⤷ Title: Python Sandbox Evasion
════════════════════════
𐀪 Author: Francesco Pastore
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:30:10 GMT
════════════════════════
⌗ Tags: #security #technology #hacking #tech #cybersecurity
════════════════════════
𐀪 Author: Francesco Pastore
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:30:10 GMT
════════════════════════
⌗ Tags: #security #technology #hacking #tech #cybersecurity
Medium
Python Sandbox Evasion
A collection of techniques for bypassing common filters in a Python sandbox
⤷ Title: Scooter Hacking: Risky Rides or Just Fun & Games?
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:01:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #electric_scooters #transportation #hacking #security
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:01:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #electric_scooters #transportation #hacking #security
Medium
Scooter Hacking: Risky Rides or Just Fun & Games? 🛴
Ever looked at an electric scooter and thought, “I wonder if I could hack that?” You’re not alone. The rise of shared scooter services has…
⤷ Title: Which WAF Fits Better: SafeLine or Imperva?
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:55:41 GMT
════════════════════════
⌗ Tags: #webdev #cybersecurity #beginners_guide #safeline_waf
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:55:41 GMT
════════════════════════
⌗ Tags: #webdev #cybersecurity #beginners_guide #safeline_waf
Medium
Which WAF Fits Better: SafeLine or Imperva?
When choosing a Web Application Firewall (WAF), you’re likely balancing security performance, deployment flexibility, and total cost. In…
⤷ Title: Carbon Black (P2:Dashboard/Alerts): A Practical Guide/An Practical Training
════════════════════════
𐀪 Author: Dean
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:51 GMT
════════════════════════
⌗ Tags: #forensics #cybersecurity #incident_response #edr #infosec
════════════════════════
𐀪 Author: Dean
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:51 GMT
════════════════════════
⌗ Tags: #forensics #cybersecurity #incident_response #edr #infosec
Medium
Carbon Black (P2:Dashboard/Alerts): A Practical Guide/An Practical Training
Carbon Black EDR (Endpoint Detection and Response) is a powerful tool, but its interface can be a little overwhelming for new users. Let me…
⤷ Title: ISO 27001 ile Bilgi Güvenliğine Yolculuk — 5
════════════════════════
𐀪 Author: İrem Çagla Demirtaş
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:31 GMT
════════════════════════
⌗ Tags: #iso_27001 #information_security #cybersecurity
════════════════════════
𐀪 Author: İrem Çagla Demirtaş
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:54:31 GMT
════════════════════════
⌗ Tags: #iso_27001 #information_security #cybersecurity
Medium
ISO 27001 ile Bilgi Güvenliğine Yolculuk — 5
Politikalar ve Prosedürlerin Güvenlikteki Rolü
⤷ Title: Day 68: Tea App Security Breaches
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:44:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #data_breach #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:44:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #data_breach #cyber_security_awareness #cybersecurity
Medium
Day 68: Tea App Security Breaches
And what I learned from it
⤷ Title: The Corix Partners Friday Reading List — August 1, 2025
════════════════════════
𐀪 Author: JC Gaillard
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:16:40 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #business #leadership #cybersecurity #technology
════════════════════════
𐀪 Author: JC Gaillard
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:16:40 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #business #leadership #cybersecurity #technology
Medium
The Corix Partners Friday Reading List — August 1, 2025
Top 10 Leadership and Management links of the week, curated by Corix Partners Founder and CEO JC Gaillard, focusing on cyber security of…
⤷ Title: Cyber Risk Management Framework: Best Practices for Continuous Monitoring and Incident Response
════════════════════════
𐀪 Author: Chatsm
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:09:08 GMT
════════════════════════
⌗ Tags: #cyber_risk_management #cyber #cyber_risk #cybercrime #cybersecurity
════════════════════════
