cybersecurity

16 readers
2 users here now

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

founded 2 years ago
MODERATORS
651
 
 
The original post: /r/cybersecurity by /u/Secure_goat3 on 2024-09-24 04:24:52.
652
 
 
The original post: /r/cybersecurity by /u/ny_soja on 2024-09-24 04:21:05.

I have been on countless engagements, interviews, and casual chats with Cyber Security folks and specifically those in IAM. The one thing that irritates TF out of me is this unwavering obsession with the tech stack, as if having deployed or implemented a new technology is the first and last thing an enterprise needs to do to secure Identities.

What confuses me more than anything else is how 'Leaders' and Engineers swear that a technical interview/conversation can be one that constitutes asking candidates about their knowledge on how to traverse a platform as if there is any material value in having this information from a Security standpoint.

In a scenario where someone knows how to traverse a platform and potentially can tell you exactly how to take a specific course of action and which buttons to click, how does this translate to actually knowing how to respond to, plan for, or mitigate Cyber related business risks?

Even better question, how do any of those questions platform navigation question align with a "deeply technical" conversation?

This seems to be a cyclical series of events, these self proclaimed "technical experts" and "SME's" spend so much time learning how to pass a cert test for the platform and completely miss the objective of knowing what practices need to exist that could actually add meaningful value to the enterprises security posture.

653
 
 
The original post: /r/cybersecurity by /u/Individual_Presence9 on 2024-09-23 23:06:02.

Hey, r/Cybersecurity!

I’ve been thinking about some of the more famous tech incidents like CrowdStrike’s null update and Facebook’s BGP outage. While these were not necessarily caused by cyberattacks, I’m curious to hear your thoughts on whether such events could ever be intentionally exploited by cybercriminals.

Could a threat actor realistically cause similar disruptions, or are these incidents more the result of rare technical issues that wouldn’t serve malicious purposes?

Looking forward to hearing your insights and experiences

654
 
 
The original post: /r/cybersecurity by /u/Kasual__ on 2024-09-23 22:51:31.

What would you change, if anything?

655
 
 
The original post: /r/cybersecurity by /u/Thisoneshallnotfall on 2024-09-23 19:26:25.

I need help writing a school essay about my future career choice. I chose to be a cybersecurity analyst and I need someone to interview for the credit. Please anybody help. The deadline is coming very soon.

656
 
 
The original post: /r/cybersecurity by /u/BigHealthTechie on 2024-09-23 19:09:19.

Hey all! We're having a panel discussion on data protection and cybersecurity in healthcare, thought some of you might want to join: https://us06web.zoom.us/webinar/register/WN_Qps1Fmq_SqG1kx6iPDXsvg#/registration

657
 
 
The original post: /r/cybersecurity by /u/Thin-Parfait4539 on 2024-09-23 18:55:11.

https://unit42.paloaltonetworks.com/rare-phishing-page-delivery-header-refresh/

Excellent article -

Novel Attack Method: Phishing attackers are increasingly using a refresh entry in the HTTP response header to distribute malicious URLs.

Stealthy and Effective: This method is less detectable than traditional phishing techniques that rely on HTML content manipulation.

Personalized Attacks: Attackers often tailor phishing emails to individual victims, increasing the likelihood of success.

658
 
 
The original post: /r/cybersecurity by /u/sklessklassklos on 2024-09-23 18:36:45.

Hello everybody, I'm a fresh Computer and Network engineering graduate, done an internship and got 2 offers from it as the title says which option is better for the technical knowledge, is there a bad choice and what do you advice me to choose

659
 
 
The original post: /r/cybersecurity by /u/Puzzleheaded-Post129 on 2024-09-23 09:05:42.

Basically the title. But i have to write more because of the rules. I tought auditing would be a good direction- i feel like thats a responsibility we wouldnt hand over to the machines.

Personally, im interested in pen testimg/ethical hacking, but im not sure i jave that dog inside of me.

Any tips or advice is welcome, thx in advance.

660
 
 
The original post: /r/cybersecurity by /u/OccasionPersonal7312 on 2024-09-23 08:30:14.

i'm considering enrolling in the post graduate program in cyber security offered on coursera (around 1600 usd), but before committing, i wanted to ask for advice. has anyone here taken this program? if so, did you feel it was worth the cost in terms of quality, content, and industry recognition?

also, i'm curious if it's possible to learn the same cybersecurity skills through free resources. are there any high-quality free (or cheap) courses, certifications, or platforms that offer similar material?

for context, i'm working on improving my cv to strengthen my chances of getting accepted into a good master's program in cybersecurity.

here's the link to the program

661
 
 
The original post: /r/cybersecurity by /u/Dear-Pin-8698 on 2024-09-23 08:20:30.

