⤷ Title: 10,000 WordPress Websites Compromised to Deliver macOS and Windows Malware
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:22:35 +0000
════════════════════════
⌗ Tags: #Malware #Atomic macOS Stealer #SocGholish #SocGholish Windows malware #Windows malware
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:22:35 +0000
════════════════════════
⌗ Tags: #Malware #Atomic macOS Stealer #SocGholish #SocGholish Windows malware #Windows malware
Daily CyberSecurity
10,000 WordPress Websites Compromised to Deliver macOS and Windows Malware
Learn about a sophisticated attack campaign targeting WordPress websites and delivering SocGholish Windows malware to unsuspecting users.
⤷ Title: Lumma Stealer Uses GitHub as a Malware Delivery Platform
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:10:47 +0000
════════════════════════
⌗ Tags: #Malware #Cobeacon #github #Lumma Stealer #Malware Delivery Platform #SecTopRAT #Vidar
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:10:47 +0000
════════════════════════
⌗ Tags: #Malware #Cobeacon #github #Lumma Stealer #Malware Delivery Platform #SecTopRAT #Vidar
Cybersecurity News
Lumma Stealer Uses GitHub as a Malware Delivery Platform
Uncover a sophisticated malware campaign using GitHub's release infrastructure to distribute the dangerous Lumma Stealer Trojan. Learn more.
⤷ Title: Canadian Hacker Indicted for $65 Million DeFi Exploit
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 00:15:17 +0000
════════════════════════
⌗ Tags: #Cyber Security #Crypto Exchange #DeFi Exploit #Global Money Laundering Scheme
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 00:15:17 +0000
════════════════════════
⌗ Tags: #Cyber Security #Crypto Exchange #DeFi Exploit #Global Money Laundering Scheme
Cybersecurity News
Canadian Hacker Indicted for $65 Million DeFi Exploit
Explore the case of a Canadian man accused of exploiting vulnerabilities in DeFi protocols, defrauding investors of $65 million. Find out more about this sophisticated scheme!
⤷ Title: Understanding Active Directory Security: Key Features and Event Logging
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:42:07 GMT
════════════════════════
⌗ Tags: #information_technology #programming #hacking #active_directory #cybersecurity
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:42:07 GMT
════════════════════════
⌗ Tags: #information_technology #programming #hacking #active_directory #cybersecurity
Medium
Understanding Active Directory Security: Key Features and Event Logging
Active Directory (AD) is a crucial system that helps organizations manage users, devices, and security policies. However, attackers often…
⤷ Title: Cracking the Linux Code: Exploring Files, Permissions & SSH
════════════════════════
𐀪 Author: Adebowale Adetunji
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:37:33 GMT
════════════════════════
⌗ Tags: #file_management #ethical_hacking #linux #ssh #cybersecurity
════════════════════════
𐀪 Author: Adebowale Adetunji
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:37:33 GMT
════════════════════════
⌗ Tags: #file_management #ethical_hacking #linux #ssh #cybersecurity
Medium
Cracking the Linux Code: Exploring Files, Permissions & SSH
Day 2 of my cybersecurity bootcamp on TryHackMe was an adventure through the Linux filesystem, where I learned how to create, move, and…
⤷ Title: The Safest Way to Store Access Token in React Native
════════════════════════
𐀪 Author: Ms. Byte Dev
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:34:14 GMT
════════════════════════
⌗ Tags: #react_native_development #software_development #authentication #react_native #cybersecurity
════════════════════════
𐀪 Author: Ms. Byte Dev
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:34:14 GMT
════════════════════════
⌗ Tags: #react_native_development #software_development #authentication #react_native #cybersecurity
Medium
The Safest Way to Store Access Token in React Native
In React Native applications, securely storing access tokens is critical for maintaining authentication integrity and protecting user data…
⤷ Title: How to Solve Event ID 208: Forced Authentication Detected
════════════════════════
𐀪 Author: Alfredo Zablah
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:01:28 GMT
════════════════════════
⌗ Tags: #soc #cybersecurity #lets_defend #threat_intelligence #incident_response
════════════════════════
𐀪 Author: Alfredo Zablah
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 02:01:28 GMT
════════════════════════
⌗ Tags: #soc #cybersecurity #lets_defend #threat_intelligence #incident_response
Medium
How to Solve Event ID 208: Forced Authentication Detected
Lets Defend Practice Event ID 208
