⤷ Title: CYBER GHOSTS Hackers — OSINT, Red Teaming & Ethical Hacking by ALPHA
════════════════════════
𐀪 Author: CYBER GHOSTS
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:28:21 GMT
════════════════════════
⌗ Tags: #osint #ethical_hacking #cybersecurity #cyberghost #alpha
════════════════════════
𐀪 Author: CYBER GHOSTS
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:28:21 GMT
════════════════════════
⌗ Tags: #osint #ethical_hacking #cybersecurity #cyberghost #alpha
Medium
CYBER GHOSTS Hackers — OSINT, Red Teaming & Ethical Hacking by ALPHA
CYBER GHOSTS — The Ethical Hacking Team by ALPHA
⤷ Title: Investigating X Profiles and Posts Using Grok AI
════════════════════════
𐀪 Author: Bank Security
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:26:51 GMT
════════════════════════
⌗ Tags: #grok #cyber_threat_intelligence #cybersecurity #ai #threat_intelligence
════════════════════════
𐀪 Author: Bank Security
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:26:51 GMT
════════════════════════
⌗ Tags: #grok #cyber_threat_intelligence #cybersecurity #ai #threat_intelligence
Medium
Investigating X Profiles and Posts Using Grok AI
Exploring Grok’s profile summaries and post explanations for efficient threat analysis
⤷ Title: What Is Zero Trust Security?
════════════════════════
𐀪 Author: Osamamurtaza
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:23:03 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cybersecurity #cybercrime
════════════════════════
𐀪 Author: Osamamurtaza
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:23:03 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cybersecurity #cybercrime
Medium
Main Principles
‘ZERO TRUST SECURITY’ is a type of security model that emphasizes that no user or any sort of device is trusted by users in the vast and…
⤷ Title: The Silent Risk in Your ICS: Why S7 Protocol Needs Security Attention
════════════════════════
𐀪 Author: Azim Uddin
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:15:23 GMT
════════════════════════
⌗ Tags: #censys #attack_surface_management #cybersecurity #blue_team #red_team
════════════════════════
𐀪 Author: Azim Uddin
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:15:23 GMT
════════════════════════
⌗ Tags: #censys #attack_surface_management #cybersecurity #blue_team #red_team
Medium
The Silent Risk in Your ICS: Why S7 Protocol Needs Security Attention
The ASM Perspective on Industrial Security…
⤷ Title: Regional Development: Sabah, Sarawak & the Tech North
════════════════════════
𐀪 Author: Minehli Arakelians Gheshlagh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:13:31 GMT
════════════════════════
⌗ Tags: #economy #ai #cyber_security_awareness #sharing_economy #cybersecurity
════════════════════════
𐀪 Author: Minehli Arakelians Gheshlagh
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:13:31 GMT
════════════════════════
⌗ Tags: #economy #ai #cyber_security_awareness #sharing_economy #cybersecurity
Medium
Regional Development: Sabah, Sarawak & the Tech North
By Minehli Arakelians Gheshlagh
⤷ Title: WARNING ⛔️ : Never Use Free WiFi—Don’t Connect to Public Wi-Fi With Your Mobile Phones
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:02:33 GMT
════════════════════════
⌗ Tags: #creativity #hacker #cybersecurity #ethical_hacking #wifihacking
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:02:33 GMT
════════════════════════
⌗ Tags: #creativity #hacker #cybersecurity #ethical_hacking #wifihacking
Medium
WARNING ⛔️ : Never Use Free WiFi—Don’t Connect to Public Wi-Fi With Your Mobile Phones
How a Simple Coffee Shop Hack Almost Ruined My Life (And How to Stay Safe)
⤷ Title: As a non-cyber person. Have you heard about “Dark Web Monitoring”?
════════════════════════
𐀪 Author: Noussayr Derbel
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:58:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #data_breach #darkweb #threat_intelligence
════════════════════════
𐀪 Author: Noussayr Derbel
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 13:58:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #data_breach #darkweb #threat_intelligence
Medium
As a non-cyber person. Have you heard about “Dark Web Monitoring”?
You have probably heard about companies being “hacked” or, more technically, “breached.” But what does that really mean?
