⤷ Title: Interlock Ransomware Strikes: eSentire Exposes Multi-Stage Payload and ClickFix Social Engineering
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:10:37 +0000
════════════════════════
⌗ Tags: #Malware #ClickFix #cybersecurity #eSentire #Interlock #malware #NodeSnake #powershell #ransomware #social engineering
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:10:37 +0000
════════════════════════
⌗ Tags: #Malware #ClickFix #cybersecurity #eSentire #Interlock #malware #NodeSnake #powershell #ransomware #social engineering
Daily CyberSecurity
Interlock Ransomware Strikes: eSentire Exposes Multi-Stage Payload and ClickFix Social Engineering
eSentire exposes Interlock, a new ransomware group using multi-stage payloads and the ClickFix social engineering technique to deploy ransomware and backdoors via compromised websites.
⤷ Title: The OAuth Phishing Trap: Proofpoint Exposes AiTM Attacks That Bypass MFA to Hijack Cloud Accounts
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:03:13 +0000
════════════════════════
⌗ Tags: #Cybercriminals #AiTM #Cloud Security #cybersecurity #MFA Bypass #Microsoft 365 #OAuth #phishing #Proofpoint #Tycoon
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:03:13 +0000
════════════════════════
⌗ Tags: #Cybercriminals #AiTM #Cloud Security #cybersecurity #MFA Bypass #Microsoft 365 #OAuth #phishing #Proofpoint #Tycoon
Daily CyberSecurity
The OAuth Phishing Trap: Proofpoint Exposes AiTM Attacks That Bypass MFA to Hijack Cloud Accounts
Proofpoint reveals an AiTM phishing campaign using fake OAuth apps and the Tycoon platform to bypass MFA, hijack Microsoft 365 accounts, and steal credentials.
⤷ Title: Software and Data Integrity Failures (OWASP A08): For Hacking, Bug Bounty, and Web Development
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:01:39 GMT
════════════════════════
⌗ Tags: #web_development #penetration_testing #ethical_hacking #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:01:39 GMT
════════════════════════
⌗ Tags: #web_development #penetration_testing #ethical_hacking #cybersecurity #bug_bounty
Medium
Software and Data Integrity Failures (OWASP A08): For Hacking, Bug Bounty, and Web Development
Learn how software and data integrity flaws (OWASP A08) expose systems to RCE, supply chain attacks, and critical data manipulation.
⤷ Title: XXE Vulnerability: কী, কেন, এবং কিভাবে এটি অ্যাটাক হয়?
════════════════════════
𐀪 Author: Ayshee
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 23:21:17 GMT
════════════════════════
⌗ Tags: #xxe_attack #bug_bounty #cybersecurity #xxe #ethical_hacking
════════════════════════
𐀪 Author: Ayshee
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 23:21:17 GMT
════════════════════════
⌗ Tags: #xxe_attack #bug_bounty #cybersecurity #xxe #ethical_hacking
Medium
XXE Vulnerability: কী, কেন, এবং কিভাবে এটি অ্যাটাক হয়?
🛡️ XXE Vulnerability: কী, কেন, এবং কিভাবে এটি অ্যাটাক হয়?
⤷ Title: CTF SQHell| TryHackMe en Español
════════════════════════
𐀪 Author: Binyamin
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:04:27 GMT
════════════════════════
⌗ Tags: #tryhackme #hacking #web_app_pentesting #ctf_walkthrough #tryhackme_walkthrough
════════════════════════
𐀪 Author: Binyamin
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:04:27 GMT
════════════════════════
⌗ Tags: #tryhackme #hacking #web_app_pentesting #ctf_walkthrough #tryhackme_walkthrough
Medium
CTF SQHell| TryHackMe en Español
🧠 Introducción
⤷ Title: Bypass de WAF com Double Encoding: Uma Jornada através de SQL Injection
════════════════════════
𐀪 Author: Jonathan M.
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:28:21 GMT
════════════════════════
⌗ Tags: #infosec #sql_injection #ctf #cybersecurity #pentesting
════════════════════════
𐀪 Author: Jonathan M.
