• mlg@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    edit-2
    14 hours ago

    See it actually goes like this:

    The cybersecurity field sees the CS and software field as a bunch of posers.

    The red team (field) sees the blue team as a bunch of posers.

    The actual redteam (opsec white hat) sees pentesters as a bunch of posers.

    The blackhat hackers sees white hat hackers as a bunch of posers.

    Most (skilled) blackhats work for an APT or Nation State, so we almost never get to see a post compromise attack that actually does anything other than crypto ransom or targeted hardware destruction.


    But seriously, this post really depends on what type of cybersecurity work.

    Our DC

    I would expect to see this from a bunch of internal company blueteam “hackers” ;)