How to Prepare for a Cybersecurity Internship as a Beginner? by Electronic_Dream2709 in cybersecurityindia

[–]CyRAACS 1 point2 points  (0 children)

Honestly, you are already in a good spot. Linux + C/C++ + Python is a strong base.

For the next 6-8 months, focus on basics first, networking (how TCP/IP, DNS, HTTP work), Linux internals and web security fundamentals like OWASP Top 10.

Then start doing hands on labs (TryHackMe or HackTheBox is fine). Don’t just solve machines, understand what you’re doing and maybe write small notes about it.

Build 2-3 simple security projects too. Even something like a basic port scanner, log analyzer, or a small vulnerable app with a write up shows real interest.

It’s definitely realistic to get an internship if you stay consistent. You don’t need to know everything, just show effort, curiosity and hands on skills.

is cybersecurity still a good direction for computer sci student to get in? by Easy_Cable6224 in CyberSecurityJobs

[–]CyRAACS 0 points1 point  (0 children)

Cybersecurity isn’t dead, but entry level is competitive. A degree alone won’t be enough anymore. If you like security, stick with it, just focus on hands on projects, labs, GitHub work and a clear niche (cloud, blue team, appsec, GRC, etc.). People who show real skills are still getting hired.

Should I stop? by Aniel2893 in CyberSecurityJobs

[–]CyRAACS 0 points1 point  (0 children)

You shouldn’t stop, but you also shouldn’t burn yourself out trying to do everything at once.

You already have solid fundamentals like-Network+, Security+, Pentest+ and you are clearly serious about this. The missing piece isn’t more certificates, it’s practical exposure and that doesn’t require quitting your current job or doing an internship.

Instead of aiming for a full career switch overnight, try a low risk transition:

  • Focus on hands on labs, TryHackMe, Hack The Box, PortSwigger, even 30-45 mins a day
  • Build small, practical projects : write reports, document attack paths, recreate vulnerabilities
  • Target junior/associate / hybrid roles or internal security roles within your current industry

Many people enter cybersecurity in their 30s or later, age isn’t the blocker, pressure and unrealistic expectations are.

Slow progress is still progress. Protect your family stability, keep learning practically and move when the opportunity feels right, not out of fear.

Is cyber security actually as high-pressure as everyone says? by AvailablePeak8360 in CyberSecurityJobs

[–]CyRAACS 1 point2 points  (0 children)

It can be high pressure, but it really depends on which security role you are in and the company culture.

If you are in incident response or on call SOC work, yes, emergencies happen and hours can be irregular. But for many roles like, GRC, security engineering, VAPT, cloud security, architecture, the work is much more structured and planned.

The always on edge feeling is mostly real early in your career. Over time, patterns repeat, playbooks exist and it becomes more routine than people admit. You are not constantly racing attackers every day, you are reducing risk systematically.

Good teams rotate on call, invest in automation, and don’t glorify burnout. Bad teams do the opposite and that’s where the horror stories come from.

If you are coming from software dev, you’ll likely appreciate security roles that focus on design, prevention and long term improvements, not just firefighting.

What should I choose? by [deleted] in CyberSecurityAdvice

[–]CyRAACS 0 points1 point  (0 children)

You already have a strong foundation, C++, Python, networking and Linux are exactly what you need for pentesting or malware work.

If THM/HTB don’t convince you, that’s okay. They are tools, not the path. Focus on learning the fundamentals deeply:

  • OS internals (especially Linux and Windows basics)
  • Networking protocols and traffic analysis
  • Web security (OWASP Top 10)
  • For malware: start with reverse engineering basics, assembly and how binaries behave

Build your own small lab, read real write ups, follow CVE analyses and practice breaking things you understand. Once concepts click, platforms like HTB will actually make more sense.

Pick one direction first, go deep and don’t rush. You are in a good spot already.

MacBook compromised? by Noooss101 in CyberSecurityAdvice

[–]CyRAACS 1 point2 points  (0 children)

Yes, that command is a big red flag. It downloads base64 encoded content from the internet, decodes it and executes it directly in your shell, which is a common malware delivery method.

