Security Engineer
431 subscribers
90 photos
1 video
47 links
A diary of Security Engineerโ€˜s life. The good, the bad, the secure ๐Ÿ˜ฌ

Ping for cooperation @stansecure

My LinkedIn linkedin.com/in/stansecure/
Download Telegram
Channel created
Channel name was changed to ยซSecurity Enginneerยป
Hello, everyone! I am starting this channel for my notes and ideas ๐Ÿคซ.

I am a security engineer from Ukraine with 11+ years of experience.

During this time, I managed to:

2015-2021- Ensure the security of the Armed Forces of Ukraine (I worked at the AFU Cybersecurity Center ๐Ÿซก).

2021-2026 - Work tirelessly to improve business security (currently working on the BPM/CRM platform).

I have worked as an Engineer, a Security Analyst, a Deputy Head of SOC, and now as Security Team Lead.

Why should you subscribe to this channel?

โ†’ I will post here everything from #ThreatIntel to #Events review and personal thoughts.

โ†’ In addition, there will be (definitely!) posts on security vulnerabilities that may affect you (or your business).

It's up to you to subscribe or not ๐Ÿ‘€.

Welcome everyone! Thank you for joining the channel!

๐Ÿ” Share and reposts are most welcome.๐Ÿ“ฃ

@securediary
.
Please open Telegram to view this post
VIEW IN TELEGRAM
1๐Ÿ‘5๐Ÿ‘Ž1
๐Ÿ˜ Beware of SEO Poisoning!

Don't let top search results trick you into downloading malware! Malicious sites are designed to look legit.

What it is:
Attackers use popular keywords ("free software", "templates") to push fake, dangerous sites high up in search rankings. Clicking them can be risky!

Red Flags ๐Ÿง
Watch for these before clicking or downloading:

โ€ข Spammy Site: Flashing warnings, fake alerts.
โ€ข Aggressive Pop-ups: Close tab/browser fast (Alt+F4 / Ctrl+Shift+Esc).
โ€ข Malicious Redirects: Sent elsewhere unexpectedly? Leave!
โ€ข Search Engine Warnings: Pay attention to browser/search flags (e.g. "This site may be hacked").

Stay Safe ๐ŸŒš

1. Cautious Downloads: Especially from new sites.
2. Check URL/Site: Does it look trustworthy?
3. Trust Your Gut: Feel suspicious? Don't click or download.
4. Stay vigilant! Cyber threats are always evolving.

Was this helpful? React or comment below! ๐Ÿ‘‡

Share this message with friends & family to keep them safe too!

#CyberSecurity #SEOPoisoning

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
1๐Ÿ‘9๐Ÿ‘Ž1
Hey, everyone! Quick security reality check:

Have you ever checked if your email address has been part of a data breach? You might be shocked by the results people often find on sites like HaveIBeenPwned.com.

Scary thought? ๐ŸŽƒ

It's more common than you'd imagine. But the good news is there are two simple steps you can take right now to level up your security:

1. Use Unique Passwords (with a Password Manager)
โ€ข Why? Reusing passwords means attackers could access your other accounts if one account is breached.
โ€ข ๐‡๐จ๐ฐ? A reliable password manager (e.g., LastPass, 1Password) can generate and store super-strong passwords, so you never reuse one again!

2. ๐„๐ง๐š๐›๐ฅ๐ž ๐Œ๐ฎ๐ฅ๐ญ๐ข-๐…๐š๐œ๐ญ๐จ๐ซ ๐€๐ฎ๐ญ๐ก๐ž๐ง๐ญ๐ข๐œ๐š๐ญ๐ข๐จ๐ง (๐Œ๐…๐€/๐Ÿ๐…๐€)
โ€ข ๐–๐ก๐ฒ? Even a strong password can be exposed in a breach. MFA adds an extra hurdle for attackers.
โ€ข ๐‡๐จ๐ฐ? Turn on MFA wherever possible. Use SMS or an authenticator app (Google Authenticator, Authy, Duo, etc.). Many are free and keep you secure even if your password leaks.

โ–ถ๏ธ ๐“๐š๐ค๐ž ๐€๐œ๐ญ๐ข๐จ๐ง: Check your email with HaveIBeenPwned.com and lock down any exposed accounts. It's better to be safe than sorry!

๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง: What is your biggest hurdle to adopting password managers or MFA?

