⤷ Title: NodeBlog — HackTheBox
════════════════════════
𐀪 Author: S4ntiHack
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:41:01 GMT
════════════════════════
⌗ Tags: #ciberseguridad #pentesting #hackthebox_writeup #hacking #hackthebox
════════════════════════
𐀪 Author: S4ntiHack
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:41:01 GMT
════════════════════════
⌗ Tags: #ciberseguridad #pentesting #hackthebox_writeup #hacking #hackthebox
Medium
NodeBlog — HackTheBox
En mi preparación para las certificaciones WPT y WPTX he realizado este Writeup de la máquina NodeBlog de HTB.
⤷ Title: Software Integrity Failures: Are You Unknowingly Serving Malicious Code?
════════════════════════
𐀪 Author: Aravind S V
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:45:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_development #supply_chain #infosec
════════════════════════
𐀪 Author: Aravind S V
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:45:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_development #supply_chain #infosec
Medium
Software Integrity Failures: Are You Unknowingly Serving Malicious Code?
“Trust, but verify — especially when it comes to third-party code.”
⤷ Title: DSViper ile Antivirüs Atlama: Adım Adım Rehber
════════════════════════
𐀪 Author: Mikail Güven Çiçek
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:52:36 GMT
════════════════════════
⌗ Tags: #dsviper #cybersecurity #obfuscation #cybertool
════════════════════════
𐀪 Author: Mikail Güven Çiçek
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:52:36 GMT
════════════════════════
⌗ Tags: #dsviper #cybersecurity #obfuscation #cybertool
Medium
DSViper ile Antivirüs Atlama: Adım Adım Rehber
DSViper ile antivirüs atlamayı adım adım öğrenin. Uygulamalı ve pratik bir rehber sizi bekliyor.
⤷ Title: Facts About Data Breaches Demonstrate Financial Impact
════════════════════════
𐀪 Author: Mitchell Barrick
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:43:43 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #cyber_security_awareness #finance #data_breach
════════════════════════
𐀪 Author: Mitchell Barrick
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:43:43 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #cyber_security_awareness #finance #data_breach
Medium
Facts About Data Breaches Demonstrate Financial Impact
Ooma’s new infographic illustrates 30 statistics about data breaches, revealing staggering financial consequences. The fully illustrated…
⤷ Title: ️ Vulnerability Scanning and Automated Management on Linux Systems
════════════════════════
𐀪 Author: Esra Kayhan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:42:05 GMT
════════════════════════
⌗ Tags: #openvas #linux_security #vulnerability_management #cloud_security_automation #cybersecurity
════════════════════════
𐀪 Author: Esra Kayhan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:42:05 GMT
════════════════════════
⌗ Tags: #openvas #linux_security #vulnerability_management #cloud_security_automation #cybersecurity
Medium
🛡️ Vulnerability Scanning and Automated Management on Linux Systems
Linux systems power a significant portion of today’s internet infrastructure, from servers and routers to cloud platforms. While known for…
⤷ Title: RoomShield Protocol – Declaration 001
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:25:10 GMT
════════════════════════
⌗ Tags: #entrepreneurship #cybersecurity #coding #deep_learning #machine_learning
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:25:10 GMT
════════════════════════
⌗ Tags: #entrepreneurship #cybersecurity #coding #deep_learning #machine_learning
Medium
RoomShield Protocol – Declaration 001
Sky Privacy and Covert Micro-Surveillance:
⤷ Title: CyberArk Workflows — How Accounts, Safes, and Sessions Work Together
════════════════════════
𐀪 Author: Terence Imoma
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:20:00 GMT
════════════════════════
⌗ Tags: #privileged_access_mgmt #cyberark #zero_trust #identityaccess_management #cybersecurity
════════════════════════
𐀪 Author: Terence Imoma
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:20:00 GMT
════════════════════════
⌗ Tags: #privileged_access_mgmt #cyberark #zero_trust #identityaccess_management #cybersecurity
Medium
CyberArk Workflows — How Accounts, Safes, and Sessions Work Together
CyberArk Expert Series (3/1000)
⤷ Title: Hacker vs. Hacker — TryHackMe writeup
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:17:26 GMT
════════════════════════
⌗ Tags: #tryhackme #ethical_hacking #ctf_writeup #linux #cybersecurity
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:17:26 GMT
════════════════════════
