⤷ Title: The Role of Penetration Testing in Healthcare Cybersecurity
════════════════════════
𐀪 Author: Gil Vidals
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:18:05 GMT
════════════════════════
⌗ Tags: #cybersecurity #hipaa_compliance #hipaa
════════════════════════
𐀪 Author: Gil Vidals
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:18:05 GMT
════════════════════════
⌗ Tags: #cybersecurity #hipaa_compliance #hipaa
Medium
The Role of Penetration Testing in Healthcare Cybersecurity
Why Penetration Testing is Critical for Healthcare IT
⤷ Title: QRishing: When QR Codes become a Hacker’s best Friend
════════════════════════
𐀪 Author: Pavlović Goran
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:16:56 GMT
════════════════════════
⌗ Tags: #qrishing #cybersecurity #cybercrime #cyberattack #qr_code
════════════════════════
𐀪 Author: Pavlović Goran
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:16:56 GMT
════════════════════════
⌗ Tags: #qrishing #cybersecurity #cybercrime #cyberattack #qr_code
Medium
QRishing: When QR Codes become a Hacker’s best Friend
Let’s be honest — QR codes are everywhere. You see them on restaurant menus, posters, business cards, and even gravestones (yes, that’s a…
⤷ Title: The Future is Now: 5 Tech Trends Shaping 2025
════════════════════════
𐀪 Author: Asma M.
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:07:26 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #technology #technology_trends #cybersecurity #future_of_work
════════════════════════
𐀪 Author: Asma M.
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 16:07:26 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #technology #technology_trends #cybersecurity #future_of_work
Medium
The Future is Now: 5 Tech Trends Shaping 2025
In today’s fast-evolving digital world, keeping up with the latest technology trends is more important than ever. Innovations in Artificial Intelligence (AI), 5G connectivity, cybersecurity, remote…
⤷ Title: I will write data science, tech, business analyst, cybersecurity, data analytics resume
════════════════════════
𐀪 Author: Amelia_cv
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:57:24 GMT
════════════════════════
⌗ Tags: #health #business_anayst #business #data_science #cybersecurity
════════════════════════
𐀪 Author: Amelia_cv
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:57:24 GMT
════════════════════════
⌗ Tags: #health #business_anayst #business #data_science #cybersecurity
Medium
I will write data science, tech, business analyst, cybersecurity, data analytics resume
WELCOME TO MY PROFESSIONAL RESUME-WRITING SERVICE!
⤷ Title: Denial of Service (DoS) Attacks
════════════════════════
𐀪 Author: Hakob Hakobyan
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:53:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #dos_attack #cloud_security #ddos
════════════════════════
𐀪 Author: Hakob Hakobyan
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:53:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #dos_attack #cloud_security #ddos
Medium
Denial of Service (DoS) Attacks
A Denial of Service (DoS) attack is a cyberattack in which an attacker attempts to make a system, network, or service unavailable to its…
⤷ Title: Simple & Cheap Ways to Schedule Tweets
════════════════════════
𐀪 Author: Chris Craft
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:46:54 GMT
════════════════════════
⌗ Tags: #xs #marketing #productivity #automation #twitter
════════════════════════
𐀪 Author: Chris Craft
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 15:46:54 GMT
════════════════════════
⌗ Tags: #xs #marketing #productivity #automation #twitter
Medium
## Simple & Cheap Ways to Schedule Tweets
### Free & Cheap Options
⤷ Title: How Bug Bounty Programs Work: The Ultimate Guide
════════════════════════
𐀪 Author: Levente Molnar
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:03:50 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #ethical_hacking #hacking #bug_bounty
════════════════════════
𐀪 Author: Levente Molnar
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:03:50 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #ethical_hacking #hacking #bug_bounty
Medium
How Bug Bounty Programs Work: The Ultimate Guide
In this guide, we’ll break down how bug bounty programs work, why they are essential, and how …
⤷ Title: XML-RPC Vulnerability: Easy Exploit, Easy Bounty!
