⤷ Title: What if your smart home turned against you?
════════════════════════
𐀪 Author: Malavika Manoj
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:25:24 GMT
════════════════════════
⌗ Tags: #cyberattack #iot #hacking #cybersecurity #smart_home
════════════════════════
𐀪 Author: Malavika Manoj
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:25:24 GMT
════════════════════════
⌗ Tags: #cyberattack #iot #hacking #cybersecurity #smart_home
Medium
What if your smart home turned against you?
Imagine you walk in and say “Hey Alexa, light on” and instead you smart vacuum start chasing your pet cat around the room. OR your front…
⤷ Title: How I got attacked by Kim Jong Un’s guys
════════════════════════
𐀪 Author: 0trust0day
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:04:59 GMT
════════════════════════
⌗ Tags: #north_korean_hacker #cybersecurity #dprk #kim_jong_un #infosec
════════════════════════
𐀪 Author: 0trust0day
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:04:59 GMT
════════════════════════
⌗ Tags: #north_korean_hacker #cybersecurity #dprk #kim_jong_un #infosec
Medium
How I got attacked by Kim Jong Un’s guys
You might think I’ve gone mad (and to be fair, there’s some truth to that — just not in this particular story), but this is a real event…
⤷ Title: Dark Web Gerçekten Karanlık mı? Bilinmeyen Yönleriyle Derin İnternetin Bilinmeyen Katmanları
════════════════════════
𐀪 Author: Ata Çalım
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:50:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #anonymity #tor_browser #darkweb #privacy
════════════════════════
𐀪 Author: Ata Çalım
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:50:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #anonymity #tor_browser #darkweb #privacy
Medium
Bilinmeyen Yönleriyle Derin İnternet
Bilinmeyen Yönleriyle Derin İnternet
⤷ Title: Exploiting CVE-2025–29744 in pg-promise: When Prepared Statements Aren’t Safe
════════════════════════
𐀪 Author: Aniket.
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:44:24 GMT
════════════════════════
⌗ Tags: #cve #sqli #pg_promise #javanoscript #cybersecurity
════════════════════════
𐀪 Author: Aniket.
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:44:24 GMT
════════════════════════
⌗ Tags: #cve #sqli #pg_promise #javanoscript #cybersecurity
Medium
Exploiting CVE-2025–29744 in pg-promise: When Prepared Statements Aren’t Safe
This post analyzes a subtle SQL injection vulnerability — CVE-2025–29744 — in pg-promise, a popular PostgreSQL library for Node.js built…
⤷ Title: Best Programming Languages for Cybersecurity in 2025
════════════════════════
𐀪 Author: Ayza Anam
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:43:44 GMT
════════════════════════
⌗ Tags: #programming_languages #technology #cybersecurity #programming #technews
════════════════════════
𐀪 Author: Ayza Anam
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:43:44 GMT
════════════════════════
⌗ Tags: #programming_languages #technology #cybersecurity #programming #technews
Medium
Best Programming Languages for Cybersecurity in 2025
As the cybersecurity environment becomes more intricate in 2025, experts are likely to remain ahead of threats that are evolving at…
⤷ Title: CAASM for Technology Leaders
════════════════════════
𐀪 Author: Arup Nanda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:40:27 GMT
════════════════════════
⌗ Tags: #technology_leadership #cybersecurity #cybersecurity_trends_2025 #cybersecurity_awareness
════════════════════════
𐀪 Author: Arup Nanda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:40:27 GMT
════════════════════════
⌗ Tags: #technology_leadership #cybersecurity #cybersecurity_trends_2025 #cybersecurity_awareness
Medium
CAASM for Technology Leaders
Part 2: Learn about vendors, implementation guides and trends in Cyber Asset Attack Surface Management
⤷ Title: Process ve Thread: Bilgisayarın Mutfak Ekibi
════════════════════════
𐀪 Author: bullbullsena
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:30:50 GMT
════════════════════════
⌗ Tags: #process #malware #threads #reverse_engineering #cybersecurity
