⤷ Title: The Secrets of Secure Code
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 16:55:19 GMT
════════════════════════
⌗ Tags: #vulnerability_prevention #code_security #secure_coding #application_security #software_security
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 16:55:19 GMT
════════════════════════
⌗ Tags: #vulnerability_prevention #code_security #secure_coding #application_security #software_security
Medium
The Secrets of Secure Code
In the rapidly evolving landscape of modern software, where applications form the backbone of businesses and daily life, the integrity and…
⤷ Title: PortSwigger Lab Walkthrough: OS Command Injection (Simple Case)
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 13:20:42 GMT
════════════════════════
⌗ Tags: #application_security #web_penetration_testing #application_pen_testing #penetration_testing #offensive_security
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Mon, 04 Aug 2025 13:20:42 GMT
════════════════════════
⌗ Tags: #application_security #web_penetration_testing #application_pen_testing #penetration_testing #offensive_security
Medium
PortSwigger Lab Walkthrough: OS Command Injection (Simple Case)
✅Introduction
⤷ Title: Application Layer Attacks: The Silent Killer of Modern Apps
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Sun, 03 Aug 2025 20:27:04 GMT
════════════════════════
⌗ Tags: #application_attacks #application_security #secure_coding #appsec #web_application_attack
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Sun, 03 Aug 2025 20:27:04 GMT
════════════════════════
⌗ Tags: #application_attacks #application_security #secure_coding #appsec #web_application_attack
Medium
Application Layer Attacks: The Silent Killer of Modern Apps
When we talk about cyberattacks, many think of massive DDoS floods, network breaches, or ransomware.
⤷ Title: A Comprehensive Guide to GPG-Signed Hash Manifests with GitHub Actions
════════════════════════
𐀪 Author: Femi Oyesanya
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 17:47:21 GMT
════════════════════════
⌗ Tags: #application_security
════════════════════════
𐀪 Author: Femi Oyesanya
════════════════════════
ⴵ Time: Sat, 02 Aug 2025 17:47:21 GMT
════════════════════════
⌗ Tags: #application_security
Medium
A Comprehensive Guide to GPG-Signed Hash Manifests with GitHub Actions
In modern software development, ensuring the integrity and authenticity of your code is paramount. A robust method for achieving this is to…
⤷ Title: One Character, One Flaw: Why & sleep 5 # Works But & sleep 5 Doesn’t
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:19:45 GMT
════════════════════════
⌗ Tags: #command_injection #hacking #os_command_injection #secure_coding #web_app_pentesting
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:19:45 GMT
════════════════════════
⌗ Tags: #command_injection #hacking #os_command_injection #secure_coding #web_app_pentesting
Medium
One Character, One Flaw: Why & sleep 5 # Works But & sleep 5 Doesn’t
When testing for command injection, you might notice something odd:
⤷ Title: How I Went from IT Support to Senior Pentester in Just 2 Years
════════════════════════
𐀪 Author: ATNO For Cybersecurity | Hacking
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:31:41 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #senior_pentester
════════════════════════
𐀪 Author: ATNO For Cybersecurity | Hacking
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:31:41 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #senior_pentester
Medium
How I Went from IT Support to Senior Pentester in Just 2 Years
1. Stopped Waiting for “The Perfect Time”
⤷ Title: LazyOwn RedTeam Framework: How Open-Source Chaos Forces Blue Teams to Stay Sharp (and Sane)
════════════════════════
𐀪 Author: Lazyown Redteam
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:30:45 GMT
════════════════════════
⌗ Tags: #hacking #red_team #blue_team
════════════════════════
𐀪 Author: Lazyown Redteam
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:30:45 GMT
════════════════════════
⌗ Tags: #hacking #red_team #blue_team
Medium
LazyOwn RedTeam Framework: How Open-Source Chaos Forces Blue Teams to Stay Sharp (and Sane)
