⤷ Title: Professional Hacking Service | Sessions Hijacking
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 15:13:33 GMT
════════════════════════
⌗ Tags: #hacking #artificial_intelligence #apple #business #android
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 15:13:33 GMT
════════════════════════
⌗ Tags: #hacking #artificial_intelligence #apple #business #android
Medium
Professional Hacking Service | Sessions Hijacking
Session hijacking is a type of cyber attack where hackers takes control of a user’s active session after the user has authenticated to a service. The goal of this attack is often to steal sensitive…
⤷ Title: Face Swap: the tool hackers don’t want you to know about
════════════════════════
𐀪 Author: Luciano Gutierrez
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:17:08 GMT
════════════════════════
⌗ Tags: #cibersecurity #tecnology #osint #hacking #data_privacy
════════════════════════
𐀪 Author: Luciano Gutierrez
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:17:08 GMT
════════════════════════
⌗ Tags: #cibersecurity #tecnology #osint #hacking #data_privacy
Medium
Face Swap: the tool hackers don’t want you to know about
Sofía is at home, worried because her partner, Marcos, tells her he is working late. Marcos sends her a photo in which he appears serious…
⤷ Title: Fluffy | Easy | Hack The Box
════════════════════════
𐀪 Author: Anasmohammed
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:16:33 GMT
════════════════════════
⌗ Tags: #fluffy #smb #smbclient #hacking
════════════════════════
𐀪 Author: Anasmohammed
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:16:33 GMT
════════════════════════
⌗ Tags: #fluffy #smb #smbclient #hacking
Medium
Fluffy | Easy | Hack The Box
Welcome to another Hack the Box exercise. In this blog post, I will show you how I owned the Fluffy machine on Hack the Box. Hack The Box…
⤷ Title: Cyber Briefing: 2025.08.05
════════════════════════
𐀪 Author: CyberMaterial
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:01:51 GMT
════════════════════════
⌗ Tags: #cyber_briefing #infosec #cybersecurity #hacking #technology
════════════════════════
𐀪 Author: CyberMaterial
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:01:51 GMT
════════════════════════
⌗ Tags: #cyber_briefing #infosec #cybersecurity #hacking #technology
Medium
Cyber Briefing: 2025.08.05
👉 What’s the latest in the cyber world today?
⤷ Title: Ultimate Technical Breakdown of the MITRE Ecosystem
════════════════════════
𐀪 Author: Shadow Packet
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:21:48 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #threat_intelligence #infosec #mitre_attack
════════════════════════
𐀪 Author: Shadow Packet
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:21:48 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #threat_intelligence #infosec #mitre_attack
Medium
Ultimate Technical Breakdown of the MITRE Ecosystem
MITRE at the core, branching into ATT&CK, D3FEND, CALDERA, ENGAGE, and ATLAS, visualizing the full cybersecurity knowledge tree.
⤷ Title: Cyber Security Trends: Adapting to the Evolving Landscape
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:46:18 GMT
════════════════════════
⌗ Tags: #security_trends #cybersecurity #cyber_threat #infosec #threat_landscape
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:46:18 GMT
════════════════════════
⌗ Tags: #security_trends #cybersecurity #cyber_threat #infosec #threat_landscape
Medium
Cyber Security Trends: Adapting to the Evolving Landscape
The digital realm is in a constant state of flux, and with this evolution, the landscape of cyber threats transforms with alarming speed…
⤷ Title: Javanoscript e o XSS
════════════════════════
𐀪 Author: Gabriel Jesus
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:05:06 GMT
════════════════════════
⌗ Tags: #xss_attack #pentesting #javanoscript #infosec #web3
════════════════════════
𐀪 Author: Gabriel Jesus
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:05:06 GMT
════════════════════════
⌗ Tags: #xss_attack #pentesting #javanoscript #infosec #web3
Medium
Javanoscript e o XSS
Estava eu estuando um poquinho nos labs da PortSwigger, e me deparei com o lab: DOM XSS in innerHTML sink using source location.search …
