bOt@zerobytes.monsterM · 2 months agoCan we trust Molly: Signal fork for Android ?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareCan we trust Molly: Signal fork for Android ?plus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoRed vs Blueplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareRed vs Blueplus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoLooking to get into security, Im a bit new to networking.plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareLooking to get into security, Im a bit new to networking.plus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoI’m curious, for those of you working as detection engineers, what are your best practices for tuning alerts to reduce noise and manage alert fatigue? I’d love to hear specific strategies or tips ...plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareI’m curious, for those of you working as detection engineers, what are your best practices for tuning alerts to reduce noise and manage alert fatigue? I’d love to hear specific strategies or tips ...plus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months ago‘People Are Scared’: Inside CISA as It Reels From Trump’s Purgeplus-squarewww.wired.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link‘People Are Scared’: Inside CISA as It Reels From Trump’s Purgeplus-squarewww.wired.combOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoNew SuperBlack ransomware exploits Fortinet auth bypass flawsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNew SuperBlack ransomware exploits Fortinet auth bypass flawsplus-squarewww.bleepingcomputer.combOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoMemory Corruption in Delphiplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareMemory Corruption in Delphiplus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoRecommendations on Information Security/Cybersecurity Subscriptions.plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareRecommendations on Information Security/Cybersecurity Subscriptions.plus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoBest practice to handle WCSS Shell exploits?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareBest practice to handle WCSS Shell exploits?plus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoWill Plankey Lead CISA to New Heights in Cybersecurity?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWill Plankey Lead CISA to New Heights in Cybersecurity?plus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoEU job marketplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareEU job marketplus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoDocumentation as a security engineerplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareDocumentation as a security engineerplus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoThe Problem With Browser Bookmark Securityplus-squarewebcull.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Problem With Browser Bookmark Securityplus-squarewebcull.combOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoPolymorphic Extensions That Can Impersonate Any Browser Extension: Attack Breakdownplus-squarelabs.sqrx.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPolymorphic Extensions That Can Impersonate Any Browser Extension: Attack Breakdownplus-squarelabs.sqrx.combOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoQuestion about CISOplus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareQuestion about CISOplus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoFBI: Medusa Ransomware Has Breached 300 Critical Infrastructure Organizationsplus-squarecyberinsider.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFBI: Medusa Ransomware Has Breached 300 Critical Infrastructure Organizationsplus-squarecyberinsider.combOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoAny poor man's CAASM projects/techniques that can integrate with various security tools?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareAny poor man's CAASM projects/techniques that can integrate with various security tools?plus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoCan You Really Spot a Deepfake?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareCan You Really Spot a Deepfake?plus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months agoHow well-designed are ticketing systems in cyber defence for situational awareness?plus-squaremessage-squaremessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareHow well-designed are ticketing systems in cyber defence for situational awareness?plus-squarebOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink
bOt@zerobytes.monsterM · 2 months ago2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓plus-squarewww.verylazytech.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓plus-squarewww.verylazytech.combOt@zerobytes.monsterM · 2 months agomessage-square0linkfedilink