⤷ Title: Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:32:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:32:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Comp AI secures $2.6M pre-seed to disrupt SOC 2 market
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:28:16 +0000
════════════════════════
⌗ Tags: #Press Release #Fund Raising
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:28:16 +0000
════════════════════════
⌗ Tags: #Press Release #Fund Raising
Hackread
Comp AI secures $2.6M pre-seed to disrupt SOC 2 market
San Francisco, California, 1st August 2025, CyberNewsWire
⤷ Title: How I Hacked Vimeo Using Just SSRF
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:04:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #api_security #cybersecurity #ssrf #vimeo
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:04:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #api_security #cybersecurity #ssrf #vimeo
Medium
How I Hacked Vimeo Using Just SSRF
The story behind the vulnerability that could’ve exposed millions of videos — and how Vimeo fixed it.
⤷ Title: Pwn2Own Offers $1 Million Bounty for Zero-Click WhatsApp Exploit
════════════════════════
𐀪 Author: Mohammed Muneef
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:02:39 GMT
════════════════════════
⌗ Tags: #bug_bounty #whatsapp_security #cybersecurity #hacking #infosec
════════════════════════
𐀪 Author: Mohammed Muneef
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:02:39 GMT
════════════════════════
⌗ Tags: #bug_bounty #whatsapp_security #cybersecurity #hacking #infosec
Medium
Pwn2Own Offers $1 Million Bounty for Zero-Click WhatsApp Exploit
Security researchers will have a shot at a $1 million prize if they can demonstrate a zero-click exploit for WhatsApp at the upcoming…
⤷ Title: SecurityManager Devre Dışıysa, Saldırganın Yolu Açık
════════════════════════
𐀪 Author: Serdarumuturan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:00:45 GMT
════════════════════════
⌗ Tags: #application_security #security_manager #java_security #remote_code_execution #java_rmi
════════════════════════
𐀪 Author: Serdarumuturan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:00:45 GMT
════════════════════════
⌗ Tags: #application_security #security_manager #java_security #remote_code_execution #java_rmi
Medium
SecurityManager Devre Dışıysa, Saldırganın Yolu Açık
Java RMI uygulamalarında ihmal edilen bir detay, sisteminize uzaktan erişim kapılarını ardına kadar açabilir. Bu yazıda, SecurityManager’ın…
⤷ Title: Tea App Hack: Disassembling The Ridiculous App Source Code
════════════════════════
𐀪 Author: Jan Kammerath
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:50:23 GMT
════════════════════════
⌗ Tags: #software_development #technology #programming #hacking #information_security
════════════════════════
𐀪 Author: Jan Kammerath
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:50:23 GMT
════════════════════════
⌗ Tags: #software_development #technology #programming #hacking #information_security
Medium
Tea App Hack: Disassembling The Ridiculous App Source Code
By now, everyone has heard of the “Tea app” getting hacked: “Hackers leak 13,000 user photos and IDs from the Tea app”. It’s a Flutter app…
⤷ Title: HTB Starting Point Tier 1 Appointment ve Sequel Makineleri Çözümleri ile Bilinmesi Gerekenler
════════════════════════
𐀪 Author: Burhan Demir
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:33:01 GMT
════════════════════════
⌗ Tags: #hackthebox #ctf #cybersecurity #hacking
════════════════════════
𐀪 Author: Burhan Demir
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:33:01 GMT
════════════════════════
⌗ Tags: #hackthebox #ctf #cybersecurity #hacking
Medium
HTB Starting Point Tier 1 Appointment ve Sequel Makineleri Çözümleri ile Bilinmesi Gerekenler
Merhaba Hackerlar! CTF çözümlerimize Appointment makinesi ile devam ediyoruz. İlk defa başlayanlar için VPN bağlantısını kurma aşamalarını…
⤷ Title: INSIDE QILIN RANSOMWARE AFFILIATE PANEL
════════════════════════
𐀪 Author: Rakesh Krishnan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:57:49 GMT
════════════════════════
⌗ Tags: #hacking #infosec #ransomware #information_security #cybersecurity
════════════════════════
𐀪 Author: Rakesh Krishnan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:57:49 GMT
════════════════════════
⌗ Tags: #hacking #infosec #ransomware #information_security #cybersecurity
Medium
INSIDE QILIN RANSOMWARE AFFILIATE PANEL
NOTE: This article strictly sticks to the leaked scenario of Qilin Ransomware Affiliate Panel and uncovers the affiliates Hastalamuerte’s —…
⤷ Title: Part 4: “Fileless Persistence” — The Malware That Came to Stay
════════════════════════
𐀪 Author: Kunal Rajour
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:41:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #fileless_malware #windows_security #tech_humor
════════════════════════
𐀪 Author: Kunal Rajour
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:41:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #fileless_malware #windows_security #tech_humor
Medium
Part 4: “Fileless Persistence” — The Malware That Came to Stay
It’s 2:41 AM.
