Security Engineer
425 subscribers
88 photos
1 video
46 links
A diary of Security Engineerโ€˜s life. The good, the bad, the secure ๐Ÿ˜ฌ

Ping for cooperation @stansecure

My LinkedIn linkedin.com/in/stansecure/
Download Telegram
Most companies fear cyberattacks. But misconfigurations are the real silent killer. ๐Ÿซจ

Cloud misconfigurations are everywhere.
They hide in small mistakes, missed settings, or rushed rollouts.

Capital One lost $1.8M because of a single overlooked setting. ๐Ÿ’ฐ
(No, it was not a fancy hack. It was a tiny checkbox left open.)

Hereโ€™s what I learned:

โ†’ 80% of cloud breaches start with simple misconfigurations.
โ†’ Old security tools miss these gaps.
โ†’ The biggest risks are often the ones no one sees.

Want to know where to look first?
Here are the Top 5 cloud misconfigurations I check every time:

1. Publicly open storage buckets (easy target!)
2. Weak access controls (too many people with keys)
3. Missing encryption (data left in plain sight)
4. Default passwords still active (yes, it happens)
5. Unmonitored services (no alerts, no eyes)

How do I prevent these?
I use a simple playbook:
โ†’ Review cloud settings often
โ†’ Set alerts for changes
โ†’ Limit access to what people need
โ†’ Remove unused accounts fast
โ†’ Train teams on what to watch for

Cloud security does not need to be hard.
But it does need care.
One small mistake can cost a lot.

Have you seen a cloud misconfiguration at work?
How did you fix it?
Your story could help save someone elseโ€™s data. ๐Ÿ‘‡

#CloudSecurity #CyberSecurity #ThreatFridays

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘12
#CyberMonday This Week in Cybersecurity โ€” May 26

Big week for cyber news! Hereโ€™s what caught my eye โ€” and what I think matters most ๐Ÿ‘‡

1๏ธโƒฃ Windows Server 2025 dMSA Vulnerability
โ†’ A new flaw lets attackers gain privilege and compromise any user in Active Directory.
โ†’ If you run AD, review your delegated Managed Service Accounts. Patch as soon as updates drop!

2๏ธโƒฃ TikTok Malware via ClickFix
โ†’ Hackers use TikTok videos to spread Vidar and StealC malware.
โ†’ The โ€œClickFixโ€ trick gets people to download malware fast.
โ†’ Training users to spot these tricks is key. Social media is now a top threat vector.

3๏ธโƒฃ GitLab Duo AI Prompt Injection
โ†’ Attackers can hijack AI responses and steal source code using hidden prompts.
โ†’ AI-powered tools save time, but always check for new risks โ€” especially indirect prompt injection.

4๏ธโƒฃ Europol Strikes Ransomware Networks
โ†’ 300 servers and โ‚ฌ3.5M seized, 650 domains neutralized, 20 arrest warrants issued.
โ†’ Law enforcement is stepping up. Global teamwork works!

5๏ธโƒฃ SafeLine WAF โ€” Open Source Web App Firewall
โ†’ New open-source WAF with zero-day detection and bot protection.
โ†’ If you run web apps, try SafeLine for better defense.

๐Ÿซข Recent Critical & High Severity CVEs
โ†’ CVE-2025-4632 (Samsung MagicINFO 9 Server)
โ†’ CVE-2025-27920 (Output Messenger)
โ†’ CVE-2025-4428/4427 (Ivanti Endpoint Manager)
โ†’ CVE-2023-38950 (ZKTeco BioTime)

See full CVE lists for the last 7 and 30 days if you want more detail โ€” https://www.cvedetails.com/

My take:
Cybersecurity is not slowing down. Every week brings new threats, new tools, and new wins for defenders.
Staying informed is part of defense.
Keeping teams trained and systems patched is how we win.

Want more?
Check the links for CVE details and threat feeds.
Letโ€™s keep our networks safe โ€” together. ๐Ÿ”’

Whatโ€™s the most important cyber risk you saw last week? ๐Ÿ‘‡

#CyberSecurity #InfoSec #CloudSecurity #ThreatIntel

@securediary
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘10๐Ÿคฏ2
An insightful question about AI and LLM security ๐Ÿค”

๐—ค: So, how could organizations defend themselves against AI injections? Or is it more about the developers of LLMs, not the users?

๐—”: Great question โ€” and itโ€™s both, really ๐Ÿ™‚

โžก๏ธ LLM providers (Devs) need to harden their models against prompt injection by improving context handling, sandboxing actions, and applying prompt input filters.

โžก๏ธ But orgs using LLMs also have responsibilities:

โ†’ Avoid blindly integrating AI into sensitive workflows (Do the security check first!)
โ†’ Sanitize and validate user inputs before sending them to the model.
โ†’ Log and audit AI activity โ€” treat it like any critical system.

