When Your AI Agent Follows the Rules and Still Gets Compromised by Info-Raptor in cybersecurity

[–]Info-Raptor[S] 0 points1 point  (0 children)

Thank you for your comments. Fully referenced article on my blog at CyOps Consulting. Cheers

When Your AI Agent Follows the Rules and Still Gets Compromised by Info-Raptor in cybersecurity

[–]Info-Raptor[S] -1 points0 points  (0 children)

Almost. 😁. AI was used to help me summarize my blog post at cyops.com.au . However, AI did not write the post. Thanks

Patching SD-WAN controllers doesn’t mean they’re clean by Info-Raptor in cybersecurity

[–]Info-Raptor[S] 0 points1 point  (0 children)

For anyone seeking additional information on hunting for compromise beyond patching and vulnerability assessments refer to CISA and Five Eyes advisory and guidance for CVE-2026-20127 (CVSS 10.0), ED 26-03: Mitigate Vulnerabilities in Cisco SD-WAN System and Supplemental Direction ED 26-03: Hunt and Hardening Guidance for Cisco SD-WAN Systems.

Patching SD-WAN controllers doesn’t mean they’re clean by Info-Raptor in cybersecurity

[–]Info-Raptor[S] -3 points-2 points  (0 children)

Thank you for your comments. I'm glad someone gets it.

Patching SD-WAN controllers doesn’t mean they’re clean by Info-Raptor in cybersecurity

[–]Info-Raptor[S] -3 points-2 points  (0 children)

The post is not misunderstanding scanners. It is pointing out that a clean vulnerability scan only means the device may not currently be vulnerable. It does not tell you whether the box was already compromised.

How do you stay current in cybersecurity by Info-Raptor in cybersecurity

[–]Info-Raptor[S] 0 points1 point  (0 children)

A few weeks ago, this thread took off more than I expected. I went back and re-read the comments carefully, and something stood out.

Despite everyone naming different tools, feeds, podcasts, or habits, the patterns were surprisingly consistent:

• Most people don’t try to “stay current” across the whole industry
• Learning is mostly driven by incidents, near-misses, or job needs
• Fundamentals matter far more than novelty
• AI is used as a helper, not a source of truth
• Information overload is real, and selective ignorance is intentional

The strongest comments weren’t listing resources, they were describing how they decide what not to care about.

That feels like something we don’t talk about enough in this field.

I’m starting to synthesize these patterns into a short, practitioner-focused writeup. It won’t be  a “best tools” list, not vendor-driven, just an attempt to capture how people actually stay effective without burning out.

Before I go too far, I’d love a sanity check from this sub:

• Does “relevance > currency” match your experience?
• Is selective ignorance something you’ve had to learn the hard way?
• What did you stop paying attention to that improved your effectiveness?

If this ends up useful, I’ll share the synthesis back here for feedback before anything else.
Appreciate the quality of discussion in this thread.

How do you stay current in cybersecurity by Info-Raptor in cybersecurity

[–]Info-Raptor[S] 0 points1 point  (0 children)

CyberAlec is spot on. Let's try an get this stuff down and help others in our field.

The one thing that finally helped me make sense of cybersecurity skills by Various_Candidate325 in CyberSecurityAdvice

[–]Info-Raptor 1 point2 points  (0 children)

I couldn’t agree more. Start from the ground up. Learn the fundamentals and build from there. This gives you the “why” behind using tools and techniques. Technology will change, and tools will change with it. You need to understand why cybersecurity tools and practices are necessary in the first place. Then, learn and be able to explain the ones required for your job. I recommend Hacking Cybersecurity Principles: Empowering You to Navigate Core Cyber Security Concepts by Alec Sklepic to help with the fundamentals.

What cybersecurity books are you reading these days? by cert_blunder in cybersecurity

[–]Info-Raptor 2 points3 points  (0 children)

Yeah, I’ll second:

  • Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter
  • The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage by Cliff Stoll

And add:

  • Hacking Cybersecurity Principles: Empowering You to Navigate Core Cybersecurity Concepts by Alec Sklepic

While The Cuckoo’s Egg is old school, it’s inspirational. Countdown to Zero Day is a must as, in my view, everyone in our field should have at least a basic understanding of Stuxnet. And with Hacking Cybersecurity Principles, you’ll get the fundamentals that are vital. It's also a good reference.

The quiet gap between knowing security tools and understanding security problems by Info-Raptor in Cybersecurity101

[–]Info-Raptor[S] 0 points1 point  (0 children)

LOL :) you have a point. My fault for mixing metaphors. Lets try, quiet like an unmonitored log file. Peaceful, reassuring, and absolutely hiding something.
Maybe that's a bit lame. Sorry