𐀪 Author: Chatsm
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:09:08 GMT
════════════════════════
⌗ Tags: #cyber_risk_management #cyber #cyber_risk #cybercrime #cybersecurity
Medium
Cyber Risk Management Framework: Best Practices for Continuous Monitoring and Incident Response
Effective continuous monitoring and incident response capabilities within a cyber risk management framework enable organizations to detect…
⤷ Title: Today’s Top Cyber Intelligence Highlights — Aug 01, 2025
════════════════════════
𐀪 Author: Dr. Fahim K Sufi, CTO & Research Scientist
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:02:35 GMT
════════════════════════
⌗ Tags: #cyber_threat #cyber #cybersecurity
════════════════════════
𐀪 Author: Dr. Fahim K Sufi, CTO & Research Scientist
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 06:02:35 GMT
════════════════════════
⌗ Tags: #cyber_threat #cyber #cybersecurity
Medium
Today’s Top Cyber Intelligence Highlights — Aug 01, 2025
Today’s cybercrime news is a delightful cocktail of political shenanigans, international espionage, and the usual parade of financially motivated morons; buckle up, buttercups! In short, the past 24…
⤷ Title: Start Earning with Cybersecurity — Even Before You Graduate
════════════════════════
𐀪 Author: Core Academy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:54:19 GMT
════════════════════════
⌗ Tags: #microsoft #cybersecurity #digital_marketing #google #it
════════════════════════
𐀪 Author: Core Academy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:54:19 GMT
════════════════════════
⌗ Tags: #microsoft #cybersecurity #digital_marketing #google #it
Medium
Start Earning with Cybersecurity — Even Before You Graduate
How Core Academy’s Cybersecurity Program Helps You Build Skills and Start Earning Faster Than Ever
⤷ Title: Windows XP Penetration Testing And Exploiting.
════════════════════════
𐀪 Author: Tarunmk
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:07:49 GMT
════════════════════════
⌗ Tags: #windows_xp #penetration_testing #msfconsole
════════════════════════
𐀪 Author: Tarunmk
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:07:49 GMT
════════════════════════
⌗ Tags: #windows_xp #penetration_testing #msfconsole
Medium
Windows XP Penetration Testing And Exploiting.
Start off by turn up both virtual machines.
⤷ Title: TryHackme: Boiler CTF Writeup
════════════════════════
𐀪 Author: Yash Rustagi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:33:34 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #ctf #privilege_escalation #tryhackme
════════════════════════
𐀪 Author: Yash Rustagi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 05:33:34 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #ctf #privilege_escalation #tryhackme
Medium
TryHackme: Boiler CTF Writeup
Intermediate level CTF which is legit made to troll us and test our patience, enumeration, and privilege escalation skills
❤1
⤷ Title: SAP NetWeaver Flaw Exploited: Auto-Color Linux Backdoor Targets US Chemical Company
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:11:25 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:11:25 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability
Penetration Testing Tools
SAP NetWeaver Flaw Exploited: Auto-Color Linux Backdoor Targets US Chemical Company
Darktrace reports a cyberattack on a US chemical company where attackers exploited a flaw in SAP NetWeaver (CVE-2025-31324) to deploy the Auto-Color Linux backdoor.
⤷ Title: XWorm 6.0 Unleashed: New Variant Uses AMSI Bypass & Critical Process Trick to Evade Detection and Crash Systems
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:08:28 +0000
════════════════════════
⌗ Tags: #Malware #AMSI Bypass #cybersecurity #Evasion #malware #persistence #RAT #Remote Access Trojan #XWorm #XWorm 6.0
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:08:28 +0000
════════════════════════
⌗ Tags: #Malware #AMSI Bypass #cybersecurity #Evasion #malware #persistence #RAT #Remote Access Trojan #XWorm #XWorm 6.0
Penetration Testing Tools
XWorm 6.0 Unleashed: New Variant Uses AMSI Bypass & Critical Process Trick to Evade Detection and Crash Systems
Netskope uncovers XWorm 6.0, a new variant using VBScript droppers, AMSI bypass, and critical process marking to evade detection and force system reboots if terminated.
