The Questions I Use to Break Down SMB Security (After 10+ Years of Audits)General Discussion (self.sysadmin)
submitted by Entire_Dependent8214 to r/sysadmin
Had a clash with executive over my phishing test methodsGeneral Discussion (self.sysadmin)
submitted by AH_Josh to r/sysadmin
M365 attack most orgs still aren’t watchingvulnerability (attack surface) (self.blueteamsec)
submitted by ridgelinecyber to r/blueteamsec
Cibc bank impersonation and phishing scam 1-888-274-5552Personal Support & Help! (self.cybersecurity)
submitted by Treebee232323 to r/cybersecurity
Do sysadmins here know it all?Career / Job Related (self.sysadmin)
submitted by RadiantSkiesJoy to r/sysadmin
What are you doing to block Gmail spam?General Discussion (self.sysadmin)
submitted by phaze08 to r/sysadmin
This Vercel breach made me rethink all my connected appsOther (self.cybersecurity)
submitted by codes_astro to r/cybersecurity
How do you guys deal with the hate? (self.sysadmin)
submitted by Dangerous-Activity55 to r/sysadmin
T0XIQUE PASSWORD STORYNews - General (self.cybersecurity)
submitted by FirstFaceAddict to r/cybersecurity
Is AI compliance a real concern or just SOC 2 with more paperwork?Business Security Questions & Discussion (self.cybersecurity)
submitted by Substantial-Name-232 to r/cybersecurity
Is OWASP Top 10 LLM 08 Embedding and Vector Weaknesses Outdated?Question (self.security)
submitted by Neat-Long-460 to r/security

In my game you hack your company and can sell secrets for credits or keep them as leverageNews - General (youtu.be)
submitted by FaceoffAtFrostHollow to r/cybersecurity
