⤷ Title: The Shodan & FOFA Hack No One Wants You to Know About
════════════════════════
𐀪 Author: KonaN
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:01:45 GMT
════════════════════════
⌗ Tags: #bug_hunting #bug_bounty #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: KonaN
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:01:45 GMT
════════════════════════
⌗ Tags: #bug_hunting #bug_bounty #hacking #cybersecurity #penetration_testing
Medium
The Shodan & FOFA Hack No One Wants You to Know About 👀
What if you could bypass API limits, export entire datasets, and never pay a cent? Here’s how I did it — and how you can too.
⤷ Title: Threat Modeling for Developers
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:40:31 GMT
════════════════════════
⌗ Tags: #application_security #devsecops #threat_modeling #secure_development #software_security
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:40:31 GMT
════════════════════════
⌗ Tags: #application_security #devsecops #threat_modeling #secure_development #software_security
Medium
Threat Modeling for Developers
In the fast-paced world of software development, the focus often gravitates towards features, performance, and user experience. While these…
⤷ Title: Sandboxing: A Safe Space for Dangerous Code
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:39:16 GMT
════════════════════════
⌗ Tags: #threat_mitigation #isolation #andboxing #application_security #code_security
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:39:16 GMT
════════════════════════
⌗ Tags: #threat_mitigation #isolation #andboxing #application_security #code_security
Medium
Sandboxing: A Safe Space for Dangerous Code
In our increasingly interconnected digital world, the need to interact with untrusted or potentially malicious code is not just a…
⤷ Title: HTB Challenge — CriticalOps
════════════════════════
𐀪 Author: MEGAZORD
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:47 GMT
════════════════════════
⌗ Tags: #challenge #htb_writeup #hacking #htb_walkthrough #web
════════════════════════
𐀪 Author: MEGAZORD
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:47 GMT
════════════════════════
⌗ Tags: #challenge #htb_writeup #hacking #htb_walkthrough #web
Medium
HTB Challenge — CriticalOps
Hello, hacker! This is the first writeup of a series of HTB challenges that I will try to maintain. And to start, we will have the…
⤷ Title: How Misconfigured Computer Accounts Lead to Hidden Privilege Escalation in Active Directory
════════════════════════
𐀪 Author: Sebastian Kandler
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:11:47 GMT
════════════════════════
⌗ Tags: #security #hacking #technology #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Sebastian Kandler
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:11:47 GMT
════════════════════════
⌗ Tags: #security #hacking #technology #penetration_testing #cybersecurity
Medium
How Misconfigured Computer Accounts Lead to Hidden Privilege Escalation in Active Directory
🛑 Did you know? Creating computer accounts in Active Directory Users and Computers (ADUC) and assigning a group like “Domain Users” sounds…
⤷ Title: Expert Lecture II
════════════════════════
𐀪 Author: unknownman
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:52:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #security_operation_center #hacking #penetration_testing #inkor
════════════════════════
𐀪 Author: unknownman
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:52:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #security_operation_center #hacking #penetration_testing #inkor
Medium
Expert Lecture II
Expert Lecture by Mr. M. Iman Karmawijaya, CTO Representative of LSware in Indonesia
⤷ Title: Top 10 WiFi Hacking Tools Used by Ethical Hackers: Introduction
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:44:28 GMT
════════════════════════
⌗ Tags: #wifihacking #ethical_hacker #wifi_hacking_tools #hacking #hackerslist
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:44:28 GMT
════════════════════════
⌗ Tags: #wifihacking #ethical_hacker #wifi_hacking_tools #hacking #hackerslist
Medium
Top 10 WiFi Hacking Tools Used by Ethical Hackers: Introduction
In this article, we’ll dive into the Top 10 WiFi Hacking Tools Used by Ethical Hackers, explore why they matter, understand how they work…
⤷ Title: The Digital Dojo: Mastering Offensive Security with AI-Powered Python Cyber Ranges
════════════════════════
𐀪 Author: SR
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:33:24 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #cybersecurity #security #hacking #python
════════════════════════
𐀪 Author: SR
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:33:24 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #cybersecurity #security #hacking #python
Medium
The Digital Dojo: Mastering Offensive Security with AI-Powered Python Cyber Ranges
In cybersecurity’s endless arms race, defenders must achieve perfection while attackers need only find a single weakness. This fundamental…
⤷ Title: DLL Injection: It’s Not as Scary as It Sounds
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:06:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #reverse_engineering #hacking #dll_injection #software_development
════════════════════════
𐀪 Author: SilentInject
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:06:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #reverse_engineering #hacking #dll_injection #software_development
Medium
DLL Injection: It’s Not as Scary as It Sounds
“DLL? More like D-E-HELL!” …until now.
⤷ Title: Attacking Windows Credential Manager — HTB Module Walkthrough
════════════════════════
𐀪 Author: Redsnorlax
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:05:28 GMT
════════════════════════
⌗ Tags: #hacking #windows #windowscredentialmanager #uac #hackthebox
════════════════════════
𐀪 Author: Redsnorlax
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:05:28 GMT
════════════════════════
⌗ Tags: #hacking #windows #windowscredentialmanager #uac #hackthebox
Medium
Attacking Windows Credential Manager — HTB Module Walkthrough
Step-by-Step Walkthrough: Attacking Windows Credential Manager (HTB Module)
⤷ Title: Storm-2603 Strikes: DNS-Controlled Backdoor Found in Global Ransomware Attacks
════════════════════════
𐀪 Author: CYber VIaz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:55:38 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #cybersecurity #microsoft_security #infosec
════════════════════════
𐀪 Author: CYber VIaz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:55:38 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #cybersecurity #microsoft_security #infosec
Medium
💣 Storm-2603 Strikes: DNS-Controlled Backdoor Found in Global Ransomware Attacks
🚨 Cybersecurity Alert: A shadowy group named Storm‑2603 is wreaking havoc with stealthy backdoors, rogue web shells, and ransomware that…
⤷ Title: ChatGPT Leaks?
