⤷ Title: Filtering In-Scope Domains Using Burp Suite Configuration and Domain List
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:41:00 GMT
════════════════════════
⌗ Tags: #noscript #bug_bounty #automation #burpsuite #penetration_testing
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:41:00 GMT
════════════════════════
⌗ Tags: #noscript #bug_bounty #automation #burpsuite #penetration_testing
Medium
Filtering In-Scope Domains Using Burp Suite Configuration and Domain List
This Python noscript is designed to filter and identify domains that fall within the scope defined in a Burp Suite configuration file. It…
⤷ Title: How I Earned $50 for a Subdomain That Almost Got Taken Over
════════════════════════
𐀪 Author: Isha Sangpal
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:39:34 GMT
════════════════════════
⌗ Tags: #ethical_hacking #bug_bounty #penetration_testing #vulnerability #cybersecurity
════════════════════════
𐀪 Author: Isha Sangpal
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:39:34 GMT
════════════════════════
⌗ Tags: #ethical_hacking #bug_bounty #penetration_testing #vulnerability #cybersecurity
Medium
How I Earned $50 for a Subdomain That Almost Got Taken Over
Who needs sleep at 12 AM when you can find a ‘non-exploitable’ bug and somehow walk away with a bounty anyway?
⤷ Title: 0x4148 — Blind SQL Injection
════════════════════════
𐀪 Author: Nano
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:13:30 GMT
════════════════════════
⌗ Tags: #red_team #bug_bounty #cybersecurity #blackhat #hacker
════════════════════════
𐀪 Author: Nano
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:13:30 GMT
════════════════════════
⌗ Tags: #red_team #bug_bounty #cybersecurity #blackhat #hacker
Medium
0x4148 — Blind SQL Injection
🚩 0x4148 — Blind SQL Injection Write-up by NAN0
⤷ Title: Surge of Akira Ransomware Hits SonicWall Firewalls
════════════════════════
𐀪 Author: Dhruvdeep Singh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:09:36 GMT
════════════════════════
⌗ Tags: #hacking #information_security #cybersecurity #ransomware #technews
════════════════════════
𐀪 Author: Dhruvdeep Singh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:09:36 GMT
════════════════════════
⌗ Tags: #hacking #information_security #cybersecurity #ransomware #technews
Medium
Surge of Akira Ransomware Hits SonicWall Firewalls
A wave of Akira ransomware attacks is exploiting a known SonicWall VPN vulnerability, hitting dozens of organizations in hours. Here’s what…
⤷ Title: Baseline vs Anomaly Detection: Understanding the Cybersecurity Mindset Shift
════════════════════════
𐀪 Author: Manish Rawat
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:27:30 GMT
════════════════════════
⌗ Tags: #reading #infosec #blog #cybersecurity #medium
════════════════════════
𐀪 Author: Manish Rawat
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:27:30 GMT
════════════════════════
⌗ Tags: #reading #infosec #blog #cybersecurity #medium
Medium
🔍 Baseline vs Anomaly Detection: Understanding the Cybersecurity Mindset Shift
In today’s ever-evolving threat landscape, detecting attacks before they cause damage is not just a goal — it’s a necessity. While…
⤷ Title: How to Protect Your Business from Spear Phishing and Phishing Attacks
════════════════════════
𐀪 Author: Hardy Mervana
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:14:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #attack #business #security #infosec
════════════════════════
𐀪 Author: Hardy Mervana
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:14:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #attack #business #security #infosec
Medium
How to Protect Your Business from Spear Phishing and Phishing Attacks
Protect your business from spear phishing and phishing attacks with key prevention tips and proven cybersecurity strategies.
