⤷ Title: HTTP Client Tools Weaponized in Account Takeover Attacks
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:25:41 +0000
════════════════════════
⌗ Tags: #Cyber Security #Account Takeover Attacks #HTTP Client Tools
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:25:41 +0000
════════════════════════
⌗ Tags: #Cyber Security #Account Takeover Attacks #HTTP Client Tools
Cybersecurity News
HTTP Client Tools Weaponized in Account Takeover Attacks
Discover the concerning trend of cybercriminals using HTTP client tools to orchestrate account takeover attacks. Learn how to protect your Microsoft 365 environment.
⤷ Title: 10,000 WordPress Websites Compromised to Deliver macOS and Windows Malware
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:22:35 +0000
════════════════════════
⌗ Tags: #Malware #Atomic macOS Stealer #SocGholish #SocGholish Windows malware #Windows malware
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:22:35 +0000
════════════════════════
⌗ Tags: #Malware #Atomic macOS Stealer #SocGholish #SocGholish Windows malware #Windows malware
Daily CyberSecurity
10,000 WordPress Websites Compromised to Deliver macOS and Windows Malware
Learn about a sophisticated attack campaign targeting WordPress websites and delivering SocGholish Windows malware to unsuspecting users.
⤷ Title: Lumma Stealer Uses GitHub as a Malware Delivery Platform
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:10:47 +0000
════════════════════════
⌗ Tags: #Malware #Cobeacon #github #Lumma Stealer #Malware Delivery Platform #SecTopRAT #Vidar
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:10:47 +0000
════════════════════════
⌗ Tags: #Malware #Cobeacon #github #Lumma Stealer #Malware Delivery Platform #SecTopRAT #Vidar
Cybersecurity News
Lumma Stealer Uses GitHub as a Malware Delivery Platform
Uncover a sophisticated malware campaign using GitHub's release infrastructure to distribute the dangerous Lumma Stealer Trojan. Learn more.
⤷ Title: Canadian Hacker Indicted for $65 Million DeFi Exploit
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 00:15:17 +0000
════════════════════════
⌗ Tags: #Cyber Security #Crypto Exchange #DeFi Exploit #Global Money Laundering Scheme
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 00:15:17 +0000
════════════════════════
⌗ Tags: #Cyber Security #Crypto Exchange #DeFi Exploit #Global Money Laundering Scheme
Cybersecurity News
Canadian Hacker Indicted for $65 Million DeFi Exploit
Explore the case of a Canadian man accused of exploiting vulnerabilities in DeFi protocols, defrauding investors of $65 million. Find out more about this sophisticated scheme!
⤷ Title: Understanding Active Directory Security: Key Features and Event Logging
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:42:07 GMT
════════════════════════
⌗ Tags: #information_technology #programming #hacking #active_directory #cybersecurity
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:42:07 GMT
════════════════════════
⌗ Tags: #information_technology #programming #hacking #active_directory #cybersecurity
Medium
Understanding Active Directory Security: Key Features and Event Logging
Active Directory (AD) is a crucial system that helps organizations manage users, devices, and security policies. However, attackers often…
⤷ Title: Cracking the Linux Code: Exploring Files, Permissions & SSH
════════════════════════
𐀪 Author: Adebowale Adetunji
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:37:33 GMT
════════════════════════
⌗ Tags: #file_management #ethical_hacking #linux #ssh #cybersecurity
════════════════════════
𐀪 Author: Adebowale Adetunji
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:37:33 GMT
════════════════════════
⌗ Tags: #file_management #ethical_hacking #linux #ssh #cybersecurity
Medium
Cracking the Linux Code: Exploring Files, Permissions & SSH
Day 2 of my cybersecurity bootcamp on TryHackMe was an adventure through the Linux filesystem, where I learned how to create, move, and…
⤷ Title: The Safest Way to Store Access Token in React Native
════════════════════════
𐀪 Author: Ms. Byte Dev
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:34:14 GMT
════════════════════════
⌗ Tags: #react_native_development #software_development #authentication #react_native #cybersecurity
════════════════════════
𐀪 Author: Ms. Byte Dev
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:34:14 GMT
════════════════════════
⌗ Tags: #react_native_development #software_development #authentication #react_native #cybersecurity
Medium
The Safest Way to Store Access Token in React Native
In React Native applications, securely storing access tokens is critical for maintaining authentication integrity and protecting user data…
⤷ Title: How to Solve Event ID 208: Forced Authentication Detected
════════════════════════
𐀪 Author: Alfredo Zablah
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:01:28 GMT
════════════════════════
⌗ Tags: #soc #cybersecurity #lets_defend #threat_intelligence #incident_response
════════════════════════
