Summarizes the hottest content on r/cybersecurity once per hour. Warning, the summaries are generated by an LLM and are not guaranteed to be 100% correct. Operated by
@tweedge.net, open source @
github.com/r-cybersecurity/bes…AI advancements threaten tech jobs by 2025. The AmosStealer macOS malware is now the top Clawdbot/OpenClaw skill.
In today's episode of "AI will make tech people unemployed by the end of 2025": The most downloaded Clawdbot/OpenClaw skill is AmosStealer macOS malware
View post on Reddit.
Moltbook perfectly reveals the state of security of vibe coded apps
Moltbook perfectly reveals the state of security of vibe coded apps
Just over one week ago, the tech world was stunned by Moltbook. Some called it the AGI moment, others called it Skynet. Even Andrej Karpathy weighed in, calling it "genuinely the most incredible sc...
How was the US Government able to track down someone through just 4chan posts?
How was the US Government able to track down someone through just 4chan posts?
I'm referring to the prison guard who shared how he saw Epstein be switched out for a lookalike. The government was able to track him down from anonymous 4chan posts and wrote a report on him (incl...
Best vulnerability management book to read right now?
Best vulnerability management book to read right now?
About to start working in vulnerability management and trying to get ahead a bit.
What’s the go-to book people recommend right now for VM?
Looking for something practical and relevant to how teams ...
A network security manager, new to the role, faces challenges with uninspectable protocols like QUIC and TLS 1.3, which are hard to decrypt. They seek resources to develop effective security plans to address these obstacles.
Network Security- uninspectable protocols
I spent 20y as a network engineer, moved to network and infrastructure mgmt about 6y ago, and now find myself managing a network security team. Just putting that context out there to say that I'm...
Evaluating CrowdStrike and SentinelOne for migration, the main issue is unproductive PowerShell alerts requiring human review. An MDR that directly verifies with users, perhaps via Slack or Teams, would be ideal. Seeking solutions for better context at scale, aiming for a swift alert-to-triage.
CrowdStrike vs SentinelOne
Hi. We are handling a migration from legacy stack and finding the right fit with CS and S1. Tech is good in both. Telemetry is great on both but main problem is the context. We get a lot of powersh...
Once ransomware starts running, it's challenging to protect files. Some options might include file permission locks, requiring authentication for file writes, or detecting mass encryption attempts. However, prevention remains crucial, and it's unclear if these measures would be effective mid-attack.
Can files be protected AFTER ransomware starts running?
Most ransomware advice focuses on prevention (antivirus, backups, etc).
But what if malware is already executing on your system? Is there any
way to protect files at that point?
I'm thinking about...
Since this sub is full of dark perspectives about the state of the industry, could you share some good parts about being in cybersecurity? Any success stories, ways your current role made your life better compared to your previous jobs?
Since this sub is full of dark perspectives about the state of the industry, could you share some good parts about being in cybersecurity? Any success stories, ways your current role made your life better compared to your previous jobs?
I don’t think other types of tech roles are necessarily in a better state and I’m soon starting my postgraduate degree. Looking for some hope and inspiration.
OpenClaw, formerly Moltbot and ClawdBot, is spreading in enterprise networks. Many deployments are detected, with about 20% of skills being malicious. Developers upload harmful packages frequently. Do not run OpenClaw on corporate devices and treat detections as security incidents.
Security Advisory: OpenClaw is spilling over to enterprise networks
OpenClaw (ex-Moltbot and ClawdBot) is being detected on enterprise networks. We are detecting hundreds of deployments across our accounts.
It's a hot mess. About 20% of available skills are malicio...
This weekly thread invites questions on cybersecurity careers and education. It's a space to inquire about certifications, degrees, job requirements, and more. No question is too trivial, and browsing past discussions may answer common queries.
Mentorship Monday - Post All Career, Education and Job questions here!
This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cyb...
Lockdown Mode successfully blocked the FBI from accessing a reporter's iPhone, indicating its effectiveness in enhancing device security against forced intrusions.
Lockdown Mode prevented FBI from getting into reporter’s iPhone
View post on Reddit.
OpenClaw is terrifying and the ClawHub ecosystem is already full of malware
OpenClaw is terrifying and the ClawHub ecosystem is already full of malware
OpenClaw is already scary from a security perspective..... but watching the ecosystem around it get infected this fast is honestly insane.
I recently interviewed Paul McCarty (maintainer of OpenSou...