What are your thoughts on Ironhack's Certified Ethical Hacking (CEH) course? Is it worth it? I'd appreciate any advice on what to do or avoid.

I'm considering enrolling in the course in Madrid, Spain. Have you taken it? If so, how was your experience? Or were you interested but decided against it? If so, why?

Many thanks in advance.

662
 
 
The original post: /r/cybersecurity by /u/DerBootsMann on 2024-09-23 18:29:04.
663
 
 
The original post: /r/cybersecurity by /u/Usual-Illustrator732 on 2024-09-23 17:56:32.
664
 
 
The original post: /r/cybersecurity by /u/arsonislegal on 2024-09-23 17:37:19.

Hey all, I'm curious if anyone has any examples of cybersecurity-related hoaxes that have occurred, or examples of times that media/news have overblown a story.

Thanks!

Edit: a good example is this post on the malware subreddit a few months ago, someone claimed they got malware from a usb vibrator... but a few people and news orgs did research and determined it likely didn't happen. But malwarebytes etc all published articles like it was completely true without doing any actual research, it seems.

665
 
 
The original post: /r/cybersecurity by /u/sendersclu8 on 2024-09-23 17:33:59.

Which integrations have people had success with for UEBA? Looking for rulesets around enumeration and reconnaissance alerting, specifically insider threat/initial access.

666
 
 
The original post: /r/cybersecurity by /u/JCTopping on 2024-09-23 17:03:21.
667
 
 
The original post: /r/cybersecurity by /u/SecTemplates on 2024-09-23 16:57:30.

The goal of this release is to provide you with everything you need to establish a bug bounty program. This includes alignment with stakeholders, working with a vendor, establishing a private bug bounty, and ultimately moving to a public bug bounty. This release pack is not sponsored or influenced by any particular bug bounty vendor and is neutral to vendor biases and influence.

In this pack, we cover:

Preparation Checklist: This checklist provides every step required to research, pilot, test, roll out, and expand a bug bounty program at your company.

Reporting Requirements: This document outlines the required information you'll need from a security researcher or vulnerability reporter as part of a bug bounty program.

Sample Bug Bounty Policy: This document contains a sample bug bounty policy that you can copy, adjust, and publish on your site.

Submission Response Templates: This document provides copy/paste message/email templates that can be used to communicate with external security researchers for the most common scenarios.

Bug Bounty Process Workflows: This diagram outlines the various steps to perform once a bug bounty program is established and you start receiving vulnerability reports. From verifying the issue to pulling in stakeholders for support, managing incidents, and public notifications. It aligns roughly with the context in the bug bounty checklist.

Bug Bounty Runbook: A runbook the security team can use to ensure consistent steps are followed when a vulnerability report is received.

Bug Bounty Metrics: This file contains sample, baseline metrics for tracking your bug bounty program and reporting on it internally.

Announcement

https://www.sectemplates.com/2024/07/announcing-the-bug-bounty-program-pack-10.html

GitHub

https://github.com/securitytemplates/sectemplates/tree/main/bug-bounty/v1

668
 
 
The original post: /r/cybersecurity by /u/kobyc on 2024-09-23 15:14:38.

Hi my name is Koby 👋 and for more than a decade I’ve been helping startups invest money into marketing, sales, product, and yes, cybersecurity, to help them grow their revenue.

My official title in my last two roles has been “head of growth” which is just a nice way of saying I do whatever is necessary to help a startup grow.

I don’t normally start posts about myself but I wanted to share just a little bit for credibility here, because I’m very very good at something that I think will help a lot of you - I’m S-tier at getting executives to invest money into valuable initiatives.

I think this is something that most humans responsible for the security of their organization really struggle with.

Often cybersecurity & compliance is seen as an afterthought.

“Do we really need to do this?”

“Is there actually a value to this penetration test?”

“What’s the easiest way for us to get this done?”

Cybersecurity departments at startups & large organizations are notoriously one of the most under-resourced teams. CISO’s begging for headcount, CFO’s trying to squeeze “efficiency” by citing miserable industry benchmarks.

To make matters worse, cybersecurity can seem to be an infinite money pit, where even if you DO throw millions of dollars at the problem of trying to become secure, there is STILL a chance that you will get compromised.

If you’re responsible for the data security of your organization, this post is to help you get the resources you need to be successful.