⤷ Title: Cybercrime Fueling War? Thai-Cambodian Conflict Linked to “Cyber Slave” Scams
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:06:27 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cambodia #Conflict #Cyber Slave Camps #cybercrime #Geopolitics #National Security #Scams #Thailand
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:06:27 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cambodia #Conflict #Cyber Slave Camps #cybercrime #Geopolitics #National Security #Scams #Thailand
Penetration Testing Tools
Cybercrime Fueling War? Thai-Cambodian Conflict Linked to "Cyber Slave" Scams
A territorial dispute between Thailand and Cambodia has escalated into armed conflict, fueled by illicit cyber slave camps and the geopolitical tensions they create.
⤷ Title: Critical BIOS Flaws in Lenovo Desktops Expose SMM to Privilege Escalation
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:03:58 +0000
════════════════════════
⌗ Tags: #Vulnerability #BIOS #cybersecurity #firmware #IdeaCentre #Insyde Software #Lenovo #privilege escalation #SMM #vulnerability #Yoga AIO
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:03:58 +0000
════════════════════════
⌗ Tags: #Vulnerability #BIOS #cybersecurity #firmware #IdeaCentre #Insyde Software #Lenovo #privilege escalation #SMM #vulnerability #Yoga AIO
Penetration Testing Tools
Critical BIOS Flaws in Lenovo Desktops Expose SMM to Privilege Escalation
Binarly discovered six critical SMM flaws in Lenovo desktops with Insyde BIOS, allowing local attackers to inject code and elevate privileges to a level beyond the OS.
⤷ Title: Solving the challenges of a bug bounty program manager (BBPM). Strategic execution for security leaders.
════════════════════════
𐀪 Author: Eleanor Barlow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 00:00:00 GMT
════════════════════════
⌗ Tags: #Business Insights
════════════════════════
𐀪 Author: Eleanor Barlow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 00:00:00 GMT
════════════════════════
⌗ Tags: #Business Insights
Intigriti
Solving the challenges of a bug bounty program manager (BBPM). Strategic execution for security leaders.
There are 6 key pain points a bug bounty program manager (BBPM) faces. This blog dissects those pain points and shows how a bug bounty program can support and drive your security strategy.
⤷ Title: Week 7 — Learning Basic Concepts of Cybersecurity
════════════════════════
𐀪 Author: Aang
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:11:23 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #information_security #information_technology #ethical_hacking
════════════════════════
𐀪 Author: Aang
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:11:23 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #information_security #information_technology #ethical_hacking
Medium
Week 7 — Learning Basic Concepts of Cybersecurity
After 100 Years — Katara discovers Aang frozen in a giant iceberg
⤷ Title: Fixing the BloodHound Startup Error on Kali Linux
════════════════════════
𐀪 Author: Prath
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:32:17 GMT
════════════════════════
⌗ Tags: #bloodhound #active_directory #hackthebox #bug_bounty #pentesting
════════════════════════
𐀪 Author: Prath
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:32:17 GMT
════════════════════════
⌗ Tags: #bloodhound #active_directory #hackthebox #bug_bounty #pentesting
Medium
Fixing the BloodHound Startup Error on Kali Linux
Fixing the “It seems it’s the first time you run BloodHound. Please run bloodhound-setup first.” Error on Kali Linux
⤷ Title: How 3 Free Recon Tools found 40 Bugs — Helped To Score $1200 in Bug Bounties
════════════════════════
𐀪 Author: Rashadul Islam
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:22:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #writing #bug_bounty #technology
════════════════════════
𐀪 Author: Rashadul Islam
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:22:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #writing #bug_bounty #technology
Medium
How 3 Free Recon Tools Found 40 Bugs — Helped To Score $1200 in Bug Bounties
How I Uncovered 40 Bugs in One Month with Just 3 Free Tools
⤷ Title: Hacked the AI, Got the Bounty: Obfuscation & Prompt Injection Techniques for Red Teamers
════════════════════════
𐀪 Author: CyberTechAjju
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:11:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #llm #ai #jailbreak #cybersecurity
════════════════════════
𐀪 Author: CyberTechAjju
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:11:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #llm #ai #jailbreak #cybersecurity
Medium
💥 Hacked the AI, Got the Bounty: Obfuscation & Prompt Injection Techniques for Red Teamers
Unlocking the Dark Corners of LLMs — By CyberTechAjju