• mlg@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    ·
    4 days ago

    See it actually goes like this:

    The cybersecurity field sees the CS and software field as a bunch of posers.

    The red team (field) sees the blue team as a bunch of posers.

    The actual redteam (opsec white hat) sees pentesters as a bunch of posers.

    The blackhat hackers sees white hat hackers as a bunch of posers.

    Most (skilled) blackhats work for an APT or Nation State, so we almost never get to see a post compromise attack that actually does anything other than crypto ransom or targeted hardware destruction.


    But seriously, this post really depends on what type of cybersecurity work.

    Our DC

    I would expect to see this from a bunch of internal company blueteam “hackers” ;)

      • LainTrain@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        3
        ·
        2 days ago

        Am I stupid and missed the joke, or do you mean to imply that “most skilled blackhats” communicate over Microsoft Teams?

        • RamenJunkie@midwest.social
          link
          fedilink
          English
          arrow-up
          3
          ·
          2 days ago

          It was kind of a two tiered joke, because they would not use Teams, but also the Lain thing playing off the OP oitrage about avime avatars.