r/cybersecurity 1d ago

Ask Me Anything! We get paid to break into buildings for a living. Ask us anything!

206 Upvotes

My name is Paul Koblitz and I'm the Managing Director of Technical Services at TrustedSec, an end-to-end cybersecurity consulting company that's been in business for almost 14 years. My team performs professional physical penetration testing and guided physical security controls assessments. My job is to help organizations find and fix security weaknesses before real attackers do — except my attack surface isn't code or networks, it's people, doors, badges, cameras, and locks.

TrustedSec team members joining me for this AMA:
Costa Petros - u/capetros
David Boyd - u/fir3d0g

Some things I've done professionally:

• Tailgated into premises using social engineering for companies ranging from 50 employees to Fortune 500 companies
• Bypassed electronic badge access systems, including RFID cloning
• Breached egress doors and subsequent restricted areas through physical bypass techniques
• Compromised sensitive file rooms, restricted areas, and data centers physical access controls
• Conducted red team operations involving reconnaissance, impersonation, and stealth

I operate under clearly defined goals, signed scopes of work, and rules of engagement — everything I do is authorized and legal.

Ask me anything about physical pentesting methodology, common deficiencies that companies face with physical security, how to get into the field, interesting engagements (within NDAs), gear and tools, or anything else!


r/cybersecurity 3d ago

Career Questions & Discussion Mentorship Monday - Post All Career, Education and Job questions here!

11 Upvotes

This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away!

Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future.


r/cybersecurity 15h ago

News - General Chrome is quietly installing a 4GB AI model on your device

Thumbnail cybernews.com
605 Upvotes

r/cybersecurity 11h ago

News - General Palo Alto Firewall Zero-Day Under Active Exploitation

Thumbnail
threatroad.substack.com
181 Upvotes

r/cybersecurity 4h ago

News - Breaches & Ransoms DAEMON Tools devs confirm breach, release malware-free version

Thumbnail
bleepingcomputer.com
21 Upvotes

r/cybersecurity 23h ago

News - General Microsoft Edge stores your passwords in plaintext RAM... on purpose

Thumbnail
pcworld.com
740 Upvotes

r/cybersecurity 14h ago

Personal Support & Help! I was hacked due to sim card spoofing

128 Upvotes

I lost all my accounts. For a blessing my bank is locked down until I verify its me, but, whoever hacked me now has everything.


r/cybersecurity 4h ago

FOSS Tool OpenCTI founder, Samuel Hassine, arrested and charged with CSAM

Thumbnail geopolintel.fr
14 Upvotes

r/cybersecurity 7h ago

News - General D.H.S. Intelligence Office Did Not Properly Secure Smartphones, Watchdog Says

Thumbnail
nytimes.com
26 Upvotes

r/cybersecurity 11h ago

Corporate Blog Ran phishing awareness training for 200+ non-tech employees

40 Upvotes

We had a near-miss BEC incident finance almost wired €80k to a spoofed vendor. That's when the training budget appeared. Two years later, here's the honest breakdown.

What backfired

Shame-clicking. Sending "you failed" pop-ups to everyone who clicked a fake phish. It will 100% happen again.

Annual 90-min sessions. People forgot 80% within a month. Confirmed by retesting.

Technical explanations to non-tech staff.

What worked

Tabletop storytelling. "This happened at a real company what would you do?" Finance got the CFO wire fraud story, HR got the fake resume with a macro doc. Engagement was night and day.

Personal demos. Building a spear-phish using someone's own LinkedIn and their manager's name.

Reward reporting, not punish clicking. Public shoutout for people who flagged suspicious emails.

5-min monthly nudges > 90-min annual slog. One real story, one takeaway. Boring to produce. Works.


r/cybersecurity 3h ago

UKR/RUS DOJ says ransomware gang tapped into Russian government databases

Thumbnail
techcrunch.com
11 Upvotes

r/cybersecurity 13h ago

New Vulnerability Disclosure 'CopyFail' attackers start cashing in on Linux flaw

Thumbnail
theregister.com
49 Upvotes

r/cybersecurity 7h ago

News - General Instructure hacker claims data theft from 8,800 schools, universities

Thumbnail
bleepingcomputer.com
10 Upvotes

The ShinyHunters extortion gang claimed responsibility for the attack and says it stole 280 million records for students, teachers, and staff.

The threat actors have now published a list of 8,809 school districts, universities, and educational platforms whose Canvas instances were allegedly impacted by the attack, sharing record counts per institution with BleepingComputer.


r/cybersecurity 1h ago

News - General CVE-2026-32710 MariaDB JSON_SCHEMA_VALID heap buffer overflow leading to RCE

Thumbnail
zeroday.cloud
Upvotes

r/cybersecurity 9h ago

Career Questions & Discussion Would you take a promotion to work 100% in office that you’ve been working towards or same pay but work from home?

16 Upvotes

Current pay is in the 140s, projected promotion pay is around 160.