⤷ Title: NodeBlog — HackTheBox
════════════════════════
𐀪 Author: S4ntiHack
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:41:01 GMT
════════════════════════
⌗ Tags: #ciberseguridad #pentesting #hackthebox_writeup #hacking #hackthebox
════════════════════════
𐀪 Author: S4ntiHack
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:41:01 GMT
════════════════════════
⌗ Tags: #ciberseguridad #pentesting #hackthebox_writeup #hacking #hackthebox
Medium
NodeBlog — HackTheBox
En mi preparación para las certificaciones WPT y WPTX he realizado este Writeup de la máquina NodeBlog de HTB.
⤷ Title: Software Integrity Failures: Are You Unknowingly Serving Malicious Code?
════════════════════════
𐀪 Author: Aravind S V
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:45:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_development #supply_chain #infosec
════════════════════════
𐀪 Author: Aravind S V
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:45:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_development #supply_chain #infosec
Medium
Software Integrity Failures: Are You Unknowingly Serving Malicious Code?
“Trust, but verify — especially when it comes to third-party code.”
⤷ Title: DSViper ile Antivirüs Atlama: Adım Adım Rehber
════════════════════════
𐀪 Author: Mikail Güven Çiçek
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:52:36 GMT
════════════════════════
⌗ Tags: #dsviper #cybersecurity #obfuscation #cybertool
════════════════════════
𐀪 Author: Mikail Güven Çiçek
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:52:36 GMT
════════════════════════
⌗ Tags: #dsviper #cybersecurity #obfuscation #cybertool
Medium
DSViper ile Antivirüs Atlama: Adım Adım Rehber
DSViper ile antivirüs atlamayı adım adım öğrenin. Uygulamalı ve pratik bir rehber sizi bekliyor.
⤷ Title: Facts About Data Breaches Demonstrate Financial Impact
════════════════════════
𐀪 Author: Mitchell Barrick
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:43:43 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #cyber_security_awareness #finance #data_breach
════════════════════════
𐀪 Author: Mitchell Barrick
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:43:43 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #cyber_security_awareness #finance #data_breach
Medium
Facts About Data Breaches Demonstrate Financial Impact
Ooma’s new infographic illustrates 30 statistics about data breaches, revealing staggering financial consequences. The fully illustrated…
⤷ Title: ️ Vulnerability Scanning and Automated Management on Linux Systems
════════════════════════
𐀪 Author: Esra Kayhan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:42:05 GMT
════════════════════════
⌗ Tags: #openvas #linux_security #vulnerability_management #cloud_security_automation #cybersecurity
════════════════════════
𐀪 Author: Esra Kayhan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:42:05 GMT
════════════════════════
⌗ Tags: #openvas #linux_security #vulnerability_management #cloud_security_automation #cybersecurity
Medium
🛡️ Vulnerability Scanning and Automated Management on Linux Systems
Linux systems power a significant portion of today’s internet infrastructure, from servers and routers to cloud platforms. While known for…
⤷ Title: RoomShield Protocol – Declaration 001
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:25:10 GMT
════════════════════════
⌗ Tags: #entrepreneurship #cybersecurity #coding #deep_learning #machine_learning
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:25:10 GMT
════════════════════════
⌗ Tags: #entrepreneurship #cybersecurity #coding #deep_learning #machine_learning
Medium
RoomShield Protocol – Declaration 001
