⤷ Title: Siber Güvenlikte Psikolojik Savaş: Sosyal Mühendisliğin Evrimi
════════════════════════
𐀪 Author: enes mercan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:46:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #it
════════════════════════
𐀪 Author: enes mercan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:46:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #it
Medium
Siber Güvenlikte Psikolojik Savaş: Sosyal Mühendisliğin Evrimi
Siber güvenlik dünyasında en çok konuşulan konular genellikle teknolojik çözümler, güçlü şifreleme yöntemleri, yeni nesil antivirüsler veya…
⤷ Title: SafeLine WAF + Load Balancing: A Multi-WAF Setup With Failover
════════════════════════
𐀪 Author: Quella
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:33:29 GMT
════════════════════════
⌗ Tags: #webdev #safeline_waf #cybersecurity
════════════════════════
𐀪 Author: Quella
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:33:29 GMT
════════════════════════
⌗ Tags: #webdev #safeline_waf #cybersecurity
Medium
SafeLine WAF + Load Balancing: A Multi-WAF Setup With Failover
To boost our internal network security, we decided to deploy the SafeLine alongside our existing hardware WAF. Acting as a software-based…
⤷ Title: NCSC CTF 2025 Forensics writeup
════════════════════════
𐀪 Author: Mustafaalzaareer
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:28:46 GMT
════════════════════════
⌗ Tags: #digital_forensics #cybersecurity #windows_forensics #network_forensics #dfir
════════════════════════
𐀪 Author: Mustafaalzaareer
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:28:46 GMT
════════════════════════
⌗ Tags: #digital_forensics #cybersecurity #windows_forensics #network_forensics #dfir
Medium
NCSC CTF 2025 Forensics writeup
This is the first time I have participated in the NCSC CTF and I was able to solve all the forensics challenges and this is my writeup for…
⤷ Title: Snake in the Pipeline: North Korea’s Covert Code Sabotage
════════════════════════
𐀪 Author: Pentestjunkie07
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:19:06 GMT
════════════════════════
⌗ Tags: #pentesting #hacker #cybersecurity
════════════════════════
𐀪 Author: Pentestjunkie07
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:19:06 GMT
════════════════════════
⌗ Tags: #pentesting #hacker #cybersecurity
Medium
Snake in the Pipeline: North Korea’s Covert Code Sabotage
I’ve dropped shells in air-gapped labs. I’ve jumped from IAM to domain admin in five minutes. But this? This was surgical.North Korean APTs…
⤷ Title: How Managed SIEM Detects Threats 10x Faster Than Your IT Team
════════════════════════
𐀪 Author: SecureSlate
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:15:00 GMT
════════════════════════
⌗ Tags: #information_technology #tools #cybersecurity #siem #compliance
════════════════════════
𐀪 Author: SecureSlate
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:15:00 GMT
════════════════════════
⌗ Tags: #information_technology #tools #cybersecurity #siem #compliance
Medium
How Managed SIEM Detects Threats 10x Faster Than Your IT Team
Upgrade your Cyber Defenses!
⤷ Title: 5 Takeaways from NetTech Episode 5: Securing Your Cloud Environment: Best Practices and Emerging…
════════════════════════
𐀪 Author: Netpremacy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:13:21 GMT
════════════════════════
⌗ Tags: #podcast #google_cloud_platform #cybersecurity #google
════════════════════════
𐀪 Author: Netpremacy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:13:21 GMT
════════════════════════
⌗ Tags: #podcast #google_cloud_platform #cybersecurity #google
Medium
5 Takeaways from NetTech Episode 5: Securing Your Cloud Environment: Best Practices and Emerging…
In this months episode of NetTech, our dedicated technical podcast, we focused on securing your cloud environment. The recent spate of…
⤷ Title: Managed Detection and Response (MDR): A Smarter Way to Secure Your Business
════════════════════════
𐀪 Author: devika pandey
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:49 GMT
════════════════════════
⌗ Tags: #mdr_service #penetration_testing
════════════════════════
𐀪 Author: devika pandey
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:49 GMT
════════════════════════
⌗ Tags: #mdr_service #penetration_testing
Medium
Managed Detection and Response (MDR): A Smarter Way to Secure Your Business
As cyber threats grow more sophisticated and persistent, traditional security measures are no longer enough. Businesses today need a…
⤷ Title: PenligentAI · 1, August 2025
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:06:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai_penetration_testing #penetration_testing #ethical_hacking
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:06:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai_penetration_testing #penetration_testing #ethical_hacking
Medium
What Is Penligent.ai?
What Is Penligent.ai?
