@ZILtoid1991 to [email protected] • 9 months agoObvious cybersecurity ruleimagemessage-square35arrow-up1328arrow-down11
arrow-up1327arrow-down1imageObvious cybersecurity rule@ZILtoid1991 to [email protected] • 9 months agomessage-square35
minus-squarescopslinkfedilinkEnglish56•9 months agoLeader: “Alright, while he’s working on breaking into their system, we’ll–” Hacker: “I’m in.” Leader: “That fast? Did you find some zero-day to exploit?” Hacker who just tried username “admin”, password “password”: “Yyyyeeeeeees?”
minus-squareUriel238 [all pronouns]linkfedilink26•edit-29 months agoTo this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations. The weakest security link is between chair and keyboard.
minus-square@[email protected]linkfedilinkEnglish16•9 months agoI mean, technically, that is a zero-day exploit
Leader: “Alright, while he’s working on breaking into their system, we’ll–”
Hacker: “I’m in.”
Leader: “That fast? Did you find some zero-day to exploit?”
Hacker who just tried username “admin”, password “password”: “Yyyyeeeeeees?”
To this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations.
The weakest security link is between chair and keyboard.
I mean, technically, that is a zero-day exploit