⤷ Title: Hacked the AI, Got the Bounty: Obfuscation & Prompt Injection Techniques for Red Teamers
════════════════════════
𐀪 Author: CyberTechAjju
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:11:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #llm #ai #jailbreak #cybersecurity
════════════════════════
𐀪 Author: CyberTechAjju
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:11:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #llm #ai #jailbreak #cybersecurity
Medium
💥 Hacked the AI, Got the Bounty: Obfuscation & Prompt Injection Techniques for Red Teamers
Unlocking the Dark Corners of LLMs — By CyberTechAjju
⤷ Title: Getting Started with Sysmon — System Monitoring for Windows
════════════════════════
𐀪 Author: Samuel George
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:25:43 GMT
════════════════════════
⌗ Tags: #system_monitor #cyber_security_awareness #application_security #information_security #sysmon
════════════════════════
𐀪 Author: Samuel George
════════════════════════
ⴵ Time: Thu, 31 Jul 2025 23:25:43 GMT
════════════════════════
⌗ Tags: #system_monitor #cyber_security_awareness #application_security #information_security #sysmon
Medium
Getting Started with Sysmon — System Monitoring for Windows
Sysmon (System Monitor) is a powerful Windows system service and device driver that logs system activity into the Windows event log…
⤷ Title: My First 7 Days on TryHackMe
════════════════════════
𐀪 Author: Pawan natekar
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:19:38 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #hackthebox #internet_of_things #hacking
════════════════════════
𐀪 Author: Pawan natekar
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:19:38 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #hackthebox #internet_of_things #hacking
Medium
My First 7 Days on TryHackMe.com
As an always learner, I came to know about TryHackMe through a friend who casually mentioned it during a conversation about ethical…
⤷ Title: CoinDCX Hack Explained: Hornet’s Role in the Aftermath
════════════════════════
𐀪 Author: Kapil Kathiriya
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:28:21 GMT
════════════════════════
⌗ Tags: #exchange #cryptocurrency #security #hacking #blockchain
════════════════════════
𐀪 Author: Kapil Kathiriya
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:28:21 GMT
════════════════════════
⌗ Tags: #exchange #cryptocurrency #security #hacking #blockchain
Medium
CoinDCX Hack Explained: Hornet’s Role in the Aftermath
In mid-July 2025, CoinDCX, one of India’s leading crypto exchanges, became the target of a sophisticated cyberattack. The attacker managed…
⤷ Title: It is a blessing (Confidential data) in disguise (Part 2)
════════════════════════
𐀪 Author: wh0arey0u
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:56:58 GMT
════════════════════════
⌗ Tags: #digital_forensics #cybersecurity #data_exfiltration #dfir
════════════════════════
𐀪 Author: wh0arey0u
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:56:58 GMT
════════════════════════
⌗ Tags: #digital_forensics #cybersecurity #data_exfiltration #dfir
Medium
It is a blessing (Confidential data) in disguise (Part 2)
How to detect and prevent this simple data exfiltration technique?
