cybersecurity

16 readers
2 users here now

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

founded 2 years ago
MODERATORS
426
 
 
The original post: /r/cybersecurity by /u/DeadBirdRugby on 2024-10-02 15:00:37.

I've seen some older generation folks on LinkedIn as Cyber Security Analyst in the 90s. From what I remember, the internet was like the wild west in the 90s. How much cyber security was there in the 90s? Was there cyber analysts at the enterprise level? What was their day job like?

427
 
 
The original post: /r/cybersecurity by /u/futuretester on 2024-10-02 14:13:29.

I’m considering a transition from IR to security architecture, for IR I’ve been following researchers, red teamers, blue teamers etc to stay on top of the latest ongoings and keep my skills up to date, what similar resources or individuals are putting out the best content for security architects?

428
 
 
The original post: /r/cybersecurity by /u/Glass_Conclusion2545 on 2024-10-02 13:24:34.

Can anyone recommend good resources e.g. books, videos, courses etc. on how to learn more about CTI? Books preferred.

429
 
 
The original post: /r/cybersecurity by /u/ANYRUN-team on 2024-10-02 12:43:37.

Hey everyone! I wanted to ask about your experience working in cybersecurity. What are the most difficult parts of your day-to-day work, and what motivates you to keep going?

430
 
 
The original post: /r/cybersecurity by /u/Jaad5 on 2024-10-02 10:54:05.

Hello everyone,

I am currently exploring the best career option between a Lead Auditor and an Internal Auditor, as I plan to apply for roles in the second line of defense, particularly those related to GRC (Governance, Risk, and Compliance) and Risk Management.

From my research, it seems these roles are quite similar, with the key distinction being that a Lead Auditor focuses on providing certification as part of a third-party certification body, while the Internal Auditor primarily ensures that the ISMS (Information Security Management System) functions as intended and is ready for certification or recertification.

Is this understanding correct?

Additionally, does the Lead Auditor role carry more recognition in the market? Which position would offer more professional value, particularly in relation to GRC and Risk Management?

Thanks!

431
 
 
The original post: /r/cybersecurity by /u/pinpepnet on 2024-10-02 08:09:40.
432
 
 
The original post: /r/cybersecurity by /u/jonatoni on 2024-10-02 07:46:27.

My team and I are working on a guide to improve SOC team efficiency, with the goal of reducing workload and costs. After doing some research, we came across the following industry benchmarks regarding SOC workload and costs: 2,640 alerts/day, which is around 79,200 alerts per month. Estimated triage time is between 19,800 and 59,400 hours per year. Labor cost, based on $30/hour, ranges from $594,000 to $1,782,000 per year.

These numbers seem a bit unrealistic, right? I can’t imagine a SOC team handling that unless they’ve got an army of bots 😄. What do you think? I would love to hear what a realistic number of alerts looks like for you, both per day and per month. And how many are actually handled by humans vs. automations?

433
 
 
The original post: /r/cybersecurity by /u/Cold_Caterpillar5776 on 2024-10-02 06:12:15.

Hey everyone, I’ve been studying cybersecurity for a while now and have a good grasp of the fundamentals. Recently, I’ve been thinking about taking my learning to the next level and diving deeper into more advanced topics.

I came across TCM Academy and it looks promising, but before jumping in, I wanted to get some feedback from those who have used it. For someone who already understands the basics, would you recommend their courses for more in-depth learning? How well do they cover advanced topics, and do you feel like they provide hands-on experience?

Any personal experiences or suggestions for other good learning platforms would be appreciated!

434
1
Interview help (zerobytes.monster)
submitted 9 months ago by [email protected] to c/[email protected]
 
 
The original post: /r/cybersecurity by /u/phatty69420 on 2024-10-02 05:54:24.

Nvidia security intern/CO-OP

Hello everyone, I was for those of you who interviewed or did a co-op/internship for nvidia in security what technical and coding questions you were asked and how/what the interview process was like? Thank you in advance.

435
 
 
The original post: /r/cybersecurity by /u/Environmental_Age_11 on 2024-10-02 04:40:08.

Title

436
 
 
The original post: /r/cybersecurity by /u/cloyd19 on 2024-10-02 03:24:36.

Howdy r/cybersecurity, I recently just completed my CISSP journey and have some free time and I want to get a feel from the community before I put a bunch of time into this.

Here it goes, would the community be receptive to an open source phishing remediation tool? Similar to Proofpoint TRAP or KnowBe4 PhishER or Cofence.

