⤷ Title: Revenant: A Modern, Full-Stack Reverse Shell C2 Framework — From Payload Generation to Victim…
════════════════════════
𐀪 Author: Hack-Bat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:30:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #security #hacking #pentesting
════════════════════════
𐀪 Author: Hack-Bat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:30:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #security #hacking #pentesting
Medium
Revenant: A Modern, Full-Stack Reverse Shell C2 Framework — From Payload Generation to Victim session Management
A proof-of-concept that turns plain HTTP into a full-fledged C2 infrastructure, built entirely in C++.
⤷ Title: Master’s Degree vs. Certifications in Cybersecurity: Which Wins?
════════════════════════
𐀪 Author: Authlyn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:34 GMT
════════════════════════
⌗ Tags: #certification #infosec #cybersecurity #education #career_advice
════════════════════════
𐀪 Author: Authlyn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:34 GMT
════════════════════════
⌗ Tags: #certification #infosec #cybersecurity #education #career_advice
Medium
Master’s Degree vs. Certifications in Cybersecurity: Which Wins?
So, you want to break into cybersecurity, huh? Awesome choice! It’s a wild ride, but super rewarding. Now comes the big question: Do you…
⤷ Title: ️ Securing Binaries Against Reverse Engineering: A Developer’s Guide
════════════════════════
𐀪 Author: Geeky Vartika
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:54:50 GMT
════════════════════════
⌗ Tags: #data_security #information_security #reverse_engineering #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Geeky Vartika
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:54:50 GMT
════════════════════════
⌗ Tags: #data_security #information_security #reverse_engineering #cyber_security_awareness #cybersecurity
Medium
🛡️ Securing Binaries Against Reverse Engineering: A Developer’s Guide
Software development isn’t just about writing code — it’s also about protecting it. Once your code is compiled into a binary and shipped…
⤷ Title: Rapid7 Layoffs: “Brutal, but is it really a surprise?”
════════════════════════
𐀪 Author: Truspex
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:48:05 GMT
════════════════════════
⌗ Tags: #career_advice #cybersecurity #security #layoffs #tech_industry
════════════════════════
𐀪 Author: Truspex
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:48:05 GMT
════════════════════════
⌗ Tags: #career_advice #cybersecurity #security #layoffs #tech_industry
Medium
Rapid7 Layoffs: “Brutal, but is it really a surprise?”
Okay, let’s address the elephant in the room. The cybersecurity world is buzzing about the recent layoffs at Rapid7. It’s never good news…
⤷ Title: What is the difference between IoC and IoA?
════════════════════════
𐀪 Author: BnHany
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:44:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_threat_intelligence #society #technology #information_security
════════════════════════
𐀪 Author: BnHany
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:44:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_threat_intelligence #society #technology #information_security
Medium
What is the difference between IoC and IoA?
“‘IoA’ Indicator of Attack VS ‘IOC’ Indicator of Compromise”
⤷ Title: Cara Menginstal Perangkat Lunak Keamanan Seperti Antivirus
════════════════════════
𐀪 Author: Fadhlan Kiramim
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:42:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #self_improvement
════════════════════════
𐀪 Author: Fadhlan Kiramim
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:42:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #self_improvement
Medium
Cara Menginstal Perangkat Lunak Keamanan Seperti Antivirus
Di era digital seperti sekarang, keamanan siber menjadi hal yang sangat penting. Setiap hari, jutaan perangkat komputer dan smartphone…
⤷ Title: AI SOC Revolution: How Artificial Intelligence is Transforming Cybersecurity Operations in 2025
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:48 GMT
════════════════════════
⌗ Tags: #agentic_ai #cyber_security_awareness #ai_agent #cybersecurity #ai
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:48 GMT
════════════════════════
⌗ Tags: #agentic_ai #cyber_security_awareness #ai_agent #cybersecurity #ai
Medium
AI SOC Revolution: How Artificial Intelligence is Transforming Cybersecurity Operations in 2025
Discover how AI-powered Security Operations Centers (SOCs) are revolutionizing cybersecurity with AI,
⤷ Title: AI SOC Agents — How Agentic SOC Outpace Traditional Tools
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:30 GMT
════════════════════════
⌗ Tags: #agentic_ai #cybersecurity #cyber_security_awareness #ai #ai_agent
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:30 GMT
════════════════════════
⌗ Tags: #agentic_ai #cybersecurity #cyber_security_awareness #ai #ai_agent
Medium
AI SOC Agents — How Agentic SOC Outpace Traditional Tools
Discover how AI SOC agents reduce alert fatigue by 83%, cut MTTR by 90%, and autonomously investigate threats 24/7.
⤷ Title: How AI SOC Analysts Are Revolutionizing Cybersecurity Operations in 2025
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:13 GMT
════════════════════════
⌗ Tags: #ai #agentic_ai #cybersecurity #security_operation_center #ai_agent
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:13 GMT
════════════════════════
⌗ Tags: #ai #agentic_ai #cybersecurity #security_operation_center #ai_agent
Medium
How AI SOC Analysts Are Revolutionizing Cybersecurity Operations in 2025
Learn how AI SOC Analysts are revolutionizing traditional SOC. How to use AI in SOC and much more!
⤷ Title: Building a cyber resilience index beyond traditional risk metrics
════════════════════════
𐀪 Author: Cloud4C Services
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_technology #risk_management #security
════════════════════════
𐀪 Author: Cloud4C Services
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_technology #risk_management #security
Medium
Building a cyber resilience index beyond traditional risk metrics
Measuring cybersecurity by just risk scores is like judging a car’s health just by how clean the windshield is. Sounds moot, right?
