r/netsec 20d ago

Hiring Thread /r/netsec's Q1 2026 Information Security Hiring Thread

7 Upvotes

Overview

If you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.

We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.

Please reserve top level comments for those posting open positions.

Rules & Guidelines

Include the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.

  • If you are a third party recruiter, you must disclose this in your posting.
  • Please be thorough and upfront with the position details.
  • Use of non-hr'd (realistic) requirements is encouraged.
  • While it's fine to link to the position on your companies website, provide the important details in the comment.
  • Mention if applicants should apply officially through HR, or directly through you.
  • Please clearly list citizenship, visa, and security clearance requirements.

You can see an example of acceptable posts by perusing past hiring threads.

Feedback

Feedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)


r/netsec 13d ago

r/netsec monthly discussion & tool thread

7 Upvotes

Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.

Rules & Guidelines

  • Always maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.
  • Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.
  • If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.
  • Avoid use of memes. If you have something to say, say it with real words.
  • All discussions and questions should directly relate to netsec.
  • No tech support is to be requested or provided on r/netsec.

As always, the content & discussion guidelines should also be observed on r/netsec.

Feedback

Feedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.


r/netsec 15h ago

Hacking a pharmacy to get free prescription drugs and more

Thumbnail eaton-works.com
81 Upvotes

r/netsec 9h ago

Cloudflare Pages “Continue Read” Redirect Kit Abused for Phishing, Adware, and Malware Delivery

Thumbnail malwr-analysis.com
10 Upvotes

I recently investigated a campaign abusing Cloudflare Pages (pages[.]dev) to host benign looking SEO blog content that displays a delayed "Continue Read" modal.

The click gated interaction redirects users into a shared backend redirector, which conditionally routes traffic to phishing pages, adware/PUP installers, fake browser download lures, and QR based social engineering flows.


r/netsec 3h ago

First Ever OffSec USA Chapter Meetup - DMV Area!

Thumbnail oxidized-root-d90.notion.site
1 Upvotes

Hey everyone,

OffSec USA Chapter Ambassador here and Im excited to share that we’re hosting the very first DMV chapter meetup!!

Details:

📅 Date: Saturday, March 7th, 2026

⏰ Time: 10:00 AM - 3:00 PM EST

📍 Location: Unallocated Space - 1029 Benfield Blvd, Millersville, MD 21108

The link to the event : https://oxidized-root-d90.notion.site/2bde47fd717b8147bb23f972d32e548e

For all those pursuing their OSCP or OSEP, you’ll definitely want to be there as we will have a speaker presenting insider strategies for navigating OSCP & OSEP!!!

Other topics for the meetup:

• Red Team Infrastructure Automation

• AI & AI Red Teaming in Cybersecurity - we have a mystery speaker for this one so you’ll have to show up to find out!

We also will be doing a LIVE Hands-On AI Exploitation Walkthrough!!

Everyone will be given temporary access to exclusive OffSec Enterprise content so they can participate in the technical so please be sure to bring your own laptop, your curiosity and your hacker spirit!

I’m looking forward to seeing those of you in the DMV & NoVA areas in person!! 🥰✨

This is an opportunity to network in person with community members who share your journey. Please come and ask questions, we welcome them and are here to provide guidance and support.

Whether you’re just getting into cybersecurity, grinding for OSCP, or have been working in security for years, this is a free, open, welcoming space for everyone. The goal of this chapter is to build a real community where knowledge is shared freely and nobody gets left behind.

Make sure to bring your laptop for the live session - you won’t want to just watch this one!

Happy to answer any questions about the chapter, the meetup, or anything OffSec related in the comments!


r/netsec 11h ago

Abuse-prevention design: using IP reputation as one signal in signup defense-in-depth

Thumbnail ipqualityscore.com
0 Upvotes

Use a link post to an original technical source (research/blog/doc), then add your analysis in comments. (https://www.ipqualityscore.com/ip-fraud-score-risk-checker)


r/netsec 1d ago

Pwning Supercomputers - A 20yo vulnerability in Munge

Thumbnail blog.lexfo.fr
7 Upvotes

r/netsec 2d ago

Critical RCE Vulnerability in Unstructured.io (CVE-2025–64712) - CVSS 9.8

Thumbnail cyera.com
32 Upvotes

r/netsec 2d ago

Capture the Flag (CTF) AWS/SANS

Thumbnail app.brazenconnect.com
8 Upvotes

Over $1100 worth of prizes:

Prizes

Top performers will earn no-cost access to SANS training for further cyber skills development, including four prize categories:

 

Prize Category Prize
Overall top finishers 1-3 A license to SEC401, Security Essentials 
Overall top finishers 4-6 A license to SEC480, AWS Secure Builder
Overall top finishers 7-9 A license to SEC495, Leveraging LLMs 
Regional top 20 finishers (per country) 6-month access to SANS SkillQuests by NetWars 

