⤷ Title: XSS Reborn: 5 Killer Scenarios That Break Assumptions & Apps .. Advanced XSS Vol. 2
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:44:40 GMT
════════════════════════
⌗ Tags: #information_security #bug_bounty #cybersecurity #ai #infosec
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:44:40 GMT
════════════════════════
⌗ Tags: #information_security #bug_bounty #cybersecurity #ai #infosec
Medium
XSS Reborn: 5 Killer Scenarios That Break Assumptions & Apps .. Advanced XSS Vol. 2
“Where Dev Assumptions Meet Hacker Reality”
⤷ Title: XSS Trap Card Series — Vol. 1
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:30:38 GMT
════════════════════════
⌗ Tags: #information_security #ai #infosec #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 06:30:38 GMT
════════════════════════
⌗ Tags: #information_security #ai #infosec #cybersecurity #bug_bounty
Medium
🚨 XSS Trap Card Series — Vol. 1
🎯 Real Scenarios | 💣 Payload Crafting | 🧠 Mindset | 🛡️ Mitigations
⤷ Title: Subdomain Scanner to HTTP Hunter:
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 05:46:41 GMT
════════════════════════
⌗ Tags: #infosec #information_security #cybersecurity #bug_bounty #ai
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 05:46:41 GMT
════════════════════════
⌗ Tags: #infosec #information_security #cybersecurity #bug_bounty #ai
Medium
🚀 Subdomain Scanner to HTTP Hunter:
How I Automated Burp Suite + Kali Linux to Hunt Web Assets Like a Machine
⤷ Title: Cybersecurity Leadership in a Dangerous World with Bob Zinga
════════════════════════
𐀪 Author: Matthew.Rosenquist
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:54:59 GMT
════════════════════════
⌗ Tags: #cybersecurity_insights #cybersecurity #business #podcast #leadership
════════════════════════
𐀪 Author: Matthew.Rosenquist
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:54:59 GMT
════════════════════════
⌗ Tags: #cybersecurity_insights #cybersecurity #business #podcast #leadership
Medium
Cybersecurity Leadership in a Dangerous World with Bob Zinga
The Cybersecurity Vault — episode 49, with guest Bob Zinga.
⤷ Title: How criminals test each SMS message on their own phone first to confirm it will reach yours
════════════════════════
𐀪 Author: Paul Walsh
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:51:58 GMT
════════════════════════
⌗ Tags: #phishing #sms #fraud #cybersecurity
════════════════════════
𐀪 Author: Paul Walsh
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:51:58 GMT
════════════════════════
⌗ Tags: #phishing #sms #fraud #cybersecurity
Medium
How criminals test each SMS message on their own phone first to confirm it will reach yours
There are two kinds of criminals: lazy ones, and smart ones who test, refine, and guarantee delivery.
⤷ Title: America’s AI Action Plan
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:49:31 GMT
════════════════════════
⌗ Tags: #innovation #national_security #cybersecurity #ai #policy
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:49:31 GMT
════════════════════════
⌗ Tags: #innovation #national_security #cybersecurity #ai #policy
Medium
America’s AI Action Plan
🏃♂️➡️🧠🤖 America’s focus is on winning the AI competition and ensuring its future prosperity.
⤷ Title: Why Python Is Crucial for Cybersecurity Today
════════════════════════
𐀪 Author: The Analytics Edge
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:46:37 GMT
════════════════════════
⌗ Tags: #python #data_science #programming #machine_learning #cybersecurity
════════════════════════
𐀪 Author: The Analytics Edge
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:46:37 GMT
════════════════════════
⌗ Tags: #python #data_science #programming #machine_learning #cybersecurity
Medium
Why Python Is Crucial for Cybersecurity Today?
From noscripting exploits to automating defense, Python is the Swiss Army knife of cybersecurity.