⌗ Tags: #tryhackme #ethical_hacking #ctf_writeup #linux #cybersecurity
Medium
Hacker vs. Hacker — TryHackMe writeup
A recruitment company’s server has been hacked, and the attacker has blocked all admin recovery attempts. Shutting it down would hurt…
⤷ Title: Home Lab Chronicles: Part 02 — Suricata IDS/IPS and Squid Transparent Proxy Integration
════════════════════════
𐀪 Author: Suprim Devkota
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:15:10 GMT
════════════════════════
⌗ Tags: #squid #cybersecurity #opnsense #suricata #homelab
════════════════════════
𐀪 Author: Suprim Devkota
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:15:10 GMT
════════════════════════
⌗ Tags: #squid #cybersecurity #opnsense #suricata #homelab
Medium
Home Lab Chronicles: Part 02 — Suricata IDS/IPS and Squid Transparent Proxy Integration
Objectives
⤷ Title: RoomShield Protocol
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #coding #data_science #deep_learning #artificial_intelligence
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #coding #data_science #deep_learning #artificial_intelligence
Medium
RoomShield Protocol
An Ethical Security Architecture for the Era of Digital Privacy
⤷ Title: Enterprise Browser DLP: How Mammoth Secures Sensitive Data in Hybrid Work Environments
════════════════════════
𐀪 Author: Mammoth Cyber
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:13:13 GMT
════════════════════════
⌗ Tags: #information_security #artificial_intelligence #ai #cybersecurity #data
════════════════════════
𐀪 Author: Mammoth Cyber
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:13:13 GMT
════════════════════════
⌗ Tags: #information_security #artificial_intelligence #ai #cybersecurity #data
Medium
Enterprise Browser DLP: How Mammoth Secures Sensitive Data in Hybrid Work Environments
In the fast-evolving landscape of hybrid and remote work, implementing robust data loss prevention (DLP) strategies is essential for…
⤷ Title: Why XSS Is Not (Usually) Possible in JSON Responses: Cross-Site Scripting in JSON Responses
════════════════════════
𐀪 Author: Jython
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:37:19 GMT
════════════════════════
⌗ Tags: #json_api #xss_attack #penetration_testing #xss_vulnerability #exploitation
════════════════════════
𐀪 Author: Jython
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:37:19 GMT
════════════════════════
⌗ Tags: #json_api #xss_attack #penetration_testing #xss_vulnerability #exploitation
Medium
Why XSS Is Not (Usually) Possible in JSON Responses: Cross-Site Scripting in JSON Responses
Cross-Site Scripting in JSON Responses: A Forensic Analysis of Execution Constraints and Abuse Vectors
⤷ Title: Exploiting Misconfigured DNS for Enumeration and Zone Transfer
════════════════════════
𐀪 Author: Mkirahmet
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:51:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #hackthebox #hackthebox_walkthrough #ethical_hacking #dns
════════════════════════
𐀪 Author: Mkirahmet
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:51:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #hackthebox #hackthebox_walkthrough #ethical_hacking #dns
Medium
Exploiting Misconfigured DNS for Enumeration and Zone Transfer
🔍 Summary
⤷ Title: Comp AI secures $2.6M pre-seed to disrupt SOC 2 market
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:27:28 +0000
════════════════════════
⌗ Tags: #Press Release
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:27:28 +0000
════════════════════════
⌗ Tags: #Press Release
Daily CyberSecurity
Comp AI secures $2.6M pre-seed to disrupt SOC 2 market
San Francisco, California, 1st August 2025, CyberNewsWire
⤷ Title: Why Domain Monitoring Is Essential for a Company
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:38:00 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #technology #privacy #bug_bounty
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:38:00 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #technology #privacy #bug_bounty
Medium
Why Domain Monitoring Is Essential for a Company
Introduction
⤷ Title: How to Install Parrot OS on VMware Workstation 17 (Fix Boot Errors)
════════════════════════
𐀪 Author: Shawn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:02:55 GMT
════════════════════════
⌗ Tags: #linux #pentesting #bug_bounty #cybersecurity #vmware
════════════════════════
𐀪 Author: Shawn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:02:55 GMT
════════════════════════
⌗ Tags: #linux #pentesting #bug_bounty #cybersecurity #vmware
Medium
How to Install Parrot OS on VMware Workstation 17 (Fix Boot Errors)
A step-by-step guide to installing ParrotOS in VMware Workstation 17, fixing the common boot errors.