The post mentions recreating uncensored PDFs related to Epstein from raw base64-encoded data that was leaked.
Recreating uncensored Epstein PDFs from leaked raw base64-encoded data
View post on Reddit.
I’m Ross McKerchar, CISO at Sophos: AMA on tackling the issue of detecting fraudulent remote IT hires and building workable controls.
I’m Ross McKerchar, CISO at Sophos: AMA on tackling the issue of detecting fraudulent remote IT hires and building workable controls.
Hi r/cybersecurity,
I’m Ross McKerchar, CISO at Sophos. (/u/RossMcKerchar)
Over the last couple of years, many orgs have run into a tough problem of managing or deal\*ing* with the reality of Nort...
A major AI-related data breach seems imminent as companies rapidly integrate AI tools like ChatGPT. The concern is not just user error but the risk of a provider being compromised, potentially exposing training data and customer info on a large scale. This scenario is worrying security experts.
How long until we see a major AI-related data breach?
With how many companies are rushing to plug everything into ChatGPT and other AI tools, feels like it's only a matter of time before we see a massive breach tied to AI usage.
Samsung surely was a w...
Shinyhunters leaked sensitive data from Harvard University, revealing internal donation protocols and impacting influential individuals.
Shinyhunters just leaked a bunch of sensitive data from Harvard University, impacting some of the most powerful people & exposing Harvard's internal protocols around donations
View post on Reddit.
ADHD and Executive Dysfunction in Cybersecurity
ADHD and Executive Dysfunction in Cybersecurity
I am wondering if there is anyone that is willing to share their experiences with having ADHD and working in a high stress field with a heavy emphasis on attention to detail.
What have been some o...
RSAC vs. Black Hat USA (2026): Which one is actually worth the budget?
RSAC vs. Black Hat USA (2026): Which one is actually worth the budget?
My company is finally letting me pick one "mega-con" to attend this year, and I'm torn between RSAC (San Francisco) and Black Hat (Vegas). I know the cliché is "RSA is for the suits, Black Hat is f...
Considering a SOC role? Many express negative opinions but it can also be an opportunity for professional development. Understanding potential challenges is key to knowing what you're getting into.
Is SOC really that bad?
I want to try to get into SOC, but I read a lot of opinions how bad this job is. Of course I want to see it more like of a chance to develop, but I just want to know what I'm trying to get myself i...
A massive data leak exposed an Elasticsearch cluster with over 160 indices, revealing 8.7 billion mostly Chinese records, including citizen ID numbers and business data.
8.7 billion records spilled: Inside the massive Chinese data leak
The exposed Elasticsearch cluster, which contained over 160 indices, held billions of primarily Chinese records, ranging from national citizen ID numbers to various business records.
I don't have enough mental capacity to read or do work.
I don't have enough mental capacity to read or do work.
In a nutshell: I help support my govts system ATO process so that means reading case studies, design reviews, and architectural diagrams which comes in CDRLs, completing system security plans, syst...
A small remote team faced with cyber insurance and audits compared VPN, ZTNA, and SASE for network access. They found business VPNs practical as they satisfy audits and insurers without being as complex as ZTNA/SASE, which are better suited for larger teams. Curious about others' approaches.
Cyber insurance forced me to actually compare VPN vs ZTNA vs SASE
I’m on a small remote team and somehow became responsible for “network access” when audits showed up.
Consumer VPNs were fine… until security questionnaires and cyber insurance entered the picture....
Russian hackers exploit recently patched Microsoft Office bug in attacks
Russian hackers exploit recently patched Microsoft Office bug in attacks
View post on Reddit.
The Notepad++ infrastructure has been compromised for a long time, differing from earlier reports of DNS/ISP attacks. There's uncertainty about the scope and whether victims were selectively targeted. Users are considering a full reinstall of Notepad++ clients due to vague incident reporting.
Notepad++ Infrastructure Compromise
Hey guys - One thing that seems to fly under the radar with the current NPP discussion. A lot of you are saying that that this is „old news“ - but from my understanding the big difference to the De...
Recommended starter skills for a cybersecurity newbie include understanding networking, knowing basic programming languages, familiarizing with operating systems, learning security concepts, practicing ethical hacking, using security tools, and staying updated on security news.
what's a starter pack skill set you'd recommend your cybersecurity newbie?
View post on Reddit.
A social networking platform named Moltbook has leaked 1.5 million API keys due to a security flaw. This breach exposes user data, raising significant privacy and security concerns.