React or comment below! ๐Ÿ‘‡

#CyberSecurity #Security #DataSecurity #Privacy

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
1๐Ÿ‘6๐Ÿ‘Ž1
Just wrapped up experimenting with image-generating AIโ€ฆ
This is what a โ€œCloud & SaaS Security Proโ€ action figure might look like ๐Ÿ”๐Ÿง‘โ€๐Ÿ’ป

Honestly? This is the cleanest version I could get with the tools I used ๐Ÿ˜…

๐Ÿ‘‰ What AI tools are you using to create visuals like these? Would love to explore whatโ€™s working for others.

Drop your favorite image or design tools below! ๐Ÿ‘‡

#AI #AIGenerated #PromptEngineering

@securediary
๐Ÿ‘4๐Ÿ‘Ž1
Balancing WAF security with user experience is a constant tradeoff.
Too strict? False positives block real users.
Too loose? Vulnerabilities slip through.

๐Ÿ”’ Pro Tip for WAF Tuning:

1. Start in alert mode โ€” observe traffic before enforcing.
2. Review logs, tune detection rules, and whitelist safe APIs.
3. Iterate weekly: adjust โžค test โžค repeat.

WAF should protect quietly โ€” users stay happy๐Ÿ™ƒ, attackers stay out.

How do you fine-tune your WAF without affecting conversions?
Letโ€™s share best practices๐Ÿ‘‡

#CyberSecurity #WAF #AppSec

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘2โค1๐Ÿ‘Ž1
๐Ÿ”’ The Cookie Problem โ€” how to balance good UX and privacy in a cookieless world?

Third-party cookies are dying. But one thing hasn't changed:

1. Great UX needs personalization
2. Strong privacy limits tracking
3. Businesses still need insights to grow

From a cybersecurity lens, here's what I've learned:
๐—ง๐—ฟ๐—ฎ๐—ป๐˜€๐—ฝ๐—ฎ๐—ฟ๐—ฒ๐—ป๐—ฐ๐˜† + ๐˜ƒ๐—ฎ๐—น๐˜‚๐—ฒ ๐—ฒ๐˜…๐—ฐ๐—ต๐—ฎ๐—ป๐—ด๐—ฒ wins.

When people *๐™ ๐™ฃ๐™ค๐™ฌ* what data you're collecting โ€” and actually *๐™œ๐™š๐™ฉ ๐™จ๐™ค๐™ข๐™š๐™ฉ๐™๐™ž๐™ฃ๐™œ ๐™ช๐™จ๐™š๐™›๐™ช๐™ก* in return โ€” they're way more likely to say "yes."

Tools like #Cookiebot and #DataGuard make this simpler.

๐Ÿ™ƒHonestly, we still figuring out "the right" balance. But when people feel in control of their data, everything flows better โ€” trust, engagement, even results.

Your turn: How are you tackling this? Got a go-to approach (or challenge) worth sharing? ๐Ÿ‘‡

#GDPR #DataPrivacy #Privacy

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘7๐Ÿ‘Ž1
๐Ÿคฏ ๐—ช๐—ต๐—ฒ๐—ฟ๐—ฒ ๐˜„๐—ถ๐—น๐—น ๐˜๐—ต๐—ฒ ๐˜„๐—ผ๐—ฟ๐—น๐—ฑ'๐˜€ ๐˜๐—ผ๐—ฝ ๐—ฐ๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—ฟ๐—ฒ๐˜€๐—ถ๐—น๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—ถ๐—ป๐˜€๐—ถ๐—ด๐—ต๐˜๐˜€ ๐—ฏ๐—ฒ ๐˜€๐—ต๐—ฎ๐—ฟ๐—ฒ๐—ฑ ๐˜๐—ผ๐—บ๐—ผ๐—ฟ๐—ฟ๐—ผ๐˜„, ๐— ๐—ฎ๐˜† ๐Ÿฒ๐˜๐—ต? InfoSec Ukraine 2025 โ€“ and I'll be there!

This is your chance to dive deep into Ukraine's battle-tested defense strategies โ€“ from a country repelling over ๐Ÿฐ,๐Ÿฏ๐Ÿญ๐Ÿฑ ๐—ฐ๐˜†๐—ฏ๐—ฒ๐—ฟ๐—ฎ๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ ๐˜†๐—ฒ๐—ฎ๐—ฟ๐—น๐˜†. If you're serious about security innovation, you can't afford to miss this.

Big thanks to Mary Hanzhelo for making my attendance possible!