I see both misconfigurations and poor input handling open the door to attackers. Donโ€™t let your guard down.

#CyberSecurity #LLM #AI #DataProtection

@securediary
๐Ÿ‘7
My Path Into Cybersecurity Started With a Choice That Changed Everything.

I was top of my Computer Science class at Military Institute of Telecommunications and Information Technologies (MITIT) with multiple career paths ahead of me.

Then, I heard about a brand-new cybersecurity unit being formed in 2015.

Most classmates chose traditional tech roles. Military Intelligence looked prestigious. Telecommunications seemed stable.

But something about defending critical infrastructure from invisible enemies sparked something in me I didn't know existed.

๐™๐™๐™š ๐™ˆ๐™ค๐™ข๐™š๐™ฃ๐™ฉ ๐™€๐™ซ๐™š๐™ง๐™ฎ๐™ฉ๐™๐™ž๐™ฃ๐™œ ๐˜พ๐™ก๐™ž๐™˜๐™ ๐™š๐™™

Picture this: 2015, Ukraine. Cyber warfare wasn't theoretical โ€” it was happening in real-time.

I walked into that newly formed cybersecurity unit as a fresh graduate with book knowledge.

I walked out every day knowing I was part of something bigger than code and algorithms.

We weren't just IT professionals. We were digital defenders.๐Ÿ›ก

๐—ช๐—ต๐—ฎ๐˜ ๐—ก๐—ผ๐—ฏ๐—ผ๐—ฑ๐˜† ๐—ง๐—ฒ๐—น๐—น๐˜€ ๐—ฌ๐—ผ๐˜‚ ๐—”๐—ฏ๐—ผ๐˜‚๐˜ ๐— ๐—ถ๐—น๐—ถ๐˜๐—ฎ๐—ฟ๐˜† ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†

Working in AFU's cybersecurity division taught me lessons no classroom ever could:
โ†’ Stakes are real - When defending critical infrastructure, there's no "test environment."
โ†’ Teamwork saves lives - Cyber defense isn't solo when national security is on the line.
โ†’ Adaptability is survival - Threat actors don't follow textbooks.
โ†’ Purpose fuels performance - Protecting your country changes how you approach problems.

๐—ง๐—ต๐—ฒ ๐—ง๐—ฒ๐—ฎ๐—ฐ๐—ต๐—ฒ๐—ฟ๐˜€ ๐—ช๐—ต๐—ผ ๐—–๐—ต๐—ฎ๐—ป๐—ด๐—ฒ๐—ฑ ๐— ๐˜† ๐—ง๐—ฟ๐—ฎ๐—ท๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜†

My MITIT teacher who saw potential in cybersecurity before it was mainstream.
My AFU manager, who believed in developing talent, not just using it.
These people showed me what it means to serve something bigger than yourself.

๐—™๐—ฟ๐—ผ๐—บ ๐—ฆ๐—ข๐—– ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜€๐˜ ๐˜๐—ผ ๐——๐—ถ๐˜ƒ๐—ถ๐˜€๐—ถ๐—ผ๐—ป ๐—–๐—ต๐—ถ๐—ฒ๐—ณ

Starting in that unit in 2015, I never imagined I'd grow into SOC Division Chief.

Here's what I learned:
1. Technical skills get you in the door
2. Leadership skills keep critical systems protected
3. People skills turn individual defenders into unified teams
4. Strategic thinking transforms reactive responses into proactive defense

๐—ง๐—ต๐—ฒ ๐—ฅ๐—ฒ๐—ฎ๐—น ๐—ฆ๐—ฒ๐—ฐ๐—ฟ๐—ฒ๐˜ ๐˜๐—ผ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฆ๐˜‚๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€

It's not about being the smartest person in the room. It's about caring deeply enough to never stop learning, defending, and improving.

๐—ฌ๐—ผ๐˜‚๐—ฟ ๐—ง๐˜‚๐—ฟ๐—ป

What moment made cybersecurity "click" for you?
Was it:
A personal experience?
A mentor who opened your eyes?
A realization about how much depends on digital security?
A desire to serve and protect?

Share your story below. Every journey is unique, but they all share one thing: the drive to protect what matters.

__

Enjoy this? ๐Ÿ”„ Repost it to your network and follow @securediary for more.

Join me on LinkedIn

#CyberSecurity #InfoSec #CyberWarfare
๐Ÿ‘14๐Ÿคฏ2
#CyberMonday 5 CVEs jumped 50%+ in exploitability in 7 days. Are you chasing the wrong threats?

Another week, another reminder that cybersecurity never sleeps. Hereโ€™s what caught my eye.

