⤷ Title: 5 Simple Ways To Outsmart Ransomware
════════════════════════
𐀪 Author: Faiza Arshad
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:11:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #cyber #ransomeware
════════════════════════
𐀪 Author: Faiza Arshad
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:11:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #cyberattack #cyber #ransomeware
Medium
5 Simple Ways To Outsmart Ransomware
Have you been a victim of malware that encrypted your data and demanded money (ransom) for decryption? The hackers access your device and…
⤷ Title: HackTheBox: The Last Dance
════════════════════════
𐀪 Author: Rahaliashraf
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:56:25 GMT
════════════════════════
⌗ Tags: #cryptography #hackthebox_walkthrough #hackthebox_writeup #hackthebox
════════════════════════
𐀪 Author: Rahaliashraf
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:56:25 GMT
════════════════════════
⌗ Tags: #cryptography #hackthebox_walkthrough #hackthebox_writeup #hackthebox
Medium
HackTheBox: The Last Dance
Sophisticated Exploitation of ChaCha20 Nonce Reuse: A Cryptographic Deep Dive
⤷ Title: Beginner’s Guide to Ethical Hacking & Footprinting (in Sinhala + English)
════════════════════════
𐀪 Author: Ruwan Sanjeewa
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:34:35 GMT
════════════════════════
⌗ Tags: #footprinting #tech_education #cybersecurity_basics #information_security #ethical_hacking
════════════════════════
𐀪 Author: Ruwan Sanjeewa
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 18:34:35 GMT
════════════════════════
⌗ Tags: #footprinting #tech_education #cybersecurity_basics #information_security #ethical_hacking
Medium
🔐 Beginner’s Guide to Ethical Hacking & Footprinting (in Sinhala 🇱🇰 + English)
🧑💻✨ A beginner-friendly guide to understanding hacking steps, 🛠️ tools, and 🛡️ cybersecurity basics in 🇱🇰 Sinhala-English 🌐.
⤷ Title: API Key Authentication in Spring Boot Without OAuth
════════════════════════
𐀪 Author: Alexander Obregon
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:07:57 GMT
════════════════════════
⌗ Tags: #api_security #programming #java #authentication #spring_boot
════════════════════════
𐀪 Author: Alexander Obregon
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:07:57 GMT
════════════════════════
⌗ Tags: #api_security #programming #java #authentication #spring_boot
Medium
API Key Authentication in Spring Boot Without OAuth
Most APIs need some way to keep things protected without making everything wide open. A simple way to do that is with API keys. These are…
⤷ Title: API Rate Limiting in Node.js: Protecting Your Endpoints
════════════════════════
𐀪 Author: habtesoft
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:01:48 GMT
════════════════════════
⌗ Tags: #nodejs #api_security #web_development #backend_development #rate_limiting
════════════════════════
𐀪 Author: habtesoft
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:01:48 GMT
════════════════════════
⌗ Tags: #nodejs #api_security #web_development #backend_development #rate_limiting
Medium
API Rate Limiting in Node.js: Protecting Your Endpoints
How to implement and optimize rate limiting to secure your Node.js APIs from abuse and ensure reliability.
⤷ Title: rootme | SQL injection — String
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
Medium
rootme | SQL injection — String
In this lab we will discuss how to solve SQL injection - String lab from root-me.org
⤷ Title: Stored XSS → Account Takeover
════════════════════════
𐀪 Author: s0ly
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:49:22 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty_writeup #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: s0ly
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:49:22 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty_writeup #bug_bounty #bug_bounty_tips
Medium
Stored XSS → Account Takeover
بِسْمِ اللَّهِ الرَّحْمَـٰنِ الرَّحِيمِ
⤷ Title: Irish-Name-Repo 1 — PicoCTF — Writeup
════════════════════════
𐀪 Author: 0xSudo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:28:13 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #picoctf #hacking
════════════════════════
𐀪 Author: 0xSudo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:28:13 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #picoctf #hacking
Medium
Irish-Name-Repo 1 — PicoCTF — Writeup
Looking at the denoscription, this says ‘Try to see if you can login’. This mostly hints at SQL Injection techniques.
