Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Owned by Vincent

CISSP Study Group

1.8k members • Free

Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!

OpenAI Study Group

1 member • Free

Share resources, get advice, and connect with peers studying for OpenAI certifications! Join our Study Group and meet fellow professionals today!

Memberships

Skoolers

177.6k members • Free

660 contributions to CISSP Study Group
CISSP Practice Question (Domain 7: Security Operations / Evidence Handling & Logging)
After a suspected insider incident, system logs from multiple servers show inconsistent timestamps and missing entries. Legal counsel advises that the organization may face litigation. Operations wants logs centralized immediately to restore visibility. What should the security manager do FIRST? A. Centralize all logs immediately to improve operational monitoring B. Preserve existing logs and establish forensic chain of custody C. Reconfigure time synchronization across all affected systems D. Notify law enforcement and external counsel of potential evidence gaps
CISSP Practice Question (Domain 6: Security Assessment & Testing / Penetration Testing Governance)
A penetration test identifies a critical vulnerability in a customer-facing application, but exploitation would require downtime during peak business hours. The business requests delaying remediation until the next quarterly release. What should the security manager do FIRST? A. Accept the risk and document the delay as requested B. Perform a risk assessment and present impact analysis to business leadership C. Immediately remediate the vulnerability despite business objections D. Disable the affected application until remediation is complete
1 like • 1d
@Pamela Solomon Correct, it is B. The first step is to perform a risk assessment and present impact analysis to leadership so they can make an informed risk decision. CISSP emphasizes that security managers provide analysis, while business leadership determines whether to accept, delay, or remediate risk.
Kimwolf Android Botnet Hijacked 1.8 Million Android Devices Worldwide
A massive botnet targeting Android devices has emerged as one of the most significant threats in the cybersecurity landscape today. Named Kimwolf, this sophisticated malware has compromised approximately 1.8 million Android devices worldwide, including smart TVs, set-top boxes, tablets, and other Android-based systems. Security researchers discovered the botnet when a trusted community partner provided the initial sample in October 2025, which used a command-and-control domain ranked second in Cloudflare’s global domain popularity rankings. The botnet’s reach spans across 222 countries and regions, with the highest concentration of infected devices in Brazil (14.63%), India (12.71%), and the United States (9.58%). https://cybersecuritynews.com/kimwolf-android-botnet-hijacked/
0 likes • 2d
"a command-and-control domain ranked second in Cloudflare’s global domain popularity rankings." wow! second!
Father loses $280K after falling for a 'pig butchering' scam on Facebook
“I lost everything. I lost my kids’ future. I lost my future, ” the father told CNN. “I cried every day. How do you tell your 78-year-old mom who has medical problems that everything’s gone?” Pig butchering is a long-con scam that blends romance, confidence tricks and fake investment opportunities, often involving cryptocurrency. The scam gets its name from the farming practice of fattening up pigs before they’re slaughtered. Scammers build trust over weeks or months, “fattening” up their targets with affection and romance before slowly introducing a “can’t-miss” investment that shows impressive, but fake, returns. https://finance.yahoo.com/news/father-loses-280k-falling-pig-120000419.html
0 likes • 2d
oufff :( all to common. Learned a new term today though! Have not heard of pig butchering
CISSP Practice Question (Domain 1: Security & Risk Management / Risk Acceptance)
A business unit requests an exception to bypass multifactor authentication for a legacy system that cannot support it without a costly upgrade. The system processes sensitive but non-regulated data, and no active exploits are known. What should the security manager do FIRST? A. Deny the request and mandate immediate MFA implementation B. Perform a risk assessment and formally document risk acceptance C. Approve the exception indefinitely due to technical limitations D. Compensate by increasing network monitoring without documentation
2 likes • 2d
@Ivo Mulders Correct, it is B. Exceptions must be formally documented and approved through risk acceptance. Denying MFA outright or approving an indefinite exception lacks governance, and compensating controls without documentation does not satisfy CISSP risk management principles.
1-10 of 660
Vincent Primiani
7
5,536points to level up
Cybersecurity. The Study Group Guy.

Active 4m ago
Joined Apr 29, 2024
New York, NY
Powered by