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:28:21 GMT
════════════════════════
⌗ Tags: #infosec #sql_injection #ctf #cybersecurity #pentesting
Medium
Bypass de WAF com Double Encoding: Uma Jornada através de SQL Injection
🎯 Introdução
⤷ Title: Identity and Access Management: RBAC vs ABAC — Choosing the Right Authorisation Model
════════════════════════
𐀪 Author: Samuel Odekunle
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:34:29 GMT
════════════════════════
⌗ Tags: #role_based_access_control #cybersecurity #zero_trust #technology #access_control
════════════════════════
𐀪 Author: Samuel Odekunle
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:34:29 GMT
════════════════════════
⌗ Tags: #role_based_access_control #cybersecurity #zero_trust #technology #access_control
Medium
Identity and Access Management: RBAC vs ABAC — Choosing the Right Authorisation Model
Authorisation is the gatekeeper of modern applications, determining what authenticated users can access and modify. While authentication…
⤷ Title: PM in Progress: Reading the Tea Leaves of an App in Hot Water
════════════════════════
𐀪 Author: Andrew Leng Ly
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:05:17 GMT
════════════════════════
⌗ Tags: #vibe_coding #data #product_design #product_management #cybersecurity
════════════════════════
𐀪 Author: Andrew Leng Ly
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 00:05:17 GMT
════════════════════════
⌗ Tags: #vibe_coding #data #product_design #product_management #cybersecurity
Medium
PM in Progress: Reading the Tea Leaves of an App in Hot Water
In product management, every feature choice leaves a mark. Sometimes, it’s a mark of innovation while other times, it can be a scar left…
⤷ Title: Smart Phishing Scams Are Now Changing Tactics in Real Time. Can Your Defenses Keep Up?
════════════════════════
𐀪 Author: Akshay Chauhan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 23:09:32 GMT
════════════════════════
⌗ Tags: #information_security #safeaeon #phishing #cybersecurity
════════════════════════
𐀪 Author: Akshay Chauhan
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 23:09:32 GMT
════════════════════════
⌗ Tags: #information_security #safeaeon #phishing #cybersecurity
Medium
Smart Phishing Scams Are Now Changing Tactics in Real Time. Can Your Defenses Keep Up?
Phishing isn’t what it used to be. Gone are the days of broken English emails from a “Nigerian prince” offering you millions. Today’s…
⤷ Title: Fileless Malware: A Growing Threat
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 23:03:48 GMT
════════════════════════
⌗ Tags: #cybersecurity #security #malware #cyber_threat #fileless_malware
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 23:03:48 GMT
════════════════════════
⌗ Tags: #cybersecurity #security #malware #cyber_threat #fileless_malware
Medium
Fileless Malware: A Growing Threat
Fileless malware represents a significant and increasingly prevalent threat in the cybersecurity landscape. Unlike traditional malware that…
⤷ Title: MITRE ATT&CK T1190 ve ToolShell (CVE‑2025‑53770): Gerçek Bir RCE Saldırısının Anatomisi
════════════════════════
𐀪 Author: Serhat Çallı
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:12:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #rce #soc_analyst #mitre_attck
════════════════════════
𐀪 Author: Serhat Çallı
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:12:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #rce #soc_analyst #mitre_attck
Medium
MITRE ATT&CK T1190 ve ToolShell (CVE‑2025‑53770): Gerçek Bir RCE Saldırısının Anatomisi
2025 yılının Temmuz ayında, Microsoft SharePoint sunucularını hedef alan kritik bir zafiyet, dünya genelinde şirketleri alarma geçirdi…
⤷ Title: The Ultimate 2FA App Battle: Proton, Aegis, and Authy Duke It Out in 2025
════════════════════════
𐀪 Author: BiyteLüm
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 02:21:35 GMT
════════════════════════
⌗ Tags: #application #cybersecurity #privacy #technology #authenticator_apps
════════════════════════
𐀪 Author: BiyteLüm
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 02:21:35 GMT
════════════════════════
⌗ Tags: #application #cybersecurity #privacy #technology #authenticator_apps
Medium
🔐 The Ultimate 2FA App Battle: Proton, Aegis, and Authy Duke It Out in 2025
Listen up, friends. If you’re still relying on just passwords to protect your digital life, we need to have a serious chat. It’s 2025, and…
⤷ Title: The Hidden Danger of Shared Local Admin Accounts
════════════════════════
𐀪 Author: Raviteja Mureboina
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:51:38 GMT
════════════════════════
⌗ Tags: #danger #assessment #administration #cybersecurity #local
════════════════════════
𐀪 Author: Raviteja Mureboina
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:51:38 GMT
════════════════════════
⌗ Tags: #danger #assessment #administration #cybersecurity #local
Medium
The Hidden Danger of Shared Local Admin Accounts
A recent cybersecurity assessment conducted by the Cybersecurity and Infrastructure Security Agency (CISA) uncovered a critical…
⤷ Title: SIEM LAB: Detecting LSASS Credential Dumping Attack (T1003.001) with Wazuh and Sysmon
════════════════════════
𐀪 Author: Stevanus Banu
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:37:49 GMT
════════════════════════
⌗ Tags: #blue_team #cybersecurity #siem #detection_engineering #mitre_attack
════════════════════════
𐀪 Author: Stevanus Banu
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:37:49 GMT
════════════════════════
⌗ Tags: #blue_team #cybersecurity #siem #detection_engineering #mitre_attack
Medium
SIEM LAB: Detecting LSASS Credential Dumping Attack (T1003.001) with Wazuh and Sysmon
In this article, I’ll apply the knowledge gained from a detection engineering article to detect the LSASS Credential Dumping Attack…
⤷ Title: Do Not Track vs. Global Privacy Control
════════════════════════
𐀪 Author: Sean Oriyano
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:36:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #technology
════════════════════════
𐀪 Author: Sean Oriyano
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:36:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #technology
Medium
Do Not Track vs. Global Privacy Control
Privacy on the web has become a critical concern in an age where every click, search, and online interaction is potentially monitored and…
⤷ Title: Let My Journey Begin!