════════════════════════
𐀪 Author: Kerolos Ayman
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:44:26 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: Kerolos Ayman
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:44:26 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty #bug_bounty_tips
Medium
XML-RPC Vulnerability: Easy Exploit, Easy Bounty!
During hunting on target Let’s called it target.com
⤷ Title: Exposed API Keys & Config Files in js file! || Bug Bounty
════════════════════════
𐀪 Author: Kerolos Ayman
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:43:42 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty
════════════════════════
𐀪 Author: Kerolos Ayman
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:43:42 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty
Medium
Exposed API Keys & Config Files in js file! || Bug Bounty
During hunting on target I found sensitive API keys and system configurations How could I find that?
⤷ Title: Bug Bounty Target Selection: How Hackers Find the Most Profitable & Juicy Bugs Before Anyone Else!
════════════════════════
𐀪 Author: Akash Ghosh
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:25:50 GMT
════════════════════════
⌗ Tags: #programming #bug_bounty_tips #cybersecurity #bug_bounty_writeup #bug_bounty
════════════════════════
𐀪 Author: Akash Ghosh
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:25:50 GMT
════════════════════════
⌗ Tags: #programming #bug_bounty_tips #cybersecurity #bug_bounty_writeup #bug_bounty
Medium
Bug Bounty Target Selection: How Hackers Find the Most Profitable & Juicy Bugs Before Anyone Else!
Free Link
⤷ Title: Avoid These Hacking Mistakes & Start Right!
════════════════════════
𐀪 Author: R4hul
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:43:19 GMT
════════════════════════
⌗ Tags: #hacking #tools #bug_bounty_tips #cybersecurity #ethical
════════════════════════
𐀪 Author: R4hul
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:43:19 GMT
════════════════════════
⌗ Tags: #hacking #tools #bug_bounty_tips #cybersecurity #ethical
Medium
Avoid These Hacking Mistakes & Start Right!
The best and only guide 👨💻
⤷ Title: PicoCTF Writeup — WhitePages
════════════════════════
𐀪 Author: SoBatista
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:02:19 GMT
════════════════════════
⌗ Tags: #hacking #data_security #forensics #white_pages #picoctf
════════════════════════
𐀪 Author: SoBatista
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:02:19 GMT
════════════════════════
⌗ Tags: #hacking #data_security #forensics #white_pages #picoctf
Medium
PicoCTF Writeup — WhitePages
Welcome back, CTF enthusiasts! Today, we’re solving the WhitePages challenge from PicoCTF 2019. At first glance, it seems like an empty…
⤷ Title: The Kidnap You Never Noticed
════════════════════════
𐀪 Author: Gerald Derks
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:57:07 GMT
════════════════════════
⌗ Tags: #hacking #culture #kidnap #ai #consciousness
════════════════════════
𐀪 Author: Gerald Derks
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:57:07 GMT
════════════════════════
⌗ Tags: #hacking #culture #kidnap #ai #consciousness
Medium
The Invisible Chains of Consciousness
The Invisible Chains of Consciousness
⤷ Title: Windows DLL Hijacking
════════════════════════
𐀪 Author: Tech Security
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:02:35 GMT
════════════════════════
⌗ Tags: #hacking #dll_hijacking #malware #dll_injection #cybersecurity
════════════════════════
𐀪 Author: Tech Security
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:02:35 GMT
════════════════════════
⌗ Tags: #hacking #dll_hijacking #malware #dll_injection #cybersecurity
Medium
Windows DLL Hijacking
Windows applications rely on Dynamic Link Libraries (DLLs) to function efficiently, but attackers can exploit weaknesses in how these DLLs…
⤷ Title: Top 6 Remote High Paying Jobs in IT You Can Do From Home
════════════════════════
𐀪 Author: Seonaissac
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:56:04 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #latest_cyber_threats #cybersecurity_training
════════════════════════
𐀪 Author: Seonaissac
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:56:04 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #latest_cyber_threats #cybersecurity_training
Medium
Top 6 Remote High Paying Jobs in IT You Can Do From Home
Technology has changed the scenario of workplaces and brought new opportunities for IT professionals erasing previous boundaries. Today…
⤷ Title: Hydra — TryHackMe Writeup !!
