⤷ Title: Why SOC Level 1?
════════════════════════
𐀪 Author: Furkanctiner
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 12:14:00 GMT
════════════════════════
⌗ Tags: #soc_analyst #cybersecurity #tryhackme #siem #incident_response
════════════════════════
𐀪 Author: Furkanctiner
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 12:14:00 GMT
════════════════════════
⌗ Tags: #soc_analyst #cybersecurity #tryhackme #siem #incident_response
Medium
🎯 Why SOC Level 1?
One of the most critical roles when entering cybersecurity is the SOC Analyst (Security Operations Center Analyst). These professionals…
⤷ Title: CVE-2025–51503: XSS Vulnerability in Microweber CMS Puts Admin Accounts at Risk
════════════════════════
𐀪 Author: CVEHUB
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 12:45:36 GMT
════════════════════════
⌗ Tags: #xs #microweber #cms #vulnerability #security
════════════════════════
𐀪 Author: CVEHUB
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 12:45:36 GMT
════════════════════════
⌗ Tags: #xs #microweber #cms #vulnerability #security
Medium
🚨 CVE-2025–51503: XSS Vulnerability in Microweber CMS Puts Admin Accounts at Risk
🔐 CVE-2025–51503: XSS Vulnerability in Microweber CMS Puts Admin Accounts at Risk
⤷ Title: New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 19:03:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 19:03:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Subdomain Enumeration Like a Pro — Complete Step-by-Step Guide (2025 Edition)
════════════════════════
𐀪 Author: Rajesh Kumar
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:30:01 GMT
════════════════════════
⌗ Tags: #subdomains_enumeration #reconnaissance #cybersecurity #bug_bounty #information_gathering
════════════════════════
𐀪 Author: Rajesh Kumar
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:30:01 GMT
════════════════════════
⌗ Tags: #subdomains_enumeration #reconnaissance #cybersecurity #bug_bounty #information_gathering
Medium
Subdomain Enumeration Like a Pro — Complete Step-by-Step Guide (2025 Edition)
Subdomain enumeration is the first step to finding real bugs and hidden entry points. But with so many tools out there, it’s easy to get…
⤷ Title: Tools Every Penetration Tester Must Build Themselves
════════════════════════
𐀪 Author: sudo whoami
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:05:26 GMT
════════════════════════
⌗ Tags: #pentesting #ethical_hacking #cybersecurity #bug_bounty #tools
════════════════════════
𐀪 Author: sudo whoami
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:05:26 GMT
════════════════════════
⌗ Tags: #pentesting #ethical_hacking #cybersecurity #bug_bounty #tools
Medium
Tools Every Penetration Tester Must Build Themselves
In the trenches of offensive security, tools are more than utilities they’re weapons. But real advantage doesn’t come from simply…
⤷ Title: Secure Coding Part 7: Command Injection — Attack (Python) — shell=True
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:57:06 GMT
════════════════════════
⌗ Tags: #devsecops #application_security #secure_sdlc #owasp_top_10 #secure_coding
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:57:06 GMT
════════════════════════
⌗ Tags: #devsecops #application_security #secure_sdlc #owasp_top_10 #secure_coding
Medium
Secure Coding Part 7: Command Injection — Attack (Python) — shell=True
This article dives deep into how using subprocess with shell=True in Python can open the door to attackers, and how to fix it the right…
⤷ Title: New Plague Malware Targets Linux Servers to Gain Stealthy SSH Access
════════════════════════
𐀪 Author: Chetan Seripally
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:48:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #malware #hacking #cloud
════════════════════════
𐀪 Author: Chetan Seripally
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:48:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #malware #hacking #cloud
Medium
New Plague Malware Targets Linux Servers to Gain Stealthy SSH Access
A New Threat Lurking in the Shadows of Linux Servers
⤷ Title: INFIDELITY CONCERNS. HOW I KNEW I WAS WITH A CHEATING PARTNER
════════════════════════
𐀪 Author: Poz Cajorla
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:43:34 GMT
════════════════════════
⌗ Tags: #spying #hacking #hire_a_hacker #private_investigator #cheating_spouse
════════════════════════
