⤷ Title: Python Web API 5 — Securing Your Python Web API: Authentication and Authorization Techniques
════════════════════════
𐀪 Author: Ayşe Kübra Kuyucu
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 14:02:07 GMT
════════════════════════
⌗ Tags: #api_best_practices #python_security #python_authentication #api_security #web_api_authorization
════════════════════════
𐀪 Author: Ayşe Kübra Kuyucu
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 14:02:07 GMT
════════════════════════
⌗ Tags: #api_best_practices #python_security #python_authentication #api_security #web_api_authorization
Medium
Python Web API 5 — Securing Your Python Web API: Authentication and Authorization Techniques
Web API Development with Python — Part 5/12
⤷ Title: FROM TWITTER TO X IS THE SAME.
════════════════════════
𐀪 Author: Patrick Carafa
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 14:23:33 GMT
════════════════════════
⌗ Tags: #twitter #social #social_media #xs #channel
════════════════════════
𐀪 Author: Patrick Carafa
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 14:23:33 GMT
════════════════════════
⌗ Tags: #twitter #social #social_media #xs #channel
Medium
FROM TWITTER TO X IS THE SAME.
www.twitter.com/PatrickCarafa
⤷ Title: Rootme CTF Walkthrough (Tryhackme)
════════════════════════
𐀪 Author: sys_br3ach3r
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 13:52:00 GMT
════════════════════════
⌗ Tags: #ctf #bugbounty_writeup #infosec_write_ups #ctf_writeup #ctf_walkthrough
════════════════════════
𐀪 Author: sys_br3ach3r
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 13:52:00 GMT
════════════════════════
⌗ Tags: #ctf #bugbounty_writeup #infosec_write_ups #ctf_writeup #ctf_walkthrough
Medium
Rootme CTF Walkthrough (Tryhackme)
This TryHackMe challenge was a fun Linux privilege escalation and web exploitation exercise where I learned some real-world techniques for…
⤷ Title: Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:46:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:46:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Handala Hackers Claim Massive Data Breach on Israeli Police, Leak 350,000 Files
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:21:55 +0000
════════════════════════
⌗ Tags: #Hacking News #Leaks #Cyber Attack #Cybersecurity #data breach #Handala #Israel #LEAKS #Palestine
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:21:55 +0000
════════════════════════
⌗ Tags: #Hacking News #Leaks #Cyber Attack #Cybersecurity #data breach #Handala #Israel #LEAKS #Palestine
Hackread
Handala Hackers Claim Massive Data Breach on Israeli Police, Leak 350,000 Files
Follow us on Bluesky, Twitter (X) and Facebook at @Hackread
⤷ Title: 5 Things We Are Going to Continue to Ignore in 2025
════════════════════════
𐀪 Author: BHIS
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:00:00 +0000
════════════════════════
⌗ Tags: #Blue Team #Incident Response #John Strand #Red Team #Webcast Wrap_Up #AI #cloud #penetration testing
════════════════════════
𐀪 Author: BHIS
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:00:00 +0000
════════════════════════
⌗ Tags: #Blue Team #Incident Response #John Strand #Red Team #Webcast Wrap_Up #AI #cloud #penetration testing
Black Hills Information Security, Inc.
5 Things We Are Going to Continue to Ignore in 2025 - Black Hills Information Security, Inc.
In this video, John Strand discusses the complexities and challenges of penetration testing, emphasizing that it goes beyond just finding and exploiting vulnerabilities.
⤷ Title: Unveiling EXIF Metadata: How to Extract Hidden Information from Images
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:37:57 GMT
════════════════════════
⌗ Tags: #bugcrowd #hacking #2025 #exiftool #bug_bounty
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:37:57 GMT
════════════════════════
⌗ Tags: #bugcrowd #hacking #2025 #exiftool #bug_bounty
Medium
Unveiling EXIF Metadata: How to Extract Hidden Information from Images
Hello Everyone,
⤷ Title: How to Start Your Journey in Bug Bounty Hunting
════════════════════════
𐀪 Author: Vipul Sonule
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:16:08 GMT
════════════════════════
⌗ Tags: #tools #bug_bounty #technology #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Vipul Sonule
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:16:08 GMT
════════════════════════
⌗ Tags: #tools #bug_bounty #technology #penetration_testing #cybersecurity
Medium
🐞 How to Start Your Journey in Bug Bounty Hunting
🐞 Bug Bounty Hunting: A Beginner’s Guide 🔍💰
⤷ Title: STIX/TAXII: The Cybersecurity Game-Changer You’re Not Using Yet!”
