⤷ Title: Ultimate Technical Breakdown of the MITRE Ecosystem
════════════════════════
𐀪 Author: Shadow Packet
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:21:48 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #threat_intelligence #infosec #mitre_attack
════════════════════════
𐀪 Author: Shadow Packet
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:21:48 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #threat_intelligence #infosec #mitre_attack
Medium
Ultimate Technical Breakdown of the MITRE Ecosystem
MITRE at the core, branching into ATT&CK, D3FEND, CALDERA, ENGAGE, and ATLAS, visualizing the full cybersecurity knowledge tree.
⤷ Title: Cyber Security Trends: Adapting to the Evolving Landscape
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:46:18 GMT
════════════════════════
⌗ Tags: #security_trends #cybersecurity #cyber_threat #infosec #threat_landscape
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:46:18 GMT
════════════════════════
⌗ Tags: #security_trends #cybersecurity #cyber_threat #infosec #threat_landscape
Medium
Cyber Security Trends: Adapting to the Evolving Landscape
The digital realm is in a constant state of flux, and with this evolution, the landscape of cyber threats transforms with alarming speed…
⤷ Title: Javanoscript e o XSS
════════════════════════
𐀪 Author: Gabriel Jesus
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:05:06 GMT
════════════════════════
⌗ Tags: #xss_attack #pentesting #javanoscript #infosec #web3
════════════════════════
𐀪 Author: Gabriel Jesus
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 16:05:06 GMT
════════════════════════
⌗ Tags: #xss_attack #pentesting #javanoscript #infosec #web3
Medium
Javanoscript e o XSS
Estava eu estuando um poquinho nos labs da PortSwigger, e me deparei com o lab: DOM XSS in innerHTML sink using source location.search …
⤷ Title: Social Engineering Testing: The Human Element of Cybersecurity
════════════════════════
𐀪 Author: West Advanced Technologies Inc
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:22:02 GMT
════════════════════════
⌗ Tags: #information_security #social_engineering #cybersecurity #infosec #cyber_security_awareness
════════════════════════
𐀪 Author: West Advanced Technologies Inc
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:22:02 GMT
════════════════════════
⌗ Tags: #information_security #social_engineering #cybersecurity #infosec #cyber_security_awareness
Medium
Social Engineering Testing: The Human Element of Cybersecurity
When people think of cybersecurity threats, they often imagine hackers exploiting software vulnerabilities or breaking into servers. But…
⤷ Title: The Hidden Risks Behind “Free” OSINT Tools Everyone Recommends
════════════════════════
𐀪 Author: Ingvar Pavlovich
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:01:48 GMT
════════════════════════
⌗ Tags: #osint #digital_privacy #cybersecurity #threat_intelligence #infosec
════════════════════════
𐀪 Author: Ingvar Pavlovich
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 13:01:48 GMT
════════════════════════
⌗ Tags: #osint #digital_privacy #cybersecurity #threat_intelligence #infosec
Medium
The Hidden Risks Behind “Free” OSINT Tools Everyone Recommends
How “recommended” tools can expose you, your investigation, and your target.
