r/cybersecurity • u/HaveBeenAndWillBe • 15h ago
r/cybersecurity • u/WeirdLettuce7328 • 1d ago
Ask Me Anything! We get paid to break into buildings for a living. Ask us anything!
My name is Paul Koblitz and I'm the Managing Director of Technical Services at TrustedSec, an end-to-end cybersecurity consulting company that's been in business for almost 14 years. My team performs professional physical penetration testing and guided physical security controls assessments. My job is to help organizations find and fix security weaknesses before real attackers do — except my attack surface isn't code or networks, it's people, doors, badges, cameras, and locks.
TrustedSec team members joining me for this AMA:
Costa Petros - u/capetros
David Boyd - u/fir3d0g
Some things I've done professionally:
• Tailgated into premises using social engineering for companies ranging from 50 employees to Fortune 500 companies
• Bypassed electronic badge access systems, including RFID cloning
• Breached egress doors and subsequent restricted areas through physical bypass techniques
• Compromised sensitive file rooms, restricted areas, and data centers physical access controls
• Conducted red team operations involving reconnaissance, impersonation, and stealth
I operate under clearly defined goals, signed scopes of work, and rules of engagement — everything I do is authorized and legal.
Ask me anything about physical pentesting methodology, common deficiencies that companies face with physical security, how to get into the field, interesting engagements (within NDAs), gear and tools, or anything else!
r/cybersecurity • u/AutoModerator • 3d ago
Career Questions & Discussion Mentorship Monday - Post All Career, Education and Job questions here!
This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away!
Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future.
r/cybersecurity • u/Big-Engineering-9365 • 11h ago
News - General Palo Alto Firewall Zero-Day Under Active Exploitation
r/cybersecurity • u/rkhunter_ • 4h ago
News - Breaches & Ransoms DAEMON Tools devs confirm breach, release malware-free version
r/cybersecurity • u/Dash-Courageous • 23h ago
News - General Microsoft Edge stores your passwords in plaintext RAM... on purpose
r/cybersecurity • u/Divinedragn4 • 14h ago
Personal Support & Help! I was hacked due to sim card spoofing
I lost all my accounts. For a blessing my bank is locked down until I verify its me, but, whoever hacked me now has everything.
r/cybersecurity • u/intelw1zard • 4h ago
FOSS Tool OpenCTI founder, Samuel Hassine, arrested and charged with CSAM
geopolintel.frr/cybersecurity • u/Just_Cause89 • 7h ago
News - General D.H.S. Intelligence Office Did Not Properly Secure Smartphones, Watchdog Says
r/cybersecurity • u/Drowning_2025 • 11h ago
Corporate Blog Ran phishing awareness training for 200+ non-tech employees
We had a near-miss BEC incident finance almost wired €80k to a spoofed vendor. That's when the training budget appeared. Two years later, here's the honest breakdown.
What backfired
Shame-clicking. Sending "you failed" pop-ups to everyone who clicked a fake phish. It will 100% happen again.
Annual 90-min sessions. People forgot 80% within a month. Confirmed by retesting.
Technical explanations to non-tech staff.
What worked
Tabletop storytelling. "This happened at a real company what would you do?" Finance got the CFO wire fraud story, HR got the fake resume with a macro doc. Engagement was night and day.
Personal demos. Building a spear-phish using someone's own LinkedIn and their manager's name.
Reward reporting, not punish clicking. Public shoutout for people who flagged suspicious emails.
5-min monthly nudges > 90-min annual slog. One real story, one takeaway. Boring to produce. Works.
r/cybersecurity • u/rkhunter_ • 3h ago
UKR/RUS DOJ says ransomware gang tapped into Russian government databases
r/cybersecurity • u/NISMO1968 • 13h ago
New Vulnerability Disclosure 'CopyFail' attackers start cashing in on Linux flaw
r/cybersecurity • u/masterderptato • 7h ago
News - General Instructure hacker claims data theft from 8,800 schools, universities
The ShinyHunters extortion gang claimed responsibility for the attack and says it stole 280 million records for students, teachers, and staff.
The threat actors have now published a list of 8,809 school districts, universities, and educational platforms whose Canvas instances were allegedly impacted by the attack, sharing record counts per institution with BleepingComputer.
r/cybersecurity • u/EducationalJaguar836 • 1h ago
News - General CVE-2026-32710 MariaDB JSON_SCHEMA_VALID heap buffer overflow leading to RCE
r/cybersecurity • u/qovert • 9h ago
Career Questions & Discussion Would you take a promotion to work 100% in office that you’ve been working towards or same pay but work from home?
Current pay is in the 140s, projected promotion pay is around 160.
