cybersecurity

14 readers
1 users here now

This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.

founded 2 years ago
MODERATORS
1
 
 
The original post: /r/cybersecurity by /u/Pure_Substance_2905 on 2025-06-26 23:42:29.

Hey,

Anyone who has ever completed an ISO 27001 internal audit? If so could you explain how you effectively complete it. Im about to complete one and want to make sure im not missing anything

2
 
 
The original post: /r/cybersecurity by /u/cybersecurity on 2025-06-26 23:19:04.
3
 
 
The original post: /r/cybersecurity by /u/MettaStoic on 2025-06-26 22:04:42.

Found this tool useful when doing CTFs. Thought the community would find it useful as well. Probably worth it to test your own JWTs as well (if you're using strong secrets, you're probably fine).

4
 
 
The original post: /r/cybersecurity by /u/0x5h4un on 2025-06-26 21:12:22.
5
 
 
The original post: /r/cybersecurity by /u/MonsieurVox on 2025-06-26 21:00:17.

Basically the title.

I've been in security for about 10 years now. I have a number of certifications, all of which I worked hard to obtain. The issue I'm facing is that my company is "belt tightening" and is pushing back on paying for cert renewals, while they used to pay them without issue. Some of these certifications cost several hundred dollars to renew, so it'd be inconvenient to pay those out of pocket.

I'm conflicted. I can pay the renewals myself, but I don't know if the cost/benefit is there anymore.

Some of the certs I have (such as the GIAC GSEC) are foundational or targeted more towards entry-ish level people, so I don't think they'd move the needle much in terms of hirability when compared to my experience. But I hate the idea of letting it expire. It was the first cert I ever got and it was probably the most valuable technical training I've ever had.

Others, like the CISSP, are ones that I'd pay for even if I was unemployed because I never want to study for and take that test again.

Each one of these certifications represent months of studying and preparation. Even if they don't directly lead to a job, pay raise, or promotion, the idea of letting them expire and removing them from my resume — in essence, like I never had them to begin with — is frustrating and (at the risk of sounding dramatic) saddening. The only cert I've ever let expire was an Agile cert that was basically pointless to take and have in the first place. The rest are security-specific.

So, back to the original question: When do you just let your certifications expire? When do certs become dead weight on your resume?

6
 
 
The original post: /r/cybersecurity by /u/Spirited_Jaguar3833 on 2025-06-26 20:49:39.

I am working as a network security engineer from past 2 years. I want to grow my career in network security currently i got a offer for associate security consultant where I will be managing firewalls and proxy ... so for future I want a advice looking forward towards the salary the opportunities what should be the road map and which career path should be the best in cyber security which all skills should i learn and should move to a specialist role or managerial role. ChatGPT said: Here’s a rephrased version of your message with improved clarity and flow:

I have been working as a Network Security Engineer for the past two years. I’m passionate about advancing my career in the field of cyber security. Recently, I received an offer for the position of Associate Security Consultant, where I’ll be responsible for managing firewalls and proxy solutions.

Looking ahead, I’m seeking advice on the best career roadmap in cybersecurity—considering factors like salary growth and future opportunities. Should I aim for a specialist role (deep technical expertise) or transition into a managerial path (leadership and strategy)? Additionally, I’d like to know which specific skills or certifications I should focus on to maximize my potential and align with the most rewarding career trajectory in the cybersecurity domain

7
 
 
The original post: /r/cybersecurity by /u/Otherwise-Silver-411 on 2025-06-26 19:37:06.

Hey there, idk if i’m writing this to vent or what. I just have to get this off my chest. last week my manager got laid off along with 4 other team members. it wasn’t due to performance, but cost cutting by the company, him getting laid off has impacted me a ton, i think because of how he’s the best manager i ever had and also how in such a short time he impacted me heavily and taught me so much, he gave me a bunch of confidence, he believed in me and helped my skills grow in such a short time. he’s a great talent so i know he will find a great position, but im just super bummed.

now i have to pick up a ton of projects and “lead” as much as i can with the ones he was working on, but i don’t have nearly as much knowledge on our environment or in general as him to lead these projects.

for anyone who’s ever dealt with this, how did you manage? how long did it take for the constant cloud over your head to go away? thanks.

8
 
 
The original post: /r/cybersecurity by /u/Positive-Sir-3789 on 2025-06-26 18:06:09.

There have been several ISE CVEs with critical 10 scores.

These are related to APIs that are on by default on ISE. Why doesn't Cisco document that disabling the API is a workaround to these CVEs? Is there some other attack vector besides the API?

