{'target': [{'comment': 'All, \n\nWow! The feedback we’ve received since the “great toilet flush” last weekend has been great. Everything from the suggestions about where the subreddit should focus, to the astronomical (and rightfully placed) number of complaints about the strict Auto-Moderator rules, has been brought to our attention either in [our former announcement thread](https://www.reddit.com/r/cybersecurity/comments/8mxgkd/input_wanted_where_do_you_think_rcybersecurity/?st=jhy63ned&sh=6cbaf288) or in mod-mail. We continue to encourage honest, good faith, discourse. Here’s some updates:\n\n* **Auto-Moderator:** The rules that were established last weekend are still in play, but they’re a bit more honed for their intended targets now. For instance, a *post* (self-post or link submission) now requires 90 days account history where as comments do not. On the flip side of that coin, *comments* require >= 20 karma but have no account age requirements. This is still less than ideal, and will still catch well-meaning members to be targeted by the Auto-Moderator. What make’s this different than last week’s mentality of “collateral damage” is that now there is a white-list mechanism in place. If anyone gets caught in the cross hair of Auto-Moderator’s remove button, message the mods and we’ll review your account and your submission and add you to the whitelist.\n\n* **Subreddit Focus:** We’ve heard you and all that remains on determining the focus of the new r/cybersecurity is our own internal deliberation. The r/cybersecurity mod team (u/chumstick, u/CDSEChris, u/Spncrgmn, and u/danielrm26) need to hash out our ideas, and our reservations, about the different directions the sub can be taken. Not just about content, but about the reality of keeping on track with the mission. I suspect that we should have some sort of idea/plan ready in short-order. Of course, we’ll keep you all updated on progress and new developments along the way. \n\nKeep the feedback coming! To paraphrase a certain renowned doctor from Seattle: *We’re listening.*\n\ne: added link to former thread to make it easier to reference.', 'permalink': 'https://www.reddit.com/r/cybersecurity/comments/8o3cvu/were_listening_the_next_phase_of_rebuilding/', 'sentiment': '{"probability": {"neg": 0.35707343527564395, "neutral": 0.82198649640315535, "pos": 0.64292656472435605}, "label": "neutral"}'}], 'attack': [{'comment': 'Andrea Carcano from Nozomi Networks told POWER LockerGoga is able to encrypt files that have the following extensions: doc, dot, wbk, docx, dotx, docb, xlm, xlsx, xltx, xlsb, xlw, ppt, pot, pps, pptx, potx, ppsx, sldx, pdf. He also said attackers dropped a “README-NOW.txt” file inside the filesystem. It contains the following message, which essentially extorts users to pay a ransom using Bitcoin cryptocurrency if they want their files back:\n\nHere’s the full story: https://www.powermag.com/cyberattack-debilitates-major-aluminum-and-hydropower-producer/\n\nhttps://i.redd.it/ekdyv2yq0an21.jpg', 'permalink': 'https://www.reddit.com/r/cybersecurity/comments/b3c4uy/heres_the_ransomeware_note_associated_with_the/', 'sentiment': '{"probability": {"neg": 0.46227955655667397, "neutral": 0.90740077354661874, "pos": 0.53772044344332603}, "label": "neutral"}'}, {'comment': "Hi All! I'm doing a paper for Uni where I want to purposefully expose my home internet by putting a few IoT devices on the network that are vulnerable to Mirai etc. Does anyone know if there are lists out there of IoT devices that are well known to be vulnerable? I'm looking for something that I would be guaranteed to find exposed through zmap or nmap etc. so that I can then try to hack it myself.... I know Krebs has a list here but it's all IP cameras mostly ([https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack/](https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack/)) ", 'permalink': 'https://www.reddit.com/r/cybersecurity/comments/b1qrop/vulnerable_iot_devices/', 'sentiment': '{"probability": {"neg": 0.75422071403576973, "neutral": 0.2114088281538864, "pos": 0.24577928596423032}, "label": "neg"}'}, {'comment': "How do hackers identify that this specific old router of specific company has a hole?\n\nDo they bruteforce and try every possible attack on all existing models of hardware/software?\n\nSince the antivirus company is not even aware that their tool can't handle a very unique attack - how do hackers find it out?!", 'permalink': 'https://www.reddit.com/r/cybersecurity/comments/b1kfo7/how_do_hackers_find_or_identify_0day_exploiteven/', 'sentiment': '{"probability": {"neg": 0.67373125572174564, "neutral": 0.78441996278916049, "pos": 0.32626874427825436}, "label": "neutral"}'}]}