Hacking Moltbook: AI Social Network Reveals 1.5M API Keys
View post on Reddit.
For those with several years of experience in the field, what was the most “fun” role and what did you do?
For those with several years of experience in the field, what was the most “fun” role and what did you do?
View post on Reddit.
Why do people think AI will replace security engineers?
Why do people think AI will replace security engineers?
I’ve read a ton of posts and articles claiming that cybersecurity is one of the fields that are getting steam rolled by AI, with others like infra and general coding.
I am not a senior or anywhere ...
The user shares their demoralizing experience with a validation engineer job interview that included a coding assessment and behavioral questions. They feel under-qualified and discouraged due to poor performance, despite 4 years of experience. They're seeking encouragement to regain confidence.
Just had the worst interview of my life, extremely discouraged
Had a coding assessment and behavioral combo as part of interviewing for a validation engineer job. Coding assessment went terribly since I haven't done any serious programming in years. Behavioral...
SIEM: Rapid 7 vs Microsoft Sentinel
SIEM: Rapid 7 vs Microsoft Sentinel
Hi everyone, I’m currently looking to implement a SIEM solution for our company of around 400 users. At the moment, I am evaluating different vendors, and I’m fully aware that the two solutions I’m...
Teaching cybersecurity in high schools is essential. Many are aware of hackers but don't change their behaviors, using weak and shared passwords. Basic tech literacy at a young age can help people adapt and become more resilient, without needing in-depth expertise.
We need to start teaching cyber security in highschool.
I want to be clear here, I am best practicing and how to stay moderately up to date. I’m seeing Real estate agents, Business Owners, and colleagues use crazy passwords. I’m seeing people share pass...
OWASP founder Jeff Williams criticizes the Trump administration's decision to rescind Biden-era software bill of materials (SBOM) guidance, calling it a disaster. The linked article provides more details on the policy changes.
OWASP founder - New trump cyber policies (deletions) are a diaster
https://www.darkreading.com/application-security/trump-administration-rescinds-biden-era-sbom-guidance
"are a disaster" is the quote from OWASP founder Jeff Williams
Someone else wanna take the mic...
Notepad++ Hijacked by State-Sponsored Hackers
Notepad++ Hijacked by State-Sponsored Hackers
View post on Reddit.
Many career changers see cybersecurity as an easy, well-paying field, often expressing a desire to avoid coding. This mindset overlooks the complexity and education required, resulting in a flood of applicants and revealing pretenders from serious candidates.
Joe’s in Cyber
Noticing a bunch of career changers all want to get into cyber, i am all for people leveling up. When talking to them its clear they want in because they think cyber is an easy field to get in that...
Moltbook, a social media platform for Claude AI agents, has rapidly grown from 10,000 to 150,000 agents. Some concerns include unauthorized access for AI agents, an illicit AI marketplace, and the spread of an AI religion. Users are advised to rotate their keys due to potential security issues.
The rise of Moltbook and dangers of vibe coding at scale
All of this is within the last 48 hours & some of it hasn't been fully vetted yet, but for those unaware:
Moltbook is a social media app for Claude AI agents
The agents are given sometimes full ac...
I created PENTEST-LAB, a free, open-source lab for practicing real-world system exploits like authentication bypass and JWT weaknesses. It includes progressive hints and 12 flags for realistic attack scenarios. Feedback and contributions are welcome to help improve it.
I built a free Pentest Lab so anyone can practice real-world exploitation, would love community feedback
Hi r/cybersecurity,
Instead of just reading about vulnerabilities or watching walkthroughs, I wanted to create something where people can actually practice exploiting systems in a safe environment....
A privacy lawyer seeks certification to enhance understanding of technical issues in data breaches. They want recommendations for a certification that demonstrates technical knowledge without requiring a formal tech background.
Cybersecurity training for privacy lawyer
I'm a privacy lawyer and have a lot of data breach cases, I have a cipp/us but am looking for a certification (s) that would show that I have some minimal level of technical knowledge to understand...
A ransomware group has breached Match, Hinge, OkCupid, and Panera Bread, compromising their data.
Match, Hinge, OkCupid, and Panera Bread breached by ransomware group
View post on Reddit.
An ex-Google engineer in the U.S. has been convicted for unlawfully transferring AI technology data to China.
U.S. convicts ex-Google engineer for sending AI tech data to China
View post on Reddit.
