⤷ Title: rootme | SQL injection — String
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
════════════════════════
𐀪 Author: Abdelfattah Elsabagh
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 17:48:37 GMT
════════════════════════
⌗ Tags: #root_me #sql_injection #injection
Medium
rootme | SQL injection — String
In this lab we will discuss how to solve SQL injection - String lab from root-me.org
⤷ Title: Stored XSS → Account Takeover
════════════════════════
𐀪 Author: s0ly
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:49:22 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty_writeup #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: s0ly
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 16:49:22 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty_writeup #bug_bounty #bug_bounty_tips
Medium
Stored XSS → Account Takeover
بِسْمِ اللَّهِ الرَّحْمَـٰنِ الرَّحِيمِ
⤷ Title: Irish-Name-Repo 1 — PicoCTF — Writeup
════════════════════════
𐀪 Author: 0xSudo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:28:13 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #picoctf #hacking
════════════════════════
𐀪 Author: 0xSudo
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:28:13 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #picoctf #hacking
Medium
Irish-Name-Repo 1 — PicoCTF — Writeup
Looking at the denoscription, this says ‘Try to see if you can login’. This mostly hints at SQL Injection techniques.
⤷ Title: Introduction to Cybersecurity: A Beginner Friendly Guide for Curious Beginners
════════════════════════
𐀪 Author: Med Abou
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 19:14:41 GMT
════════════════════════
⌗ Tags: #self_improvement #hacking #learning #cybersecurity #software_engineering
════════════════════════
𐀪 Author: Med Abou
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 19:14:41 GMT
════════════════════════
⌗ Tags: #self_improvement #hacking #learning #cybersecurity #software_engineering
Medium
Introduction to Cybersecurity: A Beginner Friendly Guide for Curious Beginners
If you’ve ever wondered what cybersecurity really is — beyond the buzzwords and news headlines — you’re not alone. Many people hear about…
⤷ Title: Cyber Starting Your Cybersecurity Journey: A Call to Action for Future Defenders
════════════════════════
𐀪 Author: Ebusingye
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:46:54 GMT
════════════════════════
⌗ Tags: #cybersecurity
════════════════════════
𐀪 Author: Ebusingye
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:46:54 GMT
════════════════════════
⌗ Tags: #cybersecurity
Medium
Cyber🚀 Starting Your Cybersecurity Journey: A Call to Action for Future Defenders
In today’s hyper-connected digital age, cybersecurity is no longer optional — it’s essential. From protecting sensitive data to securing national infrastructure and individual privacy, cybersecurity…
⤷ Title: Faking It.
════════════════════════
𐀪 Author: Cindy Kaplan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:42:32 GMT
════════════════════════
⌗ Tags: #ai #deepfakes #risk_management #cybersecurity #cyber_security_awareness
════════════════════════
𐀪 Author: Cindy Kaplan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:42:32 GMT
════════════════════════
⌗ Tags: #ai #deepfakes #risk_management #cybersecurity #cyber_security_awareness
Medium
Faking It.
Before getting too invested in your online connection, ensure it’s not a DeepFake. Advances in technology have taken catfishing to new…
⤷ Title: From a Curious Student to a Cybersecurity Enthusiast: My Journey
════════════════════════
𐀪 Author: Yash Katiyara
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:41:27 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #cybersecurity_risk
════════════════════════
𐀪 Author: Yash Katiyara
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:41:27 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #cybersecurity #cybersecurity_risk
Medium
From a Curious Student to a Cybersecurity Enthusiast: My Journey
Hello everyone, I am Yash Katiyara, aka Professor Paradox — the cool name I always wanted. This is the story of how I earned it.