⤷ Title: Zero Trust Security: Why Implicit Trust is Dead in Corporate Networks
════════════════════════
𐀪 Author: Paran
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:46:34 GMT
════════════════════════
⌗ Tags: #remote_working #network_security #saas #cybersecurity #technology
════════════════════════
𐀪 Author: Paran
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:46:34 GMT
════════════════════════
⌗ Tags: #remote_working #network_security #saas #cybersecurity #technology
Medium
Zero Trust Security: Why Implicit Trust is Dead in Corporate Networks
The traditional model of network security assumed that once you were inside the corporate network, you could be trusted. But that assumption has become a massive liability in an era of rampant data…
⤷ Title: Cyber Security Course
════════════════════════
𐀪 Author: Aditya thorat
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:45:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #course
════════════════════════
𐀪 Author: Aditya thorat
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:45:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #course
Medium
Cyber Security Course
Dreaming of a career in cybersecurity? At Offenso Hacker Academy, we provide cutting-edge training in ethical hacking, delivered by experts…
⤷ Title: The Importance of Cybersecurity in Business Operations
════════════════════════
𐀪 Author: Suganth Manoharan
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:41:32 GMT
════════════════════════
⌗ Tags: #website #web_development #web_design #web3 #cybersecurity
════════════════════════
𐀪 Author: Suganth Manoharan
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:41:32 GMT
════════════════════════
⌗ Tags: #website #web_development #web_design #web3 #cybersecurity
Medium
The Importance of Cybersecurity in Business Operations
Today, most businesses run on digital tools — emails, websites, online stores, and cloud apps. But with this digital convenience also…
⤷ Title: Hunting for Secure Connections: A Site-to-Site IPSec VPN Deployment for Healthcare Organizations
════════════════════════
𐀪 Author: Travis Sanchez
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:38:28 GMT
════════════════════════
⌗ Tags: #security #cyber_security_awareness #cybersecurity #vpn #information_security
════════════════════════
𐀪 Author: Travis Sanchez
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:38:28 GMT
════════════════════════
⌗ Tags: #security #cyber_security_awareness #cybersecurity #vpn #information_security
Medium
Hunting for Secure Connections: A Site-to-Site IPSec VPN Deployment for Healthcare Organizations
In today’s increasingly digital landscape, ensuring secure remote access to critical systems is paramount — particularly within the…
⤷ Title: Navigating SharePoint Security: Essential Steps to Protect Against New Vulnerabilities
════════════════════════
𐀪 Author: Swaroop Deshpande
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:32:56 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #microsoft #microsoft_sharepoint #attack
════════════════════════
𐀪 Author: Swaroop Deshpande
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:32:56 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #microsoft #microsoft_sharepoint #attack
Medium
Navigating SharePoint Security: Essential Steps to Protect Against New Vulnerabilities
Let us start from understanding what is Microsoft SharePoint?
⤷ Title: Data Protection by NextGen2AI
════════════════════════
𐀪 Author: NextGen2AI
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:24:18 GMT
════════════════════════
⌗ Tags: #digital_trust #ai_protection #data_security #cybersecurity #nextgen2ai
════════════════════════
𐀪 Author: NextGen2AI
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:24:18 GMT
════════════════════════
⌗ Tags: #digital_trust #ai_protection #data_security #cybersecurity #nextgen2ai
Medium
Data Protection by NextGen2AI
In an era of growing cyber threats, securing your data isn’t optional — it’s essential.
