Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "cybersecurity"
-
D: “Did the attackers exfiltrate any data?”
M: “I can’t say for sure, but most likely based on—”
D: “—but did you find any undeniable evidence of it?”
M: “Keep in mind that the absence of evidence isn’t necessarily evidence of absence. There was very limited logging to begin with and the attacker erased artifacts and logs.”
D: “If there’s no evidence, then there was no exfiltration.”
M: “If a business doesn’t have cameras on its front door and then gets robbed, it can’t claim there was no robbery just because they didn’t video-record it.”
D: “That’s a poor analogy. Nothing’s missing here. I couldn’t care less if a robber made a *copy* of my money. That isn’t robbery.”
M: “... If the Titanic really hit an iceberg, then how come no pieces of an iceberg were ever found in the wreckage?”19 -
Here's a list of unpopular stuff which I agree with:
1) I love Java more than any other programming language.
2) I love sleeping more than working.
3) I'm not a night owl. I thrive the most during daylight.
4) I don't like or need coffee. Tea is fine.
5) Webdev is a huge clusterfuck which I secretly wish that could just die already.
6) Cybersecurity is a meme and actually not that interesting. Same passes for Cloud, Machine Learning and Big Data.
7) Although I'm a huge fan of it Linux is too unstable and non-idiot proof to ever become mainstream on the desktop.
8) Windows is actually a pretty solid OS.
9) The real reason I don't use macos is because I'm a poorfag that can't afford an overpriced laptop.
10) I don't like math and I hate that people push math shit into random interview questions for dev jobs which have nothing to do with math.
Post yours.277 -
You think a junior dev pushing his code onto a production server is bad? Wait till you have that admin who is illegally mining Bitcoin on your production server. 😂
I went for a Cyber Security conference today with one of managers and this was one of the life experiences some of the speakers shared.18 -
Especially painful being a cybersecurity engineer;
Did something wrong with an if-statement.
Caused authentication to break completely; anyone could login as any user.
Was fixed veeeeeeery quickly 😅 (yes, was already live)9 -
Cybersecurity:
>nothing happens
>I can't believe we pay your useless ass to sit around doing nothing all day!
>something happens
>this is your fault1 -
I'M STARTING GRAD SCHOOL!!!!! I'm so excited I can't think properly. I started screaming in Latin and German mixed with English because I couldn't remember enough words in any one language to express myself, and I'm still certain I was incoherent.
Doing cybersecurity and forensics because I hate having a social life 😎17 -
Russia removes windows from all government computers to "show that they're serious about cybersecurity"....3
-
Friend,
I signed a petition on Action Network urging Congress to reject the dangerous EARN IT Act and protect our online free speech.
The Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2019 — also known as the EARN IT Act — gives Attorney General Willliam Barr the power to demand that tech companies kill important encryption programs. That puts us all at risk of government censorship, cybersecurity breaches, and human rights abuses.
Don’t let Congress chip away at your essential freedoms online. Sign our petition now to tell your lawmakers to reject the dangerous EARN IT Act: https://actionnetwork.org/petitions...
Thanks!5 -
---WiFi Vision: X-Ray Vision using ambient WiFi signals now possible---
“X-Ray Vision” using WiFi signals isn’t new, though previous methods required knowledge of specific WiFi transmitter placements and connection to the network in question. These limitations made WiFi vision an unlikely security breach, until now.
Cybersecurity researchers at the University of California and University of Chicago have succeeded in detecting the presence and movement of human targets using only ambient WiFi signals and a smartphone.
The researchers designed and implemented a 2-step attack: the 1st step uses statistical data mining from standard off-the-shelf smartphone WiFi detection to “sniff” out WiFi transmitter placements. The 2nd step involves placement of a WiFi sniffer to continuously monitor WiFi transmissions.
Three proposed defenses to the WiFi vision attack are Geofencing, WiFi rate limiting, and signal obfuscation.
Geofencing, or reducing the spatial range of WiFi devices, is a great defense against the attack. For its advantages, however, geofencing is impractical and unlikely to be adopted by most, as the simplest geofencing tactic would also heavily degrade WiFi connectivity.
