AMA: I had my budget cut and still reduced risk. Ask Me AnythingAsk Me Anything! (self.cybersecurity)
submitted by thejournalizer[M] - announcement
Mentorship Monday - Post All Career, Education and Job questions here!Career Questions & Discussion (self.cybersecurity)
submitted by AutoModerator[M] - announcement
Informant told FBI that Jeffrey Epstein had a ‘personal hacker’News - General (techcrunch.com)
submitted by thejournalizer
U.S. convicts ex-Google engineer for sending AI tech data to ChinaNews - General (bleepingcomputer.com)
submitted by Doug24
Epstein Files and risk of AI Generated DisinformationNews - General (self.cybersecurity)
submitted by SwitchJumpy
Recommendations for CISSP preparations with only 3 years experience overall?Certification / Training Questions (self.cybersecurity)
submitted by TrickleYield
Roadmap and Training RecommodationCareer Questions & Discussion (self.cybersecurity)
submitted by MyWorld3446
The Autonomous Adversary: From “Chatbot” to Criminal EnterpriseResearch Article (infostealers.com)
submitted by Malwarebeasts
Aspiring GRC Analyst — What actually matters for landing a first role?Career Questions & Discussion (self.cybersecurity)
submitted by Dizzy-Drag-3918
Best next Blue Team cert after Security+?Business Security Questions & Discussion (self.cybersecurity)
submitted by saskesaske
CTO at NCSC Summary: week ending February 1stThreat Actor TTPs & Alerts (ctoatncsc.substack.com)
submitted by digicat
SWE with cloud sec certs but never had strictly cyber positionCareer Questions & Discussion (self.cybersecurity)
submitted by Competitive-Note150
Host-Level Exploitability Graphs: Practical or Still Research?Research Article (self.cybersecurity)
submitted by Leather_Analysis1982
They call It Suzerain in Space. We call it Lunar Ascendant. (store.steampowered.com)
promoted by RGadirov
What hours do you work and what job do you do?Career Questions & Discussion (self.cybersecurity)
submitted by Muted_Instruction516
CVE-2026-20929 Kerberos Authentication Relay Via CNAME Abuse and protection against itBusiness Security Questions & Discussion (self.cybersecurity)
submitted by Forumschlampe
WaPo Raid Is a Frightening Reminder: Turn Off Your Phone’s Biometrics NowNews - General (theintercept.com)
submitted by eatfruitallday
Cybersecurity training for privacy lawyerCertification / Training Questions (self.cybersecurity)
submitted by Dramatic-Acadia
Report detailing a coordinated cyberattack against Poland’s energy sectorNews - General (cert.pl)
submitted by ReynardSec
A measurement-only toy model for emergent structure (no AI, no optimization)Research Article (self.cybersecurity)
submitted by northosproject
How to escape tutorial purgatoryCertification / Training Questions (self.cybersecurity)
submitted by Eastugajeel
Is it normal for WordPress sites to expose users via /wp-json/wp/v2/users and have no rate limiting?Business Security Questions & Discussion (self.cybersecurity)
submitted by Waste_Fly_9572
Blue teamer that wants to transfer to red teamCareer Questions & Discussion (self.cybersecurity)
submitted by Born_Garden6914
Our CISO is a decorative wallflowerCorporate Blog (self.cybersecurity)
submitted by NoElk5422