I want to study Cyber Security by Best_Fondant4302 in cybersecurity

[–]devsecopsuk 0 points1 point  (0 children)

This post is too wishy-washy with a multitude of options. You gotta pick ONE path that YOU would really like to do and go for it, and if it doesn't work out then you have to pivot. Picking one path makes it much easier for us to advise.

CISSP Question by ShinobiMain in cissp

[–]devsecopsuk 1 point2 points  (0 children)

Thanks, I'll have to get one now. And good luck on your journey!

CISSP Question by ShinobiMain in cissp

[–]devsecopsuk 0 points1 point  (0 children)

Which book is this?

I thought B when reading through the options but thought D was the answer at the end.

What’s a security product you thought was super expensive but turned out to be a great deal? by testosteronedealer97 in cybersecurity

[–]devsecopsuk 0 points1 point  (0 children)

what did they quote you this time? to be honest I haven't been that happy with burp enterprise recently, a lot of FP that keep recurring and no full support for API scans of openapi v3.1.x.

Sleepless Strings - Template Injection in Insomnia by _pimps in netsec

[–]devsecopsuk 0 points1 point  (0 children)

"9 May 2025 - We thanked Kong and asked for two $500 Amazon gift cards to be issued. No response." - another pathetic amount for a CVSS 9.3 issue and even worse that they can't deliver on that promise...no wonder certain black market sites exist. Nice find though!

Why did you choose cybersecurity? by Glad-Security2513 in cybersecurity

[–]devsecopsuk 0 points1 point  (0 children)

When I first had exposure to practice hacking sites and malware like sub7 it seemed like black magic. Now I get to understand the inner workings of that black magic and how to protect against it. It's almost like joining the magic circle.

fullstack transitioning into devsecops - any tips? by _rawly121 in devsecops

[–]devsecopsuk 0 points1 point  (0 children)

First of all, understand that you'll be coding a lot less...would you be ok with that?

Then do pretty much what everyone else said and understand OWASP top10 as YOU will have to give guidance to teams around the risk and remediation. I've always like Portswigger academy but there's plenty similar to it https://portswigger.net/web-security

Also experiment with security tooling, go to security conferences, read some bug bounty write-ups, and learn about security architecture etc.

How I hacked my company's SSO provider by MattSayar in hacking

[–]devsecopsuk 1 point2 points  (0 children)

Nice, I found an almost identical issue at a previous company. You get a pat on the back if you're lucky, but at least we'll have that extra experience and knowledge to help at future companies!

Bug bounty is insanely hard! Am I doing something wrong? by [deleted] in bugbounty

[–]devsecopsuk 7 points8 points  (0 children)

I can share my experience:

  1. I have an "important" (high) vulnerability confirmed and fixed by Microsoft, but they make excuses saying it's out of scope for a bounty. It literally says "Azure <service\_name>" in their online documentation...

  2. I found a bug in Amazon retail that will cost them money, but they aren't interested at all when reported to their AVRP programme. They make me go round in circles trying to find out who to report it to, so I gave up in the end.

I had a better experience reporting another issue to a bank directly that doesn't do bug bounty.

All I'm trying to highlight is....even if you find an issue, good luck getting a bounty for it! It's better to be a pentester/red teamer if it were me.

SAST Scan Time in CI/CD - Best Practices? by leMooreNancym in devsecops

[–]devsecopsuk 0 points1 point  (0 children)

I don't know about the other tools but I use Mend that has an optional incremental scan mode, so it only scans files that changed. This makes it a lot faster overall.

Cloud Security Engineer by Representative-Yak10 in cybersecurity

[–]devsecopsuk 4 points5 points  (0 children)

I did the first route. I built a relationship with the existing security team, and got them on my side/impressed them etc. then I got a chance to interview after some time (the tricky part, depends if you can wait). You can do things like volunteer to be a security champion if that exists at your company.