════════════════════════
𐀪 Author: Jasonzamora
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:18:35 GMT
════════════════════════
⌗ Tags: #my_journey_in_tech #cybersecurity #progression #tech #learning
════════════════════════
𐀪 Author: Jasonzamora
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:18:35 GMT
════════════════════════
⌗ Tags: #my_journey_in_tech #cybersecurity #progression #tech #learning
Medium
Let My Journey Begin!
🔐 Month 1: How My Cybersecurity Journey Began
⤷ Title: Filtering In-Scope Domains Using Burp Suite Configuration and Domain List
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:41:00 GMT
════════════════════════
⌗ Tags: #noscript #bug_bounty #automation #burpsuite #penetration_testing
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:41:00 GMT
════════════════════════
⌗ Tags: #noscript #bug_bounty #automation #burpsuite #penetration_testing
Medium
Filtering In-Scope Domains Using Burp Suite Configuration and Domain List
This Python noscript is designed to filter and identify domains that fall within the scope defined in a Burp Suite configuration file. It…
⤷ Title: How I Earned $50 for a Subdomain That Almost Got Taken Over
════════════════════════
𐀪 Author: Isha Sangpal
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:39:34 GMT
════════════════════════
⌗ Tags: #ethical_hacking #bug_bounty #penetration_testing #vulnerability #cybersecurity
════════════════════════
𐀪 Author: Isha Sangpal
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:39:34 GMT
════════════════════════
⌗ Tags: #ethical_hacking #bug_bounty #penetration_testing #vulnerability #cybersecurity
Medium
How I Earned $50 for a Subdomain That Almost Got Taken Over
Who needs sleep at 12 AM when you can find a ‘non-exploitable’ bug and somehow walk away with a bounty anyway?
⤷ Title: 0x4148 — Blind SQL Injection
════════════════════════
𐀪 Author: Nano
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:13:30 GMT
════════════════════════
⌗ Tags: #red_team #bug_bounty #cybersecurity #blackhat #hacker
════════════════════════
𐀪 Author: Nano
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:13:30 GMT
════════════════════════
⌗ Tags: #red_team #bug_bounty #cybersecurity #blackhat #hacker
Medium
0x4148 — Blind SQL Injection
🚩 0x4148 — Blind SQL Injection Write-up by NAN0
⤷ Title: Surge of Akira Ransomware Hits SonicWall Firewalls
════════════════════════
𐀪 Author: Dhruvdeep Singh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:09:36 GMT
════════════════════════
⌗ Tags: #hacking #information_security #cybersecurity #ransomware #technews
════════════════════════
𐀪 Author: Dhruvdeep Singh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:09:36 GMT
════════════════════════
⌗ Tags: #hacking #information_security #cybersecurity #ransomware #technews
Medium
Surge of Akira Ransomware Hits SonicWall Firewalls
A wave of Akira ransomware attacks is exploiting a known SonicWall VPN vulnerability, hitting dozens of organizations in hours. Here’s what…
⤷ Title: Baseline vs Anomaly Detection: Understanding the Cybersecurity Mindset Shift
════════════════════════
𐀪 Author: Manish Rawat
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:27:30 GMT
════════════════════════
⌗ Tags: #reading #infosec #blog #cybersecurity #medium
════════════════════════
𐀪 Author: Manish Rawat
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:27:30 GMT
════════════════════════
⌗ Tags: #reading #infosec #blog #cybersecurity #medium
Medium
🔍 Baseline vs Anomaly Detection: Understanding the Cybersecurity Mindset Shift
In today’s ever-evolving threat landscape, detecting attacks before they cause damage is not just a goal — it’s a necessity. While…