The most important rule of winning internal resources for cybersecurity is this: there are only three reasons startups invest in cybersecurity, they’ve been compromised before, it’s blocking a deal, or they are required to by law.

Recovering from a data breach: They’ve been compromised before.

I like to start with the “they’ve been compromised before” because this is the source of the business need for investing into cybersecurity. Even legal regulations are simply based on the key concept that “companies are getting hacked”.

There’s a rule called Murphy’s Law that states “anything that can go wrong, will go wrong.”

If you work in cybersecurity, this is probably one of the most important principles for you to understand. It pays for your salary, it’s what will get you promoted (or fired), this is the driving force behind the business need of cybersecurity.

Imagine for a moment if 5 people go to a work event and get really drunk. There’s a non-zero chance that one of them does something stupid and needs to get fired. But also there’s a really strong chance, probably 80-95%, that nothing bad is going to happen.

This is fine.

Now imagine that there’s 50 people who go to a work event and get really drunk. Much bigger chance something bad happens.

Now imagine 500. Now imagine 5,000. Now imagine 50,000.

The more surface area you have, what used to be a “small team grabbing drinks” turns into “something bad will absolutely happen.”

Cybersecurity is like this.

When you are small, your surface area is much smaller. Sure you’re still a target, but you’re flying under the radar, there’s a much smaller chance you are going to be compromised.

But as you scale?

You introduce more humans, your product surface area increases, you launch multiple products, you have old legacy code nobody actually understands anymore, you enter more geographies. You also launch or Product Hunt, Hackernews, you get PR on Forbes. You raise more money, you make more money, you hold more sensitive data.

Your likelihood of having a data leak or becoming compromised scales exponentially as the organization grows, your value as a target grows right alongside your attack surface area.

And eventually … anything bad that can happen, does happen.

This is why large organizations are basically forced to invest in cybersecurity. At a certain scale and surface area it’s basically a guarantee to become compromised. You are almost promised to become compromised if you do not invest in a certain level of security.

Some organizations absolutely begin to implement strong controls long before this happens, but also many don’t.

I’m just going to be really transparent, trying to convince a CEO or a Chief Product Officer to invest in cybersecurity before they’ve been hacked and personally feel the pain is going to be really really hard.

You can try to show them personal stories of similar companies, industry stats, bring in consultants to give an outside view - but it’s going to be hard.

The secret cheat code? Help them see security as a way to increase revenue, not simply prevent threats.

Security gaps costing millions: It’s blocking a deal.

Because large startups are basically forced under a near inevitability of being compromised, to start investing in cybersecurity, they will begin to require that anyone who provides services or integrations to them are ALSO secure.

This is your secret weapon if you are in an early stage company who has not yet experienced the pain of a security breach.

A strong security posture doesn’t just help you prevent your organization from being compromised, it can be a critical tool and a strong value prop to your marketing & sales team.

The dirty secret of a SOC 2 report is that it’s for your marketers and sales reps, not necessarily your security team.

Your security team knows whether or not you are secure. The SOC 2 report is so other people know you are secure.

When your organization is selling into a company that cares about security, actually becoming secure can help you unlock a LOT more business. Maybe it’s only 5% of your business. But maybe 50% or more of your business has the potential of coming from enterprise organizations.

A strong security posture helps you not only unblock these deals, but to maximize your revenue.

Even 5% on a business that’s doing $100M a year, is a $5M a year unlock. If half the business is enterprise? Then that’s $50M a year that’s being assisted and empowered through your security efforts.

A strong security posture is not only going to be a binary requirement for closing these deals, it’s going to help you get through the process faster, it’s going to help you increase the speed of your buying cycles.

You know what sales reps, CEO’s, and CFO’s all hate? Having a $1,000,000 deal held up for 3-4 weeks because the CISO is unhappy with one of your security controls.

Here’s a few tricks to talk about the value of your security as it relates to revenue:

  1. Go into Hubspot or Salesforce, pull the account information, and show the historic information of how many deals have been assisted by your security posture.
  2. Estimate the market size that can be unblocked by obtaining a strong security posture. Show confidence intervals, “If we close 5 deals worth $100,000 each, that’s $500k. If we close 20 deals worth $1,000,000 each that’s $20M. In each case, our security expense is x% of this potential revenue.”
  3. Pull in quotes & feedback from the sales reps. How are they being impacted by CISO’s and IT Managers asking about security? How often does this come up? How long do deals get stuck in security review?

