cybersecurity

10 readers
1 users here now

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

founded 1 year ago
MODERATORS
326
 
 
The original post: /r/cybersecurity by /u/NonceJ on 2024-11-07 20:15:45.

Quick background: I have been an at this company as an ISSM for just over a year now. Did one year as an ISSO before starting here, and 10 years doing SA/NA type work.

My boss works across the country and has limited insight at my location. I work with an FSO who tries to act as if he’s my boss. This has led to several communication issues between myself and leadership at the site. People constantly go to him for cybersecurity related issues assuming he is my manager.

Recently the FSO asked me for a report, I said sure but what for, and he says it’s a meeting only for management. I manage a lot of projects and it’s a lot harder when I don’t have the information I need. I brought it up to him later and asked if it would be a good idea to get me involved in these types of meetings, he told me not to worry about it and it’s mostly programmatics.

I guess I just feel like it’s hard to be a ISSM when you’re not treated like a manager. Wanted to see if anyone had input/advice on how to go about this. I’m also curious how much other ISSMs work with their FSOs, and if the dynamic is the same.

327
 
 
The original post: /r/cybersecurity by /u/KingRudy25 on 2024-11-07 19:10:46.

Hello all, I am looking for your takes on this.

I was offered a full time SOC analyst role with Accenture and also an Internship Opportunity with Crowdstrike as a Falcon Analyst.

I haven't accepted either one yet and was wondering which would help me the most long term. My end goal is red team.

With Accenture I'd have all the benefits of a full time job and with Crowdstrike I'd have an internship with the POSSIBILITY of a job, but also CrowdStrikes name on my resume.

I'm just not sure which would be most beneficial long term as I can't have both because they have overlapping start dates.

Give some feedback please!

328
 
 
The original post: /r/cybersecurity by /u/Bruegemeister on 2024-11-07 18:35:38.

Consistent with these requirements and standards, this rule proposes:

To require that certain pipeline, freight railroad, passenger railroad, and rail transit owners/operators with higher cybersecurity risk profiles establish and maintain a comprehensive cyber risk management program; To require these owners/operators, and higher-risk bus-only public transportation and over-the-road bus owners/operators, currently required to report significant physical security concerns to TSA to report cybersecurity incidents to CISA; and To extend to higher-risk pipeline owner/operators TSA's current requirements for rail and higher-risk bus operations to designate a physical security coordinator and report significant physical security concerns to TSA.

329
 
 
The original post: /r/cybersecurity by /u/unihilists on 2024-11-07 18:10:04.

Experiment shows that only 21 companies of the Fortune500 operate "/.well-known/security.txt" file

Source: https://x.com/repa_martin/status/1854559973834973645

330
 
 
The original post: /r/cybersecurity by /u/Dear-Fill-6449 on 2024-11-07 18:01:32.

Hey Reddit!

I built a Python script to make CIS Benchmark compliance easier to manage by pulling recommendations directly from PDF files into Excel or CSV. No more endless scrolling!

Features:

  • Automatic extraction of key sections (Description, Audit, Remediation, etc.)
  • Clear formatting with selectable compliance status for quick reviews

I've tested this on about 20 CIS Benchmark files from the official CIS site, and it’s working smoothly. If you have any improvement ideas or run into issues, feel free to reach out!

GitHub Link: cisbenchmarkconverter

331
 
 
The original post: /r/cybersecurity by /u/JCTopping on 2024-11-07 17:09:40.
332
 
 
The original post: /r/cybersecurity by /u/tochmoc on 2024-11-07 16:11:08.

Hello folks,

I’m 26 years old, and I’m approaching the 3-year mark in my first and current role as a Network Engineer at an ISP. I’m now looking to transition from Networking to Cybersecurity.

Has anyone here made a similar shift? If so, I’d love to hear about your experience and what kind of study or training you pursued.

Is it challenging to land a job as a Security Analyst or a Network Security Engineer?

Also, are any of you managers or business owners in the Security field who are hiring? If so, please let me know.

333
 
 
The original post: /r/cybersecurity by /u/arqf_ on 2024-11-07 15:59:27.
334
 
 
The original post: /r/cybersecurity by /u/woja111 on 2024-11-07 15:48:31.
335
 
 
The original post: /r/cybersecurity by /u/No-Importance5696 on 2024-11-07 15:05:25.

Any security analysts or non-pentesters have a use case for using Kali linux? Verifying vulnerabilities? Scanning?

Or is it more risk than reward having a Kali box on the net?

336
 
 
The original post: /r/cybersecurity by /u/VulnerableU on 2024-11-07 14:57:15.

I’m not even mad

337
 
 
The original post: /r/cybersecurity by /u/JCTopping on 2024-11-07 14:06:54.
338
 
 
The original post: /r/cybersecurity by /u/MasterVJ_09 on 2024-11-07 13:17:10.

For those who already have a Ph.D with a few years of experiences, how quick of a progress you moved up in your field of cyber expertise and is it worth it eventhough you already have the experience and certs with a Master or bachelor?

339
 
 
The original post: /r/cybersecurity by /u/TechInformed on 2024-11-07 13:16:19.
340
 
 
The original post: /r/cybersecurity by /u/Akkeri on 2024-11-07 12:50:40.
341
 
 
The original post: /r/cybersecurity by /u/Izual_Rebirth on 2024-11-07 09:58:29.

