⤷ Title: Notes of an Old Guru: The DNS Temporary Attack
════════════════════════
𐀪 Author: 0trust0day
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:30:35 GMT
════════════════════════
⌗ Tags: #dns_attack #red_team #cybersecurity #dns_interception #dnshijack
════════════════════════
𐀪 Author: 0trust0day
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:30:35 GMT
════════════════════════
⌗ Tags: #dns_attack #red_team #cybersecurity #dns_interception #dnshijack
Medium
Notes of an Old Guru: The DNS Temporary Attack
How Our Red Team Breached the Most Secure Division of a Global Corporation
⤷ Title: ISMAP Management Standards Chapter 3: What is “Governance” for Information Security, Led by…
════════════════════════
𐀪 Author: nolly
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:19:44 GMT
════════════════════════
⌗ Tags: #informationsecurityaudit #information_security #cybersecurity #saas #ismap
════════════════════════
𐀪 Author: nolly
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:19:44 GMT
════════════════════════
⌗ Tags: #informationsecurityaudit #information_security #cybersecurity #saas #ismap
Medium
ISMAP Management Standards Chapter 3: What is “Governance” for Information Security, Led by Management?
Hello everyone!
⤷ Title: Let’s Defend: 263 — SOC287 — Arbitrary File Read on Checkpoint Security Gateway [CVE-2024–24919] |…
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:15:15 GMT
════════════════════════
⌗ Tags: #lets_defend #writeup #cybersecurity #blue_team
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:15:15 GMT
════════════════════════
⌗ Tags: #lets_defend #writeup #cybersecurity #blue_team
Medium
Let’s Defend: 263 — SOC287 — Arbitrary File Read on Checkpoint Security Gateway [CVE-2024–24919] | Writeup
Let’s Defend is an interactive, hands-on training platform focused on Blue Team (defensive cybersecurity) operations. It simulates a…
⤷ Title: Host & Network Penetration Testing: System-Host Based Attacks CTF 2 Walkthrough
════════════════════════
𐀪 Author: Mabdullahbinkhalid
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:42:04 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #privilege_escalation #ethical_hacking #ejpt #penetration_testing
════════════════════════
𐀪 Author: Mabdullahbinkhalid
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:42:04 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #privilege_escalation #ethical_hacking #ejpt #penetration_testing
Medium
Host & Network Penetration Testing: System-Host Based Attacks CTF 2 Walkthrough
I will share my approach to this challenge. So, follow along the walkthrough. The challenge has two machines; target1.ine.local for first…
⤷ Title: OSCP Privilege Escalation: Linux File Expansion
════════════════════════
𐀪 Author: enigma_
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:21:57 GMT
════════════════════════
⌗ Tags: #mr_robot #offsec #penetration_testing #privilege_escalation #oscp
════════════════════════
𐀪 Author: enigma_
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:21:57 GMT
════════════════════════
⌗ Tags: #mr_robot #offsec #penetration_testing #privilege_escalation #oscp
Medium
OSCP Privilege Escalation: Linux File Expansion
Slick Linux moves to impress the ladies (it won’t).
⤷ Title: TryHackMe OWASP TOP 10 2021 -WalkThrough
════════════════════════
𐀪 Author: Kumari Amita Kishore
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:19:41 GMT
════════════════════════
⌗ Tags: #tryhackme #pentesting #web_application_security #owasp_top_10
════════════════════════
𐀪 Author: Kumari Amita Kishore
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:19:41 GMT
════════════════════════
⌗ Tags: #tryhackme #pentesting #web_application_security #owasp_top_10
Medium
TryHackMe OWASP TOP 10 2021 -WalkThrough
OWASP Top 10 Made Simple — With Hands-On Screenshots & Notes
⤷ Title: Russian State Hackers Spy on Moscow Embassies via ISP-Level AiTM Attacks
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:53:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #adversary_in_the_middle #AiTM #ApolloShadow #Cyberespionage #Embassies #Moscow #russia #Secret Blizzard #SORM #turla
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:53:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #adversary_in_the_middle #AiTM #ApolloShadow #Cyberespionage #Embassies #Moscow #russia #Secret Blizzard #SORM #turla
Daily CyberSecurity
Russian State Hackers Spy on Moscow Embassies via ISP-Level AiTM Attacks
Microsoft reveals Russian state actor Secret Blizzard is targeting foreign embassies in Moscow with ISP-level AiTM attacks, deploying ApolloShadow malware to spy on diplomats.
