cybersecurity

16 readers
2 users here now

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

founded 2 years ago
MODERATORS
151
 
 
The original post: /r/cybersecurity by /u/flacao9 on 2024-10-12 17:30:48.
152
 
 
The original post: /r/cybersecurity by /u/itcsps4 on 2024-10-12 17:26:42.

Is there a difference? I'm on the job hunt and I noticed there are Enterprise Security roles popping up that to me look are similar (or the same) as a Security Engineer role.. is this the new evolution of the "Security Engineer" or am I missing something?

153
 
 
The original post: /r/cybersecurity by /u/ka2er on 2024-10-12 16:46:25.

How do you find quality profile especially in France (east-north paris aera) ? I have a postition open and I would be interested to hear how do you chase for the right candidate ? which method do you use if company is not listed on cac40 index or cyber specialist ?

Any advice or real life experience very appreciated.

154
 
 
The original post: /r/cybersecurity by /u/madhanmaaz on 2024-10-12 16:24:00.
155
 
 
The original post: /r/cybersecurity by /u/SadCryptographer7976 on 2024-10-12 16:21:54.
156
 
 
The original post: /r/cybersecurity by /u/wisdom_of_east on 2024-10-12 12:36:21.

Please consider sharing your insight on my project...

🔧 GitHub Repository [Oblivious SRP Library]

Explore the repo and README to get started.

💡 Feedback Request [GitHub Discussions], or email me directly at by clicking here! Also, everyone is welcome to post their feedback in the comments or message me on Reddit itself.

Greetings,

I’m excited to announce the release of my dev project called Oblivious SRP, an evolution of the already highly secure Secure Remote Password (SRP) protocol. SRP is well-known for its use of zero-knowledge password proof, meaning the user’s password is never stored anywhere—not on the client, not even on the server. In SRP, passwords are never even sent over the network, not even in encrypted form! This makes SRP far more secure than other password-based systems. Hence, many major players like Apple and Skiff-mail make extensive use of SRP protocol in their products.

What makes SRP so secure?

  • No Password Storage: SRP doesn’t store your password, not even in an encrypted form. Instead, the password is transformed into a verifier that the server stores. The server uses this verifier to authenticate the user without ever learning the actual password.
  • No Password Transmission: During authentication, the user's password is never transmitted, not even in encrypted form. Instead, a mathematical proof is exchanged, allowing the server to verify the password without knowing it.
  • This makes SRP immune to common threats like password leaks from server breaches, phishing, and replay attacks.

But there’s still a potential vulnerability…

While SRP is extremely secure, it does store a verifier on the server. If a server becomes malicious, it can try to use this verifier to run dictionary attacks (guessing passwords until it finds the right one).

Introducing Oblivious SRP:

Oblivious SRP takes things up a notch by introducing Oblivious Pseudo-Random Functions (OPRF) and multi-server support to close these gaps:

  • OPRF: Instead of storing the verifier directly, the verifier is split into a private and a public component. The public verifier is generated via hashing OPRF evaluations with the private verifier, where the OPRF evaluations are username-rate-limited, making dictionary attacks nearly impossible.
  • Multi-Server Model: Oblivious SRP also supports a multi-server approach, where attackers need to compromise multiple servers to perform a successful attack. This makes password guessing far more complex and increases overall security.

Enhanced Security:

With Oblivious SRP, attackers would need to break into all the servers, bypass their rate-limitations and acquire real-time responses from each one to even begin trying to guess a password. The extra layers of defense significantly reduce the risks of traditional SRP while maintaining its core strengths.🔧

157
 
 
The original post: /r/cybersecurity by /u/MethodPleasant6478 on 2024-10-12 12:22:15.

In large enterprises, how is authentication and authorization typically managed across multiple applications (e.g., more than 20)? It doesn't seem efficient for each application to have its own isolated system for managing users, roles, and permissions. What strategies are commonly used to centralize user profiles, roles, and authorities across different systems? How do companies avoid redundancy and maintain security at scale?

158
 
 
The original post: /r/cybersecurity by /u/eatfruitallday on 2024-10-12 08:16:23.
159
 
 
The original post: /r/cybersecurity by /u/ProofLegitimate9990 on 2024-10-12 08:04:50.

