Thursday, May 19, 2022
Home Reddit


Top scoring links for the week for the most popular subreddits on information security

Anyone want to join a CTF team?

Hello, I started a group to do CTFs (CTFTime) and help each other "level up." Hacking is more fun with a group. We take anyone who has a willingness to learn. Preferably knows English enough to speak technically....

I keep receiving this weird similar emails from different senders, what to do about it?

So i have been receiving this type of emails on the main inbox, they do not go to spam for some reason, but the thing is they keep changing names and email address,...

Wizard Spider hacking group detailed analysis

submitted by /u/wtfse

The Hitchhiker’s Guide to Online Anonymity Just throwing this out there as I rarely see it referenced on privacy subs. It pretty much answers every question you might have, it is way more extensive than the popular privacy guides. This explains the how, the...

Stealing Google Drive OAuth tokens from Dropbox

submitted by /u/staz0t

Weird guy gave me an USB stick.

How can I safely see what's inside of it? Thank you guys submitted by /u/flakesareshiny

The Art of Mac Malware

submitted by /u/hedgehog0

Hacking Swagger-UI – from XSS to account takeovers

submitted by /u/albinowax

Are we a cult ? because I scared a girl by just telling I don’t use WhatsApp.

"What he has got to hide" - I heard her say. ​ Fuck normies believing the illuminati submitted by /u/RedditNoobie777

(Unpopular opinion?) How do you avoid burnout when learning?

A little backstory: Switching careers from oil/gas to infosec. 34 yo, no degree. Most likely I’m doing it wrong. But I started with TryHackMe. Did presecurity, started Complete Beginner path and switched to hackthebox since job listings keep...

School wants to use fingerprints for lunch.

So our school announced that they will be using fingerprints for lunches to speed up identification times, I think it's for a different purpose. What do you think? submitted by /u/GingerMcFerren ...

What’s the point of doing a bug bounty if the bounty is ineligible for pay?

I was doing some work on a bounty that is hosted on HackerOne. I managed to find a broken access control vulnerability while I was looking for IDORS. I spent like 8 hours doing the leg work on this...

Television without microphone

So I want to buy a television and I found a problem with the current market. All the televisions have voice control. So I assume that all the televisions do have a microphone in them? Might sound a bit...

Suuuuure… a domain that is 1 day old. Must be legit.

submitted by /u/DeathRowLemon

Phishers Add Chatbot to the Phishing Lure

Researchers have discovered a new approach being taken by phishers to increase victim engagement and confidence: the addition of an interactive chatbot. We have all become accustomed to the chatbots used by many of the largest service providers –...

QuSecure Lauches Quantum-Resilient Encryption Platform

New firm launches to provide the Easy Button for implementing quantum secure encryption The pressure to implement quantum secure encryption is increasing. This isn’t because functioning quantum computers able to crack asymmetric encryption are expected tomorrow, but because of the...
The Register

Iran, China-linked gangs join Putin’s disinformation war online

They're using the invasion 'to take aim at the usual adversaries,' Mandiant told The Reg Pro-Beijing and Iran miscreants are using the war in Ukraine to spread disinformation that supports these countries' political interests — namely, advancing anti-Western narratives...

Cyberattacks and misinformation activity against Ukraine continues say security researchers

Malware and fake news continues, says Mandiant.

6 Scary Tactics Used in Mobile App Attacks

Mobile attacks have been going on for many years, but the threat is rapidly evolving as more sophisticated malware families with novel features enter the scene.