Let’s be real: if you’re a Blue Teamer, you’ve probably woken up in a cold sweat wondering, “What new horror did the Red Team deploy while…
⤷ Title: Advanced Info-Stealer Targets 4,000+ IPs Worldwide
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:22:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #malware #news #infostealer
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:22:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #malware #news #infostealer
Medium
Advanced Info-Stealer Targets 4,000+ IPs Worldwide
Researchers have identified a surge in credential theft operations driven by a Vietnamese-speaking threat group leveraging a Python-based…
⤷ Title: Recovery Made Easy With James
════════════════════════
𐀪 Author: Norman Meg
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:34:37 GMT
════════════════════════
⌗ Tags: #cryptocurrency #hacking #world
════════════════════════
𐀪 Author: Norman Meg
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:34:37 GMT
════════════════════════
⌗ Tags: #cryptocurrency #hacking #world
Medium
Recovery Made Easy With James
After losing over $600,000.00 to fraudulent stock brokers who operated under the name “fxtradebit,” I found myself drowning in debt. However, I was fortunate enough to come across so reviews about a…
⤷ Title: Cracked in Seconds: How a Weak Password Exposed 64 Million McDonald’s Applicants
════════════════════════
𐀪 Author: Kalariya Het
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:35:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #medium #security #hacking #mcdonalds
════════════════════════
𐀪 Author: Kalariya Het
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:35:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #medium #security #hacking #mcdonalds
Medium
Cracked in Seconds: How a Weak Password Exposed 64 Million McDonald’s Applicants
The Hook
⤷ Title: Professional Hacking Service | Sessions Hijacking
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 15:13:33 GMT
════════════════════════
⌗ Tags: #hacking #artificial_intelligence #apple #business #android
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 15:13:33 GMT
════════════════════════
⌗ Tags: #hacking #artificial_intelligence #apple #business #android
Medium
Professional Hacking Service | Sessions Hijacking
Session hijacking is a type of cyber attack where hackers takes control of a user’s active session after the user has authenticated to a service. The goal of this attack is often to steal sensitive…
⤷ Title: Face Swap: the tool hackers don’t want you to know about
════════════════════════
𐀪 Author: Luciano Gutierrez
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:17:08 GMT
════════════════════════
⌗ Tags: #cibersecurity #tecnology #osint #hacking #data_privacy
════════════════════════
𐀪 Author: Luciano Gutierrez
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:17:08 GMT
════════════════════════
⌗ Tags: #cibersecurity #tecnology #osint #hacking #data_privacy
Medium
Face Swap: the tool hackers don’t want you to know about
Sofía is at home, worried because her partner, Marcos, tells her he is working late. Marcos sends her a photo in which he appears serious…
⤷ Title: Fluffy | Easy | Hack The Box
════════════════════════
𐀪 Author: Anasmohammed
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:16:33 GMT
════════════════════════
⌗ Tags: #fluffy #smb #smbclient #hacking
════════════════════════
𐀪 Author: Anasmohammed
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:16:33 GMT
════════════════════════
⌗ Tags: #fluffy #smb #smbclient #hacking
Medium
Fluffy | Easy | Hack The Box
Welcome to another Hack the Box exercise. In this blog post, I will show you how I owned the Fluffy machine on Hack the Box. Hack The Box…
⤷ Title: Cyber Briefing: 2025.08.05
════════════════════════
𐀪 Author: CyberMaterial
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:01:51 GMT
════════════════════════
⌗ Tags: #cyber_briefing #infosec #cybersecurity #hacking #technology
════════════════════════
𐀪 Author: CyberMaterial
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:01:51 GMT
════════════════════════
⌗ Tags: #cyber_briefing #infosec #cybersecurity #hacking #technology
Medium
Cyber Briefing: 2025.08.05
👉 What’s the latest in the cyber world today?
