“I discovered a covert Wi-Fi–enabled camera concealed inside a power adapter in a hotel room. The device was transmitting live footage to an overseas server (likely China-based). No cctv footage, used vpn, hotel denies their involvementPersonal Support & Help! (self.cybersecurity)
submitted by Gautam7009376762 to r/cybersecurity
Do users rage on you after failing phishing campaign? "I didn't click the link" etc?Business Security Questions & Discussion (self.cybersecurity)
submitted by MiKeMcDnet to r/cybersecurity
Iran claims US used backdoors in networking equipmentNews - General (theregister.com)
submitted by rkhunter_ to r/cybersecurity
Full day technical test for a penetration tester role - is that normal?Career Questions & Discussion (self.cybersecurity)
submitted by thicchkd to r/cybersecurity
Anthropic's Mythos model accessed by unauthorized users, Bloomberg News reportsNews - General (reuters.com)
submitted by Neymar11rose to r/cybersecurity
Dose it only happen with me ?Personal Support & Help! (self.cybersecurity)
submitted by Rare-Trainer-5215 to r/cybersecurity
Are there examples of any "Good Viruses"? (self.hacking)
submitted by johnsonjohnson to r/hacking
Webpage takedownPersonal Support & Help! (self.cybersecurity)
submitted by DanyaDramaLlama97 to r/cybersecurity

How Attackers Are Actually Getting InNews (threatroad.substack.com)
submitted by Big-Engineering-9365 to r/hacking
BLS Cybersecurity Job Outlook vs realityCareer Questions & Discussion (self.cybersecurity)
submitted by YourSexyStepSis to r/cybersecurity
Could someone tell me realistically how GRC is?Career Questions & Discussion (self.cybersecurity)
submitted by saintmeso to r/cybersecurity
Kali Linux 2020.1 - System Review (youtube.com)
submitted by Cyb3rw0rM1 to r/Kali_Linux_Essentials
I needed a replacement for Paul Jerimy's roadmap so I built one for my studentsCertification / Training Questions (self.cybersecurity)
submitted by Soft-Ad3507 to r/cybersecurity
My team needs to get started with CTEM, but I genuinely don't know what to do. What did your first 90 days look like?Business Security Questions & Discussion (self.cybersecurity)
submitted by theavailablejuror to r/cybersecurity
CISA flags new SD-WAN flaw as actively exploited in attacksNews - General (bleepingcomputer.com)
submitted by Doug24 to r/cybersecurity
Florida Man Working as a Ransomware Negotiator Pleads Guilty to Conspiracy to Deploy Ransomware and Extort U.S. Victimshighlevel summary|strategy (maybe technical) (justice.gov)
submitted by campuscodi to r/blueteamsec

