⤷ Title: Home Lab Chronicles: Part 02 — Suricata IDS/IPS and Squid Transparent Proxy Integration
════════════════════════
𐀪 Author: Suprim Devkota
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:15:10 GMT
════════════════════════
⌗ Tags: #squid #cybersecurity #opnsense #suricata #homelab
════════════════════════
𐀪 Author: Suprim Devkota
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:15:10 GMT
════════════════════════
⌗ Tags: #squid #cybersecurity #opnsense #suricata #homelab
Medium
Home Lab Chronicles: Part 02 — Suricata IDS/IPS and Squid Transparent Proxy Integration
Objectives
⤷ Title: RoomShield Protocol
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #coding #data_science #deep_learning #artificial_intelligence
════════════════════════
𐀪 Author: RoomShield Protocol
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:14:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #coding #data_science #deep_learning #artificial_intelligence
Medium
RoomShield Protocol
An Ethical Security Architecture for the Era of Digital Privacy
⤷ Title: Enterprise Browser DLP: How Mammoth Secures Sensitive Data in Hybrid Work Environments
════════════════════════
𐀪 Author: Mammoth Cyber
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:13:13 GMT
════════════════════════
⌗ Tags: #information_security #artificial_intelligence #ai #cybersecurity #data
════════════════════════
𐀪 Author: Mammoth Cyber
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:13:13 GMT
════════════════════════
⌗ Tags: #information_security #artificial_intelligence #ai #cybersecurity #data
Medium
Enterprise Browser DLP: How Mammoth Secures Sensitive Data in Hybrid Work Environments
In the fast-evolving landscape of hybrid and remote work, implementing robust data loss prevention (DLP) strategies is essential for…
⤷ Title: Why XSS Is Not (Usually) Possible in JSON Responses: Cross-Site Scripting in JSON Responses
════════════════════════
𐀪 Author: Jython
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:37:19 GMT
════════════════════════
⌗ Tags: #json_api #xss_attack #penetration_testing #xss_vulnerability #exploitation
════════════════════════
𐀪 Author: Jython
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:37:19 GMT
════════════════════════
⌗ Tags: #json_api #xss_attack #penetration_testing #xss_vulnerability #exploitation
Medium
Why XSS Is Not (Usually) Possible in JSON Responses: Cross-Site Scripting in JSON Responses
Cross-Site Scripting in JSON Responses: A Forensic Analysis of Execution Constraints and Abuse Vectors
⤷ Title: Exploiting Misconfigured DNS for Enumeration and Zone Transfer
════════════════════════
𐀪 Author: Mkirahmet
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:51:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #hackthebox #hackthebox_walkthrough #ethical_hacking #dns
════════════════════════
𐀪 Author: Mkirahmet
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 13:51:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #hackthebox #hackthebox_walkthrough #ethical_hacking #dns
Medium
Exploiting Misconfigured DNS for Enumeration and Zone Transfer
🔍 Summary
⤷ Title: Comp AI secures $2.6M pre-seed to disrupt SOC 2 market
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:27:28 +0000
════════════════════════
⌗ Tags: #Press Release
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 14:27:28 +0000
════════════════════════
⌗ Tags: #Press Release
Daily CyberSecurity
Comp AI secures $2.6M pre-seed to disrupt SOC 2 market
San Francisco, California, 1st August 2025, CyberNewsWire
⤷ Title: Why Domain Monitoring Is Essential for a Company
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:38:00 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #technology #privacy #bug_bounty
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:38:00 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #technology #privacy #bug_bounty
Medium
Why Domain Monitoring Is Essential for a Company
Introduction
⤷ Title: How to Install Parrot OS on VMware Workstation 17 (Fix Boot Errors)
════════════════════════
𐀪 Author: Shawn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:02:55 GMT
════════════════════════
⌗ Tags: #linux #pentesting #bug_bounty #cybersecurity #vmware
════════════════════════
𐀪 Author: Shawn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:02:55 GMT
════════════════════════
⌗ Tags: #linux #pentesting #bug_bounty #cybersecurity #vmware
Medium
How to Install Parrot OS on VMware Workstation 17 (Fix Boot Errors)
A step-by-step guide to installing ParrotOS in VMware Workstation 17, fixing the common boot errors.