⤷ Title: Social Engineering Testing: The Human Element of Cybersecurity
════════════════════════
𐀪 Author: West Advanced Technologies Inc
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:22:02 GMT
════════════════════════
⌗ Tags: #information_security #social_engineering #cybersecurity #infosec #cyber_security_awareness
════════════════════════
𐀪 Author: West Advanced Technologies Inc
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:22:02 GMT
════════════════════════
⌗ Tags: #information_security #social_engineering #cybersecurity #infosec #cyber_security_awareness
Medium
Social Engineering Testing: The Human Element of Cybersecurity
When people think of cybersecurity threats, they often imagine hackers exploiting software vulnerabilities or breaking into servers. But…
⤷ Title: The Hidden Risks Behind “Free” OSINT Tools Everyone Recommends
════════════════════════
𐀪 Author: Ingvar Pavlovich
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:01:48 GMT
════════════════════════
⌗ Tags: #osint #digital_privacy #cybersecurity #threat_intelligence #infosec
════════════════════════
𐀪 Author: Ingvar Pavlovich
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:01:48 GMT
════════════════════════
⌗ Tags: #osint #digital_privacy #cybersecurity #threat_intelligence #infosec
Medium
The Hidden Risks Behind “Free” OSINT Tools Everyone Recommends
How “recommended” tools can expose you, your investigation, and your target.
⤷ Title: Filtering out Noise on Burp suite like a Pro
════════════════════════
𐀪 Author: Abdul Mazid
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:55:48 GMT
════════════════════════
⌗ Tags: #infosec #web_security #burpsuite #bug_bounty #pentesting
════════════════════════
𐀪 Author: Abdul Mazid
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:55:48 GMT
════════════════════════
⌗ Tags: #infosec #web_security #burpsuite #bug_bounty #pentesting
Medium
Filtering out Noise on Burp suite like a Pro
Often times during Bug Bounty and Pentests we come across a website that sends 100s of Analytics request per second to some random website…
⤷ Title: XSS Reborn: 5 Killer Scenarios That Break Assumptions & Apps .. Advanced XSS Vol. 2
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:44:40 GMT
════════════════════════
⌗ Tags: #information_security #bug_bounty #cybersecurity #ai #infosec
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:44:40 GMT
════════════════════════
⌗ Tags: #information_security #bug_bounty #cybersecurity #ai #infosec
Medium
XSS Reborn: 5 Killer Scenarios That Break Assumptions & Apps .. Advanced XSS Vol. 2
“Where Dev Assumptions Meet Hacker Reality”
⤷ Title: XSS Trap Card Series — Vol. 1
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:30:38 GMT
════════════════════════
⌗ Tags: #information_security #ai #infosec #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:30:38 GMT
════════════════════════
⌗ Tags: #information_security #ai #infosec #cybersecurity #bug_bounty
Medium
🚨 XSS Trap Card Series — Vol. 1
🎯 Real Scenarios | 💣 Payload Crafting | 🧠 Mindset | 🛡️ Mitigations
⤷ Title: Subdomain Scanner to HTTP Hunter:
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 05:46:41 GMT
════════════════════════
⌗ Tags: #infosec #information_security #cybersecurity #bug_bounty #ai
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 05:46:41 GMT
════════════════════════
⌗ Tags: #infosec #information_security #cybersecurity #bug_bounty #ai
Medium
🚀 Subdomain Scanner to HTTP Hunter:
How I Automated Burp Suite + Kali Linux to Hunt Web Assets Like a Machine
⤷ Title: Cybersecurity Leadership in a Dangerous World with Bob Zinga
════════════════════════
𐀪 Author: Matthew.Rosenquist
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:54:59 GMT
════════════════════════
⌗ Tags: #cybersecurity_insights #cybersecurity #business #podcast #leadership
════════════════════════
𐀪 Author: Matthew.Rosenquist
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:54:59 GMT
════════════════════════
⌗ Tags: #cybersecurity_insights #cybersecurity #business #podcast #leadership
Medium
Cybersecurity Leadership in a Dangerous World with Bob Zinga
The Cybersecurity Vault — episode 49, with guest Bob Zinga.
