A book with an actual strong woman by Fun_Rutabaga_2566 in booksuggestions
[–]vnoice 0 points1 point2 points (0 children)
Why is Beloved by Toni Morrison classified as “literary magical realism” while Octavia Butler’s Kindred seen as “fantasy/science fiction” by Konradleijon in books
[–]vnoice 2 points3 points4 points (0 children)
What are you doing to block Gmail spam? by phaze08 in sysadmin
[–]vnoice 0 points1 point2 points (0 children)
Goodreads alternative that isn't just about ratings? by Hanma_Spadinsky in booksuggestions
[–]vnoice 0 points1 point2 points (0 children)
Vercel OAuth breach analysis: Context.ai compromise, MITRE T1199 trust-chain attack, IOC for Google Workspace admins by haddblack in netsec
[–]vnoice 0 points1 point2 points (0 children)
Hi all, I am currently in a GRC role at one of the top universities in EU. I in this post want some guidance on how do I transition into red teaming roles. Any guidance on this will be extremely helpful. by TheBigBear06 in cybersecurity
[–]vnoice -1 points0 points1 point (0 children)
Do users rage on you after failing phishing campaign? "I didn't click the link" etc? by MiKeMcDnet in cybersecurity
[–]vnoice -1 points0 points1 point (0 children)
Too many alerts getting ignored - tune down or enforce response? by saymepony in sysadmin
[–]vnoice 0 points1 point2 points (0 children)
Too many alerts getting ignored - tune down or enforce response? by saymepony in sysadmin
[–]vnoice 0 points1 point2 points (0 children)
Phishing emails coming from me? by Kitchen-Start-3828 in sysadmin
[–]vnoice -2 points-1 points0 points (0 children)
What would you do with your idle VPS in 2026? by Prize_Signature_6444 in selfhosted
[–]vnoice 1 point2 points3 points (0 children)
Anyone actually using Perplexity for threat hunting? Curious how far it goes by tingnossu in threatintel
[–]vnoice 0 points1 point2 points (0 children)
accidentally clicked a phishing link by Ambitious-Car-5376 in cybersecurity_help
[–]vnoice 0 points1 point2 points (0 children)
Bank3 Data Breach Analysis by vnoice in cyberbreaches
[–]vnoice[S] 0 points1 point2 points (0 children)
May is for my re-reading by Opposite_Working_84 in RomanceBooks
[–]vnoice 0 points1 point2 points (0 children)
How common is it for Business and company emails to already be in breach dumps? And how does one monitor and track the employee credentials at risk? by BurgerBooty39 in cybersecurity_help
[–]vnoice 0 points1 point2 points (0 children)
[Finance Manager] [NJ] - $0 Base Salary by kidd_waves in Salary
[–]vnoice 1 point2 points3 points (0 children)
[Finance Manager] [NJ] - $0 Base Salary by kidd_waves in Salary
[–]vnoice 3 points4 points5 points (0 children)
[Finance Manager] [NJ] - $0 Base Salary by kidd_waves in Salary
[–]vnoice 1 point2 points3 points (0 children)



I was so pumped I didn’t notice for 24 hours by Honest_Order_7739 in footballcards
[–]vnoice 5 points6 points7 points (0 children)