Work in DFIR for a large UK company, just trying to gauge who should be carrying out searches in purview/ediscovery (sec/admin/HR/legal).

Officially our process is managers go to HR who fill in a form, they send over to us to assess the scope and then gets signed off by multiple sec managers. But this only seems to be for significant investigations.

I’ve noticed in our audit logs that HR seem to run their own searches with some pretty broad parameters that don’t sit well with me.

Thinking about it though I’m not sure who this should actually be on though, seems like an IT/admin function but think there’s a case for forensic disciplines to be applied. Also I’m not sure HR can be considered truly impartial if they are allowed to do it themselves.

Just curious how it’s set up at your organisation?

160
 
 
The original post: /r/cybersecurity by /u/JohnFargeWest789 on 2024-10-11 22:35:02.

I've been pretty deep with windows pki and have a rough idea of what ciphers, protocols and algorithms are. I want to expand my skill set to HSMs and want to expand my knowledge on cryptography.

I'm after a book or two that explains cryptography well for people are are not CS grads or mathematicians!

A book where I can understand the current world and the post quantum world, whenever that may be.

Any suggestions?

161
 
 
The original post: /r/cybersecurity by /u/Admirable_Zone_5212 on 2024-10-11 21:38:42.

Hey everyone!

I recently received an offer from Amazon for a Security Engineer internship and have an interview with Microsoft for a Security Assurance Internship coming up. If I end getting the Microsoft offer, which do you think would be better in the long term, and why? I’d love to hear any insights or advice.

(Both internships are in Seattle, WA)

Thanks in advance!

View Poll

162
 
 
The original post: /r/cybersecurity by /u/ZYADWALEED on 2024-10-11 21:16:45.

Hey everyone, I recently started as a Junior SOC Engineer about a month ago, I'm learning a lot on the job and making progress but kind of slowly, I'm also feeling a bit overwhelmed. Before this role, I was mainly focusing on SOC Analyst tasks, so most of my knowledge is in analysis.

Now, in my new position, my daily tasks include working with SOAR, ticketing systems, and SIEM

What areas should I prioritize learning to become better at the engineering aspects of the role? Also, are there any good courses or resources you’d recommend?

Thanks in advance for any advice!

163
 
 
The original post: /r/cybersecurity by /u/Exact-Salt7504 on 2024-10-11 19:37:26.

Hi there,

I have been tasked with aligning our company's policies with ISO 27001: 2022.

There is certain control areas where we are not compliant, but would like to put it into policy, to then drive the compliance. We would likely accept this is as an enterprise risk.

Could anyone provide suggestions of the language we could use in our policy to reflect that we are moving towards the implementation of the control && also address the ISO requirement?

My initial thoughts include:

  • The organisation will strive to implement control XYZ...
  • Where feasible, the organisation will implement XYZ...

I would appreciate any feedback (e.g. your experience with how this goes in an audit, and any suggestions around suitable language).

164
 
 
The original post: /r/cybersecurity by /u/mn540 on 2024-10-11 18:29:17.

I found out the largest password list is about 9.9B password. But what is the largest username/password combination list?

165
 
 
The original post: /r/cybersecurity by /u/infosec_syn on 2024-10-11 18:26:41.

Hello Everyone,

My company's is mainly a Windows shop but recently we've had the need to support 5-6 MacOS users for business reasons. Our current security tools don't support MacOS. What are some of the popular security tools that you guys leverage? I am looking for anti-virus, patching, and monitoring tools. Something that can feed back to a SIEM so my team and I can be alerted in the case of a cyber event.

Thank you!

166
 
 
The original post: /r/cybersecurity by /u/JCTopping on 2024-10-11 17:55:01.
167
 
 
The original post: /r/cybersecurity by /u/blackpoint_APG on 2024-10-11 17:30:25.

Veeam released a security bulletin on September 4, 2024 for several Critical- and High-rated CVEs for Veeam Backup & Replication (VBR), including:

  • CVE-2024-40711, a remote code execution vulnerability without needing authentication - affecting versions 12.1.2.172 and earlier.