𐀪 Author: Poz Cajorla
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:43:34 GMT
════════════════════════
⌗ Tags: #spying #hacking #hire_a_hacker #private_investigator #cheating_spouse
Medium
INFIDELITY CONCERNS. HOW I KNEW I WAS WITH A CHEATING PARTNER
My wife had been acting distant, and the late night phone habits weren’t helping. I needed clarity, After several findings about how…
⤷ Title: Basic Pentesting 1 in 3 Different Ways A Beginner-Friendly Guide
════════════════════════
𐀪 Author: SACHIN PV
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:06:11 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #report #basic_pentesting #vulnhub
════════════════════════
𐀪 Author: SACHIN PV
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:06:11 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #report #basic_pentesting #vulnhub
Medium
Basic Pentesting 1 in 3 Different Ways A Beginner-Friendly Guide
Setting Up the Lab
⤷ Title: ️ Dive Into Hacking, Virtual Machines, Linux & Networking — A Beginner’s Guide
════════════════════════
𐀪 Author: Aryaajay
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:04:17 GMT
════════════════════════
⌗ Tags: #networking #virtual_machine #hacking #linux
════════════════════════
𐀪 Author: Aryaajay
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:04:17 GMT
════════════════════════
⌗ Tags: #networking #virtual_machine #hacking #linux
Medium
🛠️ Dive Into Hacking, Virtual Machines, Linux & Networking — A Beginner’s Guide
> Whether you're a cybersecurity enthusiast or a curious learner, this blog will walk you through the core skills every ethical hacker and system professional needs to understand. Let’s get this…
⤷ Title: Oops! When DevOps Becomes “DevOops”: $44M Crypto Hack
════════════════════════
𐀪 Author: CtrlC3
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:38:08 GMT
════════════════════════
⌗ Tags: #security #hacking #crypto #devops #cybersecurity
════════════════════════
𐀪 Author: CtrlC3
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:38:08 GMT
════════════════════════
⌗ Tags: #security #hacking #crypto #devops #cybersecurity
Medium
Oops! When DevOps Becomes “DevOops”: $44M Crypto Hack
So, a CoinDCX DevOps engineer allegedly took a shortcut to early retirement, involving a cool $44 million in crypto. You’ve got to wonder…
⤷ Title: Data Flow and Synchronization Between SIEM and SOAR Tools in SOC
════════════════════════
𐀪 Author: Esra Kayhan
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:46:36 GMT
════════════════════════
⌗ Tags: #soar #security_orchestration #siem #cybersecurity #cloud_security_automation
════════════════════════
𐀪 Author: Esra Kayhan
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:46:36 GMT
════════════════════════
⌗ Tags: #soar #security_orchestration #siem #cybersecurity #cloud_security_automation
Medium
🔄 Data Flow and Synchronization Between SIEM and SOAR Tools in SOC
In today’s threat landscape, passive observation is no longer sufficient. Security Operations Centers (SOC) must not only detect but also…
⤷ Title: Own a Domain? Then You Should Have a security.txt (RFC 9116)
════════════════════════
𐀪 Author: Mauro Stepanoski
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:36:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #best_practices #rfc #website
════════════════════════
𐀪 Author: Mauro Stepanoski
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:36:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #best_practices #rfc #website
Medium
🔐 Own a Domain? Then You Should Have a security.txt (RFC 9116)
If you manage a website, an online platform, or any public-facing infrastructure, this small file can save you time, stress, and…
⤷ Title: You know that feeling when you’re debugging production at 2 AM and suddenly wonder, “Wait, when did…
════════════════════════
𐀪 Author: Solo Recon
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:31:50 GMT
════════════════════════
⌗ Tags: #vibe_coding #solopreneur #cybersecurity
════════════════════════
𐀪 Author: Solo Recon
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:31:50 GMT
════════════════════════
⌗ Tags: #vibe_coding #solopreneur #cybersecurity
Medium
You know that feeling when you’re debugging production at 2 AM and suddenly wonder, “Wait, when did we last update our dependencies?”
Ever wake up at that hour wondering if your website or API is truly safe and secure?