WiFi rate limiting is effective against the 2nd step attack, but not against the 1st step attack. This is a simple defense to implement, but because of the ubiquity of IoT devices, it is unlikely to be widely adopted as it would reduce the usability of such devices.
Signal obfuscation adds noise to WiFi signals, effectively neutralizing the attack. This is the most user-friendly of all proposed defenses, with minimal impact to user WiFi devices. The biggest drawback to this tactic is the increased bandwidth of WiFi consumption, though compared to the downsides of the other mentioned defenses, signal obfuscation remains the most likely to be widely adopted and optimized for this kind of attack.
For more info, please see journal article linked below.
https://arxiv.org/pdf/...9 -
I'm soon graduating from a tech/IT school which recently specialized in cybersecurity.
Today when I changed my password on their website, it displayed the old one in clear text.
God damn it people, THIS is the reason why our school's reputation has been slowly but steadily going down.1 -
!dev - cybersecurity related.
This is a semi hypothetical situation. I walked into this ad today and I know I'd have a conversation like this about this ad but I didn't this time, I had convo's like this, though.
*le me walking through the city centre with a friend*
*advertisement about a hearing aid which can be updated through remote connection (satellite according to the ad) pops up on screen*
Friend: Ohh that looks usefu.....
Me: Oh damn, what protocol would that use?
Does it use an encrypted connection?
How'd the receiving end parse the incoming data?
What kinda authentication might the receiving end use?
Friend: wha..........
Me: What system would the hearing aid have?
Would it be easy to gain RCE (Remote Code Execution) to that system through the satellite connection and is this managed centrally?
Could you do mitm's maybe?
What data encoding would the transmissions/applications use?
Friend: nevermind.... ._________.
Cybersecurity mindset much...!11 -
None, for me, but that's why I work as a cybersecurity engineer and not a dev!
But, I do tons of side projects and the reason why I love it: it makes me feel like I'm in God mode. (and helps me solve quite some problems)
Quite ironic, for an atheist ;)4 -
My family supported me all the way. Not per definition by buying me stuff but they always 'pushed' me to do what I love doing and I am now doing that!
But, I'm a huge privacy/cybersecurity freak and my family mostly migrated to Signal and stuff like that so that's awesome :)1 -
!rant 📚 📑
Cybersecurity books @Humble Bundle
https://humblebundle.com/books/...
There is a really great Humble Book Bundle at the moment, starting at 1$. The bundle contains several cyber security books ("Practical Reverse Engineering" and "Security Engineering" have a good reputation).8 -
Im back to anyone that may cared a little, so I was offline for 6 days since my ISP Ultra Hilarious to crash my state records of their paying customers and some other stuff that It took 5ever to get back, anything you guys want to share with me that may happen lately here on DevRant? I personally my classic Amazon bashing news and Perhaps giving away some Steam Keys that one Reviewer user of my site give us out to promote the site along side the devs.
For the Amazon News there is:
Amazon in talks to buy cybersecurity startup Sqrrl and also group of New Jersey Amazon Warehouse workers stood in the cold outside an Amazon Books store in Manhattan on Wednesday to remind shoppers that their online purchases are made possible by warehouse employees who often are underpaid and denied normal workplace benefits. More info at: https://legionfront.me/pages/news
No about Free Steam gamuz:
Gravity Island Key: AACA7-CYFVW-N775L
For more free keys drop by:
https://legionfront.me/pages/gaming
https://legionfront.me/ccgr6 -
Working with JavaScript is like trying to have protective sex with condoms with millions of holes.
- a cybersecurity perspective5 -
Someone is trying to launch a brute force attack on one of my servers that I set up for an old project. According to the logs, they've tried Jorgee, they've tried directly accessing the MySQL database (with the laziest passwords), and they're now on day 4 of their brute force attack against my SSH server. I'm fairly certain that they won't be getting in (not that there's anything worth getting in the first place), but what's the standard protocol for this? Do I just wait this out, or is there something I can do to break their bot? I have fail2ban enabled, and it is doing its job, but the attacker is changing their IP address with every attack.11
-
C: “Look, I agree that these are likely leading practices, but we really don’t need all that.”