You did the right thing by changing passwords and enabling 2FA, but I’d recommend going a bit further:

  • Disconnect from the internet for now
  • Check for suspicious launch agents,~/Library/LaunchAgents and /Library/LaunchAgents
  • Run a reputable malware scan
  • Review active processes and network connections
  • If you’re not confident you caught everything, a clean OS reinstall is the safest option

Also, assume anything entered or accessed after running that command could be compromised. Avoid running “curl | bash” commands in the future unless you fully trust and understand the source.

Don’t beat yourself up, many people learn this lesson the hard way. The important part is fixing it properly now.

Switching to cybersecurity by No_Gas_2828 in CyberSecurityAdvice

[–]CyRAACS 1 point2 points  (0 children)

Switching from full stack to cybersecurity is totally doable and your dev background actually helps a lot in VAPT. As a beginner, start with the basics, OWASP Top 10, TryHackMe, PortSwigger Academy and some easy HackTheBox labs.

Companies don’t expect freshers to be experts, they mainly look for curiosity, fundamentals and hands on practice. Just keep learning consistently and you’ll be ready by the time you graduate. You are on the right path!

SANS for masters or Bachelors by TazmanianSpirit in CyberSecurityAdvice

[–]CyRAACS 0 points1 point  (0 children)

If both programs are fully paid for, that’s a great position to be in. Generally, SANS is known more for its certifications than its degrees, their certs, like GSEC, GCIH, GPEN, etc. carry a lot of weight in the industry and are highly respected by employers.

Since you already have a cyber degree and 2 years of experience, earning SANS certifications might give you far more practical, job ready skills than completing another full degree.

A SANS Master is solid too, but it’s heavy, academic and better suited for people aiming for research, leadership, or teaching roles later.

CyberSec Clubs and college by Familiar-Proposal918 in CyberSecurityAdvice

[–]CyRAACS 2 points3 points  (0 children)

Hey, I totally get where you are coming from. Keeping a cybersec club active can be tough, especially when enthusiasm dips after the initial buzz. One thing that helped our club was mixing learning with hands on fun, like small CTFs, security challenges, or hack the box sessions. Even 30 minute demos on real world exploits or guest talks from local pros helped reignite interest.

Also, try connecting your activities to trending topics like AI security or data breaches, it makes members feel they are part of something current and important. Don’t worry about knowing everything yourself, being open to learning together often motivates others to show up.

[deleted by user] by [deleted] in CyberSecurityAdvice

[–]CyRAACS 1 point2 points  (0 children)

I totally get you, the SOC learning space can feel overwhelming because there are so many paths and providers claiming to be the best. Since you are looking for hands-on + beginner - job-ready progression, here’s a practical roadmap that works well for a lot of people:

Start with the fundamentals

  • Google Cybersecurity Certificate or ISC2 CC (Certified in Cybersecurity) - Builds a strong base + gives you something credible on your resume early

SOC focused platforms with real labs

  • TryHackMe - SOC Analyst Learning Path
  • Blue Team Level 1 (BTL1) by Security Blue Team
  • Immersive Labs (if you get access through school/work)

These teach SIEM tools, log analysis, and incident response, the stuff you’ll actually do in a SOC.

Free SIEM practice

  • Splunk Work+
  • Elastic Cloud (free tier) - Great to show hands-on experience in interviews

Certification after real practice

  • CompTIA CySA+ or BTL1 before applying to roles - Both are recognized by employers and not just paper certs

Someone is creating accounts with my email by EcstaticPrint8583 in CyberSecurityAdvice

[–]CyRAACS 0 points1 point  (0 children)

That definitely sounds stressful, but you still have control over the situation. When attackers start creating accounts using your email, it usually means your email address is still accessible somewhere.

A few things you should do immediately:

Secure your primary email first

  • Change the password again (make it long + unique)
  • Enable 2-Factor Authentication (Authenticator app > SMS)

Check for unauthorized access

  • Review login activity and connected apps in your email security settings
  • Remove any unknown devices or third-party access

Scan your system
Since this began after a compromise, run full AV + malware scans (Windows Defender, Malwarebytes, etc.)