⤷ Title: Tracing Crypto: A Forensic Investigator’s Guide
════════════════════════
𐀪 Author: Wehire Laumech Beturaniza
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:51:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #digital_forensics #law_enforcement
════════════════════════
𐀪 Author: Wehire Laumech Beturaniza
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:51:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #digital_forensics #law_enforcement
Medium
Tracing Crypto: A Forensic Investigator’s Guide
Cryptocurrency has changed the way money moves around the world. But along with its benefits, it’s also been used for fraud, ransomware…
⤷ Title: Top 5 Mistakes of Cybersecurity Small Businesses Make and How to Prevent Them
════════════════════════
𐀪 Author: Zohakashif
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:50:31 GMT
════════════════════════
⌗ Tags: #mistakes_to_avoid #cybercrime #cybersecurity #how_to_fix_them #small_business
════════════════════════
𐀪 Author: Zohakashif
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:50:31 GMT
════════════════════════
⌗ Tags: #mistakes_to_avoid #cybercrime #cybersecurity #how_to_fix_them #small_business
Medium
Top 5 Mistakes of Cybersecurity Small Businesses Make and How to Prevent Them
In today’s digital world, cybersecurity threats are not limited only to large corporations and industries, small businesses are also at…
⤷ Title: Siber Güvenlikte Psikolojik Savaş: Sosyal Mühendisliğin Evrimi
════════════════════════
𐀪 Author: enes mercan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:46:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #it
════════════════════════
𐀪 Author: enes mercan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:46:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #it
Medium
Siber Güvenlikte Psikolojik Savaş: Sosyal Mühendisliğin Evrimi
Siber güvenlik dünyasında en çok konuşulan konular genellikle teknolojik çözümler, güçlü şifreleme yöntemleri, yeni nesil antivirüsler veya…
⤷ Title: SafeLine WAF + Load Balancing: A Multi-WAF Setup With Failover
════════════════════════
𐀪 Author: Quella
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:33:29 GMT
════════════════════════
⌗ Tags: #webdev #safeline_waf #cybersecurity
════════════════════════
𐀪 Author: Quella
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:33:29 GMT
════════════════════════
⌗ Tags: #webdev #safeline_waf #cybersecurity
Medium
SafeLine WAF + Load Balancing: A Multi-WAF Setup With Failover
To boost our internal network security, we decided to deploy the SafeLine alongside our existing hardware WAF. Acting as a software-based…
⤷ Title: NCSC CTF 2025 Forensics writeup
════════════════════════
𐀪 Author: Mustafaalzaareer
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:28:46 GMT
════════════════════════
⌗ Tags: #digital_forensics #cybersecurity #windows_forensics #network_forensics #dfir
════════════════════════
𐀪 Author: Mustafaalzaareer
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:28:46 GMT
════════════════════════
⌗ Tags: #digital_forensics #cybersecurity #windows_forensics #network_forensics #dfir
Medium
NCSC CTF 2025 Forensics writeup
This is the first time I have participated in the NCSC CTF and I was able to solve all the forensics challenges and this is my writeup for…
⤷ Title: Snake in the Pipeline: North Korea’s Covert Code Sabotage
════════════════════════
𐀪 Author: Pentestjunkie07
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:19:06 GMT
════════════════════════
⌗ Tags: #pentesting #hacker #cybersecurity
════════════════════════
𐀪 Author: Pentestjunkie07
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:19:06 GMT
════════════════════════
⌗ Tags: #pentesting #hacker #cybersecurity
Medium
Snake in the Pipeline: North Korea’s Covert Code Sabotage
I’ve dropped shells in air-gapped labs. I’ve jumped from IAM to domain admin in five minutes. But this? This was surgical.North Korean APTs…
⤷ Title: How Managed SIEM Detects Threats 10x Faster Than Your IT Team
════════════════════════
𐀪 Author: SecureSlate
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:15:00 GMT
════════════════════════
⌗ Tags: #information_technology #tools #cybersecurity #siem #compliance
════════════════════════
𐀪 Author: SecureSlate
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:15:00 GMT
════════════════════════
⌗ Tags: #information_technology #tools #cybersecurity #siem #compliance
Medium
How Managed SIEM Detects Threats 10x Faster Than Your IT Team
Upgrade your Cyber Defenses!