Sky Privacy and Covert Micro-Surveillance:
⤷ Title: CyberArk Workflows — How Accounts, Safes, and Sessions Work Together
════════════════════════
𐀪 Author: Terence Imoma
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:20:00 GMT
════════════════════════
⌗ Tags: #privileged_access_mgmt #cyberark #zero_trust #identityaccess_management #cybersecurity
════════════════════════
𐀪 Author: Terence Imoma
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:20:00 GMT
════════════════════════
⌗ Tags: #privileged_access_mgmt #cyberark #zero_trust #identityaccess_management #cybersecurity
Medium
CyberArk Workflows — How Accounts, Safes, and Sessions Work Together
CyberArk Expert Series (3/1000)
⤷ Title: Hacker vs. Hacker — TryHackMe writeup
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:17:26 GMT
════════════════════════
⌗ Tags: #tryhackme #ethical_hacking #ctf_writeup #linux #cybersecurity
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:17:26 GMT
════════════════════════
⌗ Tags: #tryhackme #ethical_hacking #ctf_writeup #linux #cybersecurity
Medium
Hacker vs. Hacker — TryHackMe writeup
A recruitment company’s server has been hacked, and the attacker has blocked all admin recovery attempts. Shutting it down would hurt…
⤷ Title: Home Lab Chronicles: Part 02 — Suricata IDS/IPS and Squid Transparent Proxy Integration
════════════════════════
𐀪 Author: Suprim Devkota
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:15:10 GMT
════════════════════════
⌗ Tags: #squid #cybersecurity #opnsense #suricata #homelab
════════════════════════
𐀪 Author: Suprim Devkota
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:15:10 GMT
════════════════════════
⌗ Tags: #squid #cybersecurity #opnsense #suricata #homelab
Medium
Home Lab Chronicles: Part 02 — Suricata IDS/IPS and Squid Transparent Proxy Integration
Objectives
⤷ Title: RoomShield Protocol
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #coding #data_science #deep_learning #artificial_intelligence
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #coding #data_science #deep_learning #artificial_intelligence
Medium
RoomShield Protocol
An Ethical Security Architecture for the Era of Digital Privacy
⤷ Title: Enterprise Browser DLP: How Mammoth Secures Sensitive Data in Hybrid Work Environments
════════════════════════
𐀪 Author: Mammoth Cyber
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:13:13 GMT
════════════════════════
⌗ Tags: #information_security #artificial_intelligence #ai #cybersecurity #data
════════════════════════
𐀪 Author: Mammoth Cyber
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:13:13 GMT
════════════════════════
⌗ Tags: #information_security #artificial_intelligence #ai #cybersecurity #data
Medium
Enterprise Browser DLP: How Mammoth Secures Sensitive Data in Hybrid Work Environments
In the fast-evolving landscape of hybrid and remote work, implementing robust data loss prevention (DLP) strategies is essential for…
⤷ Title: Why XSS Is Not (Usually) Possible in JSON Responses: Cross-Site Scripting in JSON Responses
════════════════════════
𐀪 Author: Jython
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:37:19 GMT
════════════════════════
⌗ Tags: #json_api #xss_attack #penetration_testing #xss_vulnerability #exploitation
════════════════════════
𐀪 Author: Jython
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:37:19 GMT
════════════════════════
⌗ Tags: #json_api #xss_attack #penetration_testing #xss_vulnerability #exploitation
Medium
Why XSS Is Not (Usually) Possible in JSON Responses: Cross-Site Scripting in JSON Responses
Cross-Site Scripting in JSON Responses: A Forensic Analysis of Execution Constraints and Abuse Vectors