2/6/25: CVE-2025-20124 and CVE-2025-20125

6/25/25: CVE-2025-20281 and CVE-2025-20282

9
 
 
The original post: /r/cybersecurity by /u/Varonis-Dan on 2025-06-26 18:00:14.
10
 
 
The original post: /r/cybersecurity by /u/CyberSecHelper on 2025-06-26 15:52:02.

Hey folks!

While working through CTFs on platforms like TryHackMe, Hack The Box, and college-level competitions, I kept running into the same problem — jumping between notes, docs, and random Google searches for basic stuff.

So I finally decided to organize everything I use into a single, easy-to-reference CTF Cheatsheet — and figured others might find it useful too.

🔗 Here’s the link: https://neerajlovecyber.com/ctf-cheatsheet

If you have suggestions, tools I missed, or cool tricks you'd like to see added — let me know! Always open to feedback.

11
 
 
The original post: /r/cybersecurity by /u/buzzlightyear0473 on 2025-06-26 15:30:19.

I hear that GRC has some similarities. I've been a tech writer for four years in the IAM/PKI/PAM industry, working with leading companies in this niche. I write technical documentation on how to use software products that handle TLS certificates, secure identity issuance, secure networking, and machine identity management. Most of my job is communicating with PMs, engineers, security teams, and end users to gather technical information and translate it into user-friendly docs. 80% stakeholder and project management, and 20% writing, is the bulk of my life. I still love tech writing and having a role that requires reading, writing, communication, attention to detail, and making things more understandable and safe to use.

Tech writers hit their ceiling pretty quick, so I'm looking for a role I could transfer my skills over to and grow more in my career. If there are options out there, how can I get there from where I'm at? I understand the current job market is insane, but I'm hoping in a couple years of studying, I can make something new work and hopefully the market will improve at least a little bit.

12
 
 
The original post: /r/cybersecurity by /u/SquareB21 on 2025-06-26 15:04:05.

Does anyone know of security awareness training for Higher Education, specifically dealing with travel to high-risk countries, but with a sensitivity that some of the people taking the training might be from one of those countries (specifically China), so it's not as harsh as existing training usually can be?

13
 
 
The original post: /r/cybersecurity by /u/Pretty-Guarantee-966 on 2025-06-26 14:52:13.

Researchers recently caught Meta using an egregious new tracking technique to spy on you. Exploiting a technical loophole, the company was able to have their apps snoop on users’ web browsing. This tracking technique stands out for its flagrant disregard of core security protections built into phones and browsers. The episode is yet another reason to distrust Meta, block web tracking, and end surveillance advertising. 

14
 
 
The original post: /r/cybersecurity by /u/M-SThrowaway on 2025-06-26 14:29:43.

https://www.retailgazette.co.uk/blog/2025/06/ms-cyber-attack-deepens

https://www.techradar.com/pro/security/mystery-of-m-and-s-hack-deepends-as-tcs-claims-none-of-its-systems-were-compromised

[EDITED: ‘Impacted Party] employee here – using a throwaway account for obvious reasons, so don’t expect replies.

I’m absolutely fed up with seeing TCS (Tata Consultancy Services) in the media trying to spin this situation and deny any responsibility. I’m [EDIT: Experienced] in IT – and I have never seen a supplier show so little accountability for a failure of this scale.

Let’s be clear: TCS are not the impacted party here. That much is true, and that’s what they’re trying to draw everyone’s attention towards as though it gets them off the hook …they are the entry point. They don’t own the houses, but they’re the maintenance workers who are unlocking all the doors for the burglars.

Their service desk and security practices were the weak link that attackers exploited, and their refusal to take responsibility is actively putting other organisations at risk. Instead of addressing the root causes, they’re focused on controlling the narrative – while making zero meaningful changes to prevent this from happening again.

We’ve been advised not to speak publicly due to ongoing legal action related to the investigation, but their latest public statement has crossed a line. So, let me spell out exactly how this attack unfolded – because it’s critical that other businesses understand just how dangerous this provider’s failings have become.

TCS was the real target: not us. We, alongside the other retailers, were the victims… and there is a big difference.

To explain; it’s clear to all those involved internally in these investigations (including Microsoft’s DART and supporting teams who have said this to us multiple times as part of their attack-pattern analysis) that Scattered Spider specifically targeted TCS because of systemic weaknesses in their service desk operations. Once in, they simply pivoted into our environment using the privileged access that TCS handed over without following basic process.

