⤷ Title: Why SIEM Often Feels Useless: A Deep Dive into Common Pitfalls
════════════════════════
𐀪 Author: Muhammad Muzammil Rawoof
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:36:21 GMT
════════════════════════
⌗ Tags: #siem_tools #security_operation_center #cyber_security_awareness #cybersecurity #siem
════════════════════════
𐀪 Author: Muhammad Muzammil Rawoof
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:36:21 GMT
════════════════════════
⌗ Tags: #siem_tools #security_operation_center #cyber_security_awareness #cybersecurity #siem
Medium
Why SIEM Often Feels Useless: A Deep Dive into Common Pitfalls
In the current digital age, many organizations are pouring significant resources into Security Information and Event Management (SIEM)…
⤷ Title: 10 Top Reasons Why Businesses Outsource Cyber Tabletop Exercises
════════════════════════
𐀪 Author: IT_Engineer
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:31:25 GMT
════════════════════════
⌗ Tags: #tabletop_exercise #cybersecurity #business_strategy #it_security #managed_services
════════════════════════
𐀪 Author: IT_Engineer
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:31:25 GMT
════════════════════════
⌗ Tags: #tabletop_exercise #cybersecurity #business_strategy #it_security #managed_services
Medium
10 Top Reasons Why Businesses Outsource Cyber Tabletop Exercises
In today’s ever-evolving threat landscape, businesses must be prepared for cyber incidents that can disrupt operations, compromise data…
⤷ Title: Dig Dug Walkthrough {TryHackMe}
════════════════════════
𐀪 Author: Devilman24
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:27:20 GMT
════════════════════════
⌗ Tags: #exploration #cybersecurity #tryhackme #red_team #dns
════════════════════════
𐀪 Author: Devilman24
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:27:20 GMT
════════════════════════
⌗ Tags: #exploration #cybersecurity #tryhackme #red_team #dns
Medium
Dig Dug Walkthrough {TryHackMe}
Room URL: https://tryhackme.com/room/digdug
⤷ Title: GIT Happens — TryHackMe Walkthrough !!
════════════════════════
𐀪 Author: IAMnk
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:24:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_writeup #cyber_security_awareness #tryhackme_walkthrough #tryhackme
════════════════════════
𐀪 Author: IAMnk
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:24:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_writeup #cyber_security_awareness #tryhackme_walkthrough #tryhackme
Medium
GIT Happens — TryHackMe Walkthrough !!
Version control systems like Git are a fundamental part of modern software development. However, if not properly secured, they can expose…
⤷ Title: Capturing Packets and Analyzing Network Traffic with Wireshark
════════════════════════
𐀪 Author: Poray Casimier
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:19:07 GMT
════════════════════════
⌗ Tags: #internet_security #cybersecurity #ipsec #wireshark #linux
════════════════════════
𐀪 Author: Poray Casimier
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:19:07 GMT
════════════════════════
⌗ Tags: #internet_security #cybersecurity #ipsec #wireshark #linux
Medium
Capturing Packets and Analyzing Network Traffic with Wireshark
Since my last blog post, I have been studying the ways in which we keep networks secure from threats and specifically identify the threats…
⤷ Title: Hack The Box: Devel — A Step-by-Step Exploitation and Privilege Escalation Walkthrough
════════════════════════
𐀪 Author: JB
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:52:18 GMT
════════════════════════
⌗ Tags: #metasploit #windows_server #penetration_testing #hackthebox #nmap
════════════════════════
𐀪 Author: JB
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:52:18 GMT
════════════════════════
⌗ Tags: #metasploit #windows_server #penetration_testing #hackthebox #nmap
Medium
Hack The Box: Devel — A Step-by-Step Exploitation and Privilege Escalation Walkthrough
Introduction
⤷ Title: Core Windows Processes - THM - SOC Level 1
════════════════════════
𐀪 Author: CyberMonk
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:21:32 GMT
════════════════════════
⌗ Tags: #tryhackme #soc_level_1 #soc_level_1_path #windows_process #core_windows_processes
════════════════════════
𐀪 Author: CyberMonk
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:21:32 GMT
════════════════════════
⌗ Tags: #tryhackme #soc_level_1 #soc_level_1_path #windows_process #core_windows_processes
Medium
Core Windows Processes - THM - SOC Level 1
Follow my page for simple and easy to understand content, I will write only that information that you have to know about that topic.
