Best of r/cybersecurity's Avatar

Best of r/cybersecurity

@cybersecurity.page

Summarizes the hottest content on r/cybersecurity once per hour. Warning, the summaries are generated by an LLM and are not guaranteed to be 100% correct. Operated by @tweedge.net, open source @ https://github.com/r-cybersecurity/best-of-bot

6,541
Followers
1
Following
6,354
Posts
22.06.2023
Joined
Posts Following

Latest posts by Best of r/cybersecurity @cybersecurity.page

Stryker Hit by Handala - Intune Managed Devices Wiped My wife had 3 Stryker managed devices wiped around 3:30 AM EDT. Their Entra login page was defaced with the Handala logo, it's still up as of this post.

Stryker suffered a cybersecurity incident where three Intune-managed devices were wiped at 3:30 AM EDT. The Entra login page was defaced with the Handala logo, and it's still visible at the time of posting.

11.03.2026 11:42 πŸ‘ 7 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Palo Alto XSIAM vs. CrowdStrike NG SIEM. Which one would you choose today? We have been doing a RFP for a new SIEM and so far these two are in the lead. I am not really sure which one I would choose between the two. Anyone have a real world experience with either one of t...

Palo Alto XSIAM vs. CrowdStrike NG SIEM. Which one would you choose today?

11.03.2026 06:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
DOGE employee stole Social Security data and put it on a thumb drive, report says View post on Reddit.

A Department of Government Employee (DOGE) was reported to have illegally copied Social Security data onto a thumb drive.

11.03.2026 01:42 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
CISSP or Master? Be brutally honest β€” I’m looking for feedback on my career path. I have about 5 years of SOC experience and hold the CompTIA Security+ certification. I’m considering pursuing CISSP and wanted to as...

The user seeks advice on whether to pursue a CISSP certification or a master's degree to enhance their 5 years of SOC experience and CompTIA Security+ credential. They're looking for feedback on which option would more meaningfully strengthen their profile for growth in cybersecurity.

11.03.2026 00:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
DOGE member took Social Security data on a thumb drive, whistleblower alleges View post on Reddit.

An individual with access to Social Security data allegedly copied it onto a thumb drive, raising concerns about data security and unauthorized data transfer.

10.03.2026 23:42 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
10+ years of DFIR... I just did my first ever forensic audit of an AI system I spent most of my career building forensic platforms to support IR engagements, so I'm used to dealing with complex data types and strange systems. But last week I came across something I hadn't s...

10+ years of DFIR... I just did my first ever forensic audit of an AI system

10.03.2026 21:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Mentorship Monday - Post All Career, Education and Job questions here! This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cyb...

Mentorship Monday - Post All Career, Education and Job questions here!

10.03.2026 20:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
I mapped 2,845 cybersecurity companies across 64 countries. Here's where the industry actually clusters. I've been tracking cybersecurity companies for a while and recently plotted them all on a searchable map, here are some things you can instantly notice in a map view that you might not see otherwis...

I mapped 2,845 cybersecurity companies across 64 countries, revealing key clusters: The US with 1,718 companies is mostly coastal, Israel has a high concentration per capita, and Europe is more spread out than expected. APAC is growing fast, led by India and Australia.

10.03.2026 19:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
I’m a cybersecurity and insider threat investigator focused on DPRK APTs and remote workers. AMA I’m Michael Barnhart. I work in insider-threat investigations and spend most of my time tracking adversaries who operate from inside corporate networks using legitimate credentials. Over the last y...

I’m a cybersecurity and insider threat investigator focused on DPRK APTs and remote workers. AMA

10.03.2026 18:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
SecurityClaw - Open-source SOC investigation tool I built a small open-source project called SecurityClaw that lets you investigate security data by simply chatting with it. This has been a few weekend long project. The idea is based on OpenClaw b...

SecurityClaw - Open-source SOC investigation tool

10.03.2026 09:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Trump's Cyber Strategy Backs Crypto and Blockchain Security for First Time View post on Reddit.

Trump's cyber strategy introduces support for cryptocurrency and blockchain security, marking the first time these technologies have been explicitly prioritized in a national cybersecurity agenda.

10.03.2026 07:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Hackers Allegedly Selling Exploit for Windows Remote Desktop Services 0-Day Flaw View post on Reddit.

Hackers are reportedly selling an exploit for an unpatched zero-day vulnerability in Windows Remote Desktop Services. This flaw could allow unauthorized access to Windows systems, posing a significant security risk.

10.03.2026 06:42 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Mississippi hospital system closes all clinics after ransomware attack View post on Reddit.

A Mississippi hospital system shut down all clinics following a ransomware attack, disrupting medical operations.

10.03.2026 05:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
AI is now being used to automate identity fraud at the account creation stage specifically Not talking about phishing or social engineering. I mean fully automated bots that generate synthetic identities, submit deepfake selfies, and retry verification with slight variations until someth...

AI is now being used to automate identity fraud at the account creation stage specifically

10.03.2026 03:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
We used r/cybersecurity as a data source for research on what was publicly visible about TCS before the M&S and JLR breaches In June 2025, a red team operator posted here: "I run Red Teams and often deal with TCS and others (Big 4 included) and it's a shit show. SOC's sleeping on SIEM alerts, basic security practices be...

A red team operator criticized TCS and others for poor security practices, such as ignoring SIEM alerts and lying during audits. This was part of a study collecting public signals from social media and reviews before TCS-related UK breaches, with data and methodology available publicly.