{'target': [{'comment': 'All, \n\nWow! The feedback we’ve received since the “great toilet flush” last weekend has been great. Everything from the suggestions about where the subreddit should focus, to the astronomical (and rightfully placed) number of complaints about the strict Auto-Moderator rules, has been brought to our attention either in [our former announcement thread](https://www.reddit.com/r/cybersecurity/comments/8mxgkd/input_wanted_where_do_you_think_rcybersecurity/?st=jhy63ned&sh=6cbaf288) or in mod-mail. We continue to encourage honest, good faith, discourse. Here’s some updates:\n\n* **Auto-Moderator:** The rules that were established last weekend are still in play, but they’re a bit more honed for their intended targets now. For instance, a *post* (self-post or link submission) now requires 90 days account history where as comments do not. On the flip side of that coin, *comments* require >= 20 karma but have no account age requirements. This is still less than ideal, and will still catch well-meaning members to be targeted by the Auto-Moderator. What make’s this different than last week’s mentality of “collateral damage” is that now there is a white-list mechanism in place. If anyone gets caught in the cross hair of Auto-Moderator’s remove button, message the mods and we’ll review your account and your submission and add you to the whitelist.\n\n* **Subreddit Focus:** We’ve heard you and all that remains on determining the focus of the new r/cybersecurity is our own internal deliberation. The r/cybersecurity mod team (u/chumstick, u/CDSEChris, u/Spncrgmn, and u/danielrm26) need to hash out our ideas, and our reservations, about the different directions the sub can be taken. Not just about content, but about the reality of keeping on track with the mission. I suspect that we should have some sort of idea/plan ready in short-order. Of course, we’ll keep you all updated on progress and new developments along the way. \n\nKeep the feedback coming! To paraphrase a certain renowned doctor from Seattle: *We’re listening.*\n\ne: added link to former thread to make it easier to reference.', 'permalink': 'https://www.reddit.com/r/cybersecurity/comments/8o3cvu/were_listening_the_next_phase_of_rebuilding/', 'sentiment': '{"probability": {"neg": 0.35707343527564395, "neutral": 0.82198649640315535, "pos": 0.64292656472435605}, "label": "neutral"}'}], 'attack': [{'comment': 'Andrea Carcano from Nozomi Networks told POWER LockerGoga is able to encrypt files that have the following extensions: doc, dot, wbk, docx, dotx, docb, xlm, xlsx, xltx, xlsb, xlw, ppt, pot, pps, pptx, potx, ppsx, sldx, pdf. He also said attackers dropped a “README-NOW.txt” file inside the filesystem. It contains the following message, which essentially extorts users to pay a ransom using Bitcoin cryptocurrency if they want their files back:\n\nHere’s the full story: https://www.powermag.com/cyberattack-debilitates-major-aluminum-and-hydropower-producer/\n\nhttps://i.redd.it/ekdyv2yq0an21.jpg', 'permalink': 'https://www.reddit.com/r/cybersecurity/comments/b3c4uy/heres_the_ransomeware_note_associated_with_the/', 'sentiment': '{"probability": {"neg": 0.46227955655667397, "neutral": 0.90740077354661874, "pos": 0.53772044344332603}, "label": "neutral"}'}, {'comment': "Hi All! I'm doing a paper for Uni where I want to purposefully expose my home internet by putting a few IoT devices on the network that are vulnerable to Mirai etc. Does anyone know if there are lists out there of IoT devices that are well known to be vulnerable? I'm looking for something that I would be guaranteed to find exposed through zmap or nmap etc. so that I can then try to hack it myself.... I know Krebs has a list here but it's all IP cameras mostly ([https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack/](https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack/)) ", 'permalink': 'https://www.reddit.com/r/cybersecurity/comments/b1qrop/vulnerable_iot_devices/', 'sentiment': '{"probability": {"neg": 0.75422071403576973, "neutral": 0.2114088281538864, "pos": 0.24577928596423032}, "label": "neg"}'}, {'comment': "How do hackers identify that this specific old router of specific company has a hole?\n\nDo they bruteforce and try every possible attack on all existing models of hardware/software?\n\nSince the antivirus company is not even aware that their tool can't handle a very unique attack - how do hackers find it out?!", 'permalink': 'https://www.reddit.com/r/cybersecurity/comments/b1kfo7/how_do_hackers_find_or_identify_0day_exploiteven/', 'sentiment': '{"probability": {"neg": 0.67373125572174564, "neutral": 0.78441996278916049, "pos": 0.32626874427825436}, "label": "neutral"}'}]}