⤷ Title: How criminals test each SMS message on their own phone first to confirm it will reach yours
════════════════════════
𐀪 Author: Paul Walsh
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:51:58 GMT
════════════════════════
⌗ Tags: #phishing #sms #fraud #cybersecurity
════════════════════════
𐀪 Author: Paul Walsh
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:51:58 GMT
════════════════════════
⌗ Tags: #phishing #sms #fraud #cybersecurity
Medium
How criminals test each SMS message on their own phone first to confirm it will reach yours
There are two kinds of criminals: lazy ones, and smart ones who test, refine, and guarantee delivery.
⤷ Title: America’s AI Action Plan
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:49:31 GMT
════════════════════════
⌗ Tags: #innovation #national_security #cybersecurity #ai #policy
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:49:31 GMT
════════════════════════
⌗ Tags: #innovation #national_security #cybersecurity #ai #policy
Medium
America’s AI Action Plan
🏃♂️➡️🧠🤖 America’s focus is on winning the AI competition and ensuring its future prosperity.
⤷ Title: Why Python Is Crucial for Cybersecurity Today
════════════════════════
𐀪 Author: The Analytics Edge
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:46:37 GMT
════════════════════════
⌗ Tags: #python #data_science #programming #machine_learning #cybersecurity
════════════════════════
𐀪 Author: The Analytics Edge
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:46:37 GMT
════════════════════════
⌗ Tags: #python #data_science #programming #machine_learning #cybersecurity
Medium
Why Python Is Crucial for Cybersecurity Today?
From noscripting exploits to automating defense, Python is the Swiss Army knife of cybersecurity.
⤷ Title: Varonis and Microsoft: Securing AI’s Future with Data Protection
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:37:50 GMT
════════════════════════
⌗ Tags: #cybersecurity #cloud_security #microsoft #data_security #risk_management
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:37:50 GMT
════════════════════════
⌗ Tags: #cybersecurity #cloud_security #microsoft #data_security #risk_management
Medium
Varonis and Microsoft: Securing AI’s Future with Data Protection
🤖 Is Your Company’s AI a Ticking Data Bomb? A critical question for every leader: What happens when businesses rush to deploy powerful AI…
⤷ Title: EXP-401 OSEE Review — Offensive Security Exploitation Expert
════════════════════════
𐀪 Author: Jake Mayhew
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:33:59 GMT
════════════════════════
⌗ Tags: #information_security #red_team #windows #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Jake Mayhew
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:33:59 GMT
════════════════════════
⌗ Tags: #information_security #red_team #windows #penetration_testing #cybersecurity
Medium
EXP-401 OSEE Review — Offensive Security Exploitation Expert
Overview
⤷ Title: Introducción a Linux — Parte 3: Primeros Comandos y Estructura del Sistema
════════════════════════
𐀪 Author: Zeyled Nazey
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:26:07 GMT
════════════════════════
⌗ Tags: #ethical_hacking #learn_cybersecurity #ctf_challenges #cybersecurity
════════════════════════
𐀪 Author: Zeyled Nazey
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:26:07 GMT
════════════════════════
⌗ Tags: #ethical_hacking #learn_cybersecurity #ctf_challenges #cybersecurity
Medium
Introducción a Linux — Parte 3: Primeros Comandos y Estructura del Sistema
“Dominar lo básico es construir los cimientos de todo un imperio digital.”
⤷ Title: Análisis del ESET Security Report 2025 | ¿Cuál es el estado actual de la ciberseguridad en…
════════════════════════
𐀪 Author: Tiziano Mass
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:20:51 GMT
════════════════════════
⌗ Tags: #information_security #security_report #eset #cybersecurity #ciberseguridad
════════════════════════
𐀪 Author: Tiziano Mass
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:20:51 GMT
════════════════════════
⌗ Tags: #information_security #security_report #eset #cybersecurity #ciberseguridad
Medium
Análisis del ESET Security Report 2025 | ¿Cuál es el estado actual de la ciberseguridad en Latinoamérica?
La reconocida empresa de seguridad ESET divulgó su reporte anual sobre el panorama del estado actual de la ciberseguridad corporativa en…