⤷ Title: AI SOC Agents — How Agentic SOC Outpace Traditional Tools
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:30 GMT
════════════════════════
⌗ Tags: #agentic_ai #cybersecurity #cyber_security_awareness #ai #ai_agent
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:30 GMT
════════════════════════
⌗ Tags: #agentic_ai #cybersecurity #cyber_security_awareness #ai #ai_agent
Medium
AI SOC Agents — How Agentic SOC Outpace Traditional Tools
Discover how AI SOC agents reduce alert fatigue by 83%, cut MTTR by 90%, and autonomously investigate threats 24/7.
⤷ Title: How AI SOC Analysts Are Revolutionizing Cybersecurity Operations in 2025
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:13 GMT
════════════════════════
⌗ Tags: #ai #agentic_ai #cybersecurity #security_operation_center #ai_agent
════════════════════════
𐀪 Author: Simbian.ai
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:37:13 GMT
════════════════════════
⌗ Tags: #ai #agentic_ai #cybersecurity #security_operation_center #ai_agent
Medium
How AI SOC Analysts Are Revolutionizing Cybersecurity Operations in 2025
Learn how AI SOC Analysts are revolutionizing traditional SOC. How to use AI in SOC and much more!
⤷ Title: Building a cyber resilience index beyond traditional risk metrics
════════════════════════
𐀪 Author: Cloud4C Services
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_technology #risk_management #security
════════════════════════
𐀪 Author: Cloud4C Services
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_technology #risk_management #security
Medium
Building a cyber resilience index beyond traditional risk metrics
Measuring cybersecurity by just risk scores is like judging a car’s health just by how clean the windshield is. Sounds moot, right?
⤷ Title: DAILY BUGLE-TRY HACK ME-ROOM
════════════════════════
𐀪 Author: 5kullk3r
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:41:53 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #ctf #cybersecurity #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: 5kullk3r
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:41:53 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #ctf #cybersecurity #tryhackme_writeup #tryhackme
Medium
DAILY BUGLE-TRY HACK ME-ROOM
Hello everyone! This room gave off immediate nostalgic vibes, but we’re here for exploits — although, fun bonus if you’re a Spidey fan thi…
⤷ Title: TryHackMe PT1 Suck
════════════════════════
𐀪 Author: Mahawev
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:21:37 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: Mahawev
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:21:37 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme
Medium
TryHackMe PT1 Suck
Web #1:
The first web application is vulnerable to Cross-Site Scripting (XSS) via the loan comment field, where malicious input such as…
The first web application is vulnerable to Cross-Site Scripting (XSS) via the loan comment field, where malicious input such as…
⤷ Title: Why Stored XSS Is Still So Dangerous: A Real Example and How to Defend
════════════════════════
𐀪 Author: ven coding
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:34:31 GMT
════════════════════════
⌗ Tags: #xss_vulnerability #xss_attack #vulnerability #stored_xss
════════════════════════
𐀪 Author: ven coding
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:34:31 GMT
════════════════════════
⌗ Tags: #xss_vulnerability #xss_attack #vulnerability #stored_xss
Medium
Why Stored XSS Is Still So Dangerous: A Real Example and How to Defend
A real stored XSS vulnerability led to a $500 bug bounty. Here’s what happened, why stored XSS is dangerous, and how to protect your apps.
⤷ Title: The Epic Tale of a JWT Key Left on a Confluence Wiki Page — Totally Secure, Right?
════════════════════════
𐀪 Author: Devansh Patel
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:31:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_writeup #bugs #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: Devansh Patel
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:31:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty_writeup #bugs #bug_bounty_tips #bug_bounty
Medium
📜 The Epic Tale of a JWT Key Left on a Confluence Wiki Page — Totally Secure, Right? 🙄🔐
The story of where to hid JWT key 🔑… and from all places they found 🕵️♂️ was in the public 🌐.