M: “These aren’t even leading practices, these are the bare minimum practices to help ensure secure login sessions and that account passwords aren’t trivially compromised.”
C: “How do I put this...? You’re trying to secure us against the hacker. That’s a noble goal. But my only concern is the auditor.”
M: “...”2 -
How to get investors wet:
“My latest project utilizes the microservices architecture and is a mobile first, artificially intelligent blockchain making use of quantum computing, serverless architecture and uses coding and algorithms with big data. also devOps, continuous integration, IoT, Cybersecurity and Virtual Reality”
Doesn’t even need to make sense11 -
Got released from the miltary after 3 years of CyberSecurity/Sysadmin role.
2 weeks layer I got a job as security sysadmin in a large telco company.
Still wish to be dev instead though -
Many people / engineers around me talk about trendy stuff like Cybersecurity or AI and show off what great encryption and neuronal networks they 'have built' ( I would rather say 'using').
I kinda get the feeling of 'Everbody talks about it - no one really knows what's goin' on inside (especially those guys who hate math and even algorithms).'
Am I just stupid or does somebody else here feel the same way? I mean people have been doing serious research about this stuff for years. And currently many kids are coming up with it as if it is easy stuff like the bubble sort.6 -
THE CODE USED IN MY MANDATORY ONLINE TRAINING ABOUT CYBER SECURITY AND STUFF LIKE THIS:
<script>window.showQuestion(someOverlyVerboseResponseFromTheServerWithTheCorrectAnswersMarked);
</script>
Oh boi it would be a real shame if someone proxied your precious function :)2 -
According to the report of Reuters: The United States Navy banned the social media app TikTok from government-issued mobile devices, saying the popular video app represented a "cybersecurity threat." A bulletin issued by the Navy on a Facebook page saying users of government issued mobile devices who had TikTok and did not remove the app would be blocked from the Navy Marine Corps Intranet.
The Navy would not describe in detail what dangers the app presents, but Pentagon spokesman Lieutenant Colonel Uriah Orland said in a statement the order was part of an effort to "address existing and emerging threats...." The U.S. government has opened a national security review of the app's owner ByteDance.10 -
I think I figured where to draw the line when trying to learn cybersecurity.
Learning ActiveDirectory.
No fucking thanks, I’d rather eat a big steaming pile of dog shit.12 -
Did successful XSS in a website.
Later on, found out that the web was built on laravel.
Still trying to figure out the level of negligence required to make a xss vulnerable laravel website10 -
YEARS of practice. I had my ups and downs. I learned myself, left it myself early on, came back to it half a year later, continued since. Figured out that web development is not the hell I wanted and quickly fell in love with iOS development in Swift. Been riding on the wind ever since, learning something new every single day.
Today I made something that some time ago took me about 3 weeks in less than an hour. If that’s not an improvement, I don’t know what that is.
Practice makes perfect, don’t forget that. Although it sounds ridiculously cheesy and shit, this is how it goes.
I’m getting drafted tomorrow. Well, this is not exactly a full on draft and joining the IDF (Israeli Defense Force) right NAO, it’s what we call a rough draft: I am having a psychotechnical examination so the military can understand how much I need to go to a cybersecurity unit instead of going to Gaza LMAO.2 -
!rant
So today I had an initial interview for a tier 1 analyst position (it's a student position). The interview went really good, and I pretty much landed it and my next one is going to be next week. It sounded pretty awesome, but a part of me thinks it's going to be a tech support position more than anything else. Nevertheless, I hope I'll get the job, it seems like a nice gateway to more awesomererer jobs.
So here's my question: can any of you guys tell me more about this type of job? How mundane or interesting is it? I'm probably not going to decline the position, I just want to be ready for what's coming.9 -
Well, there's that. LINK = CCleaner infected, 2.3 million infected. https://google.com/amp/s/... today gets better and better.4
-
Reposting this rant for more visibility. I do not like to repost, but this is really important, people's privacy is threatened.
https://devrant.com/rants/2436082/...9 -
A fellow uni student shared this deal with everyone in our security course. The first place I thought of re-sharing it was here.
https://humblebundle.com/books/...