Active exploitation has been observed in the wild by ransomware groups like Akira and Fog. Immediate action is recommended: Update VBR to the latest version to patch the vulnerability.

Relevant links:

168
 
 
The original post: /r/cybersecurity by /u/maki23 on 2024-10-11 17:23:40.
169
 
 
170
 
 
The original post: /r/cybersecurity by /u/themainheadcase on 2024-10-11 12:24:15.

If you're not familiar with Christ Titus, he is a big Youtuber in the tech space and he developed a tool called Windows Utility for debloating Windows. One of its features is called Microwin and what it does is it takes a Windows ISO and strips it of bloat, telemetry and things of this nature.

I tried Microwin to create such a debloated ISO of Win10 and it tirggered Avast, which said it detected a trojan. Here's what Powershell said:

https://imgur.com/a/AAJkknm

Here is what Avast recorded:

https://imgur.com/a/NKO2VnM

Do you think this is a genuine detection or a false positive? I'm not a programmer so maybe someone can interpret this better than I. Have there been suspicions or concerns about Windows Utility in the past?

EDIT:

Some more details. In this Windows Utility, you select the ISO you want to debloat and then after I select it I click "start the process" and the moment I click it, Avast sounds off. I just repeated the process exactly as previously and got the same two detections.

Here's more info from Avast: https://imgur.com/a/lLAR49s

171
 
 
The original post: /r/cybersecurity by /u/sammitrovic on 2024-10-11 10:26:19.
172
 
 
The original post: /r/cybersecurity by /u/Puzzlehead155 on 2024-10-11 15:10:13.

Hello All,

Recently I was planing to dip my toe into the GRC field ( no experience yet) .. I wasn't sure if I should go for CRISC or CGRC or go for a ISO27001 LI course+cert.

Now I found out about this New ISC2 Risk Management Certificates, I'd like to know what do you think about it and if it's worth it or not

Thank you,

173
 
 
The original post: /r/cybersecurity by /u/CISO_Series_Producer on 2024-10-11 14:28:06.

Below are some of the stories we’ve been reporting this week on Cyber Security Headlines.

If you’d like to watch and participate in a discussion about them, the CISO Series does a live 20-minute show every Friday at 12:30pm PT/3:30pm ET. Each week we welcome a different cyber practitioner to offer some color to the week's stories. Our guest this week is Jason Shockey, CISO, Cenlar FSB.

To get involved you can watch live and participate in the discussion on YouTube Live https://youtube.com/live/--QBs5C8qIs?feature=share or you can subscribe to the Cyber Security Headlines podcast and get it into your feed.

Here are the stories we plan to cover:

Insurers should stop funding ransomware payments, says Neuberger

An opinion piece written by U.S. deputy national security adviser for cyber and emerging technologies, Anne Neuberger and published in the Financial Times called for the practice to end, stating that “some insurance company policies, for example covering reimbursement of ransomware payments, incentivize payment of ransoms that fuel cybercrime ecosystems.” She added that the insurance industry “could play a constructive role by “requiring and verifying implementation of effective cyber security measures as a condition of underwriting its policies, akin to the way fire alarm systems are required for home insurance.” Her message followed the fourth annual International Counter Ransomware Initiative (CRI) summit that was held in in Washington D.C. this past week.

(The Record)

Harvard students create Meta Ray-Ban mod that IDs people in seconds

The creation, built by two students at the school, AnhPhu Nguyen and Caine Ardayfio, potentially allows a wearer of Meta’s new smart glasses to identify anyone they see. Their tool, which they have named I-Xray, uses the glasses to stream video images to Instagram. Faces captured in the images are then sent to a facial recognition app such as PimEyes, which matches images to its publicly available database of faces, names and PII. This provides enough information to cross-reference the data using people-search sites to find addresses and more details – potentially even partial Social Security numbers. All in about a minute. To make this even more intriguing, all the data that I-XRAY pulls itself becomes publicly available, thus creating a potential privacy nightmare for pretty much everyone.

