r/cybersources

▲ 5 r/cybersources+4 crossposts

A lot of security stacks focus on endpoints and identity, but the browser is still the most common entry point.

Phishing links, malicious downloads, drive-by attacks, all start there.

A Secure Web Gateway helps by filtering traffic, blocking risky domains, and inspecting content before it reaches the user.

How others are handling web-layer security?

u/Academic-Soup2604 — 3 days ago
▲ 31 r/cybersources+4 crossposts

Built an open source tool that automates dark web OSINT investigations end to end

put in a query, it fans out across 16+ Tor search engines, extracts IOCs, wallets, CVEs, actor handles, maps entity relationships, and generates a threat intel report. all self-hosted, all free.

medium post with full walkthrough: https://medium.com/@katriel.moses/dark-web-osint-without-the-25-000-price-tag-749c6de0f185

github: github.com/KatrielMoses/voidaccess

u/LockInternational893 — 8 days ago
▲ 14 r/cybersources+4 crossposts

WAF Evasion Engine

I know WAFs can get annoying during pen tests and CTFs. So I built a WAF evasion engine. It mutates and persists, allowing you to even use it as a proxy. It's meant to be chained with other tools like Nuclei or SQLmap. I thought it might be useful.

Happy Hacking!

https://github.com/santhsecurity/wafrift

u/MT_Carnage — 8 days ago

Why attackers love old browser extensions

A lot of people pay attention to antivirus, passwords, and updates now but browser extensions still get treated like harmless addons.

That’s probably one of the easiest blind spots in everyday security.

I recently looked through a workstation that had nearly 20 installed extensions. Half of them hadn’t been used in months, several requested access to read and change all data on websites and one had been removed from the official store weeks earlier after suspicious behavior reports.

The user had no idea.

What makes extensions risky isn’t just malware, it’s the level of access people casually grant them:

session data

page content

clipboard access

browsing activity

saved credentials in some cases

And once installed, most users never review them again.

One practical habit I’ve started recommending is treating extensions like software assets instead of browser decorations:

remove anything unused

check permissions occasionally

avoid installing multiple extensions doing the same thing

be careful with extensions from unknown publishers even if ratings look good

A compromised extension running quietly in a browser can see far more than people realize.

Sometimes the weakest point in a setup isn’t the network or the endpoint, it’s the tiny icon sitting next to the address bar.

reddit.com
u/EchoAndByte — 9 days ago