NextGen2AI delivers advanced AI-powered solutions…
NextGen2AI delivers advanced AI-powered solutions…
⤷ Title: New Vulnerabilities Caught My Eye This Week
════════════════════════
𐀪 Author: Filipino CyberSec News
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:20:31 GMT
════════════════════════
⌗ Tags: #deep_learning #web_development #society #cybersecurity #programming
════════════════════════
𐀪 Author: Filipino CyberSec News
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:20:31 GMT
════════════════════════
⌗ Tags: #deep_learning #web_development #society #cybersecurity #programming
Medium
New Vulnerabilities Caught My Eye This Week
I’ve been looking around again. Some new vulnerabilities are out there and they’re not just your usual boring patch notes either. Here are some worth noting this week: This one’s serious. Fortinet’s…
⤷ Title: NullSec Philippines Hacked a Thai Government Subdomain
════════════════════════
𐀪 Author: Filipino CyberSec News
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:17:30 GMT
════════════════════════
⌗ Tags: #programming #aws #cybersecurity #society #deep_learning
════════════════════════
𐀪 Author: Filipino CyberSec News
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:17:30 GMT
════════════════════════
⌗ Tags: #programming #aws #cybersecurity #society #deep_learning
Medium
NullSec Philippines Hacked a Thai Government Subdomain
Today, the hacktivist group NullSec Philippines quietly breached a subdomain under Thailand's Department of Labor. The target: a subdomain of pbi.dole.go.th. The method: low-key, but effective…
⤷ Title: The Cybersecurity Landscape in 2025
════════════════════════
𐀪 Author: Josaiah Dkhar
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:44:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #christ_university #ethical_hacking #cyber_hygiene #deepfakes
════════════════════════
𐀪 Author: Josaiah Dkhar
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:44:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #christ_university #ethical_hacking #cyber_hygiene #deepfakes
Medium
The Cybersecurity Landscape in 2025
Understanding today’s digital security challenges and career prospects
⤷ Title: [THM] Agent Sudo Walkthrough
════════════════════════
𐀪 Author: cpelawatte
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:59:30 GMT
════════════════════════
⌗ Tags: #agent_sudo_walkthrough #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: cpelawatte
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:59:30 GMT
════════════════════════
⌗ Tags: #agent_sudo_walkthrough #tryhackme #tryhackme_walkthrough
Medium
[THM] Agent Sudo Walkthrough
Agent Sudo is a fun, spy-themed CTF challenge where you uncover secrets hidden in images using steganography, crack into a suspicious…
⤷ Title: ️ Ethical Hacking: An Introduction for Beginners
════════════════════════
𐀪 Author: Usmaumer
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:37:27 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Usmaumer
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 04:37:27 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
🛡️ Ethical Hacking: An Introduction for Beginners
“Not all hackers wear hoodies in dark rooms — some are paid to protect.”
⤷ Title: How I Hacked Database using AI Powered Assistant
════════════════════════
𐀪 Author: AbhirupKonwar
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:17:57 GMT
════════════════════════
⌗ Tags: #shodan #pentesting #ethical_hacking #cybersecurity #osint
════════════════════════
𐀪 Author: AbhirupKonwar
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:17:57 GMT
════════════════════════
⌗ Tags: #shodan #pentesting #ethical_hacking #cybersecurity #osint
Medium
How I Hacked AI Powered Database Assistant
Prompt Injection ? naaa…. SQLi/NoSQLi ? naaa… Weak credentials? naaaa…. It’s more easier 😃
⤷ Title: 10 FastAPI Security Features You’re Probably Not Using Yet
════════════════════════
𐀪 Author: Hash Block
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:31:44 GMT
════════════════════════
⌗ Tags: #python #backend #api_security #fastapi #web_development
════════════════════════
𐀪 Author: Hash Block
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 03:31:44 GMT
════════════════════════
⌗ Tags: #python #backend #api_security #fastapi #web_development
Medium
10 FastAPI Security Features You’re Probably Not Using Yet
Hidden Security Gems in FastAPI That Can Make Your App Bulletproof
⤷ Title: Advanced Burp Suite Practical Guide: Real-World Web App Pentesting
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 06:04:27 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #chatgpt #hacking #burpsuite
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 06:04:27 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #chatgpt #hacking #burpsuite
Medium
🧠 Advanced Burp Suite Practical Guide: Real-World Web App Pentesting
👨💻 Why Go Beyond Basics?
⤷ Title: "Can You Really Hack Facebook? The Truth from an Ethical Hacker’s Perspective"
════════════════════════
𐀪 Author: Md Habibur Rahman
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 05:53:30 GMT
════════════════════════
⌗ Tags: #online_safety #facebook_security #ethical_hacking #facebook_hack #bug_bounty
════════════════════════
𐀪 Author: Md Habibur Rahman
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 05:53:30 GMT
════════════════════════
⌗ Tags: #online_safety #facebook_security #ethical_hacking #facebook_hack #bug_bounty
Medium
"Can You Really Hack Facebook? The Truth from an Ethical Hacker’s Perspective"
Every day, thousands of people search online for “how to hack Facebook.” But most of them don’t realize hacking isn’t always about crime. There’s a powerful, legal side to it called ethical hacking…