r/CyberAdvice

▲ 3 r/CyberAdvice+3 crossposts

Can someone hack my iPhone with my address

hello, my friend was recently hacked by one of her classmates. She said he had acess to her photos, notes app, messages and Instagram dm’s and she has an android. Even after changing her phone and phone number he could still see all her phone activity. My concern is that I gave my adress to her in our Instagram dm’s while she was still being hacked and I’m scared if the hacker might want to show up to my house or my school or let alone anywhere I am and hack my phone or even just hack my phone remotely . What are the chances for that?

Also my phone recently went into a boot loop (at around 3pm) and I updated it with iTunes to get my iPhone working again but on the same day the boot loop happened it showed that my photos app was used 12AM-8AM (so before the boot loop even occurred) when I was definitely asleep then.

Should I be concerned?

Also when the odd screen time did happen only my device showed up under my Apple device list and I had 2FA on.

reddit.com
u/Any-Captain9333 — 1 hour ago
▲ 13 r/CyberAdvice+2 crossposts

Are we overlooking domain security as DNS becomes a security control layer?

The recent NIST DNS Guidance (SP 800-81r3) marks a significant evolution in how we view DNS, transitioning from passive infrastructure to an active security control layer. This shift emphasizes the importance of also integrating DNS security with broader domain security and brand protection measures, particularly in light of AI's growing influence on cybersecurity, risk management, compliance, and governance.

reddit.com
u/VincentADAngelo — 2 days ago
▲ 5 r/CyberAdvice+7 crossposts

Do domain names create hidden dependencies in AI stacks?

I’ve been exploring how domain names can introduce hidden dependencies in AI systems (e.g., authentication, APIs, and service boundaries).

The chart maps the AI stack and shows how these dependencies can appear across multiple layers - application, data, model/LLM, infrastructure, and even hardware.

Curious what others think?

Source: https://www.linkedin.com/pulse/invisible-ai-foundation-vincent-d-angelo-1ctse

u/VincentADAngelo — 1 day ago
▲ 12 r/CyberAdvice+1 crossposts

Rate my Resume

Hey everyone! I recently graduated with a degree in Cybersecurity and I’m starting to apply for jobs. This is my resume and I’d really appreciate any feedback or criticism. Thanks.

u/Vanshmaurya2205 — 6 days ago
▲ 2 r/CyberAdvice+1 crossposts

Hackers Use Hidden Website Instructions in New Attacks on AI Assistants

Threat actors are now using a technique known as Indirect Prompt Injection (IPI) to manipulate large language models (LLMs) by embedding hidden instructions within seemingly ordinary websites, according to a new report from Forcepoint X-Labs. Once considered a purely theoretical risk, the research shows that IPI is now actively being exploited in the wild to target live web infrastructure.

hackread.com
u/VincentADAngelo — 17 hours ago
▲ 5 r/CyberAdvice+1 crossposts

Why MCP Changes Everything for AI Builders (And Why Privacy Has to Come First)

AI tools got a major upgrade this year. Instead of just answering questions, they now take action - reading files, running commands, scanning your codebase for context.

That's powerful, but it’s also a new kind of risk.

These tools move fast. Faster than you can react if something sensitive pops up on screen. The old advice about hiding your keys in environment variables? It doesn't account for an AI agent that can read those too.

If you're building with AI, privacy isn't optional anymore. It's part of the stack.

reddit.com
u/StreamBlur — 1 month ago