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:10:22 GMT
════════════════════════
⌗ Tags: #threat_intelligence #hacking #information_technology #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:10:22 GMT
════════════════════════
⌗ Tags: #threat_intelligence #hacking #information_technology #cybersecurity #bug_bounty
Medium
STIX/TAXII: The Cybersecurity Game-Changer You’re Not Using Yet!” 🚀
Cyber threats are evolving at an alarming rate. Organizations must stay ahead by sharing and consuming threat intelligence effectively…
⤷ Title: Ever wanted to be a hacker?
════════════════════════
𐀪 Author: Zaina Haider
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:20:58 GMT
════════════════════════
⌗ Tags: #generative_ai_tools #ethical_hacking #ethical_hacking_training #technology #hacking
════════════════════════
𐀪 Author: Zaina Haider
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:20:58 GMT
════════════════════════
⌗ Tags: #generative_ai_tools #ethical_hacking #ethical_hacking_training #technology #hacking
Medium
Ever wanted to be a hacker?
Here is how you can do it ethically⚠️⚠️⚠️
⤷ Title: What’s the Secret? Unpacking Command-Line Argument Manipulation
════════════════════════
𐀪 Author: JustAnother-Engineer
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:46:50 GMT
════════════════════════
⌗ Tags: #windows #cybersecurity #security #hacking #technology
════════════════════════
𐀪 Author: JustAnother-Engineer
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:46:50 GMT
════════════════════════
⌗ Tags: #windows #cybersecurity #security #hacking #technology
Medium
What’s the Secret? Unpacking Command-Line Argument Manipulation
Adversaries continually evolve their tactics to evade security defenses, and command-line argument spoofing is a particularly stealthy…
⤷ Title: Hacking SJCAM4000 via Wi-Fi
════════════════════════
𐀪 Author: Cyber Library
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:03:55 GMT
════════════════════════
⌗ Tags: #linux #cameras #hacking #wifi
════════════════════════
𐀪 Author: Cyber Library
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:03:55 GMT
════════════════════════
⌗ Tags: #linux #cameras #hacking #wifi
Medium
Hacking SJCAM4000 via Wi-Fi
The SJCAM4000 is one of the most popular budget action cameras. There is a version with Wi-Fi support and one without. The Wi-Fi module is…
⤷ Title: Cyber Briefing: 2025.02.10
════════════════════════
𐀪 Author: CyberMaterial
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:00:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #apple #cyber_briefing #technology #infosec
════════════════════════
𐀪 Author: CyberMaterial
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:00:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #apple #cyber_briefing #technology #infosec
Medium
Cyber Briefing: 2025.02.10
👉 What’s happening in cybersecurity today?
