⤷ Title: How I got attacked by Kim Jong Un’s guys
════════════════════════
𐀪 Author: 0trust0day
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:04:59 GMT
════════════════════════
⌗ Tags: #north_korean_hacker #cybersecurity #dprk #kim_jong_un #infosec
════════════════════════
𐀪 Author: 0trust0day
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:04:59 GMT
════════════════════════
⌗ Tags: #north_korean_hacker #cybersecurity #dprk #kim_jong_un #infosec
Medium
How I got attacked by Kim Jong Un’s guys
You might think I’ve gone mad (and to be fair, there’s some truth to that — just not in this particular story), but this is a real event…
⤷ Title: Dark Web Gerçekten Karanlık mı? Bilinmeyen Yönleriyle Derin İnternetin Bilinmeyen Katmanları
════════════════════════
𐀪 Author: Ata Çalım
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:50:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #anonymity #tor_browser #darkweb #privacy
════════════════════════
𐀪 Author: Ata Çalım
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:50:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #anonymity #tor_browser #darkweb #privacy
Medium
Bilinmeyen Yönleriyle Derin İnternet
Bilinmeyen Yönleriyle Derin İnternet
⤷ Title: Exploiting CVE-2025–29744 in pg-promise: When Prepared Statements Aren’t Safe
════════════════════════
𐀪 Author: Aniket.
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:44:24 GMT
════════════════════════
⌗ Tags: #cve #sqli #pg_promise #javanoscript #cybersecurity
════════════════════════
𐀪 Author: Aniket.
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:44:24 GMT
════════════════════════
⌗ Tags: #cve #sqli #pg_promise #javanoscript #cybersecurity
Medium
Exploiting CVE-2025–29744 in pg-promise: When Prepared Statements Aren’t Safe
This post analyzes a subtle SQL injection vulnerability — CVE-2025–29744 — in pg-promise, a popular PostgreSQL library for Node.js built…
⤷ Title: Best Programming Languages for Cybersecurity in 2025
════════════════════════
𐀪 Author: Ayza Anam
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:43:44 GMT
════════════════════════
⌗ Tags: #programming_languages #technology #cybersecurity #programming #technews
════════════════════════
𐀪 Author: Ayza Anam
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:43:44 GMT
════════════════════════
⌗ Tags: #programming_languages #technology #cybersecurity #programming #technews
Medium
Best Programming Languages for Cybersecurity in 2025
As the cybersecurity environment becomes more intricate in 2025, experts are likely to remain ahead of threats that are evolving at…
⤷ Title: CAASM for Technology Leaders
════════════════════════
𐀪 Author: Arup Nanda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:40:27 GMT
════════════════════════
⌗ Tags: #technology_leadership #cybersecurity #cybersecurity_trends_2025 #cybersecurity_awareness
════════════════════════
𐀪 Author: Arup Nanda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:40:27 GMT
════════════════════════
⌗ Tags: #technology_leadership #cybersecurity #cybersecurity_trends_2025 #cybersecurity_awareness
Medium
CAASM for Technology Leaders
Part 2: Learn about vendors, implementation guides and trends in Cyber Asset Attack Surface Management
⤷ Title: Process ve Thread: Bilgisayarın Mutfak Ekibi
════════════════════════
𐀪 Author: bullbullsena
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:30:50 GMT
════════════════════════
⌗ Tags: #process #malware #threads #reverse_engineering #cybersecurity
════════════════════════
𐀪 Author: bullbullsena
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:30:50 GMT
════════════════════════
⌗ Tags: #process #malware #threads #reverse_engineering #cybersecurity
Medium
Process ve Thread: Bilgisayarın Mutfak Ekibi
Bilgisayarlarımız çalışırken arka planda durmaksızın bir faaliyet vardır. Tıpkı Michelin yıldızlı bir restoranın mutfağı gibi… Sürekli yeni…
⤷ Title: SQL injection — String and authentication [Root me]
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:18:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #pentesting #sql_injection #sqli
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:18:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #pentesting #sql_injection #sqli
Medium
SQL injection — String and authentication [Root me]
🔎 Overview
⤷ Title: 5 Simple Ways To Outsmart Ransomware
════════════════════════
𐀪 Author: Faiza Arshad
