User
Write something
🔐 Friday Wind-Down — What Did You Actually Learn This Week?
End of week, legends. Before you close the laptop and crack a cold one — take 60 seconds and drop an answer below. This week, what was ONE thing you: 🔍 Learned (a concept, tool, technique or CVE that clicked) 🛠️ Built or tried (a lab, config, script or walkthrough) 🤯 Got stuck on (no shame — we've all been there) I'll go first: This week I was deep in SAP S/4HANA CVE-2026-0498 — a 9.1 CVSS remote code execution vuln that lets attackers with admin privileges modify source code without auth checks. Real-world example of why least privilege isn't optional. Your turn. One line is fine. Drop it below 👇 — @Aussie Mr Cyber
0
0
Monday - Week Kickoff
Good morning legends! New week, new reps. Whether you're grinding cert prep, spinning up a lab, or working through a new module — pick ONE thing to focus on today and get it done. Drop below what you're working on this week. Let's hold each other accountable.
0
0
Monday - Week Kickoff
As I'm a senior full stack developer, looking for collaborate
I'm a professional developer who has been developing projects for several years. I'm currently looking for people living in the US, Canada, or the UK who are interested in this type of business and would like to collaborate and generate revenue together. If you know of anyone who is interested, please contact me.
Cybersecurity 101 - Lesson 4 Completed
Lesson 4 of Cybersecurity 101 is now complete and I will be working on Lesson 5 tomorrow, so stay tuned Lesson 5: How do I choose the best antivirus: We have just the thing for you
0
0
🚨 CRITICAL SECURITY ALERT — SAP S/4HANA Users, Pay Attention!
Here is a rewritten post ready to share on your Skool cybersecurity channel: 🚨 CRITICAL SECURITY ALERT — SAP S/4HANA Users, Pay Attention! A critical vulnerability has just been flagged that enterprise teams and security professionals need to know about immediately. If your organisation runs SAP S/4HANA, this one is not to be ignored. CVE-2026-0498 | CVSS Score: 9.1 — CRITICAL📅 Published: January 15, 2026 What's the threat?A remote-enabled function module in SAP S/4HANA allows attackers with admin privileges to modify source code without proper authentication checks — leading to code injection and full OS command execution. In plain English? A bad actor could gain complete control of your enterprise ERP system. Who is affected?Anyone running SAP S/4HANA in their environment. What should you do RIGHT NOW? ✅ - 🔴 Apply SAP's January 2026 Security Patch Day updates immediately — don't wait - 👤 Review and audit all admin privilege assignments — least privilege principle applies here - 👁️ Monitor for any unauthorised source code modifications in your environment - 🔒 Implement or tighten change management controls to catch suspicious activity early 💡 Key takeaway for the community: This is a perfect real-world example of why privilege management and patch hygiene aren't just best practices — they're your first line of defence. A 9.1 CVSS score means this is about as serious as it gets. Stay patched. Stay vigilant. 🔐 Would you like me to turn this into a weekly "Threat of the Week" post format you can reuse for future alerts?
0
0
1-30 of 33
Cybersecurity BootCamp
skool.com/cybersecurity-bootcamp-2235
Aussie cyber pro with hands-on home lab builder sharing SOC ops, pentesting labs, playbooks & cert prep. Level up your blue-team game Down Under!
Leaderboard (30-day)
Powered by