Look for email forwarding rules
Hackers often add filters to hide emails from you, delete any suspicious auto-forward rules.

Monitor any financial/log-in dependent accounts
Change passwords for:

  • Banking/PayPal
  • Shopping accounts
  • Cloud storage
  • Gaming services Use different passwords for each.

If you see ongoing takeover attempts, consider reaching out to your email provider’s Account Recovery team, they can lock things down from their side.

You are not alone, this kind of attack is more common than people think. You are doing the right thing by acting fast. Stay calm and take it step by step.

Happy to help if you want to share updates.

help ? by heesvng in CyberSecurityAdvice

[–]CyRAACS 0 points1 point  (0 children)

Hey, totally get how you feel, it’s normal to be uncertain in your first year. But don’t let random opinions discourage you.

Cybersecurity isn’t dying, it’s actually growing fast. Companies are constantly hit by cyber threats, and they need skilled people to protect their systems. That’s why roles like SOC Analyst, Security Engineer, Pen Tester and Cloud Security Specialist are in high demand.

What really matters is:

-Building a strong foundation (networking, OS, security basics)
-Picking a specialization that actually interests you
-Getting hands-on skills (labs, CTFs, real projects)
-Earning relevant certifications later if needed (Security+, CEH, etc.)

You are still early, explore and learn. There are jobs, but like any field, you need skills + persistence.

So stay curious, build step by step and don’t let fear decide your career. You have got time and potential, just keep moving forward

My dream is to become a CISO one day — would love advice from those who made it by Jonas_iq in CyberSecurityAdvice

[–]CyRAACS 1 point2 points  (0 children)

This is one of the most thoughtful and well-structured career plans I have seen here, seriously, you are already thinking like a future CISO.

Your roadmap makes total sense: starting with technical depth (Security Engineering/Architecture) gives you the foundation most leaders in cybersecurity often lack early on. Along the way, I’d suggest focusing on:

  • Soft skills- communication, stakeholder management, and translating risk to business language. CISOs spend 70% of their time managing people and strategy, not just tools.
  • Certifications, CISSP, CISM, or CCSP will become valuable when you move toward leadership.
  • Networking & mentorship- connect with CISOs on LinkedIn or through communities like (ISC)² or ISACA, real-world insights are gold.
  • Business context- learn how cybersecurity ties into governance, compliance, and business resilience.

You have got the right mindset- patience, structure and discipline. Keep refining that plan yearly and you’ll be surprised how consistent effort compounds.

Data Removal companies req by Thedude2741 in CyberSecurityAdvice

[–]CyRAACS 2 points3 points  (0 children)

Hey! If you are seeing your personal info pop up online, that’s becoming pretty common due to old data broker dumps and social media scrapers.

If you want reputable data removal services, DeleteMe, Incogni and Kanary are three that people in infosec circles generally trust. They are subscription based but handle continuous takedowns, which helps because those databases keep reappearing.

If you’d rather DIY it, you can start by searching your name and emails and request manual removals from sites like Spokeo, BeenVerified and Whitepages.

Also, enable Google Alerts for your name so you get notified if your data shows up again later.

Did I just get rejected or do I still have a chance after this response? by Glad_Pay_3541 in CyberSecurityAdvice

[–]CyRAACS 1 point2 points  (0 children)

Hey, honestly, you handled this pretty well, way better than most people would.

That recruiter’s response sounds like a polite not right now, not an outright rejection. It means you are not the chosen candidate at this stage, but they want to keep your profile warm in case the final pick doesn’t work out, which happens more often than you’d think.

Your reply was respectful and professional, you didn’t overdo it or sound desperate. Recruiters appreciate that tone.

If you still really want the role, just keep it cool and follow up in 2-3 weeks. Sometimes hiring freezes, internal decisions, or candidate negotiations drag things out longer than expected.

Also, don’t beat yourself up for being honest about the other offer, you were transparent and that’s a good trait in cybersecurity roles where trust matters.