If your business is selling into organizations that care about security, you should be able to turn your security posture not just into an operating cost that we want to keep as small as possible, but a value prop that people will want to invest into, because it will help drive more revenue and speed up sales cycles.

Avoiding fines: It’s required by law.

The final reason that people invest into cybersecurity is that it’s being required by law.

If this is you, I want to give a sincere plea to please take this seriously.

I get how hard it is to create a startup, to simply build something that somebody wants, to get to ramen profitability. Needing to comply with regulations like HIPAA or GDPR can seem like a colossal waste of time that’s just getting in your way of driving revenue.

If you’re being required by law to implement cybersecurity, you need to realize that this is only happening because you are handling some of the most sensitive data on the planet that governments have felt the need to regulate.

So take a deep breath, and meditate for a moment on what it really means to protect your users privacy. That you are being entrusted with something sacred, your users trust.

Don’t take this simply as a box that needs to be checked, and a list of bare minimum requirements we need to dance through, but a warning sign.

You are holding sensitive data. People are very likely going to try and get this data from you. You need to protect it.

… And there will be consequences if you do not protect.

HIPAA violations have a four tiered system for fines & penalties:

  • Tier 1: Lack of knowledge: The lowest tier, with a minimum penalty of $127 and a maximum penalty of $30,487.
  • Tier 2: Reasonable cause and not willful neglect: A minimum penalty of $1,280 and a maximum penalty of $60,973.
  • Tier 3: Willful neglect, corrected within 30 days: A minimum penalty of $12,794 and a maximum penalty of $60,973.
  • Tier 4: Willful neglect, not timely corrected: A minimum penalty of $50,000 and a maximum penalty of $1,500,000.

On top of all of the consequences of simply having a data breach or becoming compromised, dep...


Content cut off. Read original on https://old.reddit.com/r/cybersecurity/comments/1fnmvmi/whats_the_monetary_value_of_cybersecurity/

669
 
 
The original post: /r/cybersecurity by /u/throwawayacct3810 on 2024-09-23 15:10:56.

So, we have 6 web applications, 2 internal and 4 external web facing where their SSL certificate expired today at the same time. This is less than 1% of our applications that have a certificate. Of the 6, 3 of them had certificate issued by Entrust and 3 by ZScaler. One of them was supposed to expire today, but the rest were supposed to expire sometime in 2025. We am thinking this was a misconfiguration, but want to rule this out if this could be an attack of some sort. We are checking siem and CS for logs to rule this out.

However never heard of this sort of attack where the SSL certificate expires. Does the hive mind here have any ideas of this could be an attack? Or is this a simple case of misconfiguration?

670
 
 
The original post: /r/cybersecurity by /u/schiftyd on 2024-09-23 15:08:43.

Not sure if this is the right place to post this, but figured i'd try anyway.

Throughout our company, my company has a google email address that has been around since the beginning of the company. This email address is tied to a lot of our accounts as the email username. I dont know all of them, but I do know it is. In some cases, it’s used as a google authentication login for some accounts.

One of our higher ups wants to give our entire team access to this email login and password, so that they can login to certain accounts. I immediately flagged this as a bad idea, but I’m apparently not explaining this well enough for them to understand why. I'm not a cybersecurity expert, just someone who's noticed this and flagged it.

In my opinion, (and pushing aside the ToS for a website's user policies/sharing accounts) having access to the main email could give someone access to change any of the passwords on a website and lock us out. Worse off, this main email also serves as an admin login to our password manager.

It’s a bad idea, right?

671
 
 
The original post: /r/cybersecurity by /u/Existing_Address_224 on 2024-09-23 15:06:01.

Am looking to expand my experience into mobile since we have the demand for it where I work but I don't if there's any respectable iOS or Android security certs to get. If anyone knows any, please let me know, preferably on the offensive side.

672
673
 
 
The original post: /r/cybersecurity by /u/JonnE_XP on 2024-09-23 14:21:38.

Hi, this is my first post ever on Reddit! So forgive me if I am not Reddit courteous or posting this in the wrong place. But I have been tasked with finding a phishing tool to test our users. We want to keep cost low, preferably free with the goal to identify those who are most susceptible and training them to better equip them for the real deal. I’ve looked online and saw there are many options.

Does anyone have any recommendations that they really like using or have used?

674
 
 
The original post: /r/cybersecurity by /u/Leather_Nebula_3270 on 2024-09-23 14:05:43.

Pls share older cybersecurity novels I need one for class🙏

675
 
 
The original post: /r/cybersecurity by /u/mandos_io on 2024-09-23 13:47:12.
view more: ‹ prev next ›