this post was submitted on 23 Jul 2025
92 points (100.0% liked)
Cybersecurity
7940 readers
4 users here now
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub
Notable mention to !cybersecuritymemes@lemmy.world
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
jee.. is that easy? what's your password OP?
hunter2, but don't tell anyone because it's a secret.
All I see is ******2
Ahh, I’m home finally
RIP
bash.org
EDIT: Nice, there's a bunch of mirrors.
Weird, because all I see is hunter*
Yup, it is. Social engineering is by far the most effective means of gaining unlawful access to any system.
Humans are always the weakest link.
Exactly. Many breaches follow this pattern:
Replace "secretary" with some other relevant individual who has a surprising amount of access and wouldn't attract attention.
correcthorsebatterystaple