How is signing in to a website the bot herder operates not considered a means by which a bot communicates with a C&C device?

I’m learning about cybersecurity and there was this question about which is NOT a means by which a bot can communicate with a C&C device? My textbook says: * A bot can receive its instructions by automatically signing in to

Bulk uninstall of a/v (eset)

We are replacing our existing a/v with a new edr tool… but need to uninstall the a/v from about 700 devices (mostly windows… but about 100 linux). Linux is an easy uninstall. Has anyone done a bulk uninstall of this

Trojan:Win32/Wacatac.B!ml

i connect my webcam to my pc and just got this warning on windows defender, but on malwarebytes it doesnt say there is a virus. i cant delete it with windows defender for some reason

Can any cybersecurity engineers in this sub provide some detail on what your job is like?

I’m trying to get a sense of what cybersecurity engineers do on a daily basis. Which programming languages do you use often? Do you go off of someone else’s penetration testing reports to find vulnerabilities and develop solutions, or do

Green IT: A cost or benefit to cybersecurity?

Green IT: A cost or benefit to cybersecurity?

Did a stupid and downloaded an executable from my school discord, just want to make sure i secured myself properly

Hello! I did a very big dumb and ran an exe sent to me from someone in my university’s discord (the usual “test my game” shit) which crashed and immediately relaunched my Discord – at this point I uninstalled discord

Pls where can I find DLP Processes and or use cases?

Pls where can I find DLP Processes and or use cases?

ADVANCED. PERSISTENT. THREAT.

ADVANCED. PERSISTENT. THREAT.

The SolarWinds Hackers Are Looking for Their Next Big Score

The SolarWinds Hackers Are Looking for Their Next Big Score

Is this normal for a junior UK role?

I recently finished my degree in an engineering subject and the only bits I enjoyed were actually computer science/Cyber Security, so I’m looking at very junior roles like that. One role I’ve seen was working as an apprentice for an

S9 shutting off by its own

When I restart my phone (s9) and enter in the password screen, it always enters in sleep mode. Then; I turn it on and the problem stops. It just happens when I restart my phone. Is this likely to be

Is there an instance where a country took responsibility for hacking another nation?

Hey you all, I was having a conversation with a friend who I was talking to and they asked me this question. I ended up trying to look it up to answer them but all the results I had were

Cybersecurity career

Hi. I´m in my third year in CS and I was thinking of going into cybersecurity after I get my degree because it seems the most interesting to me, could someone give me some advice on how to know if

Cybersecurity consulting

What do cybersecuroty consultants typically do? Like do you just make a company suggestion to be compliant with different standards and regulations?

So stupid it couldn’t be true: Could you imagine a Fortune 500 company using the zipcode of the physical location as the password for a System? I bet you would feel even more comfortable giving them your social security numbers knowing that.

So stupid it couldn’t be true: Could you imagine a Fortune 500 company using the zipcode of the physical location as the password for a System? I bet you would feel even more comfortable giving them your social security numbers