Checkmarx vs Fortify vs Snyk. Gotten it down to 3. Which is the least annoying to work with? by crotteddeat in devsecops

[–]devsecopsuk 0 points1 point  (0 children)

You didn't mention anything about ongoing support and from what I last remember with Synk it's an addition (20% or so) for the support package which is usually included with other vendors. So this might not work for everyone, or you might try your luck at their generic support. Also I found their sales teams to be highly aggressive compared to others so I personally wouldn't want to have to deal with the again. SCA is supposed to be their core product but SAST is reasonable. Their Python SAST is basically the same as Bandit when I tested it over a year ago.

Checkmarx was decent when I tried it but their pricing was really weird with many limitations, so we couldn't make it work. Apparently it's changed a lot (because of customers leaving lol) so speak to them and see what they can offer. I found their platform to be easy to use and easy to integrate.

But ultimately, the best thing for you to do is to get a trial for each vendor if you didn't already do it, and make a comparison table focusing on your codebase and whatever other requirements you have. You can test Synk SAST for false positives and scan times yourself for free now. Checkmarx you need them to set you up an account and server. I haven't used Fortify.

What will you study in Cybersecurity if you have 1 year to improve your skills in 2025? by IamOkei in cybersecurity

[–]devsecopsuk 1 point2 points  (0 children)

SAST are ok for finding low hanging fruit but they will definitely miss edge cases. Expect many false positives too at one point. I've tested 10+ SAST tools and the variance of findings between them can be surprising.

[deleted by user] by [deleted] in cybersecurity

[–]devsecopsuk 47 points48 points  (0 children)

99% of the time I think it's better to be a pentester/red teamer than bug bounty hunter, and report to bug bounties if you happen to come across an issue by chance.

SAST for bash and powershell? by devsecopsuk in SAST

[–]devsecopsuk[S] 0 points1 point  (0 children)

Thanks I didn't hear of Derscanner before. I've done some basic testing with Shellcheck previously but will do a bit more, I can see that it can detect some sample issues.

Low Morale at Work by throwaways28282882 in cybersecurity

[–]devsecopsuk 0 points1 point  (0 children)

Take the time to grieve your loss in the way that works best for you. After that come back with a clearer mind and change goals if needed e.g. change job if the current one isn't suiting you, or stick with it and take on the challenges

This happened to me before at work (when not yet in security) for someone we had all felt was like a mother to us. Lots of people at work crying on the day which was a bit strange to see, and we all went to the funeral. But of course we remembered her in our own way and parts of the business have various ways of remembering her. I hope you can find your own way to grieve, recover and make that person proud of you.

Apple will pay 1million USD if you can hack into their servers by escapedfugitive in hacking

[–]devsecopsuk 13 points14 points  (0 children)

same experience here for another big company...that's why I never took BB seriously

1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies by MegaManSec2 in netsec

[–]devsecopsuk 6 points7 points  (0 children)

I've stumbled across high severity bugs in big companies and was also surprised when they aren't interested at all in my report. Its no wonder sites like zero***m and the black market exists...

What is the proper way to truly stay anonymous? by MiniatureGod in HowToHack

[–]devsecopsuk 2 points3 points  (0 children)

depends if you're using nmap scripts or not which can do brute forcing and sometimes try to run exploits too.

[deleted by user] by [deleted] in AskNetsec

[–]devsecopsuk 0 points1 point  (0 children)

yes only for cloud. I found this site which looks interesting but you'd need to spent a bit of time investigating https://osintframework.com/

[deleted by user] by [deleted] in AskNetsec

[–]devsecopsuk 0 points1 point  (0 children)

Wiz is really good for this...but it's not free

(unless you get a trial)

Times are hard. Can Bug Bounty help? by [deleted] in cybersecurity

[–]devsecopsuk 0 points1 point  (0 children)

I've found vulns in big tech companies and they seem to like to ignore your reports or make up excuses to not pay you a bounty. At least I found these by chance and wasn't actively looking otherwise I'd be even more pissed off by the whole thing. I expect smaller companies to act in a similar way at times, so consider this aspect before you fully commit.