10.03.2026 01:42 πŸ‘ 2 πŸ” 0 πŸ’¬ 2 πŸ“Œ 0
Russia forged new cyber weapons to attack Ukraine. Now they're going international Poland’s electricity operator detected a suspicious disruption in late December when several solar power stations suddenly disconnected from the grid despite continuing to generate power. After sta...

Russia's cyber weapons, developed for attacks on Ukraine, are now being used internationally. Poland's electricity operator experienced a disruption in December, linked to attacks by Russia's FSB Center 16. Though the incident didn't cause major outages, it signals possible hybrid warfare.

10.03.2026 00:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
How We Hacked McKinsey's AI Platform View post on Reddit.

How We Hacked McKinsey's AI Platform

09.03.2026 19:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
How do investigators use email header analysis to detect spoofed emails? I am trying to analyse Email headers but not able to find a proper process to do it? I’ve been trying to understand how investigators use email header analysis to determine whether an email is genuine or spoofed. Which header fields usually reveal this, and how do analysts trace th...

Email header analysis helps investigators detect spoofed emails by examining fields like "Received", "Return-Path", and "Reply-To" to trace the actual sender. Analysts can spot inconsistencies or mismatches in these fields, revealing if the visible email address is fake.

09.03.2026 15:42 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
I noticed weird console.logs firing on every site β€” turned out a Featured Chrome extension got sold and was running a full malware chain on my machine Chrome has to do something about this there is hundreds of extensions up for selling on sites like extensions hub

A Chrome extension was sold and turned malicious, executing malware on my device. This highlights the risk of extensions sold in marketplaces and the need for Chrome to address the issue.

09.03.2026 13:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Applying Zero Trust to Agentic AI and LLM Connectivity β€” anyone else working on this? Hey all, I’m currently working in the Cloud Security Alliance on applying Zero Trust to agentic AI / LLM systems, especially from the perspective of connectivity, service-based access, and authenti...

Applying Zero Trust to Agentic AI and LLM Connectivity β€” anyone else working on this?

09.03.2026 08:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Can't stop the bots I am the only IT admin (sorta) for a small business running our website on WordPress hosted on AWS. Ive been trying to keep out the bots/ crawlers eating up our servers these past several months. I...

As the sole IT admin for a small business on WordPress/AWS, I've struggled with bots/crawlers impacting our servers. Despite using robots.txt and country filters, issues persist. We even faced a DDoS attack. What strategies have worked for you in managing this?

09.03.2026 07:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Cyber security books I'm starting my cyber security journey and wanted to know if there are any cyber security books people would recommend. I'm currently reading Pegasus by Laurent Richard but it's mainly investigativ...

Looking for recommended cybersecurity books as they start their journey. Currently reading "Pegasus" by Laurent Richard, which is more investigative journalism. Prefers non-textbook recommendations.

09.03.2026 06:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Most underrated projects in cybersecurity Hi everyone, I’m currently preparing to re-enter the cybersecurity field with a focus on Red Teaming / Offensive Security. I have about 5 years of prior experience in the field, but I took a career...

Seeking advice for re-entering the cybersecurity field with a focus on Red Teaming. Looking for project ideas, effective portfolio presentation, and recommended learning resources or courses. Aims to create a practical portfolio showcasing real offensive security skills. Seeking community guidance.

08.03.2026 23:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
How is cybercrime actually profitable when cashing out seems nearly impossible? Im a complete noob who's interested in the field of cybersecurity. I frequently see large ransomware groups demand millions in Bitcoin. How does that money ever become usable? Take a European coun...

How is cybercrime actually profitable when cashing out seems nearly impossible?

08.03.2026 17:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
When making a lengthy password, does replacing letters with numbers help at all? For example, β€œBeliever.Moustache.Gander” versus β€œB3li3v3r.Moustach3.Gand3r” Is there any difference in terms of how easy it is to crack?

Replacing letters with numbers, like "B3li3v3r" instead of "Believer," can add complexity to a password, making it harder to crack. However, it primarily depends on the length and randomness rather than simple substitutions.

08.03.2026 16:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
What were some of the best interview questions you were asked in an interview? Any role (analyst, engineer, architect), a question you thought was really smart, or one that stumped you during an interview.

What were some of the best interview questions you were asked in an interview?

08.03.2026 12:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
New Social Engineering from Recruiters. Anyone seen this social engineering attempt before? So I applied for a job, got a message from the recruiter saying I needed to optimise my CV and LinkedIN profile for the role and he had a conta...

A person applied for a job and was told by a recruiter to enhance their CV and LinkedIn profile with someone the recruiter knew. The supposed contact asked for temporary access to their LinkedIn account to optimize it, assuring not to change settings or message anyone, raising suspicion of a scam.

08.03.2026 04:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Microsoft warns hackers are using AI at every stage of cyberattacks. According to Microsoft, threat actors are rapidly adopting AI tools to assist with phishing, reconnaissance, malware creation, and evasion techniquesβ€”raising new concerns about the speed and scale ...

Microsoft alerts that hackers increasingly use AI for phishing, reconnaissance, malware creation, and evasion in cyberattacks, potentially accelerating their speed and scale.

08.03.2026 02:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Wikipedia hit by self-propagating JavaScript worm that vandalized pages View post on Reddit.

Wikipedia was affected by a self-replicating JavaScript worm that vandalized pages. This incident represents a significant cybersecurity challenge as the worm spread quickly across the platform.

08.03.2026 01:42 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Certs feel like a ponzi scheme I've been in cyber for about 4 years now, and I'm starting to question the sustainability of the certification model. I wanted to put this out there to see if others feel the same way. The barrier ...

Certs feel like a ponzi scheme

08.03.2026 00:42 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0