⤷ Title: Filtering out Noise on Burp suite like a Pro
════════════════════════
𐀪 Author: Abdul Mazid
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:55:48 GMT
════════════════════════
⌗ Tags: #infosec #web_security #burpsuite #bug_bounty #pentesting
════════════════════════
𐀪 Author: Abdul Mazid
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 08:55:48 GMT
════════════════════════
⌗ Tags: #infosec #web_security #burpsuite #bug_bounty #pentesting
Medium
Filtering out Noise on Burp suite like a Pro
Often times during Bug Bounty and Pentests we come across a website that sends 100s of Analytics request per second to some random website…
⤷ Title: XSS Reborn: 5 Killer Scenarios That Break Assumptions & Apps .. Advanced XSS Vol. 2
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:44:40 GMT
════════════════════════
⌗ Tags: #information_security #bug_bounty #cybersecurity #ai #infosec
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:44:40 GMT
════════════════════════
⌗ Tags: #information_security #bug_bounty #cybersecurity #ai #infosec
Medium
XSS Reborn: 5 Killer Scenarios That Break Assumptions & Apps .. Advanced XSS Vol. 2
“Where Dev Assumptions Meet Hacker Reality”
⤷ Title: XSS Trap Card Series — Vol. 1
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:30:38 GMT
════════════════════════
⌗ Tags: #information_security #ai #infosec #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:30:38 GMT
════════════════════════
⌗ Tags: #information_security #ai #infosec #cybersecurity #bug_bounty
Medium
🚨 XSS Trap Card Series — Vol. 1
🎯 Real Scenarios | 💣 Payload Crafting | 🧠 Mindset | 🛡️ Mitigations
⤷ Title: Subdomain Scanner to HTTP Hunter:
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 05:46:41 GMT
════════════════════════
⌗ Tags: #infosec #information_security #cybersecurity #bug_bounty #ai
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 05:46:41 GMT
════════════════════════
⌗ Tags: #infosec #information_security #cybersecurity #bug_bounty #ai
Medium
🚀 Subdomain Scanner to HTTP Hunter:
How I Automated Burp Suite + Kali Linux to Hunt Web Assets Like a Machine
⤷ Title: Cybersecurity Leadership in a Dangerous World with Bob Zinga
════════════════════════
𐀪 Author: Matthew.Rosenquist
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:54:59 GMT
════════════════════════
⌗ Tags: #cybersecurity_insights #cybersecurity #business #podcast #leadership
════════════════════════
𐀪 Author: Matthew.Rosenquist
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:54:59 GMT
════════════════════════
⌗ Tags: #cybersecurity_insights #cybersecurity #business #podcast #leadership
Medium
Cybersecurity Leadership in a Dangerous World with Bob Zinga
The Cybersecurity Vault — episode 49, with guest Bob Zinga.
⤷ Title: How criminals test each SMS message on their own phone first to confirm it will reach yours
════════════════════════
𐀪 Author: Paul Walsh
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:51:58 GMT
════════════════════════
⌗ Tags: #phishing #sms #fraud #cybersecurity
════════════════════════
𐀪 Author: Paul Walsh
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:51:58 GMT
════════════════════════
⌗ Tags: #phishing #sms #fraud #cybersecurity
Medium
How criminals test each SMS message on their own phone first to confirm it will reach yours
There are two kinds of criminals: lazy ones, and smart ones who test, refine, and guarantee delivery.
⤷ Title: America’s AI Action Plan
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:49:31 GMT
════════════════════════
⌗ Tags: #innovation #national_security #cybersecurity #ai #policy
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:49:31 GMT
════════════════════════
⌗ Tags: #innovation #national_security #cybersecurity #ai #policy
Medium
America’s AI Action Plan
🏃♂️➡️🧠🤖 America’s focus is on winning the AI competition and ensuring its future prosperity.
⤷ Title: Why Python Is Crucial for Cybersecurity Today
════════════════════════
𐀪 Author: The Analytics Edge
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:46:37 GMT
════════════════════════
⌗ Tags: #python #data_science #programming #machine_learning #cybersecurity
════════════════════════
𐀪 Author: The Analytics Edge
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:46:37 GMT
════════════════════════
⌗ Tags: #python #data_science #programming #machine_learning #cybersecurity
Medium
Why Python Is Crucial for Cybersecurity Today?
From noscripting exploits to automating defense, Python is the Swiss Army knife of cybersecurity.