⤷ Title: How to Land a Tech Job: Key Tips for Success
════════════════════════
𐀪 Author: Trent W
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:42:29 GMT
════════════════════════
⌗ Tags: #jobs #cybersecurity #business #tech #startup
════════════════════════
𐀪 Author: Trent W
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:42:29 GMT
════════════════════════
⌗ Tags: #jobs #cybersecurity #business #tech #startup
Medium
How to Land a Tech Job: Key Tips for Success
Getting a job in tech can be a challenging journey, especially if you’re just starting. However, with the right strategy, persistence, and mindset, it’s absolutely achievable. Here’s a guide on how…
⤷ Title: The Financial Sector’s Quantum Reckoning: Why Europol Is Sounding the Alarm
════════════════════════
𐀪 Author: Jason Nathaniel Ader
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:38:17 GMT
════════════════════════
⌗ Tags: #cybersecurity #europol #quantum_computing
════════════════════════
𐀪 Author: Jason Nathaniel Ader
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:38:17 GMT
════════════════════════
⌗ Tags: #cybersecurity #europol #quantum_computing
Medium
The Financial Sector’s Quantum Reckoning: Why Europol Is Sounding the Alarm
Quantum Computers Are Coming — And Banks Must Prepare for the Encryption Crisis Now
⤷ Title: Mastering Modern Red Teaming Infrastructure Part 4: Advanced OSINT Techniques, Credential…
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:23:39 GMT
════════════════════════
⌗ Tags: #darkweb #osint #cybersecurity #azure #information_security
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:23:39 GMT
════════════════════════
⌗ Tags: #darkweb #osint #cybersecurity #azure #information_security
Medium
Mastering Modern Red Teaming Infrastructure Part 4: Advanced OSINT Techniques, Credential Harvesting, and Azure AD Password Spraying…
In this part of the series, we focus on Open-Source Intelligence (OSINT) techniques to collect victim emails, validate identities, and…
⤷ Title: Conducting ATT&CK Assessments Based on APTs and Client Business Sectors.
════════════════════════
𐀪 Author: h4rd1n
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:18:15 GMT
════════════════════════
⌗ Tags: #threat_intelligence #intelligence #cybersecurity #mitre_attack #detection_engineering
════════════════════════
𐀪 Author: h4rd1n
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:18:15 GMT
════════════════════════
⌗ Tags: #threat_intelligence #intelligence #cybersecurity #mitre_attack #detection_engineering
Medium
Conducting ATT&CK Assessments Based on APTs and Client Business Sectors.
I’ve been working with MITRE ATT&CK since the beginning of my cybersecurity career, and over the past four years, I’ve faced challenges in…
⤷ Title: The Role of Penetration Testing in Healthcare Cybersecurity
════════════════════════
𐀪 Author: Gil Vidals
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:18:05 GMT
════════════════════════
⌗ Tags: #cybersecurity #hipaa_compliance #hipaa
════════════════════════
𐀪 Author: Gil Vidals
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:18:05 GMT
════════════════════════
⌗ Tags: #cybersecurity #hipaa_compliance #hipaa
Medium
The Role of Penetration Testing in Healthcare Cybersecurity
Why Penetration Testing is Critical for Healthcare IT
⤷ Title: QRishing: When QR Codes become a Hacker’s best Friend
════════════════════════
𐀪 Author: Pavlović Goran
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:16:56 GMT
════════════════════════
⌗ Tags: #qrishing #cybersecurity #cybercrime #cyberattack #qr_code
════════════════════════
𐀪 Author: Pavlović Goran
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:16:56 GMT
════════════════════════
⌗ Tags: #qrishing #cybersecurity #cybercrime #cyberattack #qr_code
Medium
QRishing: When QR Codes become a Hacker’s best Friend
Let’s be honest — QR codes are everywhere. You see them on restaurant menus, posters, business cards, and even gravestones (yes, that’s a…
⤷ Title: The Future is Now: 5 Tech Trends Shaping 2025
════════════════════════
𐀪 Author: Asma M.
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:07:26 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #technology #technology_trends #cybersecurity #future_of_work
════════════════════════
𐀪 Author: Asma M.
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:07:26 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #technology #technology_trends #cybersecurity #future_of_work
Medium
The Future is Now: 5 Tech Trends Shaping 2025
In today’s fast-evolving digital world, keeping up with the latest technology trends is more important than ever. Innovations in Artificial Intelligence (AI), 5G connectivity, cybersecurity, remote…
⤷ Title: I will write data science, tech, business analyst, cybersecurity, data analytics resume
════════════════════════
𐀪 Author: Amelia_cv
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:57:24 GMT
════════════════════════
⌗ Tags: #health #business_anayst #business #data_science #cybersecurity
════════════════════════
𐀪 Author: Amelia_cv
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:57:24 GMT
════════════════════════
⌗ Tags: #health #business_anayst #business #data_science #cybersecurity
Medium
I will write data science, tech, business analyst, cybersecurity, data analytics resume
WELCOME TO MY PROFESSIONAL RESUME-WRITING SERVICE!