

Hello everyone, I am currently working on a college project, and I want to develop an antivirus for mobile devices. Since it’s a college project, I want to avoid spending money. Could you suggest any good and reliable APIs for file scanning besides VirusTotal API?

352
 
 
The original post: /r/cybersecurity by /u/PuzzleheadedAd6504 on 2024-10-05 16:27:39.

SOC/ Security Analyst (L1) interview coming up! What should I focus on as of today to crack it? Any helpful questions/tools recommendations?

353
 
 
The original post: /r/cybersecurity by /u/KarmaJock on 2024-10-05 15:20:31.

Have any of you pursued ISO 27001 Lead Implementer? If so, do you have any recommendations if I'm self-funding?

I've seen that some of these cost a pretty penny or two: E.g. the majority site at >£1,200.

Am I biting more than I can chew off? I'm looking into preparing for GRC-related work as I 'hopefully' transition into the industry.

354
 
 
The original post: /r/cybersecurity by /u/digicat on 2024-10-05 13:34:56.
355
 
 
The original post: /r/cybersecurity by /u/celzo1776 on 2024-10-05 07:27:35.

Is it just me or have the Fanboy mentality and brand bashing intensified significantly the last 24 months, to me it seems that a lot of our newer collegaues misunderstand how to build a proper security stack, Where now it seems to be more important which brand is being used, insted of focusing on the tech stack and utilize a mixed portfolio of applications that do what they do best.

356
 
 
The original post: /r/cybersecurity by /u/peesteam on 2024-10-05 03:14:58.
357
 
 
The original post: /r/cybersecurity by /u/Arthur_Morgan44469 on 2024-10-05 02:03:24.
358
 
 
The original post: /r/cybersecurity by /u/Particular-Quail4563 on 2024-10-04 22:00:29.

Non Human Identity: I really like this space, i find it very intriguing, especially around autonomous token rotation. still learning a lot about both of these companies but I know companies like what they see from them both.

  • Oasis
  • Astix

NOW ON TO CLOUD TECHNOLOGY:

ASPM / CTEM / UVM;RBVM : I don't know what to really call this space yet

1. Dazz - leading the way in the space, heavier focus on Vuln aggregation, prioritization, and automation for vulnerability remediation. I look at them almost like XDR+SOAR for the cloud. They are one of the few that do a great job Code to Cloud to On Prem. They have soild ASPM features but I don't know if they classify as an ASPM exactly. The market is still determining what ASPM actually even means.

2. ArmorCode - They are really strong. Scoring and reporting for ASPM is really great. Their leadership, vision, and investments into growth is showing. I would put them slightly behind Dazz. However, there are use cases where they may be a better fit.

3. Avalor - Used to really love them, bought by Zscaler, I am not sure what the long term innovation looks like but they are still strong player today as long as Zscaler doesn't run the cost up.

API Security:

1. Traceable: I like them the most in this space now, since No Name was acquired by Akamai. I really love what they are doing.

2. Salt: I will always have love for them, they were one of the first to start doing API security and they are strong player but I would argue that No Name and Traceable are still slightly above them.

3. No Name: I am never a fan of a company post acquisition. I just think companies tend to overthink and/or dont innovate the product into their organization as well as they should.

CSPM / CNAPP

1. Upwind: This is one of the most intriguing companies to me and a company that people rave about. I am curious to see more from them to give a better perspective but overall their messaging and technology is getting the DevSecOps people excited. They operate in run time and extend into different areas.

2. WIZ: we have all heard of them. Their growth and execution reminds me a lot of Palo Alto Networks

3. Orca: After Wiz turned down Google's offer. I wouldn't be surprised if Google goes after them. They are without a doubt the second best option behind Wiz.

DSPM: There are others out there but dig got acquired by palo and Laminar by Rubrik.

1. Cyera: I would argue that Cyera is the best DSPM on the market. Their growth, market capitalization, and innovation continues to lead the way for most people.

2. Sentra: I really like them as a good competitor to Cyera I think both have a really strong go-to market messaging.

  1. Normalyze: They demo really well and people talk highly of them. I am still learning about them but I do know quite a few people that do have it.

AppSec: This space just has not changed much in years*,* the standard players are still holding strong.

SAST: SNYK, Veracode, Checkmarx, Synopsis, Mend, Sonatype

DAST: Veracode, Checkmark, Synopsis, Mend

SCA: SNYK, Veracode, Checkmark, Synopsis, Mend

359
 
 
The original post: /r/cybersecurity by /u/Limp-Web-5795 on 2024-10-04 21:26:09.
360
 
 
The original post: /r/cybersecurity by /u/blakdress on 2024-10-04 20:46:37.

I have OSCP and looking at sitting CPSA. I see a lot of talk about having CRT. But do companies care about CRT or CHECK (which cannot be obtained without sitting CRT)

Is it worth getting CRT through OSCP conversion or am I better saving the money and sitting the exam?