⤷ Title: Varonis and Microsoft: Securing AI’s Future with Data Protection
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:37:50 GMT
════════════════════════
⌗ Tags: #cybersecurity #cloud_security #microsoft #data_security #risk_management
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:37:50 GMT
════════════════════════
⌗ Tags: #cybersecurity #cloud_security #microsoft #data_security #risk_management
Medium
Varonis and Microsoft: Securing AI’s Future with Data Protection
🤖 Is Your Company’s AI a Ticking Data Bomb? A critical question for every leader: What happens when businesses rush to deploy powerful AI…
⤷ Title: EXP-401 OSEE Review — Offensive Security Exploitation Expert
════════════════════════
𐀪 Author: Jake Mayhew
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:33:59 GMT
════════════════════════
⌗ Tags: #information_security #red_team #windows #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Jake Mayhew
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:33:59 GMT
════════════════════════
⌗ Tags: #information_security #red_team #windows #penetration_testing #cybersecurity
Medium
EXP-401 OSEE Review — Offensive Security Exploitation Expert
Overview
⤷ Title: Introducción a Linux — Parte 3: Primeros Comandos y Estructura del Sistema
════════════════════════
𐀪 Author: Zeyled Nazey
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:26:07 GMT
════════════════════════
⌗ Tags: #ethical_hacking #learn_cybersecurity #ctf_challenges #cybersecurity
════════════════════════
𐀪 Author: Zeyled Nazey
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:26:07 GMT
════════════════════════
⌗ Tags: #ethical_hacking #learn_cybersecurity #ctf_challenges #cybersecurity
Medium
Introducción a Linux — Parte 3: Primeros Comandos y Estructura del Sistema
“Dominar lo básico es construir los cimientos de todo un imperio digital.”
⤷ Title: Análisis del ESET Security Report 2025 | ¿Cuál es el estado actual de la ciberseguridad en…
════════════════════════
𐀪 Author: Tiziano Mass
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:20:51 GMT
════════════════════════
⌗ Tags: #information_security #security_report #eset #cybersecurity #ciberseguridad
════════════════════════
𐀪 Author: Tiziano Mass
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:20:51 GMT
════════════════════════
⌗ Tags: #information_security #security_report #eset #cybersecurity #ciberseguridad
Medium
Análisis del ESET Security Report 2025 | ¿Cuál es el estado actual de la ciberseguridad en Latinoamérica?
La reconocida empresa de seguridad ESET divulgó su reporte anual sobre el panorama del estado actual de la ciberseguridad corporativa en…
⤷ Title: Who Needs to Comply with EN 18031 Cybersecurity Standards?
════════════════════════
𐀪 Author: Simon Stampfl
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:20:02 GMT
════════════════════════
⌗ Tags: #software #cybersecurity #cyber_resilience_act #radio_equipment_directive #en_18031
════════════════════════
𐀪 Author: Simon Stampfl
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:20:02 GMT
════════════════════════
⌗ Tags: #software #cybersecurity #cyber_resilience_act #radio_equipment_directive #en_18031
Medium
Who Needs to Comply with EN 18031 Cybersecurity Standards?
EN 18031 is a new European harmonized standard under the Radio Equipment Directive (RED) that introduces mandatory cybersecurity…
⤷ Title: When Bad Data Becomes the Real Threat: The Dark Trick Behind Poisoned Intel
════════════════════════
𐀪 Author: Akshay Chauhan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:14:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #data #monitoring #information_security #safeaeon
════════════════════════
𐀪 Author: Akshay Chauhan
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:14:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #data #monitoring #information_security #safeaeon
Medium
When Bad Data Becomes the Real Threat: The Dark Trick Behind Poisoned Intel
Picture this. Your security tools are humming along, your threat feed is doing its job, alerts are firing left and right. But there’s a…
⤷ Title: Penetration Testing Process
════════════════════════
𐀪 Author: Mena George
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:38:54 GMT
════════════════════════
⌗ Tags: #ethical_hacking #offensive_security #penetration_testing
════════════════════════
𐀪 Author: Mena George
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 19:38:54 GMT
════════════════════════
⌗ Tags: #ethical_hacking #offensive_security #penetration_testing
Medium
Penetration Testing Process
Penetration Testing: is a complex, cyclical process of both identifying and exploiting vulnerabilities in a system.