⤷ Title: eJPT Zero to Hero: Post Exploitation CTF 1
════════════════════════
𐀪 Author: Zaynah Smith-DaSilva
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:41:04 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #hacking #ejpt #red_team
════════════════════════
𐀪 Author: Zaynah Smith-DaSilva
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:41:04 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #hacking #ejpt #red_team
Medium
eJPT Zero to Hero: Post Exploitation CTF 1
Join me as I tackle the eJPT one topic at a time. CTF 1 Host and Network Penetration Testing: Exploitation.
⤷ Title: Don’t Become the Next Target for Scammers! Read How to Avoid Online scams
════════════════════════
𐀪 Author: Kazeem Olawale
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:36:55 GMT
════════════════════════
⌗ Tags: #scam #hacking #safety #personal_finance #fraud
════════════════════════
𐀪 Author: Kazeem Olawale
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:36:55 GMT
════════════════════════
⌗ Tags: #scam #hacking #safety #personal_finance #fraud
Medium
Don’t Become the Next Target for Scammers! Read How to Avoid Online scams
Your entire life savings can get swept away with just a single link? But being aware of these scammers’ strategies can help you secure your…
⤷ Title: Sudo Shell Escaping Privilege Escalation (Linux Privilege Escalation)
════════════════════════
𐀪 Author: Ammar Ahmed
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:09:21 GMT
════════════════════════
⌗ Tags: #red_team #linux #technology #hacking #cybersecurity
════════════════════════
𐀪 Author: Ammar Ahmed
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:09:21 GMT
════════════════════════
⌗ Tags: #red_team #linux #technology #hacking #cybersecurity
Medium
Sudo Shell Escaping Privilege Escalation (Linux Privilege Escalation)
sudo is a Linux utility that allows a permitted user to execute a command as another user, typically the root user. To maintain security…
⤷ Title: “Day 1: Breaking Into Bug Bounties — Your First Steps”
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:07:25 GMT
════════════════════════
⌗ Tags: #money #hacking #learning #cybersecurity #technology
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:07:25 GMT
════════════════════════
⌗ Tags: #money #hacking #learning #cybersecurity #technology
Medium
“Day 1: Breaking Into Bug Bounties — Your First Steps”
I still remember my first day in bug bounties — completely lost, staring at HackerOne’s dashboard like it was some alien tech. I had no…
⤷ Title: Understanding IBM Master Data Management (MDM): A Deep Dive with Real-World Examples
════════════════════════
𐀪 Author: Rahul Agarwal
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:51:28 GMT
════════════════════════
⌗ Tags: #infosec #ibm #ibm_infosphere #mdm
════════════════════════
𐀪 Author: Rahul Agarwal
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:51:28 GMT
════════════════════════
⌗ Tags: #infosec #ibm #ibm_infosphere #mdm
Medium
🧠 Understanding IBM Master Data Management (MDM): A Deep Dive with Real-World Examples
Master Data Management (MDM) is the backbone of data consistency across an enterprise. IBM’s InfoSphere MDM is one of the most robust platforms available, designed to unify, cleanse, and manage…