𐀪 Author: Alfredo Zablah
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:01:28 GMT
════════════════════════
⌗ Tags: #soc #cybersecurity #lets_defend #threat_intelligence #incident_response
Medium
How to Solve Event ID 208: Forced Authentication Detected
Lets Defend Practice Event ID 208
⤷ Title: The Rise of AI-Powered Cybersecurity: How Organizations Can Stay Ahead
════════════════════════
𐀪 Author: Gursimran Singh | Cloud IT Professional
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:44:58 GMT
════════════════════════
⌗ Tags: #security #ai_agent #ai #cybersecurity #secops
════════════════════════
𐀪 Author: Gursimran Singh | Cloud IT Professional
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:44:58 GMT
════════════════════════
⌗ Tags: #security #ai_agent #ai #cybersecurity #secops
Medium
The Rise of AI-Powered Cybersecurity: How Organizations Can Stay Ahead
Cybersecurity threats are evolving rapidly, and traditional security measures are no longer enough to keep up. With the increasing…
⤷ Title: The Evolving Landscape of Intelligence: Insights from Dr. Mostafa Amir
════════════════════════
𐀪 Author: Kathy Bell
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:38:58 GMT
════════════════════════
⌗ Tags: #intelligence #government #ai #cybersecurity
════════════════════════
𐀪 Author: Kathy Bell
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:38:58 GMT
════════════════════════
⌗ Tags: #intelligence #government #ai #cybersecurity
Medium
The Evolving Landscape of Intelligence: Insights from Dr. Mostafa Amir
Intelligence plays a pivotal role in shaping national security, corporate strategies, and even technological advancements. Whether in…
⤷ Title: I will write engineering, tech, cybersecurity, electrical engineer plant manager resume
════════════════════════
𐀪 Author: Mudasir
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:10:19 GMT
════════════════════════
⌗ Tags: #resume #technology #linkedin #cybersecurity #engineering
════════════════════════
𐀪 Author: Mudasir
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:10:19 GMT
════════════════════════
⌗ Tags: #resume #technology #linkedin #cybersecurity #engineering
Medium
I will write engineering, tech, cybersecurity, electrical engineer plant manager resume
WELCOME GREAT BUYER!
⤷ Title: Python Cheatsheet for Penetration Testing: Automating Exploit Development and Reconnaissance
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:04:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #exploit_automation #penetration_testing #python_security
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:04:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #exploit_automation #penetration_testing #python_security
Medium
Python Cheatsheet for Penetration Testing: Automating Exploit Development and Reconnaissance
Introduction
⤷ Title: Day 46 of 1000 - LiveGood Business Challenge
Topic: Pros of Joining LiveGood
════════════════════════
𐀪 Author: LiveGood Js
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 00:59:01 GMT
════════════════════════
⌗ Tags: #this_happened_to_me #cybersecurity #true_crime #freelancing #film
Topic: Pros of Joining LiveGood
════════════════════════
𐀪 Author: LiveGood Js
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 00:59:01 GMT
════════════════════════
⌗ Tags: #this_happened_to_me #cybersecurity #true_crime #freelancing #film
Medium
Day 46 of 1000 - LiveGood Business Challenge Topic: Pros of Joining LiveGood
Why choose LiveGood? Because it’s designed to help you succeed with minimal risk and maximum rewards. Whether you're looking for financial…
⤷ Title: Lian_Yu TryHackMe-Detailed Walkthrough
════════════════════════
𐀪 Author: Roop Sagar
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:05:34 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #lian_yu
════════════════════════
𐀪 Author: Roop Sagar
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:05:34 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #lian_yu
Medium
Lian_Yu TryHackMe-Detailed Walkthrough
Spoiler Alert: Try solving the machine yourself before looking into this solution
⤷ Title: Microsoft SharePoint Connector Flaw Could've Enabled Credential Theft Across Power Platform
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 09:59:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 09:59:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: [A Practical Guide] Exploiting SSRF with Filter Bypass via Open Redirection — SSRF Labs
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:10:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #ssrf_exploitation #open_redirection_exploit #ssrf #bypassing_ssrf_filters
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:10:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #ssrf_exploitation #open_redirection_exploit #ssrf #bypassing_ssrf_filters
Medium
[A Practical Guide] Exploiting SSRF with Filter Bypass via Open Redirection — SSRF Labs
[Write-up] SSRF with Filter Bypass via Open Redirection Vulnerability.