⤷ Title: Cisco Talos Q2 Report: Phishing & Ransomware Dominate, with Qilin Using Deprecated PowerShell 1.0
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:40:19 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cisco Talos #Credential Harvesting #cybersecurity #phishing #powershell #Qilin Ransomware #ransomware #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:40:19 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cisco Talos #Credential Harvesting #cybersecurity #phishing #powershell #Qilin Ransomware #ransomware #threat intelligence
Daily CyberSecurity
Cisco Talos Q2 Report: Phishing & Ransomware Dominate, with Qilin Using Deprecated PowerShell 1.0
Cisco Talos' Q2 2025 report reveals phishing is the top access method. Ransomware, including Qilin, dominated, with a surprising trend of attackers abusing PowerShell 1.0 to evade security.
⤷ Title: LockBit Ransomware Evolves: New Stealthy Tactics Use DLL Sideloading & Masquerading to Bypass Defenses
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:30:41 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cybersecurity #DLL Sideloading #evasion #LockBit #Masquerading #ransomware #Symantec #threat actor #TTPs
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:30:41 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cybersecurity #DLL Sideloading #evasion #LockBit #Masquerading #ransomware #Symantec #threat actor #TTPs
Daily CyberSecurity
LockBit Ransomware Evolves: New Stealthy Tactics Use DLL Sideloading & Masquerading to Bypass Defenses
Symantec's report reveals LockBit is using evolved tactics, including DLL sideloading and process masquerading with legitimate executables, to evade detection and deploy payloads.
⤷ Title: Google’s “Virtual Satellite” is Here: New AI Model AlphaEarth Foundations Maps the Planet with Unprecedented Detail
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:22:57 +0000
════════════════════════
⌗ Tags: #Technology #AI #AlphaEarth Foundations #climate change #Earth Observation #Environmental Monitoring #Geospatial Data #google #Virtual Satellite
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:22:57 +0000
════════════════════════
⌗ Tags: #Technology #AI #AlphaEarth Foundations #climate change #Earth Observation #Environmental Monitoring #Geospatial Data #google #Virtual Satellite
Daily CyberSecurity
Google's "Virtual Satellite" is Here: New AI Model AlphaEarth Foundations Maps the Planet with Unprecedented Detail
Google launches AlphaEarth Foundations, an AI model that functions as a "virtual satellite," integrating vast data to monitor and analyze changes across Earth with unprecedented speed and detail.
⤷ Title: Palo Alto Networks Acquires CyberArk for $25B, Enters Identity Security Market
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:18:27 +0000
════════════════════════
⌗ Tags: #Technology #acquisition #AI #CyberArk #cybersecurity #Identity Security #Nikesh Arora #Palo Alto Networks #PAM #Privileged Access Management
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:18:27 +0000
════════════════════════
⌗ Tags: #Technology #acquisition #AI #CyberArk #cybersecurity #Identity Security #Nikesh Arora #Palo Alto Networks #PAM #Privileged Access Management
Daily CyberSecurity
Palo Alto Networks Acquires CyberArk for $25B, Enters Identity Security Market
Palo Alto Networks is acquiring identity security leader CyberArk for nearly $25B. The deal marks Palo Alto's strategic entry into identity security, a critical pillar for the AI era.
⤷ Title: Qualcomm Thrives Amid Apple Chip Shift, Diversifies Beyond Mobile with Strong Q2 Results
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:13:45 +0000
════════════════════════
⌗ Tags: #Technology #AI #Apple #Automotive #C1 Chip #Diversification #financial results #IOT #mobile #Qualcomm #Snapdragon #Tech News
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:13:45 +0000
════════════════════════
⌗ Tags: #Technology #AI #Apple #Automotive #C1 Chip #Diversification #financial results #IOT #mobile #Qualcomm #Snapdragon #Tech News
Daily CyberSecurity
Qualcomm Thrives Amid Apple Chip Shift, Diversifies Beyond Mobile with Strong Q2 Results
Qualcomm's Q2 fiscal results exceeded expectations despite Apple's in-house modem. The company's strategic pivot to automotive, IoT, and data center markets is fueling growth.
⤷ Title: Proton Launches Standalone Authenticator: Separating MFA from Passwords for Ultimate Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:10:06 +0000
════════════════════════
⌗ Tags: #Technology #cybersecurity #encryption #MFA #open_source #password manager #Proton Authenticator #Proton Pass #two_factor authentication
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:10:06 +0000
════════════════════════
⌗ Tags: #Technology #cybersecurity #encryption #MFA #open_source #password manager #Proton Authenticator #Proton Pass #two_factor authentication
Daily CyberSecurity
Proton Launches Standalone Authenticator: Separating MFA from Passwords for Ultimate Security
Proton introduces a new, open-source MFA app, Proton Authenticator, designed to separate 2FA codes from passwords for enhanced security with end-to-end encryption.
