Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

Impact Creator Society

402 members • Free

CyberHero School

1.8k members • Free

CISSP Study Group

1.8k members • Free

The Cyber Community

7.1k members • Free

116 contributions to CISSP Study Group
'I'm Beyond Crushed': Bitcoiner Loses It All To A Pig Butchering Scam Despite Several Warnings
A Bitcoiner has reportedly lost his holdings to a pig butchering scam despite several warnings. “I’m beyond crushed on many different levels,” the purported victim identified only as “Thomas” said in a Dec. 14 text message shared by Bitcoin adviser Terence Michael. “I don’t know what to do moving forward.” Thomas is not wealthy, according to Michael. Thomas is a divorcee with a young daughter who had just managed to save up to 1 BTC, Michael said. A pig butchering scam refers to a long con where scammers build trust with their victims, typically through romance, to lure them into fake investment schemes. https://finance.yahoo.com/news/im-beyond-crushed-bitcoiner-loses-154606198.html
1
0
Father loses $280K after falling for a 'pig butchering' scam on Facebook
“I lost everything. I lost my kids’ future. I lost my future, ” the father told CNN. “I cried every day. How do you tell your 78-year-old mom who has medical problems that everything’s gone?” Pig butchering is a long-con scam that blends romance, confidence tricks and fake investment opportunities, often involving cryptocurrency. The scam gets its name from the farming practice of fattening up pigs before they’re slaughtered. Scammers build trust over weeks or months, “fattening” up their targets with affection and romance before slowly introducing a “can’t-miss” investment that shows impressive, but fake, returns. https://finance.yahoo.com/news/father-loses-280k-falling-pig-120000419.html
0 likes • 5d
@Vincent Primiani https://www.nbcsandiego.com/news/local/400-plus-san-diegans-lose-90m-to-pig-butchering-crypto-scams-in-last-fiscal-year/3940151/
CISSP Practice Question (Domain 6: Security Assessment & Testing / Penetration Testing Governance)
A penetration test identifies a critical vulnerability in a customer-facing application, but exploitation would require downtime during peak business hours. The business requests delaying remediation until the next quarterly release. What should the security manager do FIRST? A. Accept the risk and document the delay as requested B. Perform a risk assessment and present impact analysis to business leadership C. Immediately remediate the vulnerability despite business objections D. Disable the affected application until remediation is complete
2 likes • 5d
B, because a risk assessment combines the information from vulnerability identification and threat assessment. It involves determining the likelihood of a threat occurring and the potential impact of a successful attack. This helps prioritize risks and allocate resources for mitigation.
Passed CISSP Exam!
I am excited to share that I have provisionally passed the CISSP yesterday; 100Qs, 1st attempt. 3 months of study, effort, time and discipline paid off, I took a winded path to the CISSP, took the CC in October, then SSCP in November and CISSP this December. Many thanks to this Community, couldn’t have done it without you’ll, the study sessions, the May Brooks strategies; came in clutch!Thanks for putting this together @Vincent Primiani. I’ll certainly be lurking around this community and help out where I can. Preciate you all!
1 like • 7d
Congratulations!👏
Kimwolf Android Botnet Hijacked 1.8 Million Android Devices Worldwide
A massive botnet targeting Android devices has emerged as one of the most significant threats in the cybersecurity landscape today. Named Kimwolf, this sophisticated malware has compromised approximately 1.8 million Android devices worldwide, including smart TVs, set-top boxes, tablets, and other Android-based systems. Security researchers discovered the botnet when a trusted community partner provided the initial sample in October 2025, which used a command-and-control domain ranked second in Cloudflare’s global domain popularity rankings. The botnet’s reach spans across 222 countries and regions, with the highest concentration of infected devices in Brazil (14.63%), India (12.71%), and the United States (9.58%). https://cybersecuritynews.com/kimwolf-android-botnet-hijacked/
1-10 of 116
David Hawkins
5
336points to level up
@david-hawkins-2216
I'm a Jr. Cybersecurity Analyst with 25+ years of IT experience, a USAF veteran & also a technology advisor to my wife's businesses.

Active 49m ago
Joined Nov 26, 2024
Denver metro area
Powered by