Help appreciated, deciding on an AV

ever since ESET had that forced version update(not to be confused with virus database update) which they just wont stop even if i turn off version update, i didnt use it anymore. are there any out there like eset? or

Hello, im currently studying maths, computer science and history at alevel with predicted grades of BBB. Which Unis would you recommend for a cyber security bsc degree. Thank you

Hello, im currently studying maths, computer science and history at alevel with predicted grades of BBB. Which Unis would you recommend for a cyber security bsc degree. Thank you

“hacker-scoper”: A FOSS Go tool to filter out-of-scope URLs, IPv4s and IPv6s auto-detecting public programs for your target. Specially useful for researchers on bug-bounty programs.

“hacker-scoper”: A FOSS Go tool to filter out-of-scope URLs, IPv4s and IPv6s auto-detecting public programs for your target. Specially useful for researchers on bug-bounty programs.

Content Deliver Network security concerns

What are your thoughts on whether CDNs should be whitelisted on a FW? There is a certain web application that has various other site dependencies, [amazonaws.com](https://amazonaws.com) and [cloudfront.net](https://cloudfront.net) for example. The concern is that whitelisting the CDN domain entirely will

FIPS mode disabled in RHEL 8

Will a FIPS mode disabled RHEL server is an open vulnerable server from an attackers perspective? I came across a vendor who patch their servers for known vulnerability weekly, have MFA enabled and other security lockdown but FIPS mode disabled.

Robinhood Security Breach Exposes Data on Millions of Users

Robinhood Security Breach Exposes Data on Millions of Users

Trying to read server memory bytes via postgresql vulnerability in Kali-Linux VM

Basically I found this vulnerability and I want to perform it on my system. I installed this virtual machine (64-bit for VirtualBox): https://www.kali.org/get-kali/#kali-virtual-machines and here is the vulnerability: https://security.snyk.io/vuln/SNYK-DEBIAN11-POSTGRESQL13-1292197 I’m really confused how is even do this, so far I

Back again with another question

Hey y’all, some of you may have seen my post from about 3 weeks back. Some of you may have not. But I have a question about this saved tab in my saved collections. Don’t remember saving it. Can’t open

What is a Software Supply Chain Attestation

What is a Software Supply Chain Attestation

Any paid bug bounty hunters here?

How much do you make on average ? What’s your skill set? How long did it take you to get here? Advise for myself and others pursuing in regards to certification,education or skills

Comodo free firewall

So, I am pretty suspicious about this antivirus/firewall. I have searched all over the internet and everyone says it’s safe, although I have scanned it in virus total a long time ago and one vendor detected it as a trojan

Advice for getting cybersecurity scholarships for a VERY high functioning autistic student?

We’re a bit overwhelmed by the scholarship process and eager for help. These are the basics about him. * Our son has applied to a few colleges and his top choice is Carnegie Mellon. * He is extremely high functioning

Hacking group says it has found encryption keys needed to unlock the PS5

Hacking group says it has found encryption keys needed to unlock the PS5

REvil Ransom Arrest, $6M Seizure, and $10M Reward

REvil Ransom Arrest, $6M Seizure, and $10M Reward

False positive? Trojan:Win32/Tnega.RR!MTB

I downloaded something I probably should not have. It was from a youtube video and everything seemed trustable. I ran the file through virustotal and there was nothing detected. When the file was downloaded and extracted my windows defended turned