⤷ Title: Ultimate Technical Breakdown of the MITRE Ecosystem
════════════════════════
𐀪 Author: Shadow Packet
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:21:48 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #threat_intelligence #infosec #mitre_attack
════════════════════════
𐀪 Author: Shadow Packet
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:21:48 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #threat_intelligence #infosec #mitre_attack
Medium
Ultimate Technical Breakdown of the MITRE Ecosystem
MITRE at the core, branching into ATT&CK, D3FEND, CALDERA, ENGAGE, and ATLAS, visualizing the full cybersecurity knowledge tree.
⤷ Title: Cyber Security Trends: Adapting to the Evolving Landscape
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:46:18 GMT
════════════════════════
⌗ Tags: #security_trends #cybersecurity #cyber_threat #infosec #threat_landscape
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:46:18 GMT
════════════════════════
⌗ Tags: #security_trends #cybersecurity #cyber_threat #infosec #threat_landscape
Medium
Cyber Security Trends: Adapting to the Evolving Landscape
The digital realm is in a constant state of flux, and with this evolution, the landscape of cyber threats transforms with alarming speed…
⤷ Title: Javanoscript e o XSS
════════════════════════
𐀪 Author: Gabriel Jesus
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:05:06 GMT
════════════════════════
⌗ Tags: #xss_attack #pentesting #javanoscript #infosec #web3
════════════════════════
𐀪 Author: Gabriel Jesus
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:05:06 GMT
════════════════════════
⌗ Tags: #xss_attack #pentesting #javanoscript #infosec #web3
Medium
Javanoscript e o XSS
Estava eu estuando um poquinho nos labs da PortSwigger, e me deparei com o lab: DOM XSS in innerHTML sink using source location.search …
⤷ Title: Social Engineering Testing: The Human Element of Cybersecurity
════════════════════════
𐀪 Author: West Advanced Technologies Inc
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:22:02 GMT
════════════════════════
⌗ Tags: #information_security #social_engineering #cybersecurity #infosec #cyber_security_awareness
════════════════════════
𐀪 Author: West Advanced Technologies Inc
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:22:02 GMT
════════════════════════
⌗ Tags: #information_security #social_engineering #cybersecurity #infosec #cyber_security_awareness
Medium
Social Engineering Testing: The Human Element of Cybersecurity
When people think of cybersecurity threats, they often imagine hackers exploiting software vulnerabilities or breaking into servers. But…
⤷ Title: The Hidden Risks Behind “Free” OSINT Tools Everyone Recommends
════════════════════════
𐀪 Author: Ingvar Pavlovich
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:01:48 GMT
════════════════════════
⌗ Tags: #osint #digital_privacy #cybersecurity #threat_intelligence #infosec
════════════════════════
𐀪 Author: Ingvar Pavlovich
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:01:48 GMT
════════════════════════
⌗ Tags: #osint #digital_privacy #cybersecurity #threat_intelligence #infosec
Medium
The Hidden Risks Behind “Free” OSINT Tools Everyone Recommends
How “recommended” tools can expose you, your investigation, and your target.
⤷ Title: Filtering out Noise on Burp suite like a Pro
════════════════════════
𐀪 Author: Abdul Mazid
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:55:48 GMT
════════════════════════
⌗ Tags: #infosec #web_security #burpsuite #bug_bounty #pentesting
════════════════════════
𐀪 Author: Abdul Mazid
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:55:48 GMT
════════════════════════
⌗ Tags: #infosec #web_security #burpsuite #bug_bounty #pentesting
Medium
Filtering out Noise on Burp suite like a Pro
Often times during Bug Bounty and Pentests we come across a website that sends 100s of Analytics request per second to some random website…
⤷ Title: XSS Reborn: 5 Killer Scenarios That Break Assumptions & Apps .. Advanced XSS Vol. 2
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:44:40 GMT
════════════════════════
⌗ Tags: #information_security #bug_bounty #cybersecurity #ai #infosec
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:44:40 GMT
════════════════════════
⌗ Tags: #information_security #bug_bounty #cybersecurity #ai #infosec
Medium
XSS Reborn: 5 Killer Scenarios That Break Assumptions & Apps .. Advanced XSS Vol. 2
“Where Dev Assumptions Meet Hacker Reality”