Hopefully my fellow devranters will find this a good deal.5 -
They call it security questions.
I call it social engineering backdoor.
I'm supposed to enter those questions after logging into my account and I'm not able to skip it nor to set a proper two factor method.
Well, fuck you. Did you ever thought about dying by a two factor method? Ever watched a Saw movie? You got the idea. -
Who needs Mr. Robot or all that hacker shows, if reality is just as crazy:
https://krebsonsecurity.com/2017/...6 -
Freshly failed gloriously my degree in interaction design. Now I stumbled into a new job, doing a fullscale company advertisment campaign on cybersecurity for 6500 employees. Alone. Writing concept, gathering stakeholder, requirements and shit. I'm scared.4
-
Sad how the easy to make softwares are already flooding the market and making millions so now we actually need to work a lot and innovate on something if we wanna a few bucks.
Also sad how in the 80s you could rob banks with just sql injection and now its almost impossible unless you’ve been devoting you being to cybersecurity for years.
Basically I feel it would have been cooler to be a computer scientist 30 years ago :/1 -
So recently i got a message from aa person asking how to (these are exact words) ,
:break into insta's database using Sqlmap"
I then proceeded to tell them to "f*ck of ya c*nt ".
Afterwords it inspired me to write this rant
annoying classmates:" hahaha GuYS bEtER wAtcH OuT he's GonnaA hack Us"
me: " yea I can program I also do some ethical hacking and cybersecurity "
annoying classmates: "hahaH Bro your a Hacker OhHHhHHOOO BrO CaN yoU hACk inSta FoR mE I NEEd MoRe FolloWeRs "
me:" tf no one that's illegal and two it's waste of my time "
annoying classmates: "BrOooo CaN yoU gEt Me SoMe HacKs fOr CsGo"
me: "can you just please f*ck off , i'm not hacking for you everything you've asked me is extremely unethical and a huge waste of time, Also if you suck so bad at a game you need to cheat I recommend just stopping "
annoying classmates: "DUdE whAt ToolS dO i HVAE to DownLOad To Be A haCkEr"
me: *trying hard not to murder them* " I told you to f*ck off"
being a hackers isn't downloading tools it isn't typing at 90wpm into a terminal with green font its not about games or fame or anything its about coming up with creative solutions to problems , thinking outside the box its about individuality and breaking from the heard , looking at things from a different viewpoint,
it's about endlessly seeking knowledge.
It's about freedom though creation that's what being a hacker originally was. But because of big media and movie company's (and script kiddies) people now confuse hacker with cracker and think of us as jobless fat kids sitting in a dark room in there parents house breaking into bank accounts and buying drugs on the dark web (which people see to think there a hacker just because they can open tor browser. they then proceed to use google to look up "fresh onion links 2020") .
My classmates and really my generation has a huge case of smooth brain. They a think we can just look at someone and hack them they also seem to think using a gratify link to get a persons up is hacking and using the inspect element is hacking and that opening a terminal is hacking ! AHHHHHHHHHHHHHHHHHHHHH"
Anyways ima end this here thanks for reading :)6 -
Any professional pentesters or someone working in cybersecurity as a profession? I need some advice. The company I intern with right now wants me to test their web applications for security (they really don't care so much about security). I just wanted to know is there a standard set of procedures or a checklist that is usually followed? I know automated testing is not all that effective against web applications but what are the steps you usually take?
As of now, I have run tests and am now performing a code review but it's in PHP and I'm not really good with it. I'd like to know what more is done as a standard please.2 -
How did your quest into the dev world look like? That's mine:
First time: Age 12, was in a C++ evening class for like 2 weeks, I undetstood nothing.
Second time: Age 16-18
Fiddled with scripts for steam games and jailbroken my iPhone while fiddling with aystem configs. Nothing major.
