⤷ Title: MITRE ATT&CK T1190 ve ToolShell (CVE‑2025‑53770): Gerçek Bir RCE Saldırısının Anatomisi
════════════════════════
𐀪 Author: Serhat Çallı
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:12:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #rce #soc_analyst #mitre_attck
════════════════════════
𐀪 Author: Serhat Çallı
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:12:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #rce #soc_analyst #mitre_attck
Medium
MITRE ATT&CK T1190 ve ToolShell (CVE‑2025‑53770): Gerçek Bir RCE Saldırısının Anatomisi
2025 yılının Temmuz ayında, Microsoft SharePoint sunucularını hedef alan kritik bir zafiyet, dünya genelinde şirketleri alarma geçirdi…
⤷ Title: The Ultimate 2FA App Battle: Proton, Aegis, and Authy Duke It Out in 2025
════════════════════════
𐀪 Author: BiyteLüm
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 02:21:35 GMT
════════════════════════
⌗ Tags: #application #cybersecurity #privacy #technology #authenticator_apps
════════════════════════
𐀪 Author: BiyteLüm
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 02:21:35 GMT
════════════════════════
⌗ Tags: #application #cybersecurity #privacy #technology #authenticator_apps
Medium
🔐 The Ultimate 2FA App Battle: Proton, Aegis, and Authy Duke It Out in 2025
Listen up, friends. If you’re still relying on just passwords to protect your digital life, we need to have a serious chat. It’s 2025, and…
⤷ Title: The Hidden Danger of Shared Local Admin Accounts
════════════════════════
𐀪 Author: Raviteja Mureboina
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:51:38 GMT
════════════════════════
⌗ Tags: #danger #assessment #administration #cybersecurity #local
════════════════════════
𐀪 Author: Raviteja Mureboina
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:51:38 GMT
════════════════════════
⌗ Tags: #danger #assessment #administration #cybersecurity #local
Medium
The Hidden Danger of Shared Local Admin Accounts
A recent cybersecurity assessment conducted by the Cybersecurity and Infrastructure Security Agency (CISA) uncovered a critical…
⤷ Title: SIEM LAB: Detecting LSASS Credential Dumping Attack (T1003.001) with Wazuh and Sysmon
════════════════════════
𐀪 Author: Stevanus Banu
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:37:49 GMT
════════════════════════
⌗ Tags: #blue_team #cybersecurity #siem #detection_engineering #mitre_attack
════════════════════════
𐀪 Author: Stevanus Banu
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:37:49 GMT
════════════════════════
⌗ Tags: #blue_team #cybersecurity #siem #detection_engineering #mitre_attack
Medium
SIEM LAB: Detecting LSASS Credential Dumping Attack (T1003.001) with Wazuh and Sysmon
In this article, I’ll apply the knowledge gained from a detection engineering article to detect the LSASS Credential Dumping Attack…
⤷ Title: Do Not Track vs. Global Privacy Control
════════════════════════
𐀪 Author: Sean Oriyano
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:36:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #technology
════════════════════════
𐀪 Author: Sean Oriyano
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:36:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #technology
Medium
Do Not Track vs. Global Privacy Control
Privacy on the web has become a critical concern in an age where every click, search, and online interaction is potentially monitored and…
⤷ Title: Let My Journey Begin!
════════════════════════
𐀪 Author: Jasonzamora
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:18:35 GMT
════════════════════════
⌗ Tags: #my_journey_in_tech #cybersecurity #progression #tech #learning
════════════════════════
𐀪 Author: Jasonzamora
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 01:18:35 GMT
════════════════════════
⌗ Tags: #my_journey_in_tech #cybersecurity #progression #tech #learning
Medium
Let My Journey Begin!