⤷ Title: Introduction to Cybersecurity: A Beginner Friendly Guide for Curious Beginners
════════════════════════
𐀪 Author: Med Abou
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 19:14:41 GMT
════════════════════════
⌗ Tags: #self_improvement #hacking #learning #cybersecurity #software_engineering
════════════════════════
𐀪 Author: Med Abou
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 19:14:41 GMT
════════════════════════
⌗ Tags: #self_improvement #hacking #learning #cybersecurity #software_engineering
Medium
Introduction to Cybersecurity: A Beginner Friendly Guide for Curious Beginners
If you’ve ever wondered what cybersecurity really is — beyond the buzzwords and news headlines — you’re not alone. Many people hear about…
⤷ Title: Cyber Starting Your Cybersecurity Journey: A Call to Action for Future Defenders
════════════════════════
𐀪 Author: Ebusingye
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:46:54 GMT
════════════════════════
⌗ Tags: #cybersecurity
════════════════════════
𐀪 Author: Ebusingye
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:46:54 GMT
════════════════════════
⌗ Tags: #cybersecurity
Medium
Cyber🚀 Starting Your Cybersecurity Journey: A Call to Action for Future Defenders
In today’s hyper-connected digital age, cybersecurity is no longer optional — it’s essential. From protecting sensitive data to securing national infrastructure and individual privacy, cybersecurity…
⤷ Title: Faking It.
════════════════════════
𐀪 Author: Cindy Kaplan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:42:32 GMT
════════════════════════
⌗ Tags: #ai #deepfakes #risk_management #cybersecurity #cyber_security_awareness
════════════════════════
𐀪 Author: Cindy Kaplan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:42:32 GMT
════════════════════════
⌗ Tags: #ai #deepfakes #risk_management #cybersecurity #cyber_security_awareness
Medium
Faking It.
Before getting too invested in your online connection, ensure it’s not a DeepFake. Advances in technology have taken catfishing to new…
⤷ Title: From a Curious Student to a Cybersecurity Enthusiast: My Journey
════════════════════════
𐀪 Author: Yash Katiyara
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:41:27 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #cybersecurity_risk
════════════════════════
𐀪 Author: Yash Katiyara
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:41:27 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #cybersecurity_risk
Medium
From a Curious Student to a Cybersecurity Enthusiast: My Journey
Hello everyone, I am Yash Katiyara, aka Professor Paradox — the cool name I always wanted. This is the story of how I earned it.
⤷ Title: WHAT IS THE DIFFERENCE BETWEEN IOC AND IOA
════════════════════════
𐀪 Author: JahdiSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:34:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #education #ioc #ioa
════════════════════════
𐀪 Author: JahdiSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:34:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #education #ioc #ioa
Medium
WHAT IS THE DIFFERENCE BETWEEN IOC AND IOA
IOC vs IOA: The Clues Cybercriminals Didn’t Mean to Leave Behind
⤷ Title: OpenAI Data Leakage: When AI Chats Go Public
════════════════════════
𐀪 Author: Anatoliy Fedorenko
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:33:57 GMT
════════════════════════
⌗ Tags: #ai #openai #google_dorking #cybersecurity #data_privacy
════════════════════════
𐀪 Author: Anatoliy Fedorenko
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:33:57 GMT
════════════════════════
⌗ Tags: #ai #openai #google_dorking #cybersecurity #data_privacy
Medium
OpenAI Data Leakage: When AI Chats Go Public
Introduction
⤷ Title: Let’s Defend: 314 — SOC336 — Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025–21298) |…
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:59 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #cybersecurity #lets_defend
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:59 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #cybersecurity #lets_defend