I have build some prototypes purely for personal/my jobs use, but I want to know if this is something people would actually use or if people would just purchase enterprise solutions. Some key features would be

  • Universal compatibility (gmail, outlook, etc)
  • Extensibility of processing rules(mainly YARA or custom YAML)
  • Automation

I have my gripes with each of the enterprise offerings, and I also find a lot of companies I’ve worked with don’t have a solution or don’t really utilize their solution or for MSSP the license is cost prohibitive.

I plan to start prototyping this more, but wanted to get some community feedback on this and even get ideas for features.

437
 
 
The original post: /r/cybersecurity by /u/trainz15 on 2024-10-02 01:43:27.

Insaaaane!! Heads up it’s about the creator of sub7 (good old days) go listen to the podcast.

438
 
 
The original post: /r/cybersecurity by /u/Happy-Ship6839 on 2024-10-01 23:28:10.

Argus is an all-in-one information gathering tool crafted for ethical hackers and cybersecurity experts. It seamlessly integrates network analysis, web exploration, and threat detection, all in a sleek and intuitive interface. Argus turns complex reconnaissance into an art of simplicity.


https://github.com/jasonxtn/Argus

439
 
 
The original post: /r/cybersecurity by /u/suddenly_ponies on 2024-10-01 23:10:05.

I need to prove to exec types that patching stuff is important and I can talk about the OPM breach and other really famous ones, but what I'd really like is some highly authorative source (NIST or something) that has a scary number like 90% of breaches are because some dipshit didn't apply Windows patches in time.

Does anyone have something like that handy? I already know vulnerabilities and patching are on the OWASP top 10 (#6 currently). Is that as good as I'll be able to get?

440
1
Cybersec roadmap? (zerobytes.monster)
submitted 9 months ago by [email protected] to c/[email protected]
 
 
The original post: /r/cybersecurity by /u/ZestycloseCanary9636 on 2024-10-01 21:52:14.

Hi,

I'm currently a electronic & automatic uni student but I love to work in cybersecurity. I have basic knowledge of web development & software development, as well as some basic about embedded system as my uni teach. What should I learn from here to be able to work in cybersecurity? I saw people mentioning many comptia's certs, is it worth it for me?

441
 
 
The original post: /r/cybersecurity by /u/Stunning_Major_8899 on 2024-10-01 21:20:58.

Hello, I want to share my first open-source project (C2-framework), and I’d love to get your feedback.

and I really welcome anyone who wants to build this project with me (emoji).

Now the project is fine. I have a cli/ c2-server / implant

and the implant did bypass the Windows Defender static analysis, but I'm sure that we can make it better.

https://github.com/enigma522/C2-framework

442
 
 
The original post: /r/cybersecurity by /u/davidawarshawsky on 2024-10-01 20:15:25.

I was asking Gemini to run commands and realized it must be using isolated sandbox. It is using bookworm. If you can White Hat find vulnerabilities in the package versions, you can report to google and maybe get a bounty. They are using Bazel and protobuf.

The current Linux distribution is: Debian GNU/Linux 12 (bookworm)

MPLCONFIGDIR=/tmp/matplotlib_config_dir 

LC_CTYPE=C.UTF-8

PYTHONPATH=/usr/bin/entry/images/py_interpreter.runfiles:/usr/bin/entry/images/py_interpreter.runfiles/protobuf~23.1/python/python:/usr/bin/entry/images/py_interpreter.runfiles/protobuf~23.1/python:/usr/bin/entry/images/py_interpreter.runfiles/_main/external/protobuf~23.1/src/google/protobuf/_virtual_imports/any_proto:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_numpy/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_contourpy/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_cycler/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_fonttools/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_kiwisolver/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_packaging/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_pillow/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_pyparsing/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_six/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_python_dateutil/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_matplotlib/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_pytz/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_pandas/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_seaborn/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_entrypoints/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_markupsafe/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_jinja2/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_attrs/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_rpds_py/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_referencing/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_jsonschema_specifications/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_jsonschema/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_toolz/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_altair/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_pypdf2/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_chess/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_certifi/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_click/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_click_plugins/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_cligj/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_fiona/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_pyproj/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_shapely/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_geopandas/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_imageio/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_mpmath/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_numexpr/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_opencv_python/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_et_xmlfile/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_openpyxl/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_charset_normalizer/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_pycparser/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_cffi/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_cryptography/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_pdfminer_six/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_tenacity/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_plotly/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_lxml/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_typing_extensions/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_python_docx/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_xlsxwriter/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_python_pptx/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_reportlab/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_lazy_loader/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_networkx/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_scipy/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_tifffile/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_scikit_image/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_joblib/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_threadpoolctl/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_scikit_learn/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_patsy/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_statsmodels/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_striprtf/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_sympy/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_tabulate/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_absl_py/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_wheel/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_astunparse/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_flatbuffers/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_gast/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_google_pasta/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_grpcio/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_h5py/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_keras/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_keras_preprocessing/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_libclang/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/rules_python~0.31.0~pip~ice_deps_310_opt_einsum/site-packages:/usr/bin/entry/images/py_interpreter.runfiles/r...