🔐 Month 1: How My Cybersecurity Journey Began
⤷ Title: Filtering In-Scope Domains Using Burp Suite Configuration and Domain List
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:41:00 GMT
════════════════════════
⌗ Tags: #noscript #bug_bounty #automation #burpsuite #penetration_testing
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:41:00 GMT
════════════════════════
⌗ Tags: #noscript #bug_bounty #automation #burpsuite #penetration_testing
Medium
Filtering In-Scope Domains Using Burp Suite Configuration and Domain List
This Python noscript is designed to filter and identify domains that fall within the scope defined in a Burp Suite configuration file. It…
⤷ Title: How I Earned $50 for a Subdomain That Almost Got Taken Over
════════════════════════
𐀪 Author: Isha Sangpal
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:39:34 GMT
════════════════════════
⌗ Tags: #ethical_hacking #bug_bounty #penetration_testing #vulnerability #cybersecurity
════════════════════════
𐀪 Author: Isha Sangpal
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:39:34 GMT
════════════════════════
⌗ Tags: #ethical_hacking #bug_bounty #penetration_testing #vulnerability #cybersecurity
Medium
How I Earned $50 for a Subdomain That Almost Got Taken Over
Who needs sleep at 12 AM when you can find a ‘non-exploitable’ bug and somehow walk away with a bounty anyway?
⤷ Title: 0x4148 — Blind SQL Injection
════════════════════════
𐀪 Author: Nano
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:13:30 GMT
════════════════════════
⌗ Tags: #red_team #bug_bounty #cybersecurity #blackhat #hacker
════════════════════════
𐀪 Author: Nano
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:13:30 GMT
════════════════════════
⌗ Tags: #red_team #bug_bounty #cybersecurity #blackhat #hacker
Medium
0x4148 — Blind SQL Injection
🚩 0x4148 — Blind SQL Injection Write-up by NAN0
⤷ Title: Surge of Akira Ransomware Hits SonicWall Firewalls
════════════════════════
𐀪 Author: Dhruvdeep Singh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:09:36 GMT
════════════════════════
⌗ Tags: #hacking #information_security #cybersecurity #ransomware #technews
════════════════════════
𐀪 Author: Dhruvdeep Singh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:09:36 GMT
════════════════════════
⌗ Tags: #hacking #information_security #cybersecurity #ransomware #technews
Medium
Surge of Akira Ransomware Hits SonicWall Firewalls
A wave of Akira ransomware attacks is exploiting a known SonicWall VPN vulnerability, hitting dozens of organizations in hours. Here’s what…
⤷ Title: Baseline vs Anomaly Detection: Understanding the Cybersecurity Mindset Shift
════════════════════════
𐀪 Author: Manish Rawat
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:27:30 GMT
════════════════════════
⌗ Tags: #reading #infosec #blog #cybersecurity #medium
════════════════════════
𐀪 Author: Manish Rawat
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:27:30 GMT
════════════════════════
⌗ Tags: #reading #infosec #blog #cybersecurity #medium
Medium
🔍 Baseline vs Anomaly Detection: Understanding the Cybersecurity Mindset Shift
In today’s ever-evolving threat landscape, detecting attacks before they cause damage is not just a goal — it’s a necessity. While…
⤷ Title: How to Protect Your Business from Spear Phishing and Phishing Attacks
════════════════════════
𐀪 Author: Hardy Mervana
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:14:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #attack #business #security #infosec
════════════════════════
𐀪 Author: Hardy Mervana
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:14:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #attack #business #security #infosec
Medium
How to Protect Your Business from Spear Phishing and Phishing Attacks
Protect your business from spear phishing and phishing attacks with key prevention tips and proven cybersecurity strategies.