⤷ Title: How We Can Stop GPT From Telling Us How To Make A Bomb — Ultimate Guide To Prompt Hacking
════════════════════════
𐀪 Author: sunwoop
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:59:44 GMT
════════════════════════
⌗ Tags: #prompt_hacking #prompt_engineering #ai #tech #hacking
════════════════════════
𐀪 Author: sunwoop
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:59:44 GMT
════════════════════════
⌗ Tags: #prompt_hacking #prompt_engineering #ai #tech #hacking
Medium
How We Can Stop GPT From Telling Us How To Make A Bomb — Ultimate Guide To Prompt Hacking
link: The Ultimate Guide To Prompt Hacking
⤷ Title: Hack The Box Walkthrough — Machine: Cap | Difficulty: Easy
════════════════════════
𐀪 Author: Nicholas Lewis
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:24:48 GMT
════════════════════════
⌗ Tags: #htb #htb_writeup #hacking #hackthebox #htb_walkthrough
════════════════════════
𐀪 Author: Nicholas Lewis
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:24:48 GMT
════════════════════════
⌗ Tags: #htb #htb_writeup #hacking #hackthebox #htb_walkthrough
Medium
Hack The Box Walkthrough — Machine: Cap | Difficulty: Easy
Description: Cap is an easy difficulty Linux machine running an HTTP server that performs administrative functions including performing…
⤷ Title: SOC335 — CVE-2024-49138 Exploitation Detected
════════════════════════
𐀪 Author: Ghostploit
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:35:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #letsdefendio #cve #soc #infosec
════════════════════════
𐀪 Author: Ghostploit
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:35:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #letsdefendio #cve #soc #infosec
Medium
SOC335 — CVE-2024-49138 Exploitation Detected
Hello, my digital adventurers! Today I’m going to investigate the new Letsdefend alert. This alert is about CVE-2024-49138.
⤷ Title: Build your Own Security Lab — Part1
════════════════════════
𐀪 Author: Prajeetguha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:53:58 GMT
════════════════════════
⌗ Tags: #homelab #elk_stack #pfsense #vmware_workstation #cybersecurity
════════════════════════
𐀪 Author: Prajeetguha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:53:58 GMT
════════════════════════
⌗ Tags: #homelab #elk_stack #pfsense #vmware_workstation #cybersecurity
Medium
Build your Own Security Lab — Part1
Creating a Home Lab to emulate a security infrastructure is fun as in the process one can learn a lot about how to deploy, configure and…
⤷ Title: Cybersecurity Trends 2025_Opcito Technologies Pvt LtdCyTop cybersecurity trends for 2025 | Opcito…
════════════════════════
𐀪 Author: Opcito Technologies Pvt Ltd
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:44:21 GMT
════════════════════════
⌗ Tags: #top_5cybersecurity_trends #cybersecurity_trends_2025 #cybersecurity #cybersecurity_trend #cybersecurity_service
════════════════════════
𐀪 Author: Opcito Technologies Pvt Ltd
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:44:21 GMT
════════════════════════
⌗ Tags: #top_5cybersecurity_trends #cybersecurity_trends_2025 #cybersecurity #cybersecurity_trend #cybersecurity_service
Medium
Cybersecurity Trends 2025_Opcito Technologies Pvt LtdCyTop cybersecurity trends for 2025 | Opcito…
Cybersecurity has evolved into a dynamic battlefield. Threats are developing at an alarming rate, becoming more sophisticated and stealthy…