⤷ Title: Offensive Security Intro | Tryhackme
════════════════════════
𐀪 Author: Atakan Bitim
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:02:44 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #tryhackme_writeup #offensive_security
════════════════════════
𐀪 Author: Atakan Bitim
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:02:44 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #tryhackme_writeup #offensive_security
Medium
Offensive Security Intro | Tryhackme
TASK 1 | What is Offensive Security?
⤷ Title: Guide to Windows Privilege Escalation through Insecure Windows Service Permissions.
════════════════════════
𐀪 Author: Muhammadhuzaifa
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:14:13 GMT
════════════════════════
⌗ Tags: #windows #privilege_escalation #oscp #ethical_hacking #windows_services
════════════════════════
𐀪 Author: Muhammadhuzaifa
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 14:14:13 GMT
════════════════════════
⌗ Tags: #windows #privilege_escalation #oscp #ethical_hacking #windows_services
Medium
Guide to Windows Privilege Escalation through Insecure Windows Service Permissions.
Hello everyone!
In this blog, we’ll learn about Privilege Escalation, a common post-exploitation technique used by adversaries. Once…
In this blog, we’ll learn about Privilege Escalation, a common post-exploitation technique used by adversaries. Once…
⤷ Title: Insecure Refresh Token Usage Leads to Account Takeover (IDOR)
════════════════════════
𐀪 Author: Mahmoud Gamal
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 16:10:15 GMT
════════════════════════
⌗ Tags: #writeup #penetration_testing #bug_bounty #cybersecurity #account_takeover
════════════════════════
𐀪 Author: Mahmoud Gamal
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 16:10:15 GMT
════════════════════════
⌗ Tags: #writeup #penetration_testing #bug_bounty #cybersecurity #account_takeover
Medium
Insecure Refresh Token Usage Leads to Account Takeover (IDOR)
Introduction
⤷ Title: It Took Me 10 Minutes to Find an BAC Vulnerability $$$ That Exposed Every Users Profiles .
════════════════════════
𐀪 Author: Mufij Topinkatti
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:20:37 GMT
════════════════════════
⌗ Tags: #bug_bounty #idor #bug_bounty_writeup #red_team #infosec
════════════════════════
𐀪 Author: Mufij Topinkatti
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:20:37 GMT
════════════════════════
⌗ Tags: #bug_bounty #idor #bug_bounty_writeup #red_team #infosec
Medium
It Took Me 10 Minutes to Find an BAC Vulnerability $$$ That Exposed Every Users Profiles .
Hello Guys Myself Mufiz a bug hunter , red teamer , and a Btech student this is a short intro if u wanna get connected and know much about…
⤷ Title: Be Patient and Keep it Simple, The Bug is There
════════════════════════
𐀪 Author: Anas H Hmaidy
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:03:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_development #bugbounty_writeup #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: Anas H Hmaidy
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:03:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_development #bugbounty_writeup #bug_bounty #bug_bounty_tips
Medium
Be Patient and Keep it Simple, The Bug is There
Good Day!
⤷ Title: The Cyber Attack That Changed Geopolitics
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 16:29:36 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #cybercrime #cyberattack #geopolitics
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 16:29:36 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #cybercrime #cyberattack #geopolitics
Medium
The Cyber Attack That Changed Geopolitics
How Digital Warfare Redefined Power, Diplomacy, and Global Conflict
⤷ Title: Active Directory Basics You Might Know!!
════════════════════════
𐀪 Author: Mainekdeveloper
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:46:37 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #hacking #active_directory #cybersecurity
════════════════════════
𐀪 Author: Mainekdeveloper
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:46:37 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #hacking #active_directory #cybersecurity
Medium
Active Directory Basics You Might Know!!
the basic concepts and functionality provided by Active Directory.