⤷ Title: Python Sandbox Evasion
════════════════════════
𐀪 Author: Francesco Pastore
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:30:10 GMT
════════════════════════
⌗ Tags: #security #technology #hacking #tech #cybersecurity
════════════════════════
𐀪 Author: Francesco Pastore
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:30:10 GMT
════════════════════════
⌗ Tags: #security #technology #hacking #tech #cybersecurity
Medium
Python Sandbox Evasion
A collection of techniques for bypassing common filters in a Python sandbox
⤷ Title: Scooter Hacking: Risky Rides or Just Fun & Games?
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:01:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #electric_scooters #transportation #hacking #security
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:01:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #electric_scooters #transportation #hacking #security
Medium
Scooter Hacking: Risky Rides or Just Fun & Games? 🛴
Ever looked at an electric scooter and thought, “I wonder if I could hack that?” You’re not alone. The rise of shared scooter services has…
⤷ Title: Which WAF Fits Better: SafeLine or Imperva?
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:55:41 GMT
════════════════════════
⌗ Tags: #webdev #cybersecurity #beginners_guide #safeline_waf
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:55:41 GMT
════════════════════════
⌗ Tags: #webdev #cybersecurity #beginners_guide #safeline_waf
Medium
Which WAF Fits Better: SafeLine or Imperva?
When choosing a Web Application Firewall (WAF), you’re likely balancing security performance, deployment flexibility, and total cost. In…
⤷ Title: Carbon Black (P2:Dashboard/Alerts): A Practical Guide/An Practical Training
════════════════════════
𐀪 Author: Dean
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:51 GMT
════════════════════════
⌗ Tags: #forensics #cybersecurity #incident_response #edr #infosec
════════════════════════
𐀪 Author: Dean
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:51 GMT
════════════════════════
⌗ Tags: #forensics #cybersecurity #incident_response #edr #infosec
Medium
Carbon Black (P2:Dashboard/Alerts): A Practical Guide/An Practical Training
Carbon Black EDR (Endpoint Detection and Response) is a powerful tool, but its interface can be a little overwhelming for new users. Let me…
⤷ Title: ISO 27001 ile Bilgi Güvenliğine Yolculuk — 5
════════════════════════
𐀪 Author: İrem Çagla Demirtaş
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:31 GMT
════════════════════════
⌗ Tags: #iso_27001 #information_security #cybersecurity
════════════════════════
𐀪 Author: İrem Çagla Demirtaş
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:31 GMT
════════════════════════
⌗ Tags: #iso_27001 #information_security #cybersecurity
Medium
ISO 27001 ile Bilgi Güvenliğine Yolculuk — 5
Politikalar ve Prosedürlerin Güvenlikteki Rolü
⤷ Title: Day 68: Tea App Security Breaches
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:44:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #data_breach #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:44:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #data_breach #cyber_security_awareness #cybersecurity
Medium
Day 68: Tea App Security Breaches
And what I learned from it
⤷ Title: The Corix Partners Friday Reading List — August 1, 2025
════════════════════════
𐀪 Author: JC Gaillard
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:16:40 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #business #leadership #cybersecurity #technology
════════════════════════
𐀪 Author: JC Gaillard
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:16:40 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #business #leadership #cybersecurity #technology
Medium
The Corix Partners Friday Reading List — August 1, 2025
Top 10 Leadership and Management links of the week, curated by Corix Partners Founder and CEO JC Gaillard, focusing on cyber security of…
⤷ Title: Cyber Risk Management Framework: Best Practices for Continuous Monitoring and Incident Response
════════════════════════
𐀪 Author: Chatsm
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:09:08 GMT
════════════════════════
⌗ Tags: #cyber_risk_management #cyber #cyber_risk #cybercrime #cybersecurity
════════════════════════