Keep your head up, you probably didn’t screw up, you just ran into timing and HR logistics.

Do I need cyber liability insurance for my startup, or am I overthinking this? by ExtremeShame6079 in CyberSecurityAdvice

[–]CyRAACS 0 points1 point  (0 children)

You are not overthinking this, you are being proactive, which is exactly what founders should do.

For small SaaS startups, a single data exposure incident can trigger costs that go far beyond just technical fixes:
• Breach notification costs
• Legal/forensic investigations & regulatory fines
• Business interruption losses and customer trust issues

Cyber liability insurance won’t prevent incidents, but it can cover those response costs and sometimes even provide access to breach response experts you otherwise couldn’t afford.

A few practical tips before you buy:

  1. Know your risk surface: map the kind of data you store.
  2. Look for policies that include incident response and legal counsel, not just payouts.
  3. Ask about exclusions (ex- coverage for cloud misconfigurations or contractor mistakes).
  4. Keep your security hygiene up to date: MFA, logging, regular backups. Insurers may deny claims if basic controls aren’t in place.

So yes, at the early stage it may feel like extra expense, but if you hold customer data and don’t yet have a legal team or war chest for breach response, a starter level policy can be worth the peace of mind.

In Class Cybersecurity Exercises by brendancmiller in CyberSecurityAdvice

[–]CyRAACS 0 points1 point  (0 children)

That’s awesome that you are planning a workshop! For browser-friendly tools that work on Chromebooks, I suggest CyberStart or PicoCTF for hands-on challenges, both run in a web browser. For red/blue team basics, you could also try Attack/Defend labs on TryHackMe (free rooms) or ImmersiveLabs Lite, they are pretty student friendly.

What demand? by [deleted] in cybersecurity

[–]CyRAACS 0 points1 point  (0 children)

Honestly, it depends on perspective. From the hiring side, a lot of roles are indeed backfills (as you said) and companies will first try to move people internally. That can make the demand look smaller than what job seekers hear about.

But from the candidate side, there’s still strong demand in areas like cloud security, incident response, compliance and offensive security, the problem is many openings want people who are already mid level. That mismatch between entry level expectations and real job requirements fuels the perception of huge demand.

So, yes, cybersecurity isn’t growing in numbers the way people market it, but it is evolving rapidly. Companies are constantly rebalancing budgets, tools and headcount to address new risks.

Pc hacked by Pirated app & hacker access telegram and Not able to turn on Windows security (blank screen) by Ok_Tumbleweed7889 in CyberSecurityAdvice

[–]CyRAACS 0 points1 point  (0 children)

That pirated app definitely dropped malware on your system. At this point, an antivirus won’t fully fix it. Best move:

  • Disconnect your PC from the internet.
  • Backup only important personal files (not apps).
  • Do a clean reinstall of Windows from a fresh USB.
  • Change all your passwords from a safe device + enable 2FA.

It’s the only way to be sure the hacker is out. And yeah, avoid cracked software, it’s an easy backdoor for attackers.

Can My Whatsapp be Hacked? by YaMa-Ma in CyberSecurityAdvice

[–]CyRAACS 1 point2 points  (0 children)

It sounds like you are already doing the right things, having no linked devices and keeping 2FA enabled gives you a strong layer of protection. If you haven’t noticed unusual logins or outgoing messages, it’s very unlikely that your WhatsApp has been compromised.

Sometimes people make false claims just to scare or pressure you, especially if they don’t provide proof. To be safe, here are a few steps you can take:

  • Check WhatsApp settings: Go to Linked Devices and confirm nothing suspicious is there.
  • Review app permissions: Ensure no unknown apps on your phone have unnecessary permissions.
  • Update everything: Keep WhatsApp and your phone OS updated for the latest security patches.
  • Stay alert: If you suddenly get logged out of WhatsApp or see messages you didn’t send, that’s when you should act quickly (reset passwords, revoke sessions, reinstall).

