⤷ Title: 2025 IoT Blueprint for the Global Connected Care Era: New Guide Sets Smart Hospital Standards
════════════════════════
𐀪 Author: Black Book Market Research
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:39:10 GMT
════════════════════════
⌗ Tags: #black_book_research #cybersecurity #internet_of_things #smart_hospitals #internetofmedicalthings
════════════════════════
𐀪 Author: Black Book Market Research
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:39:10 GMT
════════════════════════
⌗ Tags: #black_book_research #cybersecurity #internet_of_things #smart_hospitals #internetofmedicalthings
Medium
2025 IoT Blueprint for the Global Connected Care Era: New Guide Sets Smart Hospital Standards
Black Book Research Unveils Comprehensive Intelligence Guide Offering Strategic Pathways, Vendor Benchmarks, and Cybersecurity Imperatives…
⤷ Title: THM — IDE Writeup
════════════════════════
𐀪 Author: Kostas Ereksonas
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:10:33 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #ftp #ide #privesc #tryhackme
════════════════════════
𐀪 Author: Kostas Ereksonas
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:10:33 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #ftp #ide #privesc #tryhackme
Medium
THM — IDE Writeup
This writeup is for IDE room in TryHackMe.
⤷ Title: Simple TCP Listener in Python
════════════════════════
𐀪 Author: PJSM-Sec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:13:49 GMT
════════════════════════
⌗ Tags: #networking #linux #python #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: PJSM-Sec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 15:13:49 GMT
════════════════════════
⌗ Tags: #networking #linux #python #cybersecurity #ethical_hacking
Medium
📡 Simple TCP Listener in Python
Inspired by Linux Basics for Hackers
⤷ Title: rootme | SQL injection — Authentication
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:35:41 GMT
════════════════════════
⌗ Tags: #sql #sql_injection #root_me
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:35:41 GMT
════════════════════════
⌗ Tags: #sql #sql_injection #root_me
Medium
rootme | SQL injection — Authentication
In this lab we will discuss how to solve SQL injection - Authentication lab from root-me.org
⤷ Title: Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 21:01:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 21:01:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: How I Uncovered Reflected and Stored XSS on a University Portal
════════════════════════
𐀪 Author: Avyukt Security
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:06:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #bug_bounty #penetration_testing #hacking
════════════════════════
𐀪 Author: Avyukt Security
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:06:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #bug_bounty #penetration_testing #hacking
Medium
How I Uncovered Reflected and Stored XSS on a University Portal
By: Kavin Jindal
⤷ Title: I Tried CSRF Attacks in Many Website (And Failed Miserably). Here’s What I Learned
════════════════════════
𐀪 Author: Shah kaif
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:02:19 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bugs #bug_bounty #bug_bounty_tips #csrf
════════════════════════
𐀪 Author: Shah kaif
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:02:19 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bugs #bug_bounty #bug_bounty_tips #csrf
Medium
I Tried CSRF Attacks in Many Website (And Failed Miserably). Here’s What I Learned
By Shah kaif | “Each failed payload is basically my application telling me: ‘Thanks for the pen-test, free of charge.” | LinkedIn
⤷ Title: What if your smart home turned against you?
════════════════════════
𐀪 Author: Malavika Manoj
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:25:24 GMT
════════════════════════
⌗ Tags: #cyberattack #iot #hacking #cybersecurity #smart_home
════════════════════════
𐀪 Author: Malavika Manoj
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:25:24 GMT
════════════════════════
⌗ Tags: #cyberattack #iot #hacking #cybersecurity #smart_home
Medium
What if your smart home turned against you?
Imagine you walk in and say “Hey Alexa, light on” and instead you smart vacuum start chasing your pet cat around the room. OR your front…
⤷ Title: How I got attacked by Kim Jong Un’s guys
════════════════════════
𐀪 Author: 0trust0day
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:04:59 GMT
════════════════════════
⌗ Tags: #north_korean_hacker #cybersecurity #dprk #kim_jong_un #infosec
════════════════════════
𐀪 Author: 0trust0day
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:04:59 GMT
════════════════════════
⌗ Tags: #north_korean_hacker #cybersecurity #dprk #kim_jong_un #infosec
Medium
How I got attacked by Kim Jong Un’s guys
You might think I’ve gone mad (and to be fair, there’s some truth to that — just not in this particular story), but this is a real event…
⤷ Title: Dark Web Gerçekten Karanlık mı? Bilinmeyen Yönleriyle Derin İnternetin Bilinmeyen Katmanları
════════════════════════
𐀪 Author: Ata Çalım
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:50:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #anonymity #tor_browser #darkweb #privacy
════════════════════════
𐀪 Author: Ata Çalım
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:50:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #anonymity #tor_browser #darkweb #privacy
Medium
Bilinmeyen Yönleriyle Derin İnternet
Bilinmeyen Yönleriyle Derin İnternet
⤷ Title: Exploiting CVE-2025–29744 in pg-promise: When Prepared Statements Aren’t Safe
════════════════════════
𐀪 Author: Aniket.
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:44:24 GMT
════════════════════════
⌗ Tags: #cve #sqli #pg_promise #javanoscript #cybersecurity
════════════════════════
𐀪 Author: Aniket.