════════════════════════
𐀪 Author: IAMnk
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:55:58 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cyber #tryhackme_writeup #cybersecurity #tryhackme
════════════════════════
𐀪 Author: IAMnk
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:55:58 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cyber #tryhackme_writeup #cybersecurity #tryhackme
Medium
Hydra — TryHackMe Writeup !!
Hydra — TryHackMe
⤷ Title: Honeypot Nedir? | What is Honeypot?
════════════════════════
𐀪 Author: Samet Koca
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:55:03 GMT
════════════════════════
⌗ Tags: #honeypot #threat_intelligence #hacker #security #cybersecurity
════════════════════════
𐀪 Author: Samet Koca
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:55:03 GMT
════════════════════════
⌗ Tags: #honeypot #threat_intelligence #hacker #security #cybersecurity
Medium
Honeypot Nedir? | What is Honeypot?
Siber güvenlik dünyasında saldırganları analiz etmek ve güvenlik açıklarını tespit etmek için kullanılan etkili yöntemlerden biri honeypot…
⤷ Title: ️ Tech Troubles in Senior Living? Let's Fix That!
════════════════════════
𐀪 Author: ɌƋƑ•TECH
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:40:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #senior_living #senior_care #mobile #technology
════════════════════════
𐀪 Author: ɌƋƑ•TECH
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:40:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #senior_living #senior_care #mobile #technology
Medium
🖥️ Tech Troubles in Senior Living? Let's Fix That!
Tech Troubles in Senior Living? Let's Fix That
⤷ Title: Why SIEM Often Feels Useless: A Deep Dive into Common Pitfalls
════════════════════════
𐀪 Author: Muhammad Muzammil Rawoof
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:36:21 GMT
════════════════════════
⌗ Tags: #siem_tools #security_operation_center #cyber_security_awareness #cybersecurity #siem
════════════════════════
𐀪 Author: Muhammad Muzammil Rawoof
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:36:21 GMT
════════════════════════
⌗ Tags: #siem_tools #security_operation_center #cyber_security_awareness #cybersecurity #siem
Medium
Why SIEM Often Feels Useless: A Deep Dive into Common Pitfalls
In the current digital age, many organizations are pouring significant resources into Security Information and Event Management (SIEM)…
⤷ Title: 10 Top Reasons Why Businesses Outsource Cyber Tabletop Exercises
════════════════════════
𐀪 Author: IT_Engineer
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:31:25 GMT
════════════════════════
⌗ Tags: #tabletop_exercise #cybersecurity #business_strategy #it_security #managed_services
════════════════════════
𐀪 Author: IT_Engineer
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:31:25 GMT
════════════════════════
⌗ Tags: #tabletop_exercise #cybersecurity #business_strategy #it_security #managed_services
Medium
10 Top Reasons Why Businesses Outsource Cyber Tabletop Exercises
In today’s ever-evolving threat landscape, businesses must be prepared for cyber incidents that can disrupt operations, compromise data…
⤷ Title: Dig Dug Walkthrough {TryHackMe}
════════════════════════
𐀪 Author: Devilman24
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:27:20 GMT
════════════════════════
⌗ Tags: #exploration #cybersecurity #tryhackme #red_team #dns
════════════════════════
𐀪 Author: Devilman24
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:27:20 GMT
════════════════════════
⌗ Tags: #exploration #cybersecurity #tryhackme #red_team #dns
Medium
Dig Dug Walkthrough {TryHackMe}
Room URL: https://tryhackme.com/room/digdug