Third time: Age 19, learned Python in a Cybersecurity course. Failed miserably because the tutors were shit, thought I hated programming.
Fourth time: Age 21, developed a lot of scripts in my sysadmin job, one of them needed a GUI so I leanred C# and WPF. Enjoyed it so much I eventually enrolled in a Java 10 month course.
Fifth time: Now, age 22, learning Android and Fullstack javascript by myself. Enjoying every moment.
I still work as a sysadmin though.3 -
Fucking job recruiters or whoever the fuck.
If the first line on my resume is under "Objective" and it states, "To obtain a job, internship, or Co-op in the field of Networking, Cybersecurity, or Administration." You can clearly see the world sales and customer service are not in there.
If you take 5 seconds to read that or search for the words customer service or sales YOU WON'T FUCKING FIND ANYTHING.
SO WHY THE FLYING FUCK DO YOU CUMBUCKET FILLED PIECES OF SHIT KEEP OFFERING SALES AND CUSTOMER JOBS TO ME.
I even got a senior sales position before. :|
Yet I can't even get a call back from an internship that's related to what I want to do lol. Smh.1 -
My office WiFi is freaking fast upto 25mbps, should I download Torrents using it. Is there a possibility that corporate networks are under more surveillance ?7
-
I feel i need to be specialized in something coz everyone can code now... like u have machine learning engineers and devops/cybersecurity but im not really into either. What other sub fields are there?4
-
Cybersecurity firm Sophos announced that it has open-sourced the Sandboxie Windows sandbox-based isolation utility. According to the reports of Bleeping Computer: Sandboxie was developed by Ronen Tzur and released on June 26, 2004, as a simple utility to help run Internet Explorer within a secure and isolated sandbox environment. Later, Tzur upgraded Sandboxie to also support sandboxing any other Windows applications that required a secure virtual sandbox.
Sophos Director of Product Marketing Seth Geftic said "We are thrilled to give the code to the community. The Sandboxie tool has been built on many years highly-skilled developer work and is an example of how to integrate with Windows at a very low level. The Sandboxie user base represents some of the most passionate, forward-thinking, and knowledgeable members of the security community, and we hope this announcement will spawn a fresh wave of ideas and use cases."
You can download Sandboxie and its source code here.
https://www.sandboxie.com/1 -
whenever i get into something with default credentials, i leave a note or change a name to say something like 'IMPROVE YOUR SECURITY'
today i did it on a printer in the library, one day i'm gonna be in cybersecurity :d1 -
Given how much talk there's around security, I think it'd be grand idea to dedicate a weekly rant to cybersecurity. Could spark an interesting discussion, especially in today's heated climate. Thoughts?
E.g. Best way to increase security/privacy?9 -
When your cybersecurity departement gets back your hacked servers but then the whole network is DDoSed!4
-
I chose Network/Cyber Security because it was my internship experience and they were willing to pay me good money to stay on... No but seriously I am much better at understanding how complex systems work than coding them. This job, as stressful as it is, is a different kind of stressful that the deadline-fraught jobs of software developers worldwide.
And i can do it fully remote. -
How stupid am i?
1. I tried to learn programming language.
- It just so freaking hard for me to understand. Failed at logic.
2. Tried to learn aws.
- Technically know how it works but often forgot the services name. (Was thinking to get aws cert).
3. Tried to learn OpenSource DB.
- Can do up to db setup only. Else i didnt understand sh*t.
4. Tried to learn cybersecurity.
- Ended up bunch of unwanted process in my vm.
I was envy that some of my friend only read documentation once & he is like know what to do.
Guys, any pro tips for poor man here?
I want to code, but somehow i stuck.
I feel dumb...16 -
I want to switch careers from 3.5 years of IT and cybersecurity to development. I have no CS degree and am 22 years old.
