Cybersecurity

7739 readers
68 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
1
2
 
 

So recently I've gotten a bit more serious about my internet security, and made some changes. Here's a short list of what I've done, but I'm wondering if I'm missing anything important:

  • Moved from Brave to Firefox
  • Bought my own domain for my email (so I can switch email providers at any time)
  • Switched to Duck Duck Go from google (It's gotten worse anyways)
  • Bought the Proton package (VPN, Encrypted email, etc...)
  • Installed Thunderbird (instead of microsoft mail app)
  • Installed uBlock Origin
  • Installed Bitwarden for password managing (My passwords are also no longer all the same)

Is there anything that I have missed that should be a priority for internet security?

3
4
5
 
 

Cybersecurity firm ESET is urging Windows 10 users to upgrade to Windows 11 or Linux to avoid a "security fiasco" as the 10-year-old operating system nears the end of support in October 2025.

"It's five minutes to twelve to avoid a security fiasco for 2025," explains ESET security expert Thorsten Urbanski.

6
7
8
9
10
 
 

or why it is not a good idea to use your birthday as your pin

11
12
13
14
 
 

For the first time in the history of Microsoft, a cyberattack has left hundreds of executive accounts compromised and caused a major user data leak as Microsoft Azure was attacked.

According to Proofpoint, the hackers use the malicious techniques that were discovered in November 2023. It includes credential theft through phishing methods and cloud account takeover (CTO) which helped the hackers gain access to both Microsoft365 applications as well as OfficeHome.

15
16
 
 

Static credentials with passwords written into a firewall's code. What could go wrong?

17
 
 

The safest option is obvious, don't try to access its contents, but if you absolutely had to, what steps would you take to minimize/contain any potential harm to your device/network?

18
19
20
21
 
 

If emphasis wasn't already concentrated on the security of these connected vehicles, major oversight obviously...

22
 
 

Interesting view on this situation.

23
 
 

Cybersecurity and Infrastructure Security Agency urges affected users to update ASAP.

24
25
 
 

cross-posted from: https://scribe.disroot.org/post/2653687

Archived version

Hackathons are common, but Chinese hacking competitions are different.

...

In 2017, Zhou Hongyi, the founder of Chinese cybersecurity giant Qihoo 360, publicly criticised the practice of sharing vulnerability discoveries internationally, arguing that such strategic assets should stay within China. His sentiments, supported by the Chinese government, gave birth to the national hacking competition called the Tianfu Cup. The contest is focused on discovering vulnerabilities in global tech products like Apple iOS, Google’s Android, and Microsoft systems.

How is Tianfu Cup different?

A 2018 rule mandates participants of the Tianfu Cup to hand over their findings to the government, instead of the tech companies.

Dakota Cary, a China-focused consultant at the US cybersecurity company SentinelOne, said, “In practice, this meant vulnerabilities were passed to the state for use in operations.”

This approach effectively turned hacking competitions into a government pipeline for acquiring zero-day vulnerabilities — software flaws unknown to vendors and extremely valuable for cyber-espionage.

...

In recent years, China’s hacking competitions have increasingly shifted focus toward breaching domestic products, including Chinese-made electric vehicles, phones, and security software.

...

view more: next ›