Hi I'm trying to fuzz iot protocols for getting into security research.I don't have any experience in security research but know my way around networks and security (seedlabs,exploitedu).I don'tknow how to fuzz protocols to find vulnerability, how do I approach this as a research topic? My approach wos just read papers but that isn't getting me anywhere.Also what are the prospects in fuzzing research like what can I research by fuzzing iot protocols ,what are possible research areas , what is the chance of me finding a vulnerability using fuzzing approach and what can I infer as research worthy conclusions
🚀 CyberCarnival'25 CTF – Are You Ready to Hack Your Way to Glory? 🔥
Get ready for the ultimate cybersecurity showdown! 🏆 CyberCarnival'25 CTF is here to test your hacking skills, problem-solving abilities, and speed. Whether you're a beginner or a pro, this is your chance to prove your mettle!
🔹 Date: 20th February 2025 🔹 Time: 10:00 AM – 1:00 PM 🔹 Mode: Online
While registering set the “Event Mode” as Online
💡 Compete, Learn & Win Exciting Prizes!
📞 For Queries, Do Contact Me
I recently applied for an IT Specialist position at Hetherington Group, an OSINT and cyber investigations firm. Seemed like a great fit—until they sent me a rejection email stating the position didn’t actually exist.
Why post a job if it’s not real? Either:
1. They’re so disorganized that they don’t manage their own listings properly, or 2. They intentionally collect resumes without planning to hire.
Neither is a good look for a company claiming to specialize in intelligence gathering. If they can’t even run a transparent hiring process, how reliable is their OSINT work?
Also, their site focuses on basic OSINT training and surface-level cyber investigations—but there’s no evidence of advanced automation, AI-driven recon, or real security research. If they were serious about OSINT, they’d be hiring people who actually build tools, not rejecting them.
Anyone else run into misleading job postings like this? Let’s talk about it—this seems like a wider problem in cybersecurity & OSINT hiring
Need help getting into my deceased mom’s old locked iPhone but only way to fix it is knowing her iCloud password. When I tried to sign into a say “forgot password” it gave me option to send verification to her old number which is used by someone else now. I don’t remember her passwords to any of her other emails. Please one of yall help MEEEE I just wanna see old pics of me and her together :(