⤷ Title: The Rise of AI-Powered Cybersecurity: How Organizations Can Stay Ahead
════════════════════════
𐀪 Author: Gursimran Singh | Cloud IT Professional
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:44:58 GMT
════════════════════════
⌗ Tags: #security #ai_agent #ai #cybersecurity #secops
════════════════════════
𐀪 Author: Gursimran Singh | Cloud IT Professional
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:44:58 GMT
════════════════════════
⌗ Tags: #security #ai_agent #ai #cybersecurity #secops
Medium
The Rise of AI-Powered Cybersecurity: How Organizations Can Stay Ahead
Cybersecurity threats are evolving rapidly, and traditional security measures are no longer enough to keep up. With the increasing…
⤷ Title: The Evolving Landscape of Intelligence: Insights from Dr. Mostafa Amir
════════════════════════
𐀪 Author: Kathy Bell
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:38:58 GMT
════════════════════════
⌗ Tags: #intelligence #government #ai #cybersecurity
════════════════════════
𐀪 Author: Kathy Bell
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:38:58 GMT
════════════════════════
⌗ Tags: #intelligence #government #ai #cybersecurity
Medium
The Evolving Landscape of Intelligence: Insights from Dr. Mostafa Amir
Intelligence plays a pivotal role in shaping national security, corporate strategies, and even technological advancements. Whether in…
⤷ Title: I will write engineering, tech, cybersecurity, electrical engineer plant manager resume
════════════════════════
𐀪 Author: Mudasir
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:10:19 GMT
════════════════════════
⌗ Tags: #resume #technology #linkedin #cybersecurity #engineering
════════════════════════
𐀪 Author: Mudasir
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:10:19 GMT
════════════════════════
⌗ Tags: #resume #technology #linkedin #cybersecurity #engineering
Medium
I will write engineering, tech, cybersecurity, electrical engineer plant manager resume
WELCOME GREAT BUYER!
⤷ Title: Python Cheatsheet for Penetration Testing: Automating Exploit Development and Reconnaissance
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:04:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #exploit_automation #penetration_testing #python_security
════════════════════════
𐀪 Author: Riki Satya Graha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:04:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #exploit_automation #penetration_testing #python_security
Medium
Python Cheatsheet for Penetration Testing: Automating Exploit Development and Reconnaissance
Introduction
⤷ Title: Day 46 of 1000 - LiveGood Business Challenge
Topic: Pros of Joining LiveGood
════════════════════════
𐀪 Author: LiveGood Js
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 00:59:01 GMT
════════════════════════
⌗ Tags: #this_happened_to_me #cybersecurity #true_crime #freelancing #film
Topic: Pros of Joining LiveGood
════════════════════════
𐀪 Author: LiveGood Js
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 00:59:01 GMT
════════════════════════
⌗ Tags: #this_happened_to_me #cybersecurity #true_crime #freelancing #film
Medium
Day 46 of 1000 - LiveGood Business Challenge Topic: Pros of Joining LiveGood
Why choose LiveGood? Because it’s designed to help you succeed with minimal risk and maximum rewards. Whether you're looking for financial…
⤷ Title: Lian_Yu TryHackMe-Detailed Walkthrough
════════════════════════
𐀪 Author: Roop Sagar
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:05:34 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #lian_yu
════════════════════════
𐀪 Author: Roop Sagar
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 01:05:34 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #lian_yu
Medium
Lian_Yu TryHackMe-Detailed Walkthrough
Spoiler Alert: Try solving the machine yourself before looking into this solution
⤷ Title: Microsoft SharePoint Connector Flaw Could've Enabled Credential Theft Across Power Platform
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 09:59:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 09:59:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: [A Practical Guide] Exploiting SSRF with Filter Bypass via Open Redirection — SSRF Labs
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:10:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #ssrf_exploitation #open_redirection_exploit #ssrf #bypassing_ssrf_filters
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:10:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #ssrf_exploitation #open_redirection_exploit #ssrf #bypassing_ssrf_filters
Medium
[A Practical Guide] Exploiting SSRF with Filter Bypass via Open Redirection — SSRF Labs
[Write-up] SSRF with Filter Bypass via Open Redirection Vulnerability.