⤷ Title: eJPT Zero to Hero: Post Exploitation CTF 1
════════════════════════
𐀪 Author: Zaynah Smith-DaSilva
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:41:04 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #hacking #ejpt #red_team
════════════════════════
𐀪 Author: Zaynah Smith-DaSilva
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:41:04 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #hacking #ejpt #red_team
Medium
eJPT Zero to Hero: Post Exploitation CTF 1
Join me as I tackle the eJPT one topic at a time. CTF 1 Host and Network Penetration Testing: Exploitation.
⤷ Title: Don’t Become the Next Target for Scammers! Read How to Avoid Online scams
════════════════════════
𐀪 Author: Kazeem Olawale
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:36:55 GMT
════════════════════════
⌗ Tags: #scam #hacking #safety #personal_finance #fraud
════════════════════════
𐀪 Author: Kazeem Olawale
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:36:55 GMT
════════════════════════
⌗ Tags: #scam #hacking #safety #personal_finance #fraud
Medium
Don’t Become the Next Target for Scammers! Read How to Avoid Online scams
Your entire life savings can get swept away with just a single link? But being aware of these scammers’ strategies can help you secure your…
⤷ Title: Sudo Shell Escaping Privilege Escalation (Linux Privilege Escalation)
════════════════════════
𐀪 Author: Ammar Ahmed
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:09:21 GMT
════════════════════════
⌗ Tags: #red_team #linux #technology #hacking #cybersecurity
════════════════════════
𐀪 Author: Ammar Ahmed
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:09:21 GMT
════════════════════════
⌗ Tags: #red_team #linux #technology #hacking #cybersecurity
Medium
Sudo Shell Escaping Privilege Escalation (Linux Privilege Escalation)
sudo is a Linux utility that allows a permitted user to execute a command as another user, typically the root user. To maintain security…
⤷ Title: “Day 1: Breaking Into Bug Bounties — Your First Steps”
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:07:25 GMT
════════════════════════
⌗ Tags: #money #hacking #learning #cybersecurity #technology
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:07:25 GMT
════════════════════════
⌗ Tags: #money #hacking #learning #cybersecurity #technology
Medium
“Day 1: Breaking Into Bug Bounties — Your First Steps”
I still remember my first day in bug bounties — completely lost, staring at HackerOne’s dashboard like it was some alien tech. I had no…
⤷ Title: Understanding IBM Master Data Management (MDM): A Deep Dive with Real-World Examples
════════════════════════
𐀪 Author: Rahul Agarwal
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:51:28 GMT
════════════════════════
⌗ Tags: #infosec #ibm #ibm_infosphere #mdm
════════════════════════
𐀪 Author: Rahul Agarwal
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:51:28 GMT
════════════════════════
⌗ Tags: #infosec #ibm #ibm_infosphere #mdm
Medium
🧠 Understanding IBM Master Data Management (MDM): A Deep Dive with Real-World Examples
Master Data Management (MDM) is the backbone of data consistency across an enterprise. IBM’s InfoSphere MDM is one of the most robust platforms available, designed to unify, cleanse, and manage…
⤷ Title: FortiGate’i Sanal Makineye Kurma ve Temel Arayüz Kullanımı
════════════════════════
𐀪 Author: Selimayvaz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:53:17 GMT
════════════════════════
⌗ Tags: #cybersecurity #vmware #fortigate #firewall
════════════════════════
𐀪 Author: Selimayvaz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:53:17 GMT
════════════════════════
⌗ Tags: #cybersecurity #vmware #fortigate #firewall
Medium
FortiGate’i Sanal Makineye Kurma ve Temel Arayüz Kullanımı
📌 İçindekiler
⤷ Title: Top Compliance Risks for Federal Health IT Contractors in 2025
════════════════════════
𐀪 Author: One Federal Solution
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:53:00 GMT
════════════════════════
⌗ Tags: #cybersecurity
════════════════════════
𐀪 Author: One Federal Solution
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:53:00 GMT
════════════════════════
⌗ Tags: #cybersecurity
Medium
Top Compliance Risks for Federal Health IT Contractors in 2025
As we enter 2025, federal health IT contractors are facing heightened compliance expectations across cybersecurity, data privacy, ethical…
⤷ Title: What’s with Linux Distros?