⤷ Title: Arm Considers Shifting to Chip Development, Competing with Qualcomm & NVIDIA
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:05:42 +0000
════════════════════════
⌗ Tags: #Technology #AI #ARM #Chip Development #Chiplets #Licensing #nvidia #Qualcomm #Rene Haas #Semiconductors #Tech Industry
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:05:42 +0000
════════════════════════
⌗ Tags: #Technology #AI #ARM #Chip Development #Chiplets #Licensing #nvidia #Qualcomm #Rene Haas #Semiconductors #Tech Industry
Daily CyberSecurity
Arm Considers Shifting to Chip Development, Competing with Qualcomm & NVIDIA
Arm CEO Rene Haas confirms the company is exploring developing its own chips and chiplets, marking a strategic pivot that could put it in direct competition with long-time partners like Qualcomm and NVIDIA.Arm, Chip Development, AI, Chiplets, Semiconductors…
⤷ Title: Stop Guessing What 404 Means! The Ultimate Guide to HTTP Status Codes You Need to Bookmark
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:20:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #burpsuite #https
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:20:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #burpsuite #https
Medium
Stop Guessing What 404 Means! The Ultimate Guide to HTTP Status Codes You Need to Bookmark
🚦 HTTP Status Codes: The Only Guide You’ll Ever Need (With Full Error Code List)
⤷ Title: 4. Malware
════════════════════════
𐀪 Author: unknownman
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 01:52:00 GMT
════════════════════════
⌗ Tags: #hacking #malware #red_team #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: unknownman
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 01:52:00 GMT
════════════════════════
⌗ Tags: #hacking #malware #red_team #penetration_testing #cybersecurity
Medium
4. Malware
The history of malware and their scenarios of attacks
⤷ Title: IOC vs IOA: Why Most Detection Strategies Are Doomed From the Start
════════════════════════
𐀪 Author: Manish Rawat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 00:54:25 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #security #infosec #job_hunting
════════════════════════
𐀪 Author: Manish Rawat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 00:54:25 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #security #infosec #job_hunting
Medium
ecurity IOC vs IOA: Why Most Detection Strategies Are Doomed From the Start
In today’s cybersecurity landscape, there’s one question that separates mature detection programs from the rest:
⤷ Title: What Your Website Style Reveals About You
════════════════════════
𐀪 Author: Er Raj Aryan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:42:06 GMT
════════════════════════
⌗ Tags: #ux #css #ui #web_development #cybersecurity
════════════════════════
𐀪 Author: Er Raj Aryan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:42:06 GMT
════════════════════════
⌗ Tags: #ux #css #ui #web_development #cybersecurity
Medium
What Your Website’s Style Says About You — And How Hackers Can Use It Against You
Your site’s design speaks volumes — and hackers know it. Learn how CSS can hide malware and protect your website from attacks.
⤷ Title: Quantum Security: Why We Need to Prepare Now, Not Later
════════════════════════
𐀪 Author: Dukerearing
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:14:48 GMT
════════════════════════
⌗ Tags: #data_security #quantum_computing #cybersecurity #quantum_security #post_quantum
════════════════════════
𐀪 Author: Dukerearing
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:14:48 GMT
════════════════════════
⌗ Tags: #data_security #quantum_computing #cybersecurity #quantum_security #post_quantum
Medium
Quantum Security: Why We Need to Prepare Now, Not Later
Quantum computing isn’t science fiction anymore — it’s fast becoming science fact. While this opens the door to revolutionary…
⤷ Title: A CCSP (Certified Cloud Security Professional) Exam Kickstarter for Cloud Native Security…
════════════════════════
𐀪 Author: Gerald Bachlmayr
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:01:25 GMT
════════════════════════
⌗ Tags: #cloud_native #ccsp #cybersecurity #aws #cloud_security
════════════════════════
𐀪 Author: Gerald Bachlmayr
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 02:01:25 GMT
════════════════════════
⌗ Tags: #cloud_native #ccsp #cybersecurity #aws #cloud_security
Medium
A CCSP (Certified Cloud Security Professional) Exam Kickstarter for Cloud Native Security…
In the first part, we covered why CCSP matters, key differences to cloud provider certifications, and risk terminology. As a next step, we…
⤷ Title: This Malware Uses Facebook Ads to Hijack Your Crypto
════════════════════════
𐀪 Author: Cyber-AppSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 01:58:36 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ai #cryptocurrency #facebook
════════════════════════
𐀪 Author: Cyber-AppSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 01:58:36 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ai #cryptocurrency #facebook
Medium
This Malware Uses Facebook Ads to Hijack Your Crypto
Imagine scrolling through Facebook, clicking a flashy ad for a cool crypto trading app… and BAM — your entire system is now under hacker…