Medium
Let’s Defend: 314 — SOC336 — Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025–21298) | Writeup
Let’s Defend is an interactive, hands-on training platform focused on Blue Team (defensive cybersecurity) operations. It simulates a…
⤷ Title: Let’s Defend: 316 — SOC338 — Lumma Stealer — DLL Side-Loading via Click Fix Phishing | Writeup
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:54 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #lets_defend #cybersecurity
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:54 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #lets_defend #cybersecurity
Medium
Let’s Defend: 316 — SOC338 — Lumma Stealer — DLL Side-Loading via Click Fix Phishing | Writeup
Let’s Defend is an interactive, hands-on training platform focused on Blue Team (defensive cybersecurity) operations. It simulates a…
⤷ Title: Footprinting HTB — FTP, SMB
════════════════════════
𐀪 Author: Mkirahmet
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:40:43 GMT
════════════════════════
⌗ Tags: #penetration_testing #hackthebox_walkthrough #hackthebox_writeup #ethical_hacking #hackthebox
════════════════════════
𐀪 Author: Mkirahmet
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:40:43 GMT
════════════════════════
⌗ Tags: #penetration_testing #hackthebox_walkthrough #hackthebox_writeup #ethical_hacking #hackthebox
Medium
Footprinting — FTP, SMB, NFS
FTP Enumeration | Banner Grabbing & Anonymous Access
⤷ Title: Securing Spring Boot with Kotlin
════════════════════════
𐀪 Author: Romman Sabbir
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:38:52 GMT
════════════════════════
⌗ Tags: #sql_injection #kotlin #security #api_security #spring_boot
════════════════════════
𐀪 Author: Romman Sabbir
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:38:52 GMT
════════════════════════
⌗ Tags: #sql_injection #kotlin #security #api_security #spring_boot
Medium
Securing Spring Boot 3 with Kotlin: JNDI, Command, and XSS Injection Prevention
Injection Under Fire: Securing Spring Boot 3 Kotlin Apps from JNDI, Command, and XSS
⤷ Title: Group-IB Exposes How Hackers Use Linux Bind Mounts (MITRE T1564.013) to Hide ATM Attack
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:13:51 +0000
════════════════════════
⌗ Tags: #Cybercriminals #anti_forensics #ATM #Bind Mounts #cyberattack #Group_IB #Linux #MITRE ATT&CK #Raspberry Pi #TINYSHELL #UNC2891
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:13:51 +0000
════════════════════════
⌗ Tags: #Cybercriminals #anti_forensics #ATM #Bind Mounts #cyberattack #Group_IB #Linux #MITRE ATT&CK #Raspberry Pi #TINYSHELL #UNC2891
Penetration Testing Tools
Group-IB Exposes How Hackers Use Linux Bind Mounts (MITRE T1564.013) to Hide ATM Attack
Group-IB uncovers how UNC2891 used Linux bind mounts (MITRE T1564.013) to hide a physical ATM cyberattack, involving a Raspberry Pi and a plan to tamper with HSMs for fraudulent withdrawals.
⤷ Title: An Introduction to Bug Bounty Hunting
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:27:54 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #vulnerability #penetration_testing #ethical_hacking
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:27:54 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #vulnerability #penetration_testing #ethical_hacking
Medium
An Introduction to Bug Bounty Hunting
Bug bounty hunting, in essence, is the process of ethically hacking into software or websites to discover and report security…
⤷ Title: Unlocking the Power of /proc/self/fd/ in Linux: From Basics to Exploits and Prevention
════════════════════════
𐀪 Author: Zoningxtr
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 21:21:39 GMT
════════════════════════
⌗ Tags: #web_development #php #bug_bounty #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Zoningxtr
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 21:21:39 GMT
════════════════════════
⌗ Tags: #web_development #php #bug_bounty #penetration_testing #cybersecurity
Medium
Bug🔍💥 Unlocking the Power of /proc/self/fd/ in Linux: From Basics to Exploits and Prevention 💣🔐
By Zoningxtr