⤷ Title: CyberSecurity ඉන්ජිනේරුවෙක් විදිහට Training වෙන්න ආරම්භක පියවර— Day 1 | Senuk Dias
════════════════════════
𐀪 Author: Senuk Dias
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:43:05 GMT
════════════════════════
⌗ Tags: #pentesting #red_team #cybersecurity #ctf #hacking
════════════════════════
𐀪 Author: Senuk Dias
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:43:05 GMT
════════════════════════
⌗ Tags: #pentesting #red_team #cybersecurity #ctf #hacking
Medium
🚀 CyberSecurity ඉන්ජිනේරුවෙක් විදිහට Training වෙන්න — Day 1 | Senuk Dias
අද බලමු Beginner කෙනෙක්ට Cybersecurity වල Red Teaming Engineer කෙනෙක් විදිහට තමන්ගේ Path එක හදාගන්න Free තියෙන Labs මොනවද කියලා.
⤷ Title: Python for Pentesters: TryHackMe
════════════════════════
𐀪 Author: RHR
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:42:50 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #hacking #penetration_testing
════════════════════════
𐀪 Author: RHR
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:42:50 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #hacking #penetration_testing
Medium
Python for Pentesters: TryHackMe
RedHatReed
⤷ Title: AI Cyber Attacks And A New Age Of Digital Threats
════════════════════════
𐀪 Author: SteveMC
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:18:58 GMT
════════════════════════
⌗ Tags: #technology #hacking #privacy #security #ai
════════════════════════
𐀪 Author: SteveMC
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:18:58 GMT
════════════════════════
⌗ Tags: #technology #hacking #privacy #security #ai
Medium
AI Cyber Attacks And A New Age Of Digital Threats
The best way to counter new security threats is to deal with them early so they can’t gain too much ground.
⤷ Title: Stack Overflow Protection and Bypass Techniques — ROP, ASLR, Canaries, and More
════════════════════════
𐀪 Author: Gleb Wam
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:50:12 GMT
════════════════════════
⌗ Tags: #pentesting #stackoverflow #exploit #cybersecurity #infosec
════════════════════════
𐀪 Author: Gleb Wam
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 15:50:12 GMT
════════════════════════
⌗ Tags: #pentesting #stackoverflow #exploit #cybersecurity #infosec
Medium
Stack Overflow Protection and Bypass Techniques — ROP, ASLR, Canaries, and More
Explore a comprehensive breakdown of stack overflow protection methods — Stack Canaries, DEP/NX, ASLR, FORTIFY_SOURCE, and more. Learn how…
⤷ Title: Building Security In, Not Bolting On
════════════════════════
𐀪 Author: Tom Ermolaev
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 16:44:19 GMT
════════════════════════
⌗ Tags: #leadership #startupş #resilience #cybersecurity #ai
════════════════════════
𐀪 Author: Tom Ermolaev
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 16:44:19 GMT
════════════════════════
⌗ Tags: #leadership #startupş #resilience #cybersecurity #ai
Medium
Building Security In, Not Bolting On
There’s something refreshing about hearing a founder talk with both precision and humility — especially in a space as complex and…
⤷ Title: From Fiber Taps to Zero-Click Exploits: The True Power of NSA, CIA & Unit 8200
════════════════════════
𐀪 Author: Muhammad Sameer
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 16:42:36 GMT
════════════════════════
⌗ Tags: #technology_and_society #privacy #digital_rights #cybersecurity #mass_surveillance
════════════════════════
𐀪 Author: Muhammad Sameer
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 16:42:36 GMT
════════════════════════
⌗ Tags: #technology_and_society #privacy #digital_rights #cybersecurity #mass_surveillance
Medium
From Fiber Taps to Zero-Click Exploits: The True Power of NSA, CIA & Unit 8200
1. Introduction
⤷ Title: How to Kill Privacy and Call It Child Protection: The UK’s Online Safety Act
════════════════════════
𐀪 Author: Matyas Koszegi
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 16:40:37 GMT
════════════════════════
⌗ Tags: #privacy #technology #cybersecurity #online_safety_act
════════════════════════
𐀪 Author: Matyas Koszegi
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 16:40:37 GMT
════════════════════════
⌗ Tags: #privacy #technology #cybersecurity #online_safety_act
Medium
How to Kill Privacy and Call It Child Protection: The UK’s Online Safety Act
The Online Safety Act is one of the biggest and most aggressive invasions on one’s privacy. You must take action!