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:11:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #cyber #ransomeware
════════════════════════
𐀪 Author: Faiza Arshad
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:11:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #cyber #ransomeware
Medium
5 Simple Ways To Outsmart Ransomware
Have you been a victim of malware that encrypted your data and demanded money (ransom) for decryption? The hackers access your device and…
⤷ Title: HackTheBox: The Last Dance
════════════════════════
𐀪 Author: Rahaliashraf
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:56:25 GMT
════════════════════════
⌗ Tags: #cryptography #hackthebox_walkthrough #hackthebox_writeup #hackthebox
════════════════════════
𐀪 Author: Rahaliashraf
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:56:25 GMT
════════════════════════
⌗ Tags: #cryptography #hackthebox_walkthrough #hackthebox_writeup #hackthebox
Medium
HackTheBox: The Last Dance
Sophisticated Exploitation of ChaCha20 Nonce Reuse: A Cryptographic Deep Dive
⤷ Title: Beginner’s Guide to Ethical Hacking & Footprinting (in Sinhala + English)
════════════════════════
𐀪 Author: Ruwan Sanjeewa
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:34:35 GMT
════════════════════════
⌗ Tags: #footprinting #tech_education #cybersecurity_basics #information_security #ethical_hacking
════════════════════════
𐀪 Author: Ruwan Sanjeewa
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:34:35 GMT
════════════════════════
⌗ Tags: #footprinting #tech_education #cybersecurity_basics #information_security #ethical_hacking
Medium
🔐 Beginner’s Guide to Ethical Hacking & Footprinting (in Sinhala 🇱🇰 + English)
🧑💻✨ A beginner-friendly guide to understanding hacking steps, 🛠️ tools, and 🛡️ cybersecurity basics in 🇱🇰 Sinhala-English 🌐.
⤷ Title: API Key Authentication in Spring Boot Without OAuth
════════════════════════
𐀪 Author: Alexander Obregon
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:07:57 GMT
════════════════════════
⌗ Tags: #api_security #programming #java #authentication #spring_boot
════════════════════════
𐀪 Author: Alexander Obregon
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:07:57 GMT
════════════════════════
⌗ Tags: #api_security #programming #java #authentication #spring_boot
Medium
API Key Authentication in Spring Boot Without OAuth
Most APIs need some way to keep things protected without making everything wide open. A simple way to do that is with API keys. These are…
⤷ Title: API Rate Limiting in Node.js: Protecting Your Endpoints
════════════════════════
𐀪 Author: habtesoft
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:01:48 GMT
════════════════════════
⌗ Tags: #nodejs #api_security #web_development #backend_development #rate_limiting
════════════════════════
𐀪 Author: habtesoft
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:01:48 GMT
════════════════════════
⌗ Tags: #nodejs #api_security #web_development #backend_development #rate_limiting
Medium
API Rate Limiting in Node.js: Protecting Your Endpoints
How to implement and optimize rate limiting to secure your Node.js APIs from abuse and ensure reliability.
⤷ Title: rootme | SQL injection — String
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
Medium
rootme | SQL injection — String
In this lab we will discuss how to solve SQL injection - String lab from root-me.org
⤷ Title: Stored XSS → Account Takeover
════════════════════════
𐀪 Author: s0ly
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:49:22 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty_writeup #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: s0ly
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:49:22 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty_writeup #bug_bounty #bug_bounty_tips
Medium
Stored XSS → Account Takeover
بِسْمِ اللَّهِ الرَّحْمَـٰنِ الرَّحِيمِ
⤷ Title: Irish-Name-Repo 1 — PicoCTF — Writeup
════════════════════════
𐀪 Author: 0xSudo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:28:13 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #picoctf #hacking
════════════════════════
𐀪 Author: 0xSudo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:28:13 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #picoctf #hacking
Medium
Irish-Name-Repo 1 — PicoCTF — Writeup
Looking at the denoscription, this says ‘Try to see if you can login’. This mostly hints at SQL Injection techniques.