๐Ÿ”ฅMust-see panel: "๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜„๐—ฎ๐—ฟ๐—ณ๐—ฎ๐—ฟ๐—ฒ ๐—ถ๐—ป ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ: ๐—ง๐—ต๐—ฒ ๐—˜๐˜…๐—ฝ๐—ฒ๐—ฟ๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—ผ๐—ณ ๐—จ๐—ธ๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ฎ๐—ป ๐—–๐—ผ๐—บ๐—ฝ๐—ฎ๐—ป๐—ถ๐—ฒ๐˜€", May 6, 16:40โ€“17:20

๐ŸŽ™ Featuring top industry experts: โ–ซ๏ธArtem Skrypnyk โ–ซ๏ธMaksim Yashchyenkoโ–ซ๏ธDr. Oleh Polihenko โ–ซ๏ธVladimir Pokatilovโ–ซ๏ธOleh Matata

Who else is attending? Drop a comment or DM me.

Let's connect, exchange insights, and strengthen our collective defense!

๐ŸŽซ Final spots available โ†’ https://infosec.parkovy.tech/

#CyberSecurity #CyberResilience #Cyberwarfare

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘6
InfoSec Ukraine 2025 wasn't just another conference for me โ€” it was a reality check. As someone who spends my days defending networks, seeing experts break down the latest threats felt like looking into the future.

๐™ƒ๐™š๐™ง๐™š ๐™–๐™ง๐™š 5 ๐™†๐™š๐™ฎ ๐™„๐™ฃ๐™จ๐™ž๐™œ๐™๐™ฉ๐™จ ๐™ฉ๐™๐™–๐™ฉ ๐™ฉ๐™ง๐™ช๐™ก๐™ฎ ๐™จ๐™ฉ๐™ง๐™ช๐™˜๐™  ๐™ข๐™š.

1. ๐˜ผ๐™„ ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ (Bruce Schneier): The AI revolution is here, and with it comes massive risks.
* Key areas: Protecting AI systems, ensuring output integrity, and upcoming AI regulation.
* ๐Ÿค” My take: I'm particularly fascinated by how we'll balance innovation and strict regulatory compliance. That's the real challenge ahead!

2. ๐˜ผ๐™‹๐™ ๐™‚๐™ง๐™ค๐™ช๐™ฅ๐™จ (Serhii Khariuk): APTs now operate like professional software companies! Complete with developers, QAs, PMs, and even "sales" teams.
* ๐Ÿคฏ My take: Understanding their organizational structure is crucial for anticipating their strategies. We're not just dealing with lone hackers anymore.

3. ๐™๐™๐™š ๐™†๐™ฃ๐™ค๐™ฌ๐™ก๐™š๐™™๐™œ๐™š ๐™‚๐™–๐™ฅ (Nazar Tymoshyk Eduard Chornyi Serhii Khariuk Ilya Aksyonenko): Both offensive and defensive teams struggle to keep pace with the rapid evolution of threats and defenses.
* โšก๏ธ My take: Whoever invests in team training today wins tomorrow.

4. ๐™๐™๐™š ๐™Œ๐™ช๐™–๐™ฃ๐™ฉ๐™ช๐™ข ๐™‡๐™š๐™–๐™ฅ (Jaya Baloo): Her session on quantum computing's impact on cryptography was a wake-up call. Preparing for a post-quantum era should have started yesterday.
* โฑ My take: What we consider "secure" today will be broken tomorrow. And not in 10 years โ€” much sooner.

5. ๐™๐™ ๐™ง๐™–๐™ž๐™ฃ๐™ž๐™–๐™ฃ ๐˜พ๐™ค๐™ข๐™ฅ๐™–๐™ฃ๐™ž๐™š๐™จ' ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™ฌ๐™–๐™ง๐™›๐™–๐™ง๐™š ๐™€๐™ญ๐™ฅ๐™š๐™ง๐™ž๐™š๐™ฃ๐™˜๐™š (Panel): Real-world attack scenarios on major entities like Kyivstar and Ukrzaliznytsia were sobering. Investment in security directly impacts customer trust.
* ๐Ÿ›ก My take: This is the clearest illustration that security isn't an expense, but a vital investment in reputation.

๐Ÿ”ฅ ๐™ˆ๐™ฎ ๐™ˆ๐™–๐™ž๐™ฃ ๐˜พ๐™ค๐™ฃ๐™˜๐™ก๐™ช๐™จ๐™ž๐™ค๐™ฃ: Cybersecurity is a marathon, not a sprint. We need to be in it for the long haul.

๐Ÿค” Which of these trends concerns you most? Is your organization already preparing for the post-quantum era?

Save this post for 2025.โคต๏ธ

๐Ÿ“ฃShare if you found this helpful.

#CyberSecurity #AISecurity #APT

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘16๐Ÿคฏ1