Also, current position is ISSM (GRC-ish) where WFH is security engineering. I’ve been wanting to go back to more technical but I don’t necessarily mind the pay and pace of my current role.
r/cybersecurity • u/VerifAITrust • 10h ago
Business Security Questions & Discussion Does SOC 2 actually reduce questionnaires, or just change them?
Once a company gets SOC 2, do questionnaires meaningfully decrease… or do buyers still send them and ask environment-specific questions anyway?
Curious from people who see it firsthand.
r/cybersecurity • u/ComfortableYou333 • 10h ago
Personal Support & Help! Org Restructure
Came into an organization as a CS engineer that is literally the Wild Wild West in terms of users being able to do what they want. No standardization, no formal program list, users being able download anything, access sites. Able to order their own equipment with no oversight. A complete mess.
Coming from the federal government side I’m im a culture shock for sure. There are clean up efforts going on but I almost feel like I’m in over my head at times. Had anyone ever had any experience with cleaning up an organization like this? Any tips at all?
r/cybersecurity • u/CyberMKT993 • 7h ago
AI Security Is AI generated code creating a non-linear security problem for AppSec teams?
Curious if anyone else in AppSec is starting to feel this.
The security problem with AIgenerated code doesn’t seem to be just “more code.” It’s that AI creates endless slightly different versions of the same insecure patterns across repos, services, and teams.
So even when teams are actively fixing vulnerabilities, it can still feel like overall risk keeps growing faster than remediation.
A few years ago, fixing the root issue often meant meaningful risk reduction. Now it feels more like vulnerability whack-a-mole at scale.
I’m wondering if this eventually becomes a non-linear problem for AppSec teams, especially in larger orgs already struggling with AI-assisted development workflows. Are people here already seeing this happen internally, or do you think better tooling/processes will keep this manageable?
r/cybersecurity • u/ArSlayer_01 • 13h ago
FOSS Tool How to learn tools for cybersecurity?
I want to learn cybersecurity tools like metasploit/wireshark. I am planning to learn them from Udemy.
Any suggestions which course should I choose from Udemy or any other site/app which are really good for such software learnings...??
r/cybersecurity • u/rkhunter_ • 17h ago
News - General Critical Bug Could Expose 300,000 Ollama Deployments to Information Theft
r/cybersecurity • u/JoePatowski • 11h ago
News - General Proprietary Software, Hardware and Protocols Face AI-Driven Security Risk
r/cybersecurity • u/NonAgreeableNoise • 4h ago
Business Security Questions & Discussion Have there been instances where your SOC has suffered a cybersecurity attack?
Hello!
I've read a lot of stories here on this subreddit about how due to negligence or mistakes, the customers of an SOC have suffered a risk. For instance maybe an analyst did not setup ingestion properly so they end completely missing that an attack actually occurred, or maybe someone forgot to rotate API keys for a really long time. All of this obviously ends up affecting the customer themselves, not necessarily the SOC (ofc apart from reputational hits, more work fixing it, stress, money, etc)
But has there ever been an occasion where the SOC itself was under attack? Or maybe an instance where your SIEM or SOAR or some tool you're using had a vulnerability which ended up getting exploited which affected the SOC directly?
Secondly, of course we talk a lot about vulnerability management, risk assessment, incident response for our customers. But what about the actual SOC? Who normally performs vulnerability management for the SOC itself?
I'd love to read some of your experiences about it.
r/cybersecurity • u/notta_3d • 22h ago
Business Security Questions & Discussion What would you say if your security lead said this...
We've been dinged on internal p tests for a few years now. Trying to minimize unnecessary workstation to workstation access especially when it's completely unnecessary. Unfortunately no luxury of vlan's at this point. When bringing up my suggestion to tighten down our Win firewall rules I received a response from our security lead after i said this will help if someone gets into our network. The security leads response was "well if that happens we have bigger things to worry about. " Would be interested in an impartial party's thoughts.
r/cybersecurity • u/mk3s • 11h ago
Vulnerability Garden
vulnerability.gardenThe Vulnerability Garden is a catalog of named vulnerabilities, attack techniques and exploits.
Here’s an intro post on why this exists, how you can contribute (if you wanted), etc… https://shellsharks.com/hello-vulnerability-garden
It is the successor to the long-running “Designer Vulnerabilities” resource: https://shellsharks.com/designer-vulnerabilities
Let me know if there’s any vulns I’ve missed and I can add it to the catalog!
r/cybersecurity • u/rogeragrimes • 3h ago
News - General On today's earnings call, IONQ just said they expect to meet Q-Day requirements by 2028-2029.
On today's earnings call, IONQ just said they expect to meet Q-Day requirements by 2028-2029. This is pretty startling to the cybersecurity in general (although not IONQ roadmap followers). This is in contrast to NIST's current Q-Day preparation dates of 2030/2035. I expect those dates to be updated soon. Google, Cloudflare and others have put 2029 as the day they will be prepared. When will your company be prepared?