════════════════════════
𐀪 Author: Ryan Kurtz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:47:12 GMT
════════════════════════
⌗ Tags: #cybersecurity #linux #computer_science #linux_kernel #technology
════════════════════════
𐀪 Author: Ryan Kurtz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:47:12 GMT
════════════════════════
⌗ Tags: #cybersecurity #linux #computer_science #linux_kernel #technology
Medium
What’s with Linux Distros?
There’s so much distros, let’s figure them out.
⤷ Title: Any Password Can Be Hacked from Just 3 Websites! Shocking Truth!
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:46:23 GMT
════════════════════════
⌗ Tags: #hacker #ethical_hacking #cybersecurity #hacking_tools #passwords
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:46:23 GMT
════════════════════════
⌗ Tags: #hacker #ethical_hacking #cybersecurity #hacking_tools #passwords
Medium
Any Password Can Be Hacked from Just 3 Websites! Shocking Truth! 😱
How These Free Tools Let Hackers Crack Your Password in Minutes
⤷ Title: Security Alert Resolution Codes
════════════════════════
𐀪 Author: Rybbord
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:41:38 GMT
════════════════════════
⌗ Tags: #incident_response #security_operation_center #digital_forensics #cybersecurity
════════════════════════
𐀪 Author: Rybbord
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:41:38 GMT
════════════════════════
⌗ Tags: #incident_response #security_operation_center #digital_forensics #cybersecurity
Medium
Security Alert Resolution Codes
An everyday struggle for SOC analysts is the sometimes ambiguous decision of what resolution code to choose for a security alert. Correct…
⤷ Title: Cybersecurity Talent Exodus Threatens Healthcare’s Digital Transformation, Black Book Survey Finds
════════════════════════
𐀪 Author: Black Book Market Research
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:41:00 GMT
════════════════════════
⌗ Tags: #healthcare_data_breach #healthcare_cybersecurity #cybersecurity_staffing #cybersecurity #black_book_research
════════════════════════
𐀪 Author: Black Book Market Research
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:41:00 GMT
════════════════════════
⌗ Tags: #healthcare_data_breach #healthcare_cybersecurity #cybersecurity_staffing #cybersecurity #black_book_research
Medium
Cybersecurity Talent Exodus Threatens Healthcare’s Digital Transformation, Black Book Survey Finds
Over 80% of Healthcare Organizations Polled Admit Cybersecurity Investments Are Underutilized Due to Staffing Shortages, Wasting Millions…
⤷ Title: Spy on WhatsApp with These Powerful Tracking Apps
════════════════════════
𐀪 Author: Narjis Batool
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:40:34 GMT
════════════════════════
⌗ Tags: #parenting #social_media #tracking #cybersecurity #whatsapp
════════════════════════
𐀪 Author: Narjis Batool
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:40:34 GMT
════════════════════════
⌗ Tags: #parenting #social_media #tracking #cybersecurity #whatsapp
Medium
Spy on WhatsApp with These Powerful Tracking Apps
WhatsApp is among the most well-liked messaging apps globally. Individuals utilize it daily to communicate with pals, exchange photos, and…
⤷ Title: Why SMART Isn’t Enough for Drive Health
════════════════════════
𐀪 Author: ULINK DA Drive Analyzer
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:39:25 GMT
════════════════════════
⌗ Tags: #technology #data_science #artificial_intelligence #machine_learning #cybersecurity
════════════════════════
𐀪 Author: ULINK DA Drive Analyzer
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:39:25 GMT
════════════════════════
⌗ Tags: #technology #data_science #artificial_intelligence #machine_learning #cybersecurity
Medium
Why SMART Isn’t Enough for Drive Health
In this series, we are exploring what’s new and next in the world of storage and drives. You can “follow” to never miss an article.