⤷ Title: TryHackMe | FAT32 Analysis | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:05:57 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 18:05:57 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #cyber_security_awareness #cybersecurity
Medium
TryHackMe | FAT32 Analysis | WriteUp
Examine the FAT32 filesystem from a forensic point of view
⤷ Title: IDOR Unlocked: Accessing Unauthorized Data with a Simple Tweak!
════════════════════════
𐀪 Author: D3fault
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:54:34 GMT
════════════════════════
⌗ Tags: #pentesting #vulnerability_disclosure #red_teaming #cybersecurity #bug_bounty_writeup
════════════════════════
𐀪 Author: D3fault
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 17:54:34 GMT
════════════════════════
⌗ Tags: #pentesting #vulnerability_disclosure #red_teaming #cybersecurity #bug_bounty_writeup
Medium
🚨 IDOR Unlocked: Accessing Unauthorized Data with a Simple Tweak! 🔥
This is the journey of how we discovered an Insecure Direct Object Reference (IDOR) vulnerability that could lead to serious data breaches.
⤷ Title: 4 Arrested as Police Dismantle 8Base Ransomware, Seize Dark Web Sites
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:18:00 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Dark Web #Security #8Base #Cybersecurity #Dark Net #dark web #Ransom #Ransomware
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:18:00 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Dark Web #Security #8Base #Cybersecurity #Dark Net #dark web #Ransom #Ransomware
Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
4 Arrested as Police Dismantle 8Base Ransomware, Seize Dark Web Sites
Follow us on Bluesky, Twitter (X) and Facebook at @Hackread
⤷ Title: Apple Issues Emergency Updates to Patch Actively Exploited Zero-Day Vulnerability – CVE-2025-24200
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:16:39 +0000
════════════════════════
⌗ Tags: #Vulnerability #Apple #CVE_2025_24200 #ios
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:16:39 +0000
════════════════════════
⌗ Tags: #Vulnerability #Apple #CVE_2025_24200 #ios
Daily CyberSecurity
Apple Issues Emergency Updates to Patch Actively Exploited Zero-Day Vulnerability - CVE-2025-24200
Urgent security update: Apple patches zero-day vulnerability (CVE-2025-24200) actively exploited in targeted attacks.
⤷ Title: International Operation Dismantles Phobos Ransomware Gang: Key Arrests and 8Base Takedown
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:31 GMT
════════════════════════
⌗ Tags: #bug_bounty #malware #gangs #ai #money
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:31 GMT
════════════════════════
⌗ Tags: #bug_bounty #malware #gangs #ai #money
Medium
🚨International Operation Dismantles Phobos Ransomware Gang: Key Arrests and 8Base Takedown🚨
WIRE TOR — The Ethical Hacking Services
⤷ Title: Day 6: CSS Injection + Clickjacking to Account Takeover
════════════════════════
𐀪 Author: dani3l
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:19:26 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #account_takeover
════════════════════════
𐀪 Author: dani3l
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:19:26 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #account_takeover
Medium
Day 6: CSS Injection + Clickjacking to Account Takeover
Introduction
⤷ Title: E-commerce Under Attack: Google Tag Manager Skimmers Deployed
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:40 GMT
════════════════════════
⌗ Tags: #google #money #ai #hacking #usa
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:40 GMT
════════════════════════
⌗ Tags: #google #money #ai #hacking #usa
Medium
🚨E-commerce Under Attack: Google Tag Manager Skimmers Deployed🚨
WIRE TOR — The Ethical Hacking Services
⤷ Title: Major Cyberattack Cripples Newspaper Operations Nationwide
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:36 GMT
════════════════════════
⌗ Tags: #malware #ai #dallas_lee_news #hacking #money
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:36 GMT
════════════════════════
⌗ Tags: #malware #ai #dallas_lee_news #hacking #money
Medium
🚨Major Cyberattack Cripples Newspaper Operations Nationwide🚨
WIRE TOR — The Ethical Hacking Services
⤷ Title: Como Iniciar na Cibersegurança?
════════════════════════
𐀪 Author: Onerio Ramos
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:58:26 GMT
════════════════════════
⌗ Tags: #hacking #cibersegurança #hacks #cybersecurity #professional
════════════════════════
𐀪 Author: Onerio Ramos
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:58:26 GMT
════════════════════════
⌗ Tags: #hacking #cibersegurança #hacks #cybersecurity #professional
Medium
Como Iniciar na Cibersegurança?
A cibersegurança é uma das áreas mais promissoras da tecnologia, com uma demanda crescente por profissionais qualificados. Mas por onde…
