this post was submitted on 09 Mar 2026
36 points (97.4% liked)

Cybersecurity

9698 readers
51 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
top 2 comments
sorted by: hot top controversial new old
[โ€“] lnxtx@sopuli.xyz 8 points 1 week ago

The team sent out 4,300 disclosure emails to over 600 organisations, but only 9% bothered to reply.
[...]
Eventually, the team reached a 97% remediation rate, but only after going directly to the authorities that issue the certificates.

Why you data leaks, they don't bother.

Single use keys? Can anyone more familiar with what's available after TLS 2.0 speak to the overhead of constantly generating new keys. I assume the article is advocating for sessional keys. Do we get into scaleability issues?

Also, I want to make a joke about managers pushing for speed and cost, hiring vibe coders who then hard code credentials, including private keys on their local then submitting them through the sdlc, but I'm too hungover to be funny.