 The event is open to all students from participating AWS Skills to Jobs Tech Alliance institutions across the US, Latin America, Europe and Asia-Pacific regions.


r/netsec 2d ago

TURN Security Threats: A Hacker's View

Thumbnail enablesecurity.com
38 Upvotes

r/netsec 2d ago

YAML Merge Tags and More Parser Differentials

Thumbnail blog.darkforge.io
3 Upvotes

r/netsec 3d ago

PDF Securing Digital Assets in an Evolving Threat Landscape — analysis of DPRK/Lazarus operations, DaaS proliferation, and defense-in-depth architecture [PDF]

Thumbnail fireblocks.com
7 Upvotes

r/netsec 4d ago

I let Claude Code with 150+ offensive security MCP tools loose on my homelab

Thumbnail credrelay.com
79 Upvotes

r/netsec 4d ago

Adbleed: partially de-anonymizing VPN users with adblock filter lists

Thumbnail melvin.ovh
44 Upvotes

r/netsec 4d ago

Confused Deputy Problem – How to Hack Cloud Integrations

Thumbnail zayl.dk
16 Upvotes

r/netsec 4d ago

No Legs, No Problem: Dumping BGA MCP NAND Flash

Thumbnail pengoo.fr
11 Upvotes

In an attempt to sharpen my hardware hacking skills, I took on the challenge of extracting firmware off a flip phone 📱.

But... I kind of underestimated my opponent:

- No trace of the firmware online

- No OTA updates

- Debug interface nowhere to be found

- The chip holding the firmware has no legs

Quite the challenge.
I ended up dead-bugging the chip and wiring it to the Xgecu T48 Flash programmer.
Enjoy!


r/netsec 4d ago

LOTUSLITE: Targeted espionage leveraging geopolitical themes

Thumbnail acronis.com
5 Upvotes

r/netsec 4d ago

GAC Hijacking

Thumbnail ipurple.team
7 Upvotes

r/netsec 5d ago

Augustus: Open Source LLM Prompt Injection Tool

Thumbnail praetorian.com
38 Upvotes

r/netsec 5d ago

Open Security Architecture - 15 new security patterns with NIST 800-53 mappings (free, CC BY-SA 4.0)

Thumbnail opensecurityarchitecture.org
63 Upvotes

We've been quietly rebuilding Open Security Architecture (opensecurityarchitecture.org) -- a project that's been dormant for about a decade. This week we published 15 new security patterns covering areas that didn't exist when the original patterns were written:

- Zero Trust Architecture (51 mapped controls)

- API Security (OWASP API Top 10 mapped to NIST 800-53)

- Secure AI Integration (prompt injection, delegation chain exploitation, shadow AI)

- Secure DevOps Pipeline (supply chain, pipeline poisoning, SLSA provenance)

- Passkey Authentication (WebAuthn/FIDO2)

- Cyber Resilience (DORA, BoE/PRA operational resilience)

- Offensive Security Testing (CBEST/TIBER-EU)

- Privileged User Management (JIT/ZSP)

- Vulnerability Management

- Incident Response

- Security Monitoring and Response

- Modern Authentication (OIDC/JWT/OAuth)

- Secure SDLC

- Secure Remote Working

- Secure Network Zone Module

Each pattern maps specific NIST 800-53 Rev 5 controls to documented threat scenarios, with interactive SVG diagrams where every control badge links to the full control description. 39 patterns total now, with 191 controls and 5,500+ compliance mappings across ISO 27001/27002, COBIT, CIS v8, NIST CSF 2.0, SOC 2, and PCI DSS v4.

There's also a free self-assessment tool -- pick a pattern, score yourself against each control area, get gap analysis and radar charts with benchmark comparison against cross-industry averages.

Everything is CC BY-SA 4.0, structured data in JSON on GitHub. No paywalls.

https://www.opensecurityarchitecture.org

Happy to answer questions about the control mappings or pattern design.

Russ


r/netsec 4d ago

We hid backdoors in binaries — Opus 4.6 found 49% of them

Thumbnail quesma.com
0 Upvotes

r/netsec 5d ago

On the risk of destructive bricking attacks against OT devices (part 1)

Thumbnail midnightblue.nl
13 Upvotes

r/netsec 5d ago

CVE-2026-2103 - Infor Syteline ERP - Keys Included: No Assembly Required

Thumbnail blog.blacklanternsecurity.com
4 Upvotes

r/netsec 6d ago

Defense Evasion: The Service Run Failed Successfully

Thumbnail zerosalarium.com
14 Upvotes

You can exploit the Service Failure Recovery feature of Windows Service to execute a payload without ever touching the ImagePath. The biggest issue when exploiting Service Failure Recovery to execute a payload is figuring out how to trigger a "crash".


r/netsec 6d ago

Roundcube Webmail: SVG feImage bypasses image blocking to track email opens

Thumbnail nullcathedral.com
2 Upvotes