Content cut off. Read original on https://old.reddit.com/r/cybersecurity/comments/1ftxwjy/found_some_gemini_pro_container_internals_with/

443
 
 
The original post: /r/cybersecurity by /u/Lower_Nothing3710 on 2024-10-01 19:42:15.

Wondering if they are legit, thanks!

444
 
 
The original post: /r/cybersecurity by /u/Antique_Seat9761 on 2024-10-01 19:16:39.

Looking for guidance on how to draft a BYOD policy. Our company has a lot of people that use personal phones for work purposes, so we'd like to impose a policy on permitted uses of personal devices for corporate business, and security requirements that users must maintain on their device(having an antivirus solution). However our legal team is blocking us, because they say we're not allowed to dictate what people can and cannot do on their personal devices, and that we could potentially be liable to a lawsuit if we let someone go on the grounds of violating this policy. Is there any merit to this argument? I want to respect our legal teams judgement, but it's my understanding that a BYOD policy is pretty common and best practice across most industries. I also worry that not implementing a policy just allows unmanaged risk for someone to do something on their personal device that gets the company in trouble.

Edit: to specify, we're a US based company doing business in most states and major metro areas (including California) in the healthcare sector.

445
 
 
The original post: /r/cybersecurity by /u/SGTh3r0 on 2024-10-01 18:55:31.

My team has been struggling to get control of our company's Monday.com account. Global Admin is our Parent Company. Each company has a workspace. Parent company has no IT professionals on staff. My team is the only IT/Cyber team amongst all the companies. A sister company has a bunch of Devs. We currently have absolutely no admin control to this or our company's workspace. The CSuite doesn't seem to care according to my manager.

Currently I just witnessed an HR employee just created a board and made it public across all of our monday.com with PHI and PII for all Workman's comp claims. We are reporting and stopping this of course. What is the best way to leverage this to get us admin access? Any other Advice?

446
 
 
The original post: /r/cybersecurity by /u/LordandPeasantGamgee on 2024-10-01 18:53:16.

If our company is using Amazon Bedrock to provide AI capabilities to our end users, do I have to list the model we are using as a sub-processor or just Bedrock? Further, does listing AWS act as a catch all?

447
 
 
The original post: /r/cybersecurity by /u/WatermanReports on 2024-10-01 18:42:36.
448
 
 
The original post: /r/cybersecurity by /u/PartialNecessity on 2024-10-01 18:36:32.

Anyone have suggestions on a free or low cost high level 'course' for employees (bonus if it includes healthcare related subject matter) to ignore and click through anually? We used to have KnowBe4 but I could never get approval to force employees to actually participate in the educational aspect of the product so we got rid of it in favor of other tech we could actually utilize....

449
 
 
The original post: /r/cybersecurity by /u/Unlucky_Scientist703 on 2024-10-01 18:09:19.

I manage an infosec team and I'm organizing a few internal talks for security awareness month. Wondering if anyone has put on a presentation/event internally that went over really well with a larger non-technical audience? We have the standard awareness training/phish tests and all that, but I'm trying to figure out something that would resonate and get more engagement from people outside the technology org.

We're offering incentives of course to convince folks to attend (none of these are mandatory), but if you are willing to share what's worked/hasn't worked for you I'd appreciate it!

450
 
 
The original post: /r/cybersecurity by /u/Fuuck_iT on 2024-10-01 15:56:27.

I work in a Consultant Firm, we have different departments. I work in the Systems department. All my tasks are related to SOC, whether it is to triage alerts and escale them to L2 if needed. I was wondering if it would be ok to use Cybersecurity Analyst as job title in my LinkedIn profile even though in my job contract says Systems Technician.

view more: ‹ prev next ›