⤷ Title: WHAT IS THE DIFFERENCE BETWEEN IOC AND IOA
════════════════════════
𐀪 Author: JahdiSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:34:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #education #ioc #ioa
════════════════════════
𐀪 Author: JahdiSec
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:34:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #education #ioc #ioa
Medium
WHAT IS THE DIFFERENCE BETWEEN IOC AND IOA
IOC vs IOA: The Clues Cybercriminals Didn’t Mean to Leave Behind
⤷ Title: OpenAI Data Leakage: When AI Chats Go Public
════════════════════════
𐀪 Author: Anatoliy Fedorenko
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:33:57 GMT
════════════════════════
⌗ Tags: #ai #openai #google_dorking #cybersecurity #data_privacy
════════════════════════
𐀪 Author: Anatoliy Fedorenko
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:33:57 GMT
════════════════════════
⌗ Tags: #ai #openai #google_dorking #cybersecurity #data_privacy
Medium
OpenAI Data Leakage: When AI Chats Go Public
Introduction
⤷ Title: Let’s Defend: 314 — SOC336 — Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025–21298) |…
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:59 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #cybersecurity #lets_defend
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:59 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #cybersecurity #lets_defend
Medium
Let’s Defend: 314 — SOC336 — Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025–21298) | Writeup
Let’s Defend is an interactive, hands-on training platform focused on Blue Team (defensive cybersecurity) operations. It simulates a…
⤷ Title: Let’s Defend: 316 — SOC338 — Lumma Stealer — DLL Side-Loading via Click Fix Phishing | Writeup
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:54 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #lets_defend #cybersecurity
════════════════════════
𐀪 Author: EPereda
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:29:54 GMT
════════════════════════
⌗ Tags: #blue_team #writeup #lets_defend #cybersecurity
Medium
Let’s Defend: 316 — SOC338 — Lumma Stealer — DLL Side-Loading via Click Fix Phishing | Writeup
Let’s Defend is an interactive, hands-on training platform focused on Blue Team (defensive cybersecurity) operations. It simulates a…
⤷ Title: Footprinting HTB — FTP, SMB
════════════════════════
𐀪 Author: Mkirahmet
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:40:43 GMT
════════════════════════
⌗ Tags: #penetration_testing #hackthebox_walkthrough #hackthebox_writeup #ethical_hacking #hackthebox
════════════════════════
𐀪 Author: Mkirahmet
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:40:43 GMT
════════════════════════
⌗ Tags: #penetration_testing #hackthebox_walkthrough #hackthebox_writeup #ethical_hacking #hackthebox
Medium
Footprinting — FTP, SMB, NFS
FTP Enumeration | Banner Grabbing & Anonymous Access
⤷ Title: Securing Spring Boot with Kotlin
════════════════════════
𐀪 Author: Romman Sabbir
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:38:52 GMT
════════════════════════
⌗ Tags: #sql_injection #kotlin #security #api_security #spring_boot
════════════════════════
𐀪 Author: Romman Sabbir
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 20:38:52 GMT
════════════════════════
⌗ Tags: #sql_injection #kotlin #security #api_security #spring_boot
Medium
Securing Spring Boot 3 with Kotlin: JNDI, Command, and XSS Injection Prevention
Injection Under Fire: Securing Spring Boot 3 Kotlin Apps from JNDI, Command, and XSS
⤷ Title: Group-IB Exposes How Hackers Use Linux Bind Mounts (MITRE T1564.013) to Hide ATM Attack
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:13:51 +0000
════════════════════════
⌗ Tags: #Cybercriminals #anti_forensics #ATM #Bind Mounts #cyberattack #Group_IB #Linux #MITRE ATT&CK #Raspberry Pi #TINYSHELL #UNC2891
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:13:51 +0000
════════════════════════
⌗ Tags: #Cybercriminals #anti_forensics #ATM #Bind Mounts #cyberattack #Group_IB #Linux #MITRE ATT&CK #Raspberry Pi #TINYSHELL #UNC2891
Penetration Testing Tools
Group-IB Exposes How Hackers Use Linux Bind Mounts (MITRE T1564.013) to Hide ATM Attack
Group-IB uncovers how UNC2891 used Linux bind mounts (MITRE T1564.013) to hide a physical ATM cyberattack, involving a Raspberry Pi and a plan to tamper with HSMs for fraudulent withdrawals.