⤷ Title: CYBER GHOSTS Hackers — OSINT, Red Teaming & Ethical Hacking by ALPHA
════════════════════════
𐀪 Author: CYBER GHOSTS
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:28:21 GMT
════════════════════════
⌗ Tags: #osint #ethical_hacking #cybersecurity #cyberghost #alpha
════════════════════════
𐀪 Author: CYBER GHOSTS
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:28:21 GMT
════════════════════════
⌗ Tags: #osint #ethical_hacking #cybersecurity #cyberghost #alpha
Medium
CYBER GHOSTS Hackers — OSINT, Red Teaming & Ethical Hacking by ALPHA
CYBER GHOSTS — The Ethical Hacking Team by ALPHA
⤷ Title: Investigating X Profiles and Posts Using Grok AI
════════════════════════
𐀪 Author: Bank Security
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:26:51 GMT
════════════════════════
⌗ Tags: #grok #cyber_threat_intelligence #cybersecurity #ai #threat_intelligence
════════════════════════
𐀪 Author: Bank Security
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:26:51 GMT
════════════════════════
⌗ Tags: #grok #cyber_threat_intelligence #cybersecurity #ai #threat_intelligence
Medium
Investigating X Profiles and Posts Using Grok AI
Exploring Grok’s profile summaries and post explanations for efficient threat analysis
⤷ Title: What Is Zero Trust Security?
════════════════════════
𐀪 Author: Osamamurtaza
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:23:03 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cybersecurity #cybercrime
════════════════════════
𐀪 Author: Osamamurtaza
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:23:03 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cybersecurity #cybercrime
Medium
Main Principles
‘ZERO TRUST SECURITY’ is a type of security model that emphasizes that no user or any sort of device is trusted by users in the vast and…
⤷ Title: The Silent Risk in Your ICS: Why S7 Protocol Needs Security Attention
════════════════════════
𐀪 Author: Azim Uddin
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:15:23 GMT
════════════════════════
⌗ Tags: #censys #attack_surface_management #cybersecurity #blue_team #red_team
════════════════════════
𐀪 Author: Azim Uddin
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:15:23 GMT
════════════════════════
⌗ Tags: #censys #attack_surface_management #cybersecurity #blue_team #red_team
Medium
The Silent Risk in Your ICS: Why S7 Protocol Needs Security Attention
The ASM Perspective on Industrial Security…
⤷ Title: Regional Development: Sabah, Sarawak & the Tech North
════════════════════════
𐀪 Author: Minehli Arakelians Gheshlagh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:13:31 GMT
════════════════════════
⌗ Tags: #economy #ai #cyber_security_awareness #sharing_economy #cybersecurity
════════════════════════
𐀪 Author: Minehli Arakelians Gheshlagh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:13:31 GMT
════════════════════════
⌗ Tags: #economy #ai #cyber_security_awareness #sharing_economy #cybersecurity
Medium
Regional Development: Sabah, Sarawak & the Tech North
By Minehli Arakelians Gheshlagh
⤷ Title: WARNING ⛔️ : Never Use Free WiFi—Don’t Connect to Public Wi-Fi With Your Mobile Phones
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:02:33 GMT
════════════════════════
⌗ Tags: #creativity #hacker #cybersecurity #ethical_hacking #wifihacking
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:02:33 GMT
════════════════════════
⌗ Tags: #creativity #hacker #cybersecurity #ethical_hacking #wifihacking
Medium
WARNING ⛔️ : Never Use Free WiFi—Don’t Connect to Public Wi-Fi With Your Mobile Phones
How a Simple Coffee Shop Hack Almost Ruined My Life (And How to Stay Safe)
⤷ Title: As a non-cyber person. Have you heard about “Dark Web Monitoring”?
════════════════════════
𐀪 Author: Noussayr Derbel
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:58:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #data_breach #darkweb #threat_intelligence
════════════════════════
𐀪 Author: Noussayr Derbel
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:58:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #data_breach #darkweb #threat_intelligence
Medium
As a non-cyber person. Have you heard about “Dark Web Monitoring”?
You have probably heard about companies being “hacked” or, more technically, “breached.” But what does that really mean?