bOt@zerobytes.monsterM · 2 hours agoCan we perform an internal penetration test against our servers and workstations if they are Azure Virtual Desktops in Azure Cloud?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareCan we perform an internal penetration test against our servers and workstations if they are Azure Virtual Desktops in Azure Cloud?plus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoIdentity Provider for 50 employees with mixed OS?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareIdentity Provider for 50 employees with mixed OS?plus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoFaang coding interviewplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareFaang coding interviewplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoCISA: Ivanti Vulns Chained Together in Attacksplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCISA: Ivanti Vulns Chained Together in Attacksplus-squarewww.darkreading.combOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoBlack 'Magic' Targets Enterprise Juniper Routers With Backdoorplus-squarewww.darkreading.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBlack 'Magic' Targets Enterprise Juniper Routers With Backdoorplus-squarewww.darkreading.combOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoCareer advice - cloud securityplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareCareer advice - cloud securityplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoFreelance Opportunitiesplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareFreelance Opportunitiesplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoEve Maler, Co-Inventor of SAML, Shares Bold Predictions for the Future of Identity and SSOplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareEve Maler, Co-Inventor of SAML, Shares Bold Predictions for the Future of Identity and SSOplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoResources/Ideas for University Cybersecurity Clubplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareResources/Ideas for University Cybersecurity Clubplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours ago“What book or resource has had the biggest ‘Aha!’ moment for you in a specific area of cybersecurity (like ethical hacking, threat intelligence, or risk management)?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-square“What book or resource has had the biggest ‘Aha!’ moment for you in a specific area of cybersecurity (like ethical hacking, threat intelligence, or risk management)?plus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoCritical Vulnerability: SonicWall Secure Mobile Accessplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareCritical Vulnerability: SonicWall Secure Mobile Accessplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoGRC beginner/Intermediate certificationplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareGRC beginner/Intermediate certificationplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoJuniper enterprise routers backdoored via "magic packet" malwareplus-squarewww.helpnetsecurity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJuniper enterprise routers backdoored via "magic packet" malwareplus-squarewww.helpnetsecurity.combOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoLinkedIn Premium customers filed a lawsuit against the social media platform, claiming that it shared their private messages with third parties without their consent in order to train artificial i...plus-squaretherecord.mediaexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLinkedIn Premium customers filed a lawsuit against the social media platform, claiming that it shared their private messages with third parties without their consent in order to train artificial i...plus-squaretherecord.mediabOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoWhere does everyone get their CyberSec info?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareWhere does everyone get their CyberSec info?plus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoTransitioning from a CISO/Head of InfoSec role to CIO/Head of IT...crazy? Step back?plus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareTransitioning from a CISO/Head of InfoSec role to CIO/Head of IT...crazy? Step back?plus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoTelegram captcha tricks you into running malicious PowerShell scriptsplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTelegram captcha tricks you into running malicious PowerShell scriptsplus-squarewww.bleepingcomputer.combOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoDiscussion, What type of virus is this according this textplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squareDiscussion, What type of virus is this according this textplus-squarebOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoGovernment and university websites targeted in ScriptAPI[.]dev client-side attackplus-squarecside.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGovernment and university websites targeted in ScriptAPI[.]dev client-side attackplus-squarecside.devbOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink
bOt@zerobytes.monsterM · 2 hours agoUnder Trump, US Cyberdefense Loses Its Headplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnder Trump, US Cyberdefense Loses Its Headplus-squarewww.wired.combOt@zerobytes.monsterM · 2 hours agomessage-square0fedilink