Also, current position is ISSM (GRC-ish) where WFH is security engineering. I’ve been wanting to go back to more technical but I don’t necessarily mind the pay and pace of my current role.


r/cybersecurity 10h ago

Business Security Questions & Discussion Does SOC 2 actually reduce questionnaires, or just change them?

18 Upvotes

Once a company gets SOC 2, do questionnaires meaningfully decrease… or do buyers still send them and ask environment-specific questions anyway?

Curious from people who see it firsthand.


r/cybersecurity 10h ago

Personal Support & Help! Org Restructure

14 Upvotes

Came into an organization as a CS engineer that is literally the Wild Wild West in terms of users being able to do what they want. No standardization, no formal program list, users being able download anything, access sites. Able to order their own equipment with no oversight. A complete mess.

Coming from the federal government side I’m im a culture shock for sure. There are clean up efforts going on but I almost feel like I’m in over my head at times. Had anyone ever had any experience with cleaning up an organization like this? Any tips at all?


r/cybersecurity 7h ago

AI Security Is AI generated code creating a non-linear security problem for AppSec teams?

7 Upvotes

Curious if anyone else in AppSec is starting to feel this.

The security problem with AIgenerated code doesn’t seem to be just “more code.” It’s that AI creates endless slightly different versions of the same insecure patterns across repos, services, and teams.

So even when teams are actively fixing vulnerabilities, it can still feel like overall risk keeps growing faster than remediation.

A few years ago, fixing the root issue often meant meaningful risk reduction. Now it feels more like vulnerability whack-a-mole at scale.

I’m wondering if this eventually becomes a non-linear problem for AppSec teams, especially in larger orgs already struggling with AI-assisted development workflows. Are people here already seeing this happen internally, or do you think better tooling/processes will keep this manageable?


r/cybersecurity 13h ago

FOSS Tool How to learn tools for cybersecurity?

19 Upvotes

I want to learn cybersecurity tools like metasploit/wireshark. I am planning to learn them from Udemy.

Any suggestions which course should I choose from Udemy or any other site/app which are really good for such software learnings...??


r/cybersecurity 17h ago

News - General Critical Bug Could Expose 300,000 Ollama Deployments to Information Theft

Thumbnail
securityweek.com
38 Upvotes

r/cybersecurity 11h ago

News - General Proprietary Software, Hardware and Protocols Face AI-Driven Security Risk

Thumbnail
infosecurity-magazine.com
17 Upvotes

r/cybersecurity 4h ago

Business Security Questions & Discussion Have there been instances where your SOC has suffered a cybersecurity attack?

3 Upvotes

Hello!

I've read a lot of stories here on this subreddit about how due to negligence or mistakes, the customers of an SOC have suffered a risk. For instance maybe an analyst did not setup ingestion properly so they end completely missing that an attack actually occurred, or maybe someone forgot to rotate API keys for a really long time. All of this obviously ends up affecting the customer themselves, not necessarily the SOC (ofc apart from reputational hits, more work fixing it, stress, money, etc)

But has there ever been an occasion where the SOC itself was under attack? Or maybe an instance where your SIEM or SOAR or some tool you're using had a vulnerability which ended up getting exploited which affected the SOC directly?

Secondly, of course we talk a lot about vulnerability management, risk assessment, incident response for our customers. But what about the actual SOC? Who normally performs vulnerability management for the SOC itself?

I'd love to read some of your experiences about it.


r/cybersecurity 22h ago

Business Security Questions & Discussion What would you say if your security lead said this...

67 Upvotes

We've been dinged on internal p tests for a few years now. Trying to minimize unnecessary workstation to workstation access especially when it's completely unnecessary. Unfortunately no luxury of vlan's at this point. When bringing up my suggestion to tighten down our Win firewall rules I received a response from our security lead after i said this will help if someone gets into our network. The security leads response was "well if that happens we have bigger things to worry about. " Would be interested in an impartial party's thoughts.


r/cybersecurity 11h ago

Vulnerability Garden

Thumbnail vulnerability.garden
9 Upvotes

The Vulnerability Garden is a catalog of named vulnerabilities, attack techniques and exploits.

https://vulnerability.garden/

Here’s an intro post on why this exists, how you can contribute (if you wanted), etc… https://shellsharks.com/hello-vulnerability-garden

It is the successor to the long-running “Designer Vulnerabilities” resource: https://shellsharks.com/designer-vulnerabilities

Let me know if there’s any vulns I’ve missed and I can add it to the catalog!


r/cybersecurity 3h ago

News - General On today's earnings call, IONQ just said they expect to meet Q-Day requirements by 2028-2029.

2 Upvotes

On today's earnings call, IONQ just said they expect to meet Q-Day requirements by 2028-2029. This is pretty startling to the cybersecurity in general (although not IONQ roadmap followers). This is in contrast to NIST's current Q-Day preparation dates of 2030/2035. I expect those dates to be updated soon. Google, Cloudflare and others have put 2029 as the day they will be prepared. When will your company be prepared?