Do you think companies treat someone like me differently compared to some college graduate with no tech experience? Or that the only experience that matters is dev experience?4 -
I am trying to start my career in the world of web development currently I am 16 and in 2 years I have to move out (moms orders) what would be the first move into getting a job as a web developer is it best to freelance or work full time for a company and what certification's would you recommend getting I am already very good with computers both windows and Linux (windows can kiss my ass tho ) and I know html css as well as some php and jquery I even know a little MySQL (I am also very talented at cybersecurity mainly infosec and OSINT )
(I know this question probably sounds stupid but I would like some advice from people in the area recently I told my dad I want to be a web developer my dad then told me I should get a real job )
Any advice would be great7 -
Hello devrant, I have a question:
What can you tell me about cybersecurity? is it worthwhile? I mean, could I get a nice job with it? Where should I begin to start learning about it?14 -
Okay so I'm back at ranting now cause I got a reason in my useless life to rant lmao. I started college recently, I'm majoring in Computer Science so the thing is that, my University provides specialization in cybersecurity and stuff to third year students and our Mr. HOD of applied sciences, who is basically an ass, in charge of conveying all the details to students, puts a complete mailing list of freshmen in the 'To' box rather than using BCC... smh. *Evil laughter*1
-
Have you ever wondered why the developer part of the tech world is so rich and full of community? Devrant is one example.
Coming from a background of IT and cybersecurity I've never felt this way before. Why the IT and security world isn't as rich?1 -
What RSS feeds are you guys subscribed to? My reader is so damn empty all the time. Preferrably CyberSec and Linux related (English or German).
I'm currently subscribed to Heise Security (German), Hacker News, NixCraft and Linux Journal2 -
I'm tempted to join a cybersecurity challenge and give it a shot. The only problem is that the dates for the admission tests are fully overlapping with my exam period at university, and I *need* to pass some exams this time.
Why does it always have to be so complicated? -
I'm starting to really regret not meeting more professors in school. I'm trying to found a ctf team at my university and can't get a single professor to agree to advise the club (it's required to use school resources) loads of interested students but I can't find a single staffer. All the computer science professors talk about how important cybersecurity is but they don't want anything to do with it.
I'm so desperate I'm about to reach out to... information systems professors from the college of business2 -
Which one comes first? vulnerability or threat? 🤔🤔 I would go with vulnerability how about you guys?5
-
Reading Geekonomics (silly title for the book) and seriously considering that maybe we should all be licensed/certified since so much software is broken, looking at you Equifax.1
-
Hey guys, I want to do a cyber security career. For me it's the most interesting field in CS. How can I get started? Is it worth to do some online courses where you get certifications (asking this because they are kind of pricey). I'm a QA Tester with 1 year of work experience, don't know if I should just apply to jobs or acquire skills/certificates first. Thanks for all the incoming answers. :D5
-
https://en.wikipedia.org/wiki/...
h t t p s : / / e n . w i k i p e d i a . o r g / w i k i / N e x t _ ( 2 0 2 0 _ T V _ s e r i e s )
-----------
Premise
The series centers on the efforts of a homeland cybersecurity team to counter "a rogue AI with the ability to constantly improve itself".
-----------4 -
Really really frustrated with constant changes to webapps from business teams lol .. made major code changes to a product 6 times the last 6 months 🙄
Any suggestions on how to transition into a security engineer job (I manage DevOps for the company as well, and I am currently studying cybersecurity engineering too) -
I'd like to one day work on security consulting/advising (incident response, opsec, SOC, etc). For those of you here that are currently in or have worked with people in that field: what advice do you have for handling cyber risk situations?2
-
Hey all, I'm currently getting a job offer for a risk advisory position (my stepping stone into cybersecurity), and I'm extremely excited.
It would be my first tech job, and in the tri-state area (NJ/NY/PA).
Do you have any advice on salary negotiation before I decide whether or not to accept the position? Trying to do my research on glassdoor, but I also want to hear from the pros on this board. -
I was thinking about my PhD as I will get my bachelor's degree this semester.
I was searching for top universities for cybersecurity PhD.
Sure I will have to get my master first
But what is your suggestion for PhD?
I am currently in love with Berlin university but not sure if it's a right choice.1 -
hey guys. I want to explore the field of cybersecurity as it is THE field of my interest. Help me?7