⤷ Title: CAASM for Technology Leaders
════════════════════════
𐀪 Author: Arup Nanda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:40:27 GMT
════════════════════════
⌗ Tags: #technology_leadership #cybersecurity #cybersecurity_trends_2025 #cybersecurity_awareness
════════════════════════
𐀪 Author: Arup Nanda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:40:27 GMT
════════════════════════
⌗ Tags: #technology_leadership #cybersecurity #cybersecurity_trends_2025 #cybersecurity_awareness
Medium
CAASM for Technology Leaders
Part 2: Learn about vendors, implementation guides and trends in Cyber Asset Attack Surface Management
⤷ Title: Process ve Thread: Bilgisayarın Mutfak Ekibi
════════════════════════
𐀪 Author: bullbullsena
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:30:50 GMT
════════════════════════
⌗ Tags: #process #malware #threads #reverse_engineering #cybersecurity
════════════════════════
𐀪 Author: bullbullsena
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:30:50 GMT
════════════════════════
⌗ Tags: #process #malware #threads #reverse_engineering #cybersecurity
Medium
Process ve Thread: Bilgisayarın Mutfak Ekibi
Bilgisayarlarımız çalışırken arka planda durmaksızın bir faaliyet vardır. Tıpkı Michelin yıldızlı bir restoranın mutfağı gibi… Sürekli yeni…
⤷ Title: SQL injection — String and authentication [Root me]
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:18:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #pentesting #sql_injection #sqli
════════════════════════
𐀪 Author: Adhamkhairy
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:18:46 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_security #pentesting #sql_injection #sqli
Medium
SQL injection — String and authentication [Root me]
🔎 Overview
⤷ Title: 5 Simple Ways To Outsmart Ransomware
════════════════════════
𐀪 Author: Faiza Arshad
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:11:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #cyber #ransomeware
════════════════════════
𐀪 Author: Faiza Arshad
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:11:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #cyber #ransomeware
Medium
5 Simple Ways To Outsmart Ransomware
Have you been a victim of malware that encrypted your data and demanded money (ransom) for decryption? The hackers access your device and…
⤷ Title: HackTheBox: The Last Dance
════════════════════════
𐀪 Author: Rahaliashraf
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:56:25 GMT
════════════════════════
⌗ Tags: #cryptography #hackthebox_walkthrough #hackthebox_writeup #hackthebox
════════════════════════
𐀪 Author: Rahaliashraf
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:56:25 GMT
════════════════════════
⌗ Tags: #cryptography #hackthebox_walkthrough #hackthebox_writeup #hackthebox
Medium
HackTheBox: The Last Dance
Sophisticated Exploitation of ChaCha20 Nonce Reuse: A Cryptographic Deep Dive
⤷ Title: Beginner’s Guide to Ethical Hacking & Footprinting (in Sinhala + English)
════════════════════════
𐀪 Author: Ruwan Sanjeewa
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:34:35 GMT
════════════════════════
⌗ Tags: #footprinting #tech_education #cybersecurity_basics #information_security #ethical_hacking
════════════════════════
𐀪 Author: Ruwan Sanjeewa
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:34:35 GMT
════════════════════════
⌗ Tags: #footprinting #tech_education #cybersecurity_basics #information_security #ethical_hacking
Medium
🔐 Beginner’s Guide to Ethical Hacking & Footprinting (in Sinhala 🇱🇰 + English)
🧑💻✨ A beginner-friendly guide to understanding hacking steps, 🛠️ tools, and 🛡️ cybersecurity basics in 🇱🇰 Sinhala-English 🌐.
⤷ Title: API Key Authentication in Spring Boot Without OAuth
════════════════════════
𐀪 Author: Alexander Obregon
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:07:57 GMT
════════════════════════
⌗ Tags: #api_security #programming #java #authentication #spring_boot
════════════════════════
𐀪 Author: Alexander Obregon
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:07:57 GMT
════════════════════════
⌗ Tags: #api_security #programming #java #authentication #spring_boot
Medium
API Key Authentication in Spring Boot Without OAuth
Most APIs need some way to keep things protected without making everything wide open. A simple way to do that is with API keys. These are…
⤷ Title: API Rate Limiting in Node.js: Protecting Your Endpoints
════════════════════════
𐀪 Author: habtesoft
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:01:48 GMT
════════════════════════
⌗ Tags: #nodejs #api_security #web_development #backend_development #rate_limiting
════════════════════════
𐀪 Author: habtesoft
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:01:48 GMT
════════════════════════
⌗ Tags: #nodejs #api_security #web_development #backend_development #rate_limiting
Medium
API Rate Limiting in Node.js: Protecting Your Endpoints
How to implement and optimize rate limiting to secure your Node.js APIs from abuse and ensure reliability.
⤷ Title: rootme | SQL injection — String
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
Medium
rootme | SQL injection — String
In this lab we will discuss how to solve SQL injection - String lab from root-me.org
⤷ Title: Stored XSS → Account Takeover
════════════════════════
𐀪 Author: s0ly
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:49:22 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty_writeup #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: s0ly
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:49:22 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty_writeup #bug_bounty #bug_bounty_tips
Medium
Stored XSS → Account Takeover
بِسْمِ اللَّهِ الرَّحْمَـٰنِ الرَّحِيمِ
⤷ Title: Irish-Name-Repo 1 — PicoCTF — Writeup
════════════════════════
𐀪 Author: 0xSudo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:28:13 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #picoctf #hacking
════════════════════════
𐀪 Author: 0xSudo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:28:13 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #picoctf #hacking
Medium
Irish-Name-Repo 1 — PicoCTF — Writeup
Looking at the denoscription, this says ‘Try to see if you can login’. This mostly hints at SQL Injection techniques.