════════════════════════
𐀪 Author: bullbullsena
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:30:50 GMT
════════════════════════
⌗ Tags: #process #malware #threads #reverse_engineering #cybersecurity
Medium
Process ve Thread: Bilgisayarın Mutfak Ekibi
Bilgisayarlarımız çalışırken arka planda durmaksızın bir faaliyet vardır. Tıpkı Michelin yıldızlı bir restoranın mutfağı gibi… Sürekli yeni…
⤷ Title: SQL injection — String and authentication [Root me]
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:18:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #pentesting #sql_injection #sqli
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:18:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #pentesting #sql_injection #sqli
Medium
SQL injection — String and authentication [Root me]
🔎 Overview
⤷ Title: 5 Simple Ways To Outsmart Ransomware
════════════════════════
𐀪 Author: Faiza Arshad
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:11:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #cyber #ransomeware
════════════════════════
𐀪 Author: Faiza Arshad
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:11:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #cyber #ransomeware
Medium
5 Simple Ways To Outsmart Ransomware
Have you been a victim of malware that encrypted your data and demanded money (ransom) for decryption? The hackers access your device and…
⤷ Title: HackTheBox: The Last Dance
════════════════════════
𐀪 Author: Rahaliashraf
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:56:25 GMT
════════════════════════
⌗ Tags: #cryptography #hackthebox_walkthrough #hackthebox_writeup #hackthebox
════════════════════════
𐀪 Author: Rahaliashraf
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:56:25 GMT
════════════════════════
⌗ Tags: #cryptography #hackthebox_walkthrough #hackthebox_writeup #hackthebox
Medium
HackTheBox: The Last Dance
Sophisticated Exploitation of ChaCha20 Nonce Reuse: A Cryptographic Deep Dive
⤷ Title: Beginner’s Guide to Ethical Hacking & Footprinting (in Sinhala + English)
════════════════════════
𐀪 Author: Ruwan Sanjeewa
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:34:35 GMT
════════════════════════
⌗ Tags: #footprinting #tech_education #cybersecurity_basics #information_security #ethical_hacking
════════════════════════
𐀪 Author: Ruwan Sanjeewa
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:34:35 GMT
════════════════════════
⌗ Tags: #footprinting #tech_education #cybersecurity_basics #information_security #ethical_hacking
Medium
🔐 Beginner’s Guide to Ethical Hacking & Footprinting (in Sinhala 🇱🇰 + English)
🧑💻✨ A beginner-friendly guide to understanding hacking steps, 🛠️ tools, and 🛡️ cybersecurity basics in 🇱🇰 Sinhala-English 🌐.
⤷ Title: API Key Authentication in Spring Boot Without OAuth
════════════════════════
𐀪 Author: Alexander Obregon
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:07:57 GMT
════════════════════════
⌗ Tags: #api_security #programming #java #authentication #spring_boot
════════════════════════
𐀪 Author: Alexander Obregon
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:07:57 GMT
════════════════════════
⌗ Tags: #api_security #programming #java #authentication #spring_boot
Medium
API Key Authentication in Spring Boot Without OAuth
Most APIs need some way to keep things protected without making everything wide open. A simple way to do that is with API keys. These are…
⤷ Title: API Rate Limiting in Node.js: Protecting Your Endpoints
════════════════════════
𐀪 Author: habtesoft
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:01:48 GMT
════════════════════════
⌗ Tags: #nodejs #api_security #web_development #backend_development #rate_limiting
════════════════════════
𐀪 Author: habtesoft
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:01:48 GMT
════════════════════════
⌗ Tags: #nodejs #api_security #web_development #backend_development #rate_limiting
Medium
API Rate Limiting in Node.js: Protecting Your Endpoints
How to implement and optimize rate limiting to secure your Node.js APIs from abuse and ensure reliability.