════════════════════════
𐀪 Author: Pascal Asch
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:46:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_leak #chatgpt
════════════════════════
𐀪 Author: Pascal Asch
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:46:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_leak #chatgpt
Medium
ChatGPT Leaks? How public share links turn into OSINT Goldmines — A real-world OSINT Tool for hunting leaked data.
1. Introduction
⤷ Title: DREAD Risk Assessment Model
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:38 GMT
════════════════════════
⌗ Tags: #dread_model #security_vulnerabilities #risk_assessment #threat_modeling #cybersecurity
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:43:38 GMT
════════════════════════
⌗ Tags: #dread_model #security_vulnerabilities #risk_assessment #threat_modeling #cybersecurity
Medium
DREAD Risk Assessment Model
The dynamic and ever-expanding landscape of cybersecurity demands robust frameworks for identifying, evaluating, and prioritizing risks…
⤷ Title: STRIDE Threat Modeling Methodology
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:41:49 GMT
════════════════════════
⌗ Tags: #threat_modeling #stride #risk_management #security_methodology #cybersecurity
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:41:49 GMT
════════════════════════
⌗ Tags: #threat_modeling #stride #risk_management #security_methodology #cybersecurity
Medium
STRIDE Threat Modeling Methodology
In the intricate landscape of modern software development, security can no longer be an afterthought, a patch applied late in the…
⤷ Title: Reverse Engineering for Malware Analysis
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:38:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #reverse_engineering #malware_analysis #binary_analysis
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:38:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #reverse_engineering #malware_analysis #binary_analysis
Medium
Reverse Engineering for Malware Analysis
The digital realm is a constant battlefield, where sophisticated cyber threats relentlessly evolve, posing significant dangers to…
⤷ Title: Why a Cybersecurity Compliance Audit Is Essential for Every Organization in China in 2025
════════════════════════
𐀪 Author: Alex Graham
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:31:48 GMT
════════════════════════
⌗ Tags: #cybersecurity #regulatory_compliance #cyber_security_awareness
════════════════════════
𐀪 Author: Alex Graham
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:31:48 GMT
════════════════════════
⌗ Tags: #cybersecurity #regulatory_compliance #cyber_security_awareness
Medium
Why a Cybersecurity Compliance Audit Is Essential for Every Organization in China in 2025
China’s digital economy is growing at record speed, and with it comes increasing pressure on businesses to protect sensitive data and…
⤷ Title: DIY Faraday Fashion: How I Sewed a Hoodie That Ghosts Wi-Fi Trackers
════════════════════════
𐀪 Author: Franziska "Ziska" Fink
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:02:54 GMT
════════════════════════
⌗ Tags: #privacy #hacker_culture #wearables #cybersecurity #diy
════════════════════════
𐀪 Author: Franziska "Ziska" Fink
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 10:02:54 GMT
════════════════════════
⌗ Tags: #privacy #hacker_culture #wearables #cybersecurity #diy
Medium
DIY Faraday Fashion: How I Sewed a Hoodie That Ghosts Wi-Fi Trackers
by Ziska Fink, resident code-witch at Rabenherz Productions
⤷ Title: Real-World Scenarios: How Ech Browser Protects You Daily
════════════════════════
𐀪 Author: Psylinks Announce
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:58:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy
════════════════════════
𐀪 Author: Psylinks Announce
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:58:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy
Medium
Real-World Scenarios: How Ech Browser Protects You Daily
Everyday online threats can be subtle or sudden — but Ech Browser’s privacy and security features are designed to protect you in…
⤷ Title: Wonderland Write-Up (TryHackMe)
════════════════════════
𐀪 Author: Mustafa Bostan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:58:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_writeup #ctf_writeup #ctf
════════════════════════
𐀪 Author: Mustafa Bostan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:58:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_writeup #ctf_writeup #ctf
Medium
Wonderland Write-Up (TryHackMe)
Merhabalar bugün bu yazımda TryHackMe’deki Wonderland CTF’ini çözeceğiz.
⤷ Title: Antivirus Is Broken; Here’s How AI Is Fixing It
════════════════════════
𐀪 Author: Ivander “Andreas” Wijaya
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:55:18 GMT
════════════════════════
⌗ Tags: #ai_tools #infostealer_malware #xdr #cybersecurity #antivirus
════════════════════════
𐀪 Author: Ivander “Andreas” Wijaya
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:55:18 GMT
════════════════════════
⌗ Tags: #ai_tools #infostealer_malware #xdr #cybersecurity #antivirus
Medium
Antivirus Is Broken; Here’s How AI Is Fixing It
In today's hyper-connected world, cyber threats are no longer just a possibility, they are a daily reality. From ransomware to silent data…
⤷ Title: Why Penetration Testing Is Essential For Your Business
════════════════════════
𐀪 Author: Qualysec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:22:47 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #cyberattack #cybercrime
════════════════════════
𐀪 Author: Qualysec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 09:22:47 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #cyberattack #cybercrime
Medium
Why Penetration Testing Is Essential For Your Business
What is a Penetration Testing report?