Cybersecurity leaders scramble to educate employees on generative AI threats
Proofpoint News Feed Proofpoint News Feed CySecBot CySecBot
More results...
Proofpoint News Feed Proofpoint News Feed CySecBot CySecBot
The State of Rhode Island has confirmed that cybercriminals have begun publishing data stolen from its social services portal, the RIBridges system
Over 2.5 million end users are at risk as researchers discover 36 compromised Chrome extensions
Chinese hackers appear to have compromised Treasury machines via a trusted third party
Overview
If you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.
We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.
Please reserve top level comments for those posting open positions.
Rules & Guidelines
Include the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.
You can see an example of acceptable posts by perusing past hiring threads.
Feedback
Feedback and suggestions are welcome, but please don’t hijack this thread (use moderator mail instead.)
submitted by /u/netsec_burn
[link] [comments]
Introduction to Meerkat Challange I want to share some tips for approaching the Meerkat challenge. Sherlock Scenario on Meerkat A zip file has been provided, containing a .pcap file that captures network traffic from the timeframe of the suspected compromise. Additionally, a .json file is included, recording security events from the same period. Tools use for Meerkat […]
The post Hack The Box: Sherlock Meerkat Walkthrough – Easy Difficulty appeared first on Threatninja.net.