bOt@zerobytes.monsterM · 24 days agoIs CCNA necessary/recommended for getting into Cybersecurity?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareIs CCNA necessary/recommended for getting into Cybersecurity?plus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days ago5th Circuit rules ISP should have terminated Internet users accused of piracyplus-squarearstechnica.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link5th Circuit rules ISP should have terminated Internet users accused of piracyplus-squarearstechnica.combOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoUK cyber chiefs warn organisations to be aware of new Russian web attack tacticsplus-squarewww.newschainonline.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUK cyber chiefs warn organisations to be aware of new Russian web attack tacticsplus-squarewww.newschainonline.combOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoWe should really start treating LLMs as attacker-controlled like we do client-side web applicationsplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWe should really start treating LLMs as attacker-controlled like we do client-side web applicationsplus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoOpenCTI for brand protection?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareOpenCTI for brand protection?plus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoExtracting Metasploitable 2 on virtualboxplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareExtracting Metasploitable 2 on virtualboxplus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoPokémon Developer Game Freak Reportedly Hacked, Massive Amounts Of Data Allegedly Leakedplus-squarewww.nintendolife.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPokémon Developer Game Freak Reportedly Hacked, Massive Amounts Of Data Allegedly Leakedplus-squarewww.nintendolife.combOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoEmail Analysts (Phishing, Spam, Malware) - what is your day to day and do you enjoy your role?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareEmail Analysts (Phishing, Spam, Malware) - what is your day to day and do you enjoy your role?plus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoHow to begin in Cybersecurityplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareHow to begin in Cybersecurityplus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoChinese Scientists Report Using Quantum Computer to Hack Military-grade Encryptionplus-squarethequantuminsider.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChinese Scientists Report Using Quantum Computer to Hack Military-grade Encryptionplus-squarethequantuminsider.combOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoHow worried is everyone about the looming defeat of AES encryption?plus-squarewww.oodaloop.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow worried is everyone about the looming defeat of AES encryption?plus-squarewww.oodaloop.combOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoHow do you feel about some people think that cybersecurity is a "easy money generator"?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareHow do you feel about some people think that cybersecurity is a "easy money generator"?plus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoWhat do you love and hate about the cybersecurity field?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWhat do you love and hate about the cybersecurity field?plus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoKilleen ransomware attackplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareKilleen ransomware attackplus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoCoding in Cyber Engineer role? What to expect? (Goldman Sachs)plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareCoding in Cyber Engineer role? What to expect? (Goldman Sachs)plus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoEn/decryption keys storage adviceplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareEn/decryption keys storage adviceplus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoChinese researchers have reportedly cracked military-grade encryption using a D-Wave quantum computerplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareChinese researchers have reportedly cracked military-grade encryption using a D-Wave quantum computerplus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoA Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machinesplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machinesplus-squarewww.wired.combOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 24 days agoEnterprise Security Engineer vs Security Engineer?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareEnterprise Security Engineer vs Security Engineer?plus-squarebOt@zerobytes.monsterM · 24 days agomessage-square0fedilink
bOt@zerobytes.monsterM · 25 days agoCyber job board for France ?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareCyber job board for France ?plus-squarebOt@zerobytes.monsterM · 25 days agomessage-square0fedilink