Also any advise on CRT exam I see it’s 2.5hrs but close book so seems like a lot of syntax to remember specially for the kiosk break through and network side of the exam

361
 
 
The original post: /r/cybersecurity by /u/Successful_Echo7532 on 2024-10-04 19:29:43.

I’m a Security Engineer but I’ve lost touch with DS/algorithms since transitioning to security from data science and dev role. I’m preparing for MAANG security engineer interviews and looking for a good set of programming problems to practice. Besides nolang’s Google notes, are there any other problem sets you recommend?

362
 
 
The original post: /r/cybersecurity by /u/AverageAdmin on 2024-10-04 17:21:01.

Hi all!

I have an interview for a SIEM and Detection Engineer position which is what I do now. One of the sections will be testing my in Python. I have used Python lightly at work but mostly for my OSCP doing some exploits.

I am trying to touch up my skills but I have no idea what they will grill me on. I was curious if anyone has an insight from some Python interviews to help guide my studying

Thank you!

363
 
 
The original post: /r/cybersecurity by /u/chrispy_pv on 2024-10-04 15:21:11.

Wanted to reach out and ask what home projects, certs, job experience have you guys done? I have been in IT for 7 years now, wanted to further my career, so I plan to take the security+ exam at the end of the month, but I am very analytical and organized. I also like protecting networks and keeping things secure.

That being said, what is a day to day like being a cyber professional whether protecting, analzying etc? Appreciate it in advance thanks guys

364
 
 
The original post: /r/cybersecurity by /u/urbanfoxmarketing on 2024-10-04 14:41:01.

I would like to get info and someone look on Testing lightweight SIEM on Raspberry Pi 4 8GB just for test on my home network and Test website for getting hands on other SIEM and quickly setup

365
 
 
The original post: /r/cybersecurity by /u/HotFan9966 on 2024-10-04 14:39:19.

I haven't seen any other threads and I am from a third-world country. To get into cybersecurity in my country is similar to having no experience at all if I go out to a country like the US. So, as a third year cybersecurity and digital forensics student who does more than what the college teaches here with the affiliated university in the UK (for instance I'm into reverse engineering and malware analysis and have been reading a ton of books and applying practical stuff) what advice do you have for me as professionals to get some real world experience possible remote online?

Recently I've been looking into online jobs but all those entry level jobs don't seem entry level with some requiring 3-5 years minimum industry experience. Also, I'm from Nepal, a country which still uses paper or simple old computers with hard disks to store data in majority.

366
 
 
The original post: /r/cybersecurity by /u/Nmax7 on 2024-10-04 14:21:29.

Thanks!

367
 
 
The original post: /r/cybersecurity by /u/TrainerDry7900 on 2024-10-05 00:26:06.

I'm looking for book recommendations that focus on identifying security vulnerabilities, any suggestions? They don't have to be beginner level books, though, anything helps, thanks.

368
 
 
The original post: /r/cybersecurity by /u/Illustrious-Web8148 on 2024-10-04 21:31:27.

I want to do a simulation using Deepfakes to help educate and train users this month… curious if anyone had ideas or suggestions how to go about doing this?

369
 
 
The original post: /r/cybersecurity by /u/momob2492 on 2024-10-04 20:47:10.

Or the worst thing you've noticed hardly anyone else wants to deal with on the job?

370
 
 
The original post: /r/cybersecurity by /u/professor_bond on 2024-10-04 20:20:12.

Apple’s latest operating system update, macOS 15 Sequoia, has disrupted several major cybersecurity tools used by enterprises and macOS users. The update, released on Monday, has reportedly broken functionalities of security tools developed by CrowdStrike, SentinelOne, Microsoft, and ESET, causing frustration among both developers and end-users.

371
 
 
The original post: /r/cybersecurity by /u/nick313 on 2024-10-04 20:06:17.
372
 
 
The original post: /r/cybersecurity by /u/ISeeDeadPackets on 2024-10-04 19:53:48.

While everyone has their detractors, I think most can agree that Crowdstrike has been a respectable choice over the years. I'm currently evaluating solutions (looking at SOC/MDR/SIEM) and I'm really kind of leaning their direction in spite of the recent issue. My principal concerns are centered around any legal consequences that might still be coming and their ability to weather them.

Am I nuts?

373
1
AI Glasses (zerobytes.monster)
submitted 9 months ago by [email protected] to c/[email protected]
 
 
374
 
 
The original post: /r/cybersecurity by /u/Hot_Kaleidoscope3864 on 2024-10-04 19:44:12.

Hi! Is there anyone who has solved Twinkle Lab? (Hack the box) I'm struggling to get the flag for user and root! And I don't even see one single walkthrough on the internet! So has anyone done this lab before?

375
 
 
The original post: /r/cybersecurity by /u/urosperko on 2024-10-04 19:17:08.
view more: ‹ prev next ›