this post was submitted on 09 Mar 2026
34 points (97.2% liked)

Cybersecurity

9671 readers
94 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
top 2 comments
sorted by: hot top controversial new old
[โ€“] lnxtx@sopuli.xyz 8 points 14 hours ago

The team sent out 4,300 disclosure emails to over 600 organisations, but only 9% bothered to reply.
[...]
Eventually, the team reached a 97% remediation rate, but only after going directly to the authorities that issue the certificates.

Why you data leaks, they don't bother.

[โ€“] Thedogdrinkscoffee@lemmy.ca 2 points 13 hours ago

Single use keys? Can anyone more familiar with what's available after TLS 2.0 speak to the overhead of constantly generating new keys. I assume the article is advocating for sessional keys. Do we get into scaleability issues?

Also, I want to make a joke about managers pushing for speed and cost, hiring vibe coders who then hard code credentials, including private keys on their local then submitting them through the sdlc, but I'm too hungover to be funny.