⤷ Title: An Introduction to Bug Bounty Hunting
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:27:54 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #vulnerability #penetration_testing #ethical_hacking
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:27:54 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #vulnerability #penetration_testing #ethical_hacking
Medium
An Introduction to Bug Bounty Hunting
Bug bounty hunting, in essence, is the process of ethically hacking into software or websites to discover and report security…
⤷ Title: Unlocking the Power of /proc/self/fd/ in Linux: From Basics to Exploits and Prevention
════════════════════════
𐀪 Author: Zoningxtr
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 21:21:39 GMT
════════════════════════
⌗ Tags: #web_development #php #bug_bounty #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Zoningxtr
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 21:21:39 GMT
════════════════════════
⌗ Tags: #web_development #php #bug_bounty #penetration_testing #cybersecurity
Medium
Bug🔍💥 Unlocking the Power of /proc/self/fd/ in Linux: From Basics to Exploits and Prevention 💣🔐
By Zoningxtr
⤷ Title: Turn LFI into RCE Using /proc/self/ — A Deep Dive for Pentesters
════════════════════════
𐀪 Author: Zoningxtr
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 21:19:36 GMT
════════════════════════
⌗ Tags: #php #web_development #bug_bounty #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Zoningxtr
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 21:19:36 GMT
════════════════════════
⌗ Tags: #php #web_development #bug_bounty #cybersecurity #penetration_testing
Medium
💣 Turn LFI into RCE Using /proc/self/ — A Deep Dive for Pentesters 💻🚀
By Zoningxtr
⤷ Title: Detecting Account Takeover in Real Time
════════════════════════
𐀪 Author: Karthikeyan Nagaraj
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:16:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #careers #hacking #technology #security
════════════════════════
𐀪 Author: Karthikeyan Nagaraj
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:16:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #careers #hacking #technology #security
Medium
Detecting Account Takeover in Real Time
How organizations can spot and stop hijacked accounts before damage is done.
⤷ Title: Fortytwo.nl — It’s So Bad, I’m Embarrassed to Write About It
════════════════════════
𐀪 Author: 0trust0day
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 21:39:53 GMT
════════════════════════
⌗ Tags: #fortytwo #0trust0day #cybersecurity #infosec
════════════════════════
𐀪 Author: 0trust0day
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 21:39:53 GMT
════════════════════════
⌗ Tags: #fortytwo #0trust0day #cybersecurity #infosec
Medium
Fortytwo.nl — It’s So Bad, I’m Embarrassed to Write About It
How a Dutch “Security” Company Became a Real-World CVE Compilation
⤷ Title: AI with Cyber security
════════════════════════
𐀪 Author: Jayasri Vijayakumar
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:55:14 GMT
════════════════════════
⌗ Tags: #ai_with_cyber_security #ai #cybersecurity #ai_is_the_future
════════════════════════
𐀪 Author: Jayasri Vijayakumar
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:55:14 GMT
════════════════════════
⌗ Tags: #ai_with_cyber_security #ai #cybersecurity #ai_is_the_future
Medium
AI with Cyber security
I recently came across an interesting video about how AI can accelerate Cybersecurity.
I also used the notegpt to explore the tool and…
I also used the notegpt to explore the tool and…
⤷ Title: From Vulnerability to Visibility: Managing Server Security with SecuMS and OmniGuard
════════════════════════
𐀪 Author: Ramadhana Khalaf Sandhyakala
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:52:39 GMT
════════════════════════
⌗ Tags: #configuration #cybersecurity #information_security
════════════════════════
𐀪 Author: Ramadhana Khalaf Sandhyakala
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 22:52:39 GMT
════════════════════════
⌗ Tags: #configuration #cybersecurity #information_security
Medium
From Vulnerability to Visibility: Managing Server Security with SecuMS and OmniGuard
System Security Management through CCE-Based Vulnerability Assessment and Modular Server Hardening Mr. M. Iman Karmawijaya, CTO of LSWare…