⤷ Title: 5 Takeaways from NetTech Episode 5: Securing Your Cloud Environment: Best Practices and Emerging…
════════════════════════
𐀪 Author: Netpremacy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:13:21 GMT
════════════════════════
⌗ Tags: #podcast #google_cloud_platform #cybersecurity #google
════════════════════════
𐀪 Author: Netpremacy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:13:21 GMT
════════════════════════
⌗ Tags: #podcast #google_cloud_platform #cybersecurity #google
Medium
5 Takeaways from NetTech Episode 5: Securing Your Cloud Environment: Best Practices and Emerging…
In this months episode of NetTech, our dedicated technical podcast, we focused on securing your cloud environment. The recent spate of…
⤷ Title: Managed Detection and Response (MDR): A Smarter Way to Secure Your Business
════════════════════════
𐀪 Author: devika pandey
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:49 GMT
════════════════════════
⌗ Tags: #mdr_service #penetration_testing
════════════════════════
𐀪 Author: devika pandey
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:49 GMT
════════════════════════
⌗ Tags: #mdr_service #penetration_testing
Medium
Managed Detection and Response (MDR): A Smarter Way to Secure Your Business
As cyber threats grow more sophisticated and persistent, traditional security measures are no longer enough. Businesses today need a…
⤷ Title: PenligentAI · 1, August 2025
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:06:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai_penetration_testing #penetration_testing #ethical_hacking
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:06:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai_penetration_testing #penetration_testing #ethical_hacking
Medium
What Is Penligent.ai?
What Is Penligent.ai?
⤷ Title: Meet the New Wave of AI-Native Security Innovators
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:04:24 GMT
════════════════════════
⌗ Tags: #llm #penetration_testing #ethical_hacking #cybersecurity #ai_penetration_testing
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:04:24 GMT
════════════════════════
⌗ Tags: #llm #penetration_testing #ethical_hacking #cybersecurity #ai_penetration_testing
Medium
Meet the New Wave of AI-Native Security Innovators
PenligentAI · 1, August 2025
⤷ Title: Penligent.ai: Unveiling the Shocking Power and Challenges of LLM‑Based Penetration Testing
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:59:39 GMT
════════════════════════
⌗ Tags: #ai_penetration_testing #penetration_testing #cybersecurity #llm
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:59:39 GMT
════════════════════════
⌗ Tags: #ai_penetration_testing #penetration_testing #cybersecurity #llm
Medium
Penligent.ai: Unveiling the Shocking Power and Challenges of LLM‑Based Penetration Testing
PenligentAI · 1, August 2025
⤷ Title: Vulnerability Assessment and Penetration Testing
════════════════════════
𐀪 Author: Shubhamrawat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:36:06 GMT
════════════════════════
⌗ Tags: #vulnerability_assessment #penetration_testing
════════════════════════
𐀪 Author: Shubhamrawat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:36:06 GMT
════════════════════════
⌗ Tags: #vulnerability_assessment #penetration_testing
Medium
Vulnerability Assessment and Penetration Testing
Penetration testing, also known as “ethical hacking,” simulates real-world cyber attacks against your systems and networks. It involves a…
⤷ Title: Certified Ethical Hacking Course in Calicut — Start Today
════════════════════════
𐀪 Author: bilalinternship
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:01:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: bilalinternship
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:01:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking
Medium
Certified Ethical Hacking Course in Calicut — Start Today
Get hands-on training, real-world projects, and career support. Join Calicut’s leading cybersecurity course. Visit our website now…
⤷ Title: RCE in Apache OFBiz: What Devs Should Know About CVE-2023–49070
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:24:14 GMT
════════════════════════
⌗ Tags: #vulnerability #rce #cybersecurity
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:24:14 GMT
════════════════════════
⌗ Tags: #vulnerability #rce #cybersecurity
Medium
RCE in Apache OFBiz: What Devs Should Know About CVE-2023–49070
> About Author Hi, I’m Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for…
⤷ Title: Root-Me: SQL Injection — Authentication
════════════════════════
𐀪 Author: _marwankhodair_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:32 GMT
════════════════════════
⌗ Tags: #mssql #sql_server #sql_injection #sql #mysql
════════════════════════
𐀪 Author: _marwankhodair_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:32 GMT
════════════════════════
⌗ Tags: #mssql #sql_server #sql_injection #sql #mysql
Medium
Root-Me: SQL Injection — Authentication
Challenge Writeup by 0xMarvul