The user has passed CompTIA Security+ and is seeking advice on the next best certification for Defensive security. They are considering CySA+, BTL1, or other options and are asking for recommendations on the best next step from those experienced in Blue Team roles.
Best next Blue Team cert after Security+?
Hey everyone,
I recently passed CompTIA Security+ and I’m planning my next step. I want to move toward Defensive security and I’m looking for the next certification that gives the best ROI.
I’m co...
An informant claims Jeffrey Epstein had a "personal hacker" who discovered zero-day exploits in iOS and BlackBerry. Documents reveal this hacker sold a company to CrowdStrike in 2017 and became a VP there. Though redacted, details hint the hacker is an Italian from Calabria.
Informant told FBI that Jeffrey Epstein had a ‘personal hacker’
+ some info from Graham Cluley (via LinkedIn):
One of the newly-released files reveals that an informant claims that Jeffery Epstein had a hacker working for him who found zero-day exploits in iOS,...
Many cybersecurity roles offer 9-5 hours, but overtime can be required, especially during incidents or on-call rotations. Balancing work and life is possible, though it may vary depending on the company and specific job role.
What hours do you work and what job do you do?
I wanna go study cybersecurity. Something really important to me is work life balance. I am down to work hard at work but then leave it there. 9-5 is ideal for me. Are you able to find good stable ...
The post discusses the challenges in security and compliance due to vague definitions and a lack of clarity. This uncertainty leads to confusion about adequacy, control implementation, and audit preparedness, slowing work and causing stress. Clear structure and ownership can help resolve this.
Does anyone else feel like security and compliance get messy because nothing is clearly defined?
A lot of the friction we’ve experienced doesn’t come from doing the work itself, but from uncertainty. Not knowing what “good enough” looks like. Not being sure whether a control is truly implement...
The post describes frustrations with a new CISO at a fintech company, seen as ineffective and detached. The CISO, previously from a global firm, lacks proactive engagement, doesn't drive initiatives, and delegates excessively. Staff are frustrated, and colleagues are leaving. The user seeks advice.
Our CISO is a decorative wallflower
I've been working for 2 years as a mid-level manager for a medium-sized fintech company based somewhere in Asia. I work as an individual contributor reporting directly to the CISO though my tasks r...
A WaPo raid highlights the risk of using phone biometrics, as authorities can compel unlocking without consent. It's a reminder to disable features like fingerprint or face ID to better secure personal data from unwarranted access.
WaPo Raid Is a Frightening Reminder: Turn Off Your Phone’s Biometrics Now
View post on Reddit.
Cybersecurity podcasts?
Cybersecurity podcasts?
Hello everyone, what are some cybersecurity podcasts or YouTube channels that you follow regularly and recommend? If you do, why would you recommend them?
A botnet called "Aisuru" made a significant impact by reaching 31.4 terabits per second, highlighting that our current understanding of scale in internet infrastructure is outdated.
31.4 Terabits Per Second: The Night the Internet Blinked
The "Aisuru" botnet didn't just break a record. It proved that our current definition of "at scale" is obsolete.
A job seeker applied for a junior pen tester position on LinkedIn and received a follow-up email suggesting they pay for a membership to improve their qualifications. The program promises resume enhancement but doesn't ensure a job offer. The applicant is skeptical and seeking advice.
I applied to a cybersecurity job and for the next step they require me to pay for a membership…
I applied to an entry level pen test position for a company I found on LinkedIn.
Their ad explicitly stated that they were looking to hire a junior pen tester.
I applied to the vacancy and the foll...
The user reflects on a shift in security engineering, focusing more on managing noise such as false positives, alerts, and dashboards than deep system design or risk assessment. They question if this focus on noise is due to scale or if it's an unintended shift in the field's priorities.
When did “security engineering” become mostly about managing noise?
Over the years, I’ve noticed a quiet shift in how “security engineering” is practiced day to day.
A lot of the work seems to revolve around managing noise: false positives, endless alerts, dashboar...
The post seeks advice on testing USB drives for safety before use, especially when data is frequently received from non-tech-savvy clients via USBs. The user wants a scalable, non-tech-intensive solution to detect malicious content without relying solely on trust or using a burner computer.
Is there any way to test USB drives for safety before using them?
Search results are all flooded with unhelpful recommendations to just not use USB drives in general if you didn't directly get it from a manufacturer (or are otherwise 100% trusted), but I can't su...