⤷ Title: DAILY BUGLE-TRY HACK ME-ROOM
════════════════════════
𐀪 Author: 5kullk3r
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:41:53 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #ctf #cybersecurity #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: 5kullk3r
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:41:53 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #ctf #cybersecurity #tryhackme_writeup #tryhackme
Medium
DAILY BUGLE-TRY HACK ME-ROOM
Hello everyone! This room gave off immediate nostalgic vibes, but we’re here for exploits — although, fun bonus if you’re a Spidey fan thi…
⤷ Title: TryHackMe PT1 Suck
════════════════════════
𐀪 Author: Mahawev
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:21:37 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: Mahawev
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:21:37 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme
Medium
TryHackMe PT1 Suck
Web #1:
The first web application is vulnerable to Cross-Site Scripting (XSS) via the loan comment field, where malicious input such as…
The first web application is vulnerable to Cross-Site Scripting (XSS) via the loan comment field, where malicious input such as…
⤷ Title: Why Stored XSS Is Still So Dangerous: A Real Example and How to Defend
════════════════════════
𐀪 Author: ven coding
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:34:31 GMT
════════════════════════
⌗ Tags: #xss_vulnerability #xss_attack #vulnerability #stored_xss
════════════════════════
𐀪 Author: ven coding
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:34:31 GMT
════════════════════════
⌗ Tags: #xss_vulnerability #xss_attack #vulnerability #stored_xss
Medium
Why Stored XSS Is Still So Dangerous: A Real Example and How to Defend
A real stored XSS vulnerability led to a $500 bug bounty. Here’s what happened, why stored XSS is dangerous, and how to protect your apps.
⤷ Title: The Epic Tale of a JWT Key Left on a Confluence Wiki Page — Totally Secure, Right?
════════════════════════
𐀪 Author: Devansh Patel
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:31:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_writeup #bugs #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: Devansh Patel
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:31:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_writeup #bugs #bug_bounty_tips #bug_bounty
Medium
📜 The Epic Tale of a JWT Key Left on a Confluence Wiki Page — Totally Secure, Right? 🙄🔐
The story of where to hid JWT key 🔑… and from all places they found 🕵️♂️ was in the public 🌐.
⤷ Title: Python Sandbox Evasion
════════════════════════
𐀪 Author: Francesco Pastore
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:30:10 GMT
════════════════════════
⌗ Tags: #security #technology #hacking #tech #cybersecurity
════════════════════════
𐀪 Author: Francesco Pastore
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:30:10 GMT
════════════════════════
⌗ Tags: #security #technology #hacking #tech #cybersecurity
Medium
Python Sandbox Evasion
A collection of techniques for bypassing common filters in a Python sandbox
⤷ Title: Scooter Hacking: Risky Rides or Just Fun & Games?
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:01:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #electric_scooters #transportation #hacking #security
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:01:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #electric_scooters #transportation #hacking #security
Medium
Scooter Hacking: Risky Rides or Just Fun & Games? 🛴
Ever looked at an electric scooter and thought, “I wonder if I could hack that?” You’re not alone. The rise of shared scooter services has…
⤷ Title: Which WAF Fits Better: SafeLine or Imperva?
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:55:41 GMT
════════════════════════
⌗ Tags: #webdev #cybersecurity #beginners_guide #safeline_waf
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:55:41 GMT
════════════════════════
⌗ Tags: #webdev #cybersecurity #beginners_guide #safeline_waf
Medium
Which WAF Fits Better: SafeLine or Imperva?
When choosing a Web Application Firewall (WAF), you’re likely balancing security performance, deployment flexibility, and total cost. In…
⤷ Title: Carbon Black (P2:Dashboard/Alerts): A Practical Guide/An Practical Training
════════════════════════
𐀪 Author: Dean
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:51 GMT
════════════════════════
⌗ Tags: #forensics #cybersecurity #incident_response #edr #infosec
════════════════════════
𐀪 Author: Dean
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:51 GMT
════════════════════════
⌗ Tags: #forensics #cybersecurity #incident_response #edr #infosec
Medium
Carbon Black (P2:Dashboard/Alerts): A Practical Guide/An Practical Training
Carbon Black EDR (Endpoint Detection and Response) is a powerful tool, but its interface can be a little overwhelming for new users. Let me…
⤷ Title: ISO 27001 ile Bilgi Güvenliğine Yolculuk — 5
════════════════════════
𐀪 Author: İrem Çagla Demirtaş
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:31 GMT
════════════════════════
⌗ Tags: #iso_27001 #information_security #cybersecurity
════════════════════════
𐀪 Author: İrem Çagla Demirtaş
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:31 GMT
════════════════════════
⌗ Tags: #iso_27001 #information_security #cybersecurity
Medium
ISO 27001 ile Bilgi Güvenliğine Yolculuk — 5
Politikalar ve Prosedürlerin Güvenlikteki Rolü
⤷ Title: Day 68: Tea App Security Breaches
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:44:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #data_breach #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:44:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #data_breach #cyber_security_awareness #cybersecurity
Medium
Day 68: Tea App Security Breaches
And what I learned from it
⤷ Title: The Corix Partners Friday Reading List — August 1, 2025
════════════════════════
𐀪 Author: JC Gaillard
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:16:40 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #business #leadership #cybersecurity #technology
════════════════════════
𐀪 Author: JC Gaillard
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:16:40 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #business #leadership #cybersecurity #technology
Medium
The Corix Partners Friday Reading List — August 1, 2025
Top 10 Leadership and Management links of the week, curated by Corix Partners Founder and CEO JC Gaillard, focusing on cyber security of…