𐀪 Author: Chatsm
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:09:08 GMT
════════════════════════
⌗ Tags: #cyber_risk_management #cyber #cyber_risk #cybercrime #cybersecurity
Medium
Cyber Risk Management Framework: Best Practices for Continuous Monitoring and Incident Response
Effective continuous monitoring and incident response capabilities within a cyber risk management framework enable organizations to detect…
⤷ Title: Today’s Top Cyber Intelligence Highlights — Aug 01, 2025
════════════════════════
𐀪 Author: Dr. Fahim K Sufi, CTO & Research Scientist
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:02:35 GMT
════════════════════════
⌗ Tags: #cyber_threat #cyber #cybersecurity
════════════════════════
𐀪 Author: Dr. Fahim K Sufi, CTO & Research Scientist
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:02:35 GMT
════════════════════════
⌗ Tags: #cyber_threat #cyber #cybersecurity
Medium
Today’s Top Cyber Intelligence Highlights — Aug 01, 2025
Today’s cybercrime news is a delightful cocktail of political shenanigans, international espionage, and the usual parade of financially motivated morons; buckle up, buttercups! In short, the past 24…
⤷ Title: Start Earning with Cybersecurity — Even Before You Graduate
════════════════════════
𐀪 Author: Core Academy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:54:19 GMT
════════════════════════
⌗ Tags: #microsoft #cybersecurity #digital_marketing #google #it
════════════════════════
𐀪 Author: Core Academy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:54:19 GMT
════════════════════════
⌗ Tags: #microsoft #cybersecurity #digital_marketing #google #it
Medium
Start Earning with Cybersecurity — Even Before You Graduate
How Core Academy’s Cybersecurity Program Helps You Build Skills and Start Earning Faster Than Ever
⤷ Title: Windows XP Penetration Testing And Exploiting.
════════════════════════
𐀪 Author: Tarunmk
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:07:49 GMT
════════════════════════
⌗ Tags: #windows_xp #penetration_testing #msfconsole
════════════════════════
𐀪 Author: Tarunmk
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:07:49 GMT
════════════════════════
⌗ Tags: #windows_xp #penetration_testing #msfconsole
Medium
Windows XP Penetration Testing And Exploiting.
Start off by turn up both virtual machines.
⤷ Title: TryHackme: Boiler CTF Writeup
════════════════════════
𐀪 Author: Yash Rustagi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:33:34 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #ctf #privilege_escalation #tryhackme
════════════════════════
𐀪 Author: Yash Rustagi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:33:34 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #ctf #privilege_escalation #tryhackme
Medium
TryHackme: Boiler CTF Writeup
Intermediate level CTF which is legit made to troll us and test our patience, enumeration, and privilege escalation skills
❤1
⤷ Title: SAP NetWeaver Flaw Exploited: Auto-Color Linux Backdoor Targets US Chemical Company
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:11:25 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:11:25 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability
Penetration Testing Tools
SAP NetWeaver Flaw Exploited: Auto-Color Linux Backdoor Targets US Chemical Company
Darktrace reports a cyberattack on a US chemical company where attackers exploited a flaw in SAP NetWeaver (CVE-2025-31324) to deploy the Auto-Color Linux backdoor.
⤷ Title: XWorm 6.0 Unleashed: New Variant Uses AMSI Bypass & Critical Process Trick to Evade Detection and Crash Systems
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:08:28 +0000
════════════════════════
⌗ Tags: #Malware #AMSI Bypass #cybersecurity #Evasion #malware #persistence #RAT #Remote Access Trojan #XWorm #XWorm 6.0
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:08:28 +0000
════════════════════════
⌗ Tags: #Malware #AMSI Bypass #cybersecurity #Evasion #malware #persistence #RAT #Remote Access Trojan #XWorm #XWorm 6.0
Penetration Testing Tools
XWorm 6.0 Unleashed: New Variant Uses AMSI Bypass & Critical Process Trick to Evade Detection and Crash Systems
Netskope uncovers XWorm 6.0, a new variant using VBScript droppers, AMSI bypass, and critical process marking to evade detection and force system reboots if terminated.