⤷ Title: Varonis and Microsoft: Securing AI’s Future with Data Protection
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:37:50 GMT
════════════════════════
⌗ Tags: #cybersecurity #cloud_security #microsoft #data_security #risk_management
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:37:50 GMT
════════════════════════
⌗ Tags: #cybersecurity #cloud_security #microsoft #data_security #risk_management
Medium
Varonis and Microsoft: Securing AI’s Future with Data Protection
🤖 Is Your Company’s AI a Ticking Data Bomb? A critical question for every leader: What happens when businesses rush to deploy powerful AI…
⤷ Title: EXP-401 OSEE Review — Offensive Security Exploitation Expert
════════════════════════
𐀪 Author: Jake Mayhew
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:33:59 GMT
════════════════════════
⌗ Tags: #information_security #red_team #windows #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Jake Mayhew
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:33:59 GMT
════════════════════════
⌗ Tags: #information_security #red_team #windows #penetration_testing #cybersecurity
Medium
EXP-401 OSEE Review — Offensive Security Exploitation Expert
Overview
⤷ Title: Introducción a Linux — Parte 3: Primeros Comandos y Estructura del Sistema
════════════════════════
𐀪 Author: Zeyled Nazey
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:26:07 GMT
════════════════════════
⌗ Tags: #ethical_hacking #learn_cybersecurity #ctf_challenges #cybersecurity
════════════════════════
𐀪 Author: Zeyled Nazey
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:26:07 GMT
════════════════════════
⌗ Tags: #ethical_hacking #learn_cybersecurity #ctf_challenges #cybersecurity
Medium
Introducción a Linux — Parte 3: Primeros Comandos y Estructura del Sistema
“Dominar lo básico es construir los cimientos de todo un imperio digital.”
⤷ Title: Análisis del ESET Security Report 2025 | ¿Cuál es el estado actual de la ciberseguridad en…
════════════════════════
𐀪 Author: Tiziano Mass
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:20:51 GMT
════════════════════════
⌗ Tags: #information_security #security_report #eset #cybersecurity #ciberseguridad
════════════════════════
𐀪 Author: Tiziano Mass
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:20:51 GMT
════════════════════════
⌗ Tags: #information_security #security_report #eset #cybersecurity #ciberseguridad
Medium
Análisis del ESET Security Report 2025 | ¿Cuál es el estado actual de la ciberseguridad en Latinoamérica?
La reconocida empresa de seguridad ESET divulgó su reporte anual sobre el panorama del estado actual de la ciberseguridad corporativa en…
⤷ Title: Who Needs to Comply with EN 18031 Cybersecurity Standards?
════════════════════════
𐀪 Author: Simon Stampfl
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:20:02 GMT
════════════════════════
⌗ Tags: #software #cybersecurity #cyber_resilience_act #radio_equipment_directive #en_18031
════════════════════════
𐀪 Author: Simon Stampfl
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:20:02 GMT
════════════════════════
⌗ Tags: #software #cybersecurity #cyber_resilience_act #radio_equipment_directive #en_18031
Medium
Who Needs to Comply with EN 18031 Cybersecurity Standards?
EN 18031 is a new European harmonized standard under the Radio Equipment Directive (RED) that introduces mandatory cybersecurity…
⤷ Title: When Bad Data Becomes the Real Threat: The Dark Trick Behind Poisoned Intel
════════════════════════
𐀪 Author: Akshay Chauhan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:14:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #data #monitoring #information_security #safeaeon
════════════════════════
𐀪 Author: Akshay Chauhan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:14:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #data #monitoring #information_security #safeaeon
Medium
When Bad Data Becomes the Real Threat: The Dark Trick Behind Poisoned Intel
Picture this. Your security tools are humming along, your threat feed is doing its job, alerts are firing left and right. But there’s a…
⤷ Title: Penetration Testing Process
════════════════════════
𐀪 Author: Mena George
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:38:54 GMT
════════════════════════
⌗ Tags: #ethical_hacking #offensive_security #penetration_testing
════════════════════════
𐀪 Author: Mena George
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:38:54 GMT
════════════════════════
⌗ Tags: #ethical_hacking #offensive_security #penetration_testing
Medium
Penetration Testing Process
Penetration Testing: is a complex, cyclical process of both identifying and exploiting vulnerabilities in a system.
⤷ Title: The Ultimate Guide to the Best Penetration Testing Tools in 2025
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:39:12 GMT
════════════════════════
⌗ Tags: #cyber #penetration_testing #2025 #cybersecurity #cybrmonk
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:39:12 GMT
════════════════════════
⌗ Tags: #cyber #penetration_testing #2025 #cybersecurity #cybrmonk
Medium
The Ultimate Guide to the Best Penetration Testing Tools in 2025
When you’re tasked with safeguarding critical assets in a turbulent cyber landscape, choosing the right penetration testing tools isn’t…