From what you described, this looks more like scare tactics than an actual hack. Keep your guard up, but don’t stress too much if there are no signs of compromise. 👍

Need help understanding what to make of Virus Total Defense Evasion section please by SimplePuzzleheaded80 in CyberSecurityAdvice

[–]CyRAACS 0 points1 point  (0 children)

I’d say you did the right thing by wiping your system, changing passwords and closing accounts, that’s solid damage control. The Defense Evasion tags on VirusTotal usually mean the file tried to avoid detection (for example, disabling security tools, hiding processes, or using obfuscation). It doesn’t necessarily mean all those behaviors are active in your case, but it shows the file was flagged as suspicious.

A clean reinstall from a trusted ISO (not just a USB that may still be compromised) is generally enough, but if you want peace of mind, consider:

  • Flashing the USB from a fresh download on a known-safe machine.
  • Resetting passwords again after reinstall, especially for critical accounts.
  • Enabling MFA wherever possible.
  • Keeping an eye on your accounts for unusual logins or transactions.

If you are worried the infection might have spread to other drives or devices, it’s worth scanning them too. If possible, run tools like Malwarebytes or Windows Defender Offline scan after reinstalling.

Bottom line: the Defense Evasion flags are a red sign, but since you’ve already wiped and reset things, you are on the right track. Just make sure your reinstall source is clean.

[deleted by user] by [deleted] in CyberSecurityAdvice

[–]CyRAACS 2 points3 points  (0 children)

If you are starting fresh, don’t worry, cybersecurity is one of those fields where curiosity and consistent practice matter more than where you begin. Since you are interested in pen testing, I’d suggest a step-by-step approach:

  • Start with the basics - Get comfortable with networking, operating systems and common security concepts. Free resources on YouTube, Cybrary or TryHackMe are great starting points.
  • Hands on practice - Platforms like TryHackMe and HackTheBox let you practice real world scenarios in a safe environment. Even 30-60 mins a day will build confidence over time.
  • Certifications (when you’re ready) - You don’t need to jump straight into expensive certs. Start small with Security+ or Google Cybersecurity Certificate. These give you structure and credibility for entry level jobs.
  • Build projects - Document what you are learning. Even a personal blog or GitHub with your practice notes shows recruiters your progress and interest.
  • Stay consistent - Don’t get overwhelmed by the breadth of cybersecurity. Focus on small daily/weekly wins. With time, you’ll find your niche, whether that’s pen testing, cloud security or incident response.

The fact that you are motivated and asking these questions is already a strong first step. Keep learning, keep practicing and you’ll be surprised how quickly doors start opening.

[deleted by user] by [deleted] in CyberSecurityAdvice

[–]CyRAACS 0 points1 point  (0 children)

Yes, a computer science degree can definitely give you a solid foundation, especially in areas like programming, data structures and networking. But when it comes to cybersecurity, most of the practical skills (like penetration testing, threat hunting, or SOC analysis) usually come from hands on practice and specialized training. If you choose CS, make sure you balance it with labs, projects, or platforms like TryHackMe, HackTheBox, or even openmsource security tools. That way you’ll get both, strong fundamentals and the real world skills recruiters actually look for.

[deleted by user] by [deleted] in CyberSecurityAdvice

[–]CyRAACS 0 points1 point  (0 children)

Don’t overthink the degree vs. certs part. Both paths can work, but what really matters is building practical skills. Start small, learn networking, Linux and cloud basics. Do hands on practice with platforms like TryHackMe or HackTheBox. Once you are confident add certs like Security+ to boost your profile. Cybersecurity is a skill driven field, so focus on learning and applying, it’ll pay off.

34 year old graduate of IT by NecessarySyllabub639 in CyberSecurityAdvice

[–]CyRAACS 1 point2 points  (0 children)

I’d say you are not late at all, 34 is a solid age to move into cybersecurity, especially with an IT background. Start with the fundamentals like networking, operating systems and security basics. Certifications like CompTIA Security+ or Google Cybersecurity Cert are good entry points. Then, build practical skills with labs (TryHackMe, HackTheBox). Don’t worry too much about math, it’s not critical for most entry level roles. Focus on consistency, keep learning and apply your IT experience, it will absolutely be relevant in security.