Hey All,

I see Microsoft have accidentally classified the 2025 Upgrade as a Security Patch. Am I right in thinking, idiotic as it is, that despite it being a known mistake a company would not be compliant without installing it purely because it's still labelled a Security Patch despite it not really being one? I'd like to think it's not that simplistic but who knows.

342
 
 
The original post: /r/cybersecurity by /u/syne01 on 2024-11-06 18:43:41.

For context, enshittification is defined as a pattern in which online products and services decline in quality. It's usually used to refer to websites and products, but I think it can be used in a wider context.

The recent post about ISC2s issues got me to start to think about this, as well as the proliferation of cyber gurus, and the fact that basically every post secondary school in my city now has some sort of cybersecurity offering.

So, I want to see what folks think about the current state of cybersecurity education. I'm talking formal education, certs, bootcamps, etc. Is it good? Was it good, and has now become bad? Or, has it always been bad? Is it more complicated than that? Are some worse than others? How has the messaging from orgs like ISC2 affected the cyber education landscape?

Really interested to hear other folks opinions on this.

343
 
 
The original post: /r/cybersecurity by /u/PassageMindless9260 on 2024-11-06 18:19:38.

Hey guys, I was wondering how you have navigated providing third parties with access to your environment for business such as Contractors and Consultants. We are an AD/EntraID Environment and we have been providing all contractors will full M365 accounts; however, I am not sure this is the correct way to go.

  1. It costs us monthly to maintain their account in terms of licensing + labor on the HelpDesk

  2. We can still apply conditional access to guest accounts

How have you guys navigated this? Would love to hear your thoughts and recommendations.

344
 
 
The original post: /r/cybersecurity by /u/dohat34 on 2024-11-06 14:56:05.

Guys - have there been any reports of tools like Disk Drill able to recover files from a SSD on a newer MacBook like the M2 laptops even if TRIM support is enabled and after a file is deleted & empty trash completed? Thanks

345
 
 
The original post: /r/cybersecurity by /u/marinolson on 2024-11-06 17:30:03.

Hi all,

Our company's website was recently spoofed and resulted in fraud and account closures. Is there any way to prevent spoofing, like restricting image copy/paste capability or screen capturing? We got the website taken down fairly quickly, but not before they scammed a few customers.

Thanks!

346
 
 
The original post: /r/cybersecurity by /u/Few-Tree3490 on 2024-11-06 14:29:01.

Title: Transitioning to Cybersecurity (Pentesting) – Need help clarifying some practical and theoretical aspects!

Hi everyone,

After several years in a completely different field, I’ve decided to make a career switch into cybersecurity, specifically in pentesting. I love the idea of contributing to security from an ethical angle, but I have to admit there’s a part of this profession that still feels pretty vague to me.

I’ve taken several courses and feel comfortable with the basics—vulnerability scanning, configuration audits, standard penetration tests… But the further I go, the more I realize that the ethical approach only scratches the surface of the job. For example, I’m still a bit lost when it comes to understanding how some hackers (ethical or otherwise) manage to gather information like specific IP addresses or exploit certain vulnerabilities to gain an overview of a network. There’s this general “gap” in my understanding of deep data collection, especially when it comes to targeting specific objectives.

It feels like there’s a difference between standard pentesting methodologies and the techniques used by skilled hackers in real-world scenarios. For example, how does advanced OSINT work in practice? How do you get a broader view of a network’s vulnerabilities (without crossing any legal boundaries, of course!)? I’m sensing some gaps in my knowledge, and I want to make sure I’m not overlooking anything important.

Do you have any advice on how to bridge these “grey areas”? Did you feel this same kind of uncertainty when starting out? Do you know of any resources (books, training, communities) that cover deep reconnaissance techniques, information gathering, or even real-world stories that could help illuminate these topics?

Thanks in advance for any advice or experiences you can share. I’m excited to improve and build a more complete understanding of this fascinating field!

347
 
 
The original post: /r/cybersecurity by /u/ExactAirport5 on 2024-11-07 05:10:30.

How do you approach integrating security controls into cloud projects to ensure proper implementation? Can you walk us through a scenario where you identified and addressed security gaps in a cloud environment?

348
 
 
The original post: /r/cybersecurity by /u/RaulAbusabalU on 2024-11-07 05:03:19.

I was looking into finding a compact quick way to run mi and to avoid any sluggish performance.

I'm trying Kali in Wsl with GUI seems good runs decent. But haven't tried wireshark or other tools that some time a go wsl had trouble runing. But then again I'm only using it for bbh/webhack.

Not considering dual boot

Maybe USB? But I've read that it's not for everyday use?

And the infamous bare metal.

Would Kali Wsl be enough for web hacking?

349
 
 
The original post: /r/cybersecurity by /u/Holiday_Persimmon_91 on 2024-11-06 23:35:42.

I recently took a job a college as the Cybersecurity Manager. The current CITO is the acting CISO. He is now asking me to write policies, develop controls, training, and architect a roadmap. I am capable of doing all thats been askied of me, yet I feel as if my title/pay does not match the responsibilities. Am I wrong? Ideas?

350
 
 
The original post: /r/cybersecurity by /u/arqf_ on 2024-11-06 21:35:17.
view more: ‹ prev next ›