I’m going to school and need a little help

I’m enrolled in school and I want an extra degree to help me. I am currently getting a degree in it networking and cybersecutity. I’m just wondering if there is a corse that would be a bit better than it

Does google transparency port work?

[https://transparencyreport.google.com/safe-browsing/search?url=](https://transparencyreport.google.com/safe-browsing/search?url=) Does this work and is it reliable?

Should I take the job?

So right now I work Tier 2/3 helpdesk. Ive been applying for entry level cybersec jobs for about 4-5 months now. I get a good amount of interviews and often get to the last interview. Usually I see about 2

Using Google For Information Gathering | TryHackMe Google Dorking

Using Google For Information Gathering | TryHackMe Google Dorking

Are Network Intrusion Detection System using Machine Learning better than signatture based in real world settings?

I have seen so many academic papers claiming that machine learning based NIDS are better than signature based NIDS. Specifically they claim to detect zero day attacks. Troubling thing in these papers is that either they use two decade old

When ‘Good Enough’ Security Just Isn’t Enough

When ‘Good Enough’ Security Just Isn’t Enough

Getting probed on random ports from Digital Ocean IP addresses, always from SOURCE port 32766

Anyone else seeing these? Going on for hours, several source IPs, so far all at DigitalOcean, and as stated, TO various dest ports, but always FROM port 32766. My default block rule is stopping these, so it’s not like there’s

Apple sues Israeli spyware group NSO

Apple sues Israeli spyware group NSO

What is the best site with exercises to learn about XSS?

I know about: * xss.pwnfunction.com * domxss.com/domxss * portswigger.net Which site(s) would you recommend?

Oh-o i think im in trouble

Oh-o i think im in trouble

Cybersecurity in the ROS 2 communication middleware, targeting the top 6 DDS implementations

Cybersecurity in the ROS 2 communication middleware, targeting the top 6 DDS implementations

Impact of Security breach on career

I’ve not seen this question posed to /r/cybersecurity before, so I wanted to ask those of you who have worked at a company when a breach occurred, How long did you stay at the company afterwards and what impact did

Suspected domain hijacking results in British government website showing porn

Suspected domain hijacking results in British government website showing porn

Metasploit CTF anyone?

A friend and I are teaming up for the Metasploit community CTF in a few days. If anyone wants to tag along, you’re more than welcome. Doesn’t matter if you’re a beginner or not (need some kind of experience though).

Automatically downloaded a file named setup.zip from a suspicious website. (please answer)

So I was visiting a website then i got redirected into a suspicious website, I couldn’t close it quickly because instead of opening a new tab, it opened a new window and right after i closed it, there was a