⤷ Title: Zero Trust Security: Why Implicit Trust is Dead in Corporate Networks
════════════════════════
𐀪 Author: Paran
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:46:34 GMT
════════════════════════
⌗ Tags: #remote_working #network_security #saas #cybersecurity #technology
════════════════════════
𐀪 Author: Paran
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:46:34 GMT
════════════════════════
⌗ Tags: #remote_working #network_security #saas #cybersecurity #technology
Medium
Zero Trust Security: Why Implicit Trust is Dead in Corporate Networks
The traditional model of network security assumed that once you were inside the corporate network, you could be trusted. But that assumption has become a massive liability in an era of rampant data…
⤷ Title: Cyber Security Course
════════════════════════
𐀪 Author: Aditya thorat
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:45:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #course
════════════════════════
𐀪 Author: Aditya thorat
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:45:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #course
Medium
Cyber Security Course
Dreaming of a career in cybersecurity? At Offenso Hacker Academy, we provide cutting-edge training in ethical hacking, delivered by experts…
⤷ Title: The Importance of Cybersecurity in Business Operations
════════════════════════
𐀪 Author: Suganth Manoharan
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:41:32 GMT
════════════════════════
⌗ Tags: #website #web_development #web_design #web3 #cybersecurity
════════════════════════
𐀪 Author: Suganth Manoharan
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:41:32 GMT
════════════════════════
⌗ Tags: #website #web_development #web_design #web3 #cybersecurity
Medium
The Importance of Cybersecurity in Business Operations
Today, most businesses run on digital tools — emails, websites, online stores, and cloud apps. But with this digital convenience also…
⤷ Title: Hunting for Secure Connections: A Site-to-Site IPSec VPN Deployment for Healthcare Organizations
════════════════════════
𐀪 Author: Travis Sanchez
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:38:28 GMT
════════════════════════
⌗ Tags: #security #cyber_security_awareness #cybersecurity #vpn #information_security
════════════════════════
𐀪 Author: Travis Sanchez
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:38:28 GMT
════════════════════════
⌗ Tags: #security #cyber_security_awareness #cybersecurity #vpn #information_security
Medium
Hunting for Secure Connections: A Site-to-Site IPSec VPN Deployment for Healthcare Organizations
In today’s increasingly digital landscape, ensuring secure remote access to critical systems is paramount — particularly within the…
⤷ Title: Navigating SharePoint Security: Essential Steps to Protect Against New Vulnerabilities
════════════════════════
𐀪 Author: Swaroop Deshpande
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:32:56 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #microsoft #microsoft_sharepoint #attack
════════════════════════
𐀪 Author: Swaroop Deshpande
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:32:56 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #microsoft #microsoft_sharepoint #attack
Medium
Navigating SharePoint Security: Essential Steps to Protect Against New Vulnerabilities
Let us start from understanding what is Microsoft SharePoint?
⤷ Title: Data Protection by NextGen2AI
════════════════════════
𐀪 Author: NextGen2AI
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:24:18 GMT
════════════════════════
⌗ Tags: #digital_trust #ai_protection #data_security #cybersecurity #nextgen2ai
════════════════════════
𐀪 Author: NextGen2AI
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:24:18 GMT
════════════════════════
⌗ Tags: #digital_trust #ai_protection #data_security #cybersecurity #nextgen2ai
Medium
Data Protection by NextGen2AI
In an era of growing cyber threats, securing your data isn’t optional — it’s essential.
NextGen2AI delivers advanced AI-powered solutions…
NextGen2AI delivers advanced AI-powered solutions…
⤷ Title: New Vulnerabilities Caught My Eye This Week
════════════════════════
𐀪 Author: Filipino CyberSec News
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:20:31 GMT
════════════════════════
⌗ Tags: #deep_learning #web_development #society #cybersecurity #programming
════════════════════════
𐀪 Author: Filipino CyberSec News
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:20:31 GMT
════════════════════════
⌗ Tags: #deep_learning #web_development #society #cybersecurity #programming
Medium
New Vulnerabilities Caught My Eye This Week
I’ve been looking around again. Some new vulnerabilities are out there and they’re not just your usual boring patch notes either. Here are some worth noting this week: This one’s serious. Fortinet’s…
⤷ Title: NullSec Philippines Hacked a Thai Government Subdomain
════════════════════════
𐀪 Author: Filipino CyberSec News
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:17:30 GMT
════════════════════════
⌗ Tags: #programming #aws #cybersecurity #society #deep_learning
════════════════════════
𐀪 Author: Filipino CyberSec News
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:17:30 GMT
════════════════════════
⌗ Tags: #programming #aws #cybersecurity #society #deep_learning
Medium
NullSec Philippines Hacked a Thai Government Subdomain
Today, the hacktivist group NullSec Philippines quietly breached a subdomain under Thailand's Department of Labor. The target: a subdomain of pbi.dole.go.th. The method: low-key, but effective…
⤷ Title: The Cybersecurity Landscape in 2025
════════════════════════
𐀪 Author: Josaiah Dkhar
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:44:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #christ_university #ethical_hacking #cyber_hygiene #deepfakes
════════════════════════
𐀪 Author: Josaiah Dkhar
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:44:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #christ_university #ethical_hacking #cyber_hygiene #deepfakes
Medium
The Cybersecurity Landscape in 2025
Understanding today’s digital security challenges and career prospects