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:44:24 GMT
════════════════════════
⌗ Tags: #cve #sqli #pg_promise #javanoscript #cybersecurity
Medium
Exploiting CVE-2025–29744 in pg-promise: When Prepared Statements Aren’t Safe
This post analyzes a subtle SQL injection vulnerability — CVE-2025–29744 — in pg-promise, a popular PostgreSQL library for Node.js built…
⤷ Title: Best Programming Languages for Cybersecurity in 2025
════════════════════════
𐀪 Author: Ayza Anam
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:43:44 GMT
════════════════════════
⌗ Tags: #programming_languages #technology #cybersecurity #programming #technews
════════════════════════
𐀪 Author: Ayza Anam
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:43:44 GMT
════════════════════════
⌗ Tags: #programming_languages #technology #cybersecurity #programming #technews
Medium
Best Programming Languages for Cybersecurity in 2025
As the cybersecurity environment becomes more intricate in 2025, experts are likely to remain ahead of threats that are evolving at…
⤷ Title: CAASM for Technology Leaders
════════════════════════
𐀪 Author: Arup Nanda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:40:27 GMT
════════════════════════
⌗ Tags: #technology_leadership #cybersecurity #cybersecurity_trends_2025 #cybersecurity_awareness
════════════════════════
𐀪 Author: Arup Nanda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:40:27 GMT
════════════════════════
⌗ Tags: #technology_leadership #cybersecurity #cybersecurity_trends_2025 #cybersecurity_awareness
Medium
CAASM for Technology Leaders
Part 2: Learn about vendors, implementation guides and trends in Cyber Asset Attack Surface Management
⤷ Title: Process ve Thread: Bilgisayarın Mutfak Ekibi
════════════════════════
𐀪 Author: bullbullsena
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:30:50 GMT
════════════════════════
⌗ Tags: #process #malware #threads #reverse_engineering #cybersecurity
════════════════════════
𐀪 Author: bullbullsena
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:30:50 GMT
════════════════════════
⌗ Tags: #process #malware #threads #reverse_engineering #cybersecurity
Medium
Process ve Thread: Bilgisayarın Mutfak Ekibi
Bilgisayarlarımız çalışırken arka planda durmaksızın bir faaliyet vardır. Tıpkı Michelin yıldızlı bir restoranın mutfağı gibi… Sürekli yeni…
⤷ Title: SQL injection — String and authentication [Root me]
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:18:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #pentesting #sql_injection #sqli
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:18:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #pentesting #sql_injection #sqli
Medium
SQL injection — String and authentication [Root me]
🔎 Overview
⤷ Title: 5 Simple Ways To Outsmart Ransomware
════════════════════════
𐀪 Author: Faiza Arshad
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:11:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #cyber #ransomeware
════════════════════════
𐀪 Author: Faiza Arshad
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:11:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #cyber #ransomeware
Medium
5 Simple Ways To Outsmart Ransomware
Have you been a victim of malware that encrypted your data and demanded money (ransom) for decryption? The hackers access your device and…
⤷ Title: HackTheBox: The Last Dance
════════════════════════
𐀪 Author: Rahaliashraf
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:56:25 GMT
════════════════════════
⌗ Tags: #cryptography #hackthebox_walkthrough #hackthebox_writeup #hackthebox
════════════════════════
𐀪 Author: Rahaliashraf
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:56:25 GMT
════════════════════════
⌗ Tags: #cryptography #hackthebox_walkthrough #hackthebox_writeup #hackthebox
Medium
HackTheBox: The Last Dance
Sophisticated Exploitation of ChaCha20 Nonce Reuse: A Cryptographic Deep Dive
⤷ Title: Beginner’s Guide to Ethical Hacking & Footprinting (in Sinhala + English)
════════════════════════
𐀪 Author: Ruwan Sanjeewa
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:34:35 GMT
════════════════════════
⌗ Tags: #footprinting #tech_education #cybersecurity_basics #information_security #ethical_hacking
════════════════════════
𐀪 Author: Ruwan Sanjeewa
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:34:35 GMT
════════════════════════
⌗ Tags: #footprinting #tech_education #cybersecurity_basics #information_security #ethical_hacking
Medium
🔐 Beginner’s Guide to Ethical Hacking & Footprinting (in Sinhala 🇱🇰 + English)
🧑💻✨ A beginner-friendly guide to understanding hacking steps, 🛠️ tools, and 🛡️ cybersecurity basics in 🇱🇰 Sinhala-English 🌐.
⤷ Title: API Key Authentication in Spring Boot Without OAuth
════════════════════════
𐀪 Author: Alexander Obregon
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:07:57 GMT
════════════════════════
⌗ Tags: #api_security #programming #java #authentication #spring_boot
════════════════════════
𐀪 Author: Alexander Obregon
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:07:57 GMT
════════════════════════
⌗ Tags: #api_security #programming #java #authentication #spring_boot
Medium
API Key Authentication in Spring Boot Without OAuth
Most APIs need some way to keep things protected without making everything wide open. A simple way to do that is with API keys. These are…
⤷ Title: API Rate Limiting in Node.js: Protecting Your Endpoints
════════════════════════
𐀪 Author: habtesoft
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:01:48 GMT
════════════════════════
⌗ Tags: #nodejs #api_security #web_development #backend_development #rate_limiting
════════════════════════
𐀪 Author: habtesoft
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:01:48 GMT
════════════════════════
⌗ Tags: #nodejs #api_security #web_development #backend_development #rate_limiting
Medium
API Rate Limiting in Node.js: Protecting Your Endpoints
How to implement and optimize rate limiting to secure your Node.js APIs from abuse and ensure reliability.
⤷ Title: rootme | SQL injection — String
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
Medium
rootme | SQL injection — String
In this lab we will discuss how to solve SQL injection - String lab from root-me.org