These attackers exploited: • Untrained or poorly trained service desk staff • Zero verification of caller identity • No adherence to basic security protocols, even when asked repeatedly by clients • No oversight or effective quality assurance on their support processes

Early in the investigation, we requested TCS send us call recordings for the first few identified social engineering attempts we were able to trace. Just the first 4… The recordings they sent us – without even reviewing them first – were jaw-dropping.

In 3 of 4 calls, the service desk reset passwords and re-enrolled MFA with zero resistance. The caller simply gave a name – no validation, no callback, no check. On the 4th call, the attacker requested access to a privileged group. The TCS agent asked for an employee ID. The ID given didn’t even match our company’s format; and yet, the access was granted anyway.

That’s four out of four security failures.

When we requested the rest of the call logs (we know over 100 such calls were made), TCS stalled for days. Eventually, a senior manager claimed the recordings were either lost or deleted. Yes – they said both.

TCS is now publicly claiming that their systems weren’t breached … as if that excuses the fact that their people and processes were the compromised layer. This is a textbook case of supply chain failure. The attackers didn’t need to hack anything. TCS handed them the keys.

And in some cases, they’re not just managing access: they’re also responsible for monitoring security operations. Yet they completely missed the post-breach attacker activity. Why? Because their SOC services are just as ineffective.

Even after all this, a member of our team called the TCS desk from a personal phone, impersonated a colleague, and was able to reset their password … again, with no challenge.

They’ve learned nothing. Their focus remains on PR damage control rather than remediation, and that is simply unacceptable.

This isn’t just a [EDIT: Impacted Party] issue. Any organisation using TCS for access or security support should be asking serious questions right now. These attackers are going through TCS to get to you … and TCS isn’t stopping them.

They failed. They know it. And now they’re trying to bury it.

[EDIT: helpful Redditor told me to remove my company affiliation so it doesn’t get pulled by mods for self-doxing. Thanks for the note!]

15
 
 
The original post: /r/cybersecurity by /u/texmex5 on 2025-06-26 13:11:55.

I've been putting together this news roundup since April. My goal is to make it quickly scannable and actionable for cybersecurity specialists.

I try to focus on new novel types of attacks, threats and industry shaping developments. I try to avoid reporting on "happens every day" types of things. Some weeks I struggle to keep the selection under 20 and some weeks like this, 9 is all it takes to get the gist of it.

If you have been reading these and have some feedback, I'd love to get it, to make it more useful, comment, or DM.

16
 
 
The original post: /r/cybersecurity by /u/Cautious_Budget_3620 on 2025-06-26 13:02:26.

I am launching the AiCybr Practice Center for fellow learners. As there are plenty of study materials available online, however most the practice exams are behind paywall, limited questions in free tier, or require login/signup to see complete results. Hence I have created this resource to help new learners.

What is it?

  • It is free practice guide, no login/signup required.

  • Select exam objectives, number of questions.

  • Choose between Exam mode (results at the end) or Practice mode (instant feedback)

  • Result at the end with correct answer explained (again no email/login required to see the results)

What’s covered?

  • Linux Commands

  • CompTIA A+ Core 1 (220-1201)

  • CompTIA A+ Core 2 (220-1202)

  • CompTIA Network+ (N10-009)

  • CompTIA Security+ (SY0-701)

How to use it?

  • Study of exam objectives , try the quiz, understand which topics need attention and read again. Repeat as needed.

  • or take the quiz before you start to get a feel for what the exam objectives cover. (My suggestion: I personally feel this is a better approach for any type of study, whether you are reading a book or studying online, just glance through questions first, even though you don't have answers it at that time. But when you go through study material later, and you'll find the connection with question and will remember that particular section more)

  • This is not replacement of official assessment or study material, but can help in identifying improvement areas.

  • This is not a exam dump, and the questions are not bench marked again official exam level, these are only supporting materials.

  • Practicing quiz after studying has higher chances of memory retention, so will help in recall the objectives and remember for longer.

Link in comments.

17
 
 
The original post: /r/cybersecurity by /u/Latter-Site-9121 on 2025-06-26 12:29:16.

Recently analyzed a sophisticated cyber espionage campaign by the China-based APT group known as Silver Fox (Void Arachne). Active since 2024, this group primarily targets public sector, healthcare, and critical infrastructure entities.

Key Highlights:

  • Uses trojanized versions of trusted medical software (Philips DICOM Viewer) and popular applications.
  • Deploys multi-stage payloads via Alibaba cloud infrastructure, bypassing antivirus using vulnerable drivers.
  • Implements stealthy UAC bypass, scheduled tasks for persistence, and aggressive credential theft (browsers, crypto wallets, email clients).
  • Establishes persistent remote access with ValleyRAT (Winos 4.0), keyloggers, and cryptocurrency miners.