⤷ Title: Introduction to Cybersecurity: A Beginner Friendly Guide for Curious Beginners
════════════════════════
𐀪 Author: Med Abou
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 19:14:41 GMT
════════════════════════
⌗ Tags: #self_improvement #hacking #learning #cybersecurity #software_engineering
════════════════════════
𐀪 Author: Med Abou
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 19:14:41 GMT
════════════════════════
⌗ Tags: #self_improvement #hacking #learning #cybersecurity #software_engineering
Medium
Introduction to Cybersecurity: A Beginner Friendly Guide for Curious Beginners
If you’ve ever wondered what cybersecurity really is — beyond the buzzwords and news headlines — you’re not alone. Many people hear about…
⤷ Title: Cyber Starting Your Cybersecurity Journey: A Call to Action for Future Defenders
════════════════════════
𐀪 Author: Ebusingye
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:46:54 GMT
════════════════════════
⌗ Tags: #cybersecurity
════════════════════════
𐀪 Author: Ebusingye
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:46:54 GMT
════════════════════════
⌗ Tags: #cybersecurity
Medium
Cyber🚀 Starting Your Cybersecurity Journey: A Call to Action for Future Defenders
In today’s hyper-connected digital age, cybersecurity is no longer optional — it’s essential. From protecting sensitive data to securing national infrastructure and individual privacy, cybersecurity…
⤷ Title: Faking It.
════════════════════════
𐀪 Author: Cindy Kaplan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:42:32 GMT
════════════════════════
⌗ Tags: #ai #deepfakes #risk_management #cybersecurity #cyber_security_awareness
════════════════════════
𐀪 Author: Cindy Kaplan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:42:32 GMT
════════════════════════
⌗ Tags: #ai #deepfakes #risk_management #cybersecurity #cyber_security_awareness
Medium
Faking It.
Before getting too invested in your online connection, ensure it’s not a DeepFake. Advances in technology have taken catfishing to new…
⤷ Title: From a Curious Student to a Cybersecurity Enthusiast: My Journey
════════════════════════
𐀪 Author: Yash Katiyara
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:41:27 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #cybersecurity_risk
════════════════════════
𐀪 Author: Yash Katiyara
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:41:27 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #cybersecurity_risk
Medium
From a Curious Student to a Cybersecurity Enthusiast: My Journey
Hello everyone, I am Yash Katiyara, aka Professor Paradox — the cool name I always wanted. This is the story of how I earned it.
⤷ Title: WHAT IS THE DIFFERENCE BETWEEN IOC AND IOA
════════════════════════
𐀪 Author: JahdiSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:34:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #education #ioc #ioa
════════════════════════
𐀪 Author: JahdiSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:34:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #education #ioc #ioa
Medium
WHAT IS THE DIFFERENCE BETWEEN IOC AND IOA
IOC vs IOA: The Clues Cybercriminals Didn’t Mean to Leave Behind
⤷ Title: OpenAI Data Leakage: When AI Chats Go Public
════════════════════════
𐀪 Author: Anatoliy Fedorenko
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:33:57 GMT
════════════════════════
⌗ Tags: #ai #openai #google_dorking #cybersecurity #data_privacy
════════════════════════
𐀪 Author: Anatoliy Fedorenko
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:33:57 GMT
════════════════════════
⌗ Tags: #ai #openai #google_dorking #cybersecurity #data_privacy
Medium
OpenAI Data Leakage: When AI Chats Go Public
Introduction
⤷ Title: Let’s Defend: 314 — SOC336 — Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025–21298) |…
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:59 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #cybersecurity #lets_defend
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:59 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #cybersecurity #lets_defend
Medium
Let’s Defend: 314 — SOC336 — Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025–21298) | Writeup
Let’s Defend is an interactive, hands-on training platform focused on Blue Team (defensive cybersecurity) operations. It simulates a…
⤷ Title: Let’s Defend: 316 — SOC338 — Lumma Stealer — DLL Side-Loading via Click Fix Phishing | Writeup
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:54 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #lets_defend #cybersecurity
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:54 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #lets_defend #cybersecurity
Medium
Let’s Defend: 316 — SOC338 — Lumma Stealer — DLL Side-Loading via Click Fix Phishing | Writeup
Let’s Defend is an interactive, hands-on training platform focused on Blue Team (defensive cybersecurity) operations. It simulates a…
⤷ Title: Footprinting HTB — FTP, SMB
════════════════════════
𐀪 Author: Mkirahmet
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:40:43 GMT
════════════════════════
⌗ Tags: #penetration_testing #hackthebox_walkthrough #hackthebox_writeup #ethical_hacking #hackthebox
════════════════════════
𐀪 Author: Mkirahmet
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:40:43 GMT
════════════════════════
⌗ Tags: #penetration_testing #hackthebox_walkthrough #hackthebox_writeup #ethical_hacking #hackthebox
Medium
Footprinting — FTP, SMB, NFS
FTP Enumeration | Banner Grabbing & Anonymous Access
⤷ Title: Securing Spring Boot with Kotlin
════════════════════════
𐀪 Author: Romman Sabbir
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:38:52 GMT
════════════════════════
⌗ Tags: #sql_injection #kotlin #security #api_security #spring_boot
════════════════════════
𐀪 Author: Romman Sabbir
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:38:52 GMT
════════════════════════
⌗ Tags: #sql_injection #kotlin #security #api_security #spring_boot
Medium
Securing Spring Boot 3 with Kotlin: JNDI, Command, and XSS Injection Prevention
Injection Under Fire: Securing Spring Boot 3 Kotlin Apps from JNDI, Command, and XSS