⤷ Title: rootme | SQL injection — String
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
Medium
rootme | SQL injection — String
In this lab we will discuss how to solve SQL injection - String lab from root-me.org
⤷ Title: Stored XSS → Account Takeover
════════════════════════
𐀪 Author: s0ly
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:49:22 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty_writeup #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: s0ly
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:49:22 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty_writeup #bug_bounty #bug_bounty_tips
Medium
Stored XSS → Account Takeover
بِسْمِ اللَّهِ الرَّحْمَـٰنِ الرَّحِيمِ
⤷ Title: Irish-Name-Repo 1 — PicoCTF — Writeup
════════════════════════
𐀪 Author: 0xSudo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:28:13 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #picoctf #hacking
════════════════════════
𐀪 Author: 0xSudo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:28:13 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #picoctf #hacking
Medium
Irish-Name-Repo 1 — PicoCTF — Writeup
Looking at the denoscription, this says ‘Try to see if you can login’. This mostly hints at SQL Injection techniques.
⤷ Title: Introduction to Cybersecurity: A Beginner Friendly Guide for Curious Beginners
════════════════════════
𐀪 Author: Med Abou
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 19:14:41 GMT
════════════════════════
⌗ Tags: #self_improvement #hacking #learning #cybersecurity #software_engineering
════════════════════════
𐀪 Author: Med Abou
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 19:14:41 GMT
════════════════════════
⌗ Tags: #self_improvement #hacking #learning #cybersecurity #software_engineering
Medium
Introduction to Cybersecurity: A Beginner Friendly Guide for Curious Beginners
If you’ve ever wondered what cybersecurity really is — beyond the buzzwords and news headlines — you’re not alone. Many people hear about…
⤷ Title: Cyber Starting Your Cybersecurity Journey: A Call to Action for Future Defenders
════════════════════════
𐀪 Author: Ebusingye
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:46:54 GMT
════════════════════════
⌗ Tags: #cybersecurity
════════════════════════
𐀪 Author: Ebusingye
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:46:54 GMT
════════════════════════
⌗ Tags: #cybersecurity
Medium
Cyber🚀 Starting Your Cybersecurity Journey: A Call to Action for Future Defenders
In today’s hyper-connected digital age, cybersecurity is no longer optional — it’s essential. From protecting sensitive data to securing national infrastructure and individual privacy, cybersecurity…
⤷ Title: Faking It.
════════════════════════
𐀪 Author: Cindy Kaplan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:42:32 GMT
════════════════════════
⌗ Tags: #ai #deepfakes #risk_management #cybersecurity #cyber_security_awareness
════════════════════════
𐀪 Author: Cindy Kaplan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:42:32 GMT
════════════════════════
⌗ Tags: #ai #deepfakes #risk_management #cybersecurity #cyber_security_awareness
Medium
Faking It.
Before getting too invested in your online connection, ensure it’s not a DeepFake. Advances in technology have taken catfishing to new…
⤷ Title: From a Curious Student to a Cybersecurity Enthusiast: My Journey
════════════════════════
𐀪 Author: Yash Katiyara
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:41:27 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #cybersecurity_risk
════════════════════════
𐀪 Author: Yash Katiyara
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:41:27 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #cybersecurity_risk
Medium
From a Curious Student to a Cybersecurity Enthusiast: My Journey
Hello everyone, I am Yash Katiyara, aka Professor Paradox — the cool name I always wanted. This is the story of how I earned it.
⤷ Title: WHAT IS THE DIFFERENCE BETWEEN IOC AND IOA
════════════════════════
𐀪 Author: JahdiSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:34:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #education #ioc #ioa
════════════════════════
𐀪 Author: JahdiSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:34:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #education #ioc #ioa
Medium
WHAT IS THE DIFFERENCE BETWEEN IOC AND IOA
IOC vs IOA: The Clues Cybercriminals Didn’t Mean to Leave Behind