⤷ Title: Introduction to Cybersecurity: A Beginner Friendly Guide for Curious Beginners
════════════════════════
𐀪 Author: Med Abou
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 19:14:41 GMT
════════════════════════
⌗ Tags: #self_improvement #hacking #learning #cybersecurity #software_engineering
════════════════════════
𐀪 Author: Med Abou
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 19:14:41 GMT
════════════════════════
⌗ Tags: #self_improvement #hacking #learning #cybersecurity #software_engineering
Medium
Introduction to Cybersecurity: A Beginner Friendly Guide for Curious Beginners
If you’ve ever wondered what cybersecurity really is — beyond the buzzwords and news headlines — you’re not alone. Many people hear about…
⤷ Title: Cyber Starting Your Cybersecurity Journey: A Call to Action for Future Defenders
════════════════════════
𐀪 Author: Ebusingye
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:46:54 GMT
════════════════════════
⌗ Tags: #cybersecurity
════════════════════════
𐀪 Author: Ebusingye
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:46:54 GMT
════════════════════════
⌗ Tags: #cybersecurity
Medium
Cyber🚀 Starting Your Cybersecurity Journey: A Call to Action for Future Defenders
In today’s hyper-connected digital age, cybersecurity is no longer optional — it’s essential. From protecting sensitive data to securing national infrastructure and individual privacy, cybersecurity…
⤷ Title: Faking It.
════════════════════════
𐀪 Author: Cindy Kaplan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:42:32 GMT
════════════════════════
⌗ Tags: #ai #deepfakes #risk_management #cybersecurity #cyber_security_awareness
════════════════════════
𐀪 Author: Cindy Kaplan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:42:32 GMT
════════════════════════
⌗ Tags: #ai #deepfakes #risk_management #cybersecurity #cyber_security_awareness
Medium
Faking It.
Before getting too invested in your online connection, ensure it’s not a DeepFake. Advances in technology have taken catfishing to new…
⤷ Title: From a Curious Student to a Cybersecurity Enthusiast: My Journey
════════════════════════
𐀪 Author: Yash Katiyara
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:41:27 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #cybersecurity_risk
════════════════════════
𐀪 Author: Yash Katiyara
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:41:27 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #cybersecurity_risk
Medium
From a Curious Student to a Cybersecurity Enthusiast: My Journey
Hello everyone, I am Yash Katiyara, aka Professor Paradox — the cool name I always wanted. This is the story of how I earned it.
⤷ Title: WHAT IS THE DIFFERENCE BETWEEN IOC AND IOA
════════════════════════
𐀪 Author: JahdiSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:34:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #education #ioc #ioa
════════════════════════
𐀪 Author: JahdiSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:34:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #education #ioc #ioa
Medium
WHAT IS THE DIFFERENCE BETWEEN IOC AND IOA
IOC vs IOA: The Clues Cybercriminals Didn’t Mean to Leave Behind
⤷ Title: OpenAI Data Leakage: When AI Chats Go Public
════════════════════════
𐀪 Author: Anatoliy Fedorenko
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:33:57 GMT
════════════════════════
⌗ Tags: #ai #openai #google_dorking #cybersecurity #data_privacy
════════════════════════
𐀪 Author: Anatoliy Fedorenko
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:33:57 GMT
════════════════════════
⌗ Tags: #ai #openai #google_dorking #cybersecurity #data_privacy
Medium
OpenAI Data Leakage: When AI Chats Go Public
Introduction