⤷ Title: How We Can Stop GPT From Telling Us How To Make A Bomb — Ultimate Guide To Prompt Hacking
════════════════════════
𐀪 Author: sunwoop
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:59:44 GMT
════════════════════════
⌗ Tags: #prompt_hacking #prompt_engineering #ai #tech #hacking
════════════════════════
𐀪 Author: sunwoop
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:59:44 GMT
════════════════════════
⌗ Tags: #prompt_hacking #prompt_engineering #ai #tech #hacking
Medium
How We Can Stop GPT From Telling Us How To Make A Bomb — Ultimate Guide To Prompt Hacking
link: The Ultimate Guide To Prompt Hacking
⤷ Title: Hack The Box Walkthrough — Machine: Cap | Difficulty: Easy
════════════════════════
𐀪 Author: Nicholas Lewis
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:24:48 GMT
════════════════════════
⌗ Tags: #htb #htb_writeup #hacking #hackthebox #htb_walkthrough
════════════════════════
𐀪 Author: Nicholas Lewis
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 03:24:48 GMT
════════════════════════
⌗ Tags: #htb #htb_writeup #hacking #hackthebox #htb_walkthrough
Medium
Hack The Box Walkthrough — Machine: Cap | Difficulty: Easy
Description: Cap is an easy difficulty Linux machine running an HTTP server that performs administrative functions including performing…
⤷ Title: SOC335 — CVE-2024-49138 Exploitation Detected
════════════════════════
𐀪 Author: Ghostploit
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:35:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #letsdefendio #cve #soc #infosec
════════════════════════
𐀪 Author: Ghostploit
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:35:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #letsdefendio #cve #soc #infosec
Medium
SOC335 — CVE-2024-49138 Exploitation Detected
Hello, my digital adventurers! Today I’m going to investigate the new Letsdefend alert. This alert is about CVE-2024-49138.
⤷ Title: Build your Own Security Lab — Part1
════════════════════════
𐀪 Author: Prajeetguha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:53:58 GMT
════════════════════════
⌗ Tags: #homelab #elk_stack #pfsense #vmware_workstation #cybersecurity
════════════════════════
𐀪 Author: Prajeetguha
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:53:58 GMT
════════════════════════
⌗ Tags: #homelab #elk_stack #pfsense #vmware_workstation #cybersecurity
Medium
Build your Own Security Lab — Part1
Creating a Home Lab to emulate a security infrastructure is fun as in the process one can learn a lot about how to deploy, configure and…
⤷ Title: Cybersecurity Trends 2025_Opcito Technologies Pvt LtdCyTop cybersecurity trends for 2025 | Opcito…
════════════════════════
𐀪 Author: Opcito Technologies Pvt Ltd
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:44:21 GMT
════════════════════════
⌗ Tags: #top_5cybersecurity_trends #cybersecurity_trends_2025 #cybersecurity #cybersecurity_trend #cybersecurity_service
════════════════════════
𐀪 Author: Opcito Technologies Pvt Ltd
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:44:21 GMT
════════════════════════
⌗ Tags: #top_5cybersecurity_trends #cybersecurity_trends_2025 #cybersecurity #cybersecurity_trend #cybersecurity_service
Medium
Cybersecurity Trends 2025_Opcito Technologies Pvt LtdCyTop cybersecurity trends for 2025 | Opcito…
Cybersecurity has evolved into a dynamic battlefield. Threats are developing at an alarming rate, becoming more sophisticated and stealthy…
⤷ Title: How Deepfake Technology Impacts Website Security
════════════════════════
𐀪 Author: TishaChoksi
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:41:07 GMT
════════════════════════
⌗ Tags: #web3 #ai #cybersecurity #deepfakes #security
════════════════════════
𐀪 Author: TishaChoksi
════════════════════════
ⴵ Time: Tue, 04 Feb 2025 04:41:07 GMT
════════════════════════
⌗ Tags: #web3 #ai #cybersecurity #deepfakes #security
Medium
How Deepfake Technology Impacts Website Security
Introduction