๐Ÿ”ฅTop News:

1๏ธโƒฃ Linux flaws in Ubuntu, RHEL, Fedora โ†’ password hash theft via core dumps. Not flashy, but deadly if missed.

2๏ธโƒฃ U.S. DoJ took down 4 โ€œcrypting serviceโ€ domains. Attackers keep innovating, law enforcement is catching up.

3๏ธโƒฃ EDDIESTEALER malware broke Chromeโ€™s latest encryption. Even browser security is a moving target.

4๏ธโƒฃ China-linked APTs went after SQL Server, expanding attack vectors across Asia and Brazil.

5๏ธโƒฃ Microsoft OneDrive File Picker bug โ†’ possible exposure of whole cloud storage, not just the file you pick.

ESSP score check: CVE-2024-9916 went from low risk to 80.49% exploitability โ€” up 79.40 points. Thatโ€™s a warning to look at.
More at cvedetails.com

Hereโ€™s what Iโ€™ve learned:

โ†’ The โ€œboringโ€ stuff โ€” core dump handlers, file pickers, config basics โ€” gets ignored until attackers show us why it matters.

โ†’ 80% of cloud breaches start with simple misconfigurations, not zero-days. Remember Capital Oneโ€™s $1.8M lesson?

โ†’ Attackers target what we trust most: โ€œinvisibleโ€ things that hold our systems together.

My take: Security leaders who audit the basics win the long game. Fancy tools matter, but discipline around the fundamentals saves millions.

Are you focusing on the right risks? Or is your team missing whatโ€™s hiding in plain sight?

Stay secure out there. ๐Ÿ˜‘

__

Enjoy this? ๐Ÿ”„ Repost it to your network and follow @securediary for more.

Join me on LinkedIn

#Cybersecurity #InfoSec #ThreatIntel
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘10
After 2 weeks of #CyberMonday threat intel and CVE updates, I want to hear from YOU.

Every Monday, I share the latest threats, key CVEs, and Cybersecurity news to help you stay ahead.

My goal? Make your week safer and save you hours of research. But I know every team has different needs.

Hereโ€™s what I want to know:
โ†’ Are these weekly updates helping you spot risks faster?
โ†’ Do you use them to brief your team, patch systems, or guide your strategy?
โ†’ What would make these updates even more useful for you?

Your feedback shapes what I share next. I want #CyberMonday to be your go-to for:

1๏ธโƒฃ Actionable Threat Intel
2๏ธโƒฃ Fast CVE Highlights
3๏ธโƒฃ Simple, clear takeaways you can use right away

Help me deliver the best #Cybersecurity content for YOU ๐Ÿ™‚
๐Ÿ‘9
๐Ÿง  5 Blind Spots That Held Me Back as a Security Leader (Until My Mentor Called Me Out)

For years, I thought being a strong security leader meant fixing every problem. I jumped into tool implementation, led audits, and stayed deep in the technical weeds. I believed doing more was leading more.

Then, I asked for honest feedback from the manager I trust. What I heard was not easy, but it changed my path.

Here are the 5 blind spots that stalled my growth:

1๏ธโƒฃ Overinvolvement in Execution
I thought being hands-on was the way to lead. But by taking every task myself, I blocked my team from growing. I learned: leadership means empowering others, not doing it all.

2๏ธโƒฃ Under-communicating Wins & Lessons
I believed results would speak for themselves. They donโ€™t. If you do not share your teamโ€™s impact and what you learn (even from mistakes), your work stays hidden. Now, I make it a habit to share short updates about impact, not just activity.

3๏ธโƒฃ Perfect Messaging Over Timely Connection
I spent too long trying to say things perfectly. This made me miss moments to connect and build trust. Now, I focus on being real, not perfect. Authentic words build stronger teams.

4๏ธโƒฃ Defaulting to Technical Depth
I thought technical skill was my main tool. But leadership is not about solving every ticket; it is about shaping team culture, budgets, and the big picture. I ask myself: am I leading with my expertise, or with my vision?

5๏ธโƒฃ Waiting to Feel โ€˜Readyโ€™ to Share
I waited too long to share my journey. I told myself, โ€œIโ€™ll post after something big.โ€ But real growth happens in public, by sharing small wins, struggles, and lessons as they come.

Every leader has blind spots. These were mine. Facing them with real feedback helped me become not just a better engineer, but a better leader.

What is one leadership blind spot you have seen in yourself or others? How did you work through it?

Stay sharp, stay secure.

__

Enjoy this? ๐Ÿ”„ Repost it to your network and follow @securediary for more.

Join me on LinkedIn

#Leadership #InfoSec #GrowthMindset
๐Ÿ‘11๐Ÿคฏ1