⤷ Title: Meet the New Wave of AI-Native Security Innovators
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:04:24 GMT
════════════════════════
⌗ Tags: #llm #penetration_testing #ethical_hacking #cybersecurity #ai_penetration_testing
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:04:24 GMT
════════════════════════
⌗ Tags: #llm #penetration_testing #ethical_hacking #cybersecurity #ai_penetration_testing
Medium
Meet the New Wave of AI-Native Security Innovators
PenligentAI · 1, August 2025
⤷ Title: Penligent.ai: Unveiling the Shocking Power and Challenges of LLM‑Based Penetration Testing
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:59:39 GMT
════════════════════════
⌗ Tags: #ai_penetration_testing #penetration_testing #cybersecurity #llm
════════════════════════
𐀪 Author: PenligentAI
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:59:39 GMT
════════════════════════
⌗ Tags: #ai_penetration_testing #penetration_testing #cybersecurity #llm
Medium
Penligent.ai: Unveiling the Shocking Power and Challenges of LLM‑Based Penetration Testing
PenligentAI · 1, August 2025
⤷ Title: Vulnerability Assessment and Penetration Testing
════════════════════════
𐀪 Author: Shubhamrawat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:36:06 GMT
════════════════════════
⌗ Tags: #vulnerability_assessment #penetration_testing
════════════════════════
𐀪 Author: Shubhamrawat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:36:06 GMT
════════════════════════
⌗ Tags: #vulnerability_assessment #penetration_testing
Medium
Vulnerability Assessment and Penetration Testing
Penetration testing, also known as “ethical hacking,” simulates real-world cyber attacks against your systems and networks. It involves a…
⤷ Title: Certified Ethical Hacking Course in Calicut — Start Today
════════════════════════
𐀪 Author: bilalinternship
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:01:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: bilalinternship
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:01:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking
Medium
Certified Ethical Hacking Course in Calicut — Start Today
Get hands-on training, real-world projects, and career support. Join Calicut’s leading cybersecurity course. Visit our website now…
⤷ Title: RCE in Apache OFBiz: What Devs Should Know About CVE-2023–49070
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:24:14 GMT
════════════════════════
⌗ Tags: #vulnerability #rce #cybersecurity
════════════════════════
𐀪 Author: AerieWhole123
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 07:24:14 GMT
════════════════════════
⌗ Tags: #vulnerability #rce #cybersecurity
Medium
RCE in Apache OFBiz: What Devs Should Know About CVE-2023–49070
> About Author Hi, I’m Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for…
⤷ Title: Root-Me: SQL Injection — Authentication
════════════════════════
𐀪 Author: _marwankhodair_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:32 GMT
════════════════════════
⌗ Tags: #mssql #sql_server #sql_injection #sql #mysql
════════════════════════
𐀪 Author: _marwankhodair_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 08:16:32 GMT
════════════════════════
⌗ Tags: #mssql #sql_server #sql_injection #sql #mysql
Medium
Root-Me: SQL Injection — Authentication
Challenge Writeup by 0xMarvul
⤷ Title: Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Dork for AI LLM Chatbot
════════════════════════
𐀪 Author: rr-1k
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:26:55 GMT
════════════════════════
⌗ Tags: #llm #chatgpt #hacking #ai #bug_bounty
════════════════════════
𐀪 Author: rr-1k
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:26:55 GMT
════════════════════════
⌗ Tags: #llm #chatgpt #hacking #ai #bug_bounty
Medium
Dork for AI LLM Chatbot
Dork For AI Chatsbots ( Chagpt, gemini, grok, cluade and more )
⤷ Title: “Burp + Extensions = JS Recon on Steroids: From Endpoints to Exploits”
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:02:44 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ai #infosec #bug_bounty
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:02:44 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ai #infosec #bug_bounty
Medium
🧠 “Burp + Extensions = JS Recon on Steroids: From Endpoints to Exploits”
⚙️ Burp Extension Power Stack
⤷ Title: The Shodan & FOFA Hack No One Wants You to Know About
════════════════════════
𐀪 Author: KonaN
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:01:45 GMT
════════════════════════
⌗ Tags: #bug_hunting #bug_bounty #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: KonaN
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:01:45 GMT
════════════════════════
⌗ Tags: #bug_hunting #bug_bounty #hacking #cybersecurity #penetration_testing
Medium
The Shodan & FOFA Hack No One Wants You to Know About 👀
What if you could bypass API limits, export entire datasets, and never pay a cent? Here’s how I did it — and how you can too.
⤷ Title: Threat Modeling for Developers
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:40:31 GMT
════════════════════════
⌗ Tags: #application_security #devsecops #threat_modeling #secure_development #software_security
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:40:31 GMT
════════════════════════
⌗ Tags: #application_security #devsecops #threat_modeling #secure_development #software_security
Medium
Threat Modeling for Developers
In the fast-paced world of software development, the focus often gravitates towards features, performance, and user experience. While these…
⤷ Title: Sandboxing: A Safe Space for Dangerous Code
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:39:16 GMT
════════════════════════
⌗ Tags: #threat_mitigation #isolation #andboxing #application_security #code_security
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:39:16 GMT
════════════════════════
⌗ Tags: #threat_mitigation #isolation #andboxing #application_security #code_security
Medium
Sandboxing: A Safe Space for Dangerous Code
In our increasingly interconnected digital world, the need to interact with untrusted or potentially malicious code is not just a…
⤷ Title: HTB Challenge — CriticalOps
════════════════════════
𐀪 Author: MEGAZORD
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:47 GMT
════════════════════════
⌗ Tags: #challenge #htb_writeup #hacking #htb_walkthrough #web
════════════════════════
𐀪 Author: MEGAZORD
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:47 GMT
════════════════════════
⌗ Tags: #challenge #htb_writeup #hacking #htb_walkthrough #web
Medium
HTB Challenge — CriticalOps
Hello, hacker! This is the first writeup of a series of HTB challenges that I will try to maintain. And to start, we will have the…