⤷ Title: The Ultimate Guide to the Best Penetration Testing Tools in 2025
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:39:12 GMT
════════════════════════
⌗ Tags: #cyber #penetration_testing #2025 #cybersecurity #cybrmonk
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 18:39:12 GMT
════════════════════════
⌗ Tags: #cyber #penetration_testing #2025 #cybersecurity #cybrmonk
Medium
The Ultimate Guide to the Best Penetration Testing Tools in 2025
When you’re tasked with safeguarding critical assets in a turbulent cyber landscape, choosing the right penetration testing tools isn’t…
⤷ Title: Day 72: Wireless Connections
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:18:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #wifi #networking
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 17:18:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #wifi #networking
Medium
Day 72: Wireless Connections
How does Wi-Fi work?
⤷ Title: Starting Bug Bounty — Documenting My Journey
════════════════════════
𐀪 Author: Calvaryhasarrived
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 15:33:53 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #bug_bounty #information_security #ethical_hacking
════════════════════════
𐀪 Author: Calvaryhasarrived
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 15:33:53 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #bug_bounty #information_security #ethical_hacking
Medium
Starting Bug Bounty — Documenting My Journey
Hey guys. I’m starting bug bounty.
⤷ Title: Day 71: Metasploit
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:37:50 GMT
════════════════════════
⌗ Tags: #metasploit #penetration_testing #metasploit_framework #cybersecurity
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 14:37:50 GMT
════════════════════════
⌗ Tags: #metasploit #penetration_testing #metasploit_framework #cybersecurity
Medium
Day 71: Metasploit
An introductory guide
⤷ Title: I Found a Major Privacy Leak in a Popular Social App Just Because a Friend Said “Check This Out”
════════════════════════
𐀪 Author: KonaN
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 12:43:01 GMT
════════════════════════
⌗ Tags: #bug_bounty #data_breach #penetration_testing #cybersecurity #hacking
════════════════════════
𐀪 Author: KonaN
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 12:43:01 GMT
════════════════════════
⌗ Tags: #bug_bounty #data_breach #penetration_testing #cybersecurity #hacking
Medium
I Found a Major Privacy Leak in a Popular Social App Just Because a Friend Said “Check This Out”
A casual app suggestion led to a discovery that exposed over 100,000 users’ private data here’s how it unfolded.
⤷ Title: Zero.WebAppSecurity Penetrasyon Testi
════════════════════════
𐀪 Author: Bilge Güngör
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 12:11:16 GMT
════════════════════════
⌗ Tags: #zerowebappsecurity #web_security #cybersecurity #penetration_testing #web_penetration_testing
════════════════════════
𐀪 Author: Bilge Güngör
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 12:11:16 GMT
════════════════════════
⌗ Tags: #zerowebappsecurity #web_security #cybersecurity #penetration_testing #web_penetration_testing
Medium
Zero.WebAppSecurity Penetrasyon Testi
Son birkaç haftadır, zero.webappsecurity.com üzerinde kapsamlı güvenlik testleri yaptım. Buradaki amacım sadece OWASP Top 10’da yer alan…
⤷ Title: Cyber Security Audits: Evaluating the Security Posture
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 11:17:56 GMT
════════════════════════
⌗ Tags: #vulnerability_assessment #security_posture #penetration_testing #risk_assessment #cybersecurity_audit
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
ⴵ Time: Tue, 05 Aug 2025 11:17:56 GMT
════════════════════════
⌗ Tags: #vulnerability_assessment #security_posture #penetration_testing #risk_assessment #cybersecurity_audit
Medium
Cyber Security Audits: Evaluating the Security Posture
In today's rapidly evolving digital landscape, organizations face an unprecedented array of cyber threats that continuously challenge their…