Mapped Silver Fox’s TTPs to MITRE ATT&CK, provided detailed indicators of compromise (IOCs), and outlined effective defense strategies.

Feel free to check out the full technical analysis and defense recommendations here: https://www.picussecurity.com/resource/blog/silver-fox-apt-targets-public-sector-via-trojanized-medical-software

18
19
 
 
The original post: /r/cybersecurity by /u/donutloop on 2025-06-26 11:43:39.
20
 
 
The original post: /r/cybersecurity by /u/2xEshocK on 2025-06-26 11:15:13.

Might be relevant to some folks here!

The research team at Koi Security has disclosed a critical vulnerability in Open VSX, the extension marketplace powering VSCode forks like Cursor, Windsurf, Gitpod, VSCodium, and more, collectively used by over 8 million developers.

The vulnerability gave attackers the ability to take full control of the entire marketplace, allowing them to silently push malicious updates to every extension. Any developer with an extension installed could be compromised, no interaction required.

The flaw stemmed from a misconfigured GitHub Actions workflow

The issue was responsibly reported by Koi Security and has since been fixed, though the patching process took considerable time.

Key takeaways:

  • One CI misconfiguration exposed full marketplace control
  • A malicious update could backdoor thousands of developer environments
  • Affected platforms include Cursor, Windsurf, VSCodium, Gitpod, StackBlitz, and more
  • Highlights the growing supply chain risk of extension ecosystems

This isn’t just about one marketplace, it’s a broader warning about the privileged, auto-updating nature of software extensions. These extensions often come from third-party developers, run with deep access, and are rarely governed like traditional dependencies.

Full write-up: https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44

21
 
 
The original post: /r/cybersecurity by /u/Most-Anywhere-6651 on 2025-06-26 11:04:52.

The research team at Koi Security has disclosed a critical vulnerability in Open VSX, the extension marketplace powering VSCode forks like Cursor, Windsurf, Gitpod, VSCodium, and more, collectively used by over 8 million developers.

The vulnerability gave attackers the ability to take full control of the entire marketplace, allowing them to silently push malicious updates to every extension. Any developer with an extension installed could be compromised, no interaction required.

The flaw stemmed from a misconfigured GitHub Actions workflow

The issue was responsibly reported by Koi Security and has since been fixed, though the patching process took considerable time.

Key takeaways:

  • One CI misconfiguration exposed full marketplace control
  • A malicious update could backdoor thousands of developer environments
  • Affected platforms include Cursor, Windsurf, VSCodium, Gitpod, StackBlitz, and more
  • Highlights the growing supply chain risk of extension ecosystems

This isn’t just about one marketplace, it’s a broader warning about the privileged, auto-updating nature of software extensions. These extensions often come from third-party developers, run with deep access, and are rarely governed like traditional dependencies.

Full write-up: https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44

22
 
 
The original post: /r/cybersecurity by /u/tekz on 2025-06-26 09:42:38.
23
 
 
The original post: /r/cybersecurity by /u/magister1999 on 2025-06-26 09:38:39.

Hey everyone, I’ve been thinking about buying this TrainSec learning path

https://trainsec.net/windows-security-researcher/

but since I’d be covering the cost myself, I wanted to hear your thoughts if anyone’s tried it. The syllabus looks really promising. I work in an SOC L2 and I’m looking for something that can help me level up my skills and knowledge at work, do you think this path can be a big boost?

24
 
 
The original post: /r/cybersecurity by /u/Zestyclose-Ease-2821 on 2025-06-26 09:26:58.

I’m currently working on four certifications — CCNA, Google Cybersecurity Certificate, Security+, and AWS Cloud 101. Just wondering if this combination is strong enough to land an entry-level job.

25
 
 
The original post: /r/cybersecurity by /u/sebby2 on 2025-06-26 07:35:59.

Hello everyone! This may not be the right place but I'm not sure where else to ask.

I recently started using the NIST CVE API (https://nvd.nist.gov/developers/vulnerabilities) to sift through CVE's and noticed that the API is really inconsistent.

Sometimes the API would send less vulnerabilities than it reported (a.i. totalVulns != length of actual vulnerabilities), sometimes even none at all or actually broken JSON.

Has anyone else noticed this aswell? Is the API really just that broken? What else can I do except just retrying and hoping that it will eventually work? I don't want to spam NIST.

view more: next ›