(The Register)

Salt Typhoon attack potentially exposes wiretap data

The Chinese state-sponsored hacking group known as Salt Typhoon has reportedly compromised U.S. broadband providers, including AT&T, Verizon, and Lumen Technologies, through systems used for court-authorized wiretapping. According to sources, the hackers gained access not only to these wiretapping systems but also to general internet traffic flowing through the networks, raising significant national security concerns. The breach is believed to be part of a larger intelligence-gathering campaign by China, potentially compromising sensitive data. The FBI, along with private security analysts are currently investigating the extent of the intrusion and data theft.

(The Wall Street Journal),(Security Week),(The Register),(Dark Reading)

Salt Typhoon and the dangers of backdoors

Yesterday, we covered the compromise of wiretap systems across several US telcos by the China-linked threat actors Salt Typhoon. TechCrunch’s Zack Whittaker published a piece illustrating this as the consequence of including legally required backdoors in communication channels. The 1994 Communications Assistance for Law Enforcement Act, or CALEA requires “communications providers” to provide all necessary assistance to lawful government requests for customer information. In the piece, Georgetown Law professor Matt Blaze described this kind of attack as “inevitable” and said “CALEA should be regarded as a cautionary tale, not a success story, for backdoors.”

(TechCrunch)

White House prioritizes secure internet routing, using memory safe languages

Speaking at a Recorded Future event Wednesday in Washington, D.C., National Cyber Director Harry Coker said that “the White House is focused on securing two foundational aspects of the tech landscape: how information packets are routed across the internet and computer programming languages that can be susceptible to memory-related errors. Specifically he pointed out how the White House is looking at “next steps to secure Border Gateway Protocol, including the adoption of security mechanisms known as Resource Public Key Infrastructure (RPKI), which it plans to have in place in more than 60% of the federal government’s advertised IP space by the end of the year. Coker also spoke of “shifting from languages, like C or C++ to memory-safe ones like Go or Rust.” He identified this as a key priority of the Biden administration and a way to avoid known bugs. This correlates to a Microsoft report from July 2019 that found that more than 70% of the vulnerabilities that are assigned a CVE in any given year are related to memory safety.

(Cyberscoop andMicrosoft)

Cyberattack hits major U.S. water utility

American Water Works, which serves over 14 million people, disclosed a cyberattack that impacted its billing systems, though the company says water and wastewater services remain unaffected. The attack was first detected on October 3, and the company    has assured customers that there will be no late fees or service interruptions as they work to restore normal operations. In response to the growing number of threats aimed at the water sector, the EPA announced plans to ramp up security inspections and require the government to provide yearly risk mitigation updates.

(Cyber Scoop),(Bleeping Computer),(American Water Statement)

A look at consumer security behaviors

Consumer Reports published its "Consumer Cyber Readiness Report.” It found that 46% of respondents had personally experienced a cyberattack or digital scam, with 19% losing money. 75% of these scams and attacks came over email, social media, or messaging apps, with phishing being the most common method. On the plus side, 80% of respondents said they use some form of MFA on online accounts. 53% of respondents were confident that their data would not be distributed without their knowledge.

(Dark ReadingCR )

174
 
 
The original post: /r/cybersecurity by /u/Innvolve on 2024-10-11 14:15:01.

So, have you heard about the delay in the NIS2 directive implementation in the Netherlands? It was supposed to be rolled out by the end of this year, but the Dutch government has decided to push it back. The reason? Well, it’s a mix of logistical and legislative hurdles that they need to sort out first.

For many businesses, this delay is a bit of a relief because it gives them more time to get everything in order. On the flip side, it also means more uncertainty and the need to keep adapting to new cybersecurity threats. The government is working on providing more detailed guidelines and support to help businesses transition smoothly. They’re also focusing on strengthening public-private partnerships to improve our national cybersecurity.

I’m really curious about how you’re handling these changes. Have you started preparing for NIS2 compliance yet? What kind of challenges have you faced so far?

Are you or your organization ready for NIS2 compliance?

View Poll

175
 
 
The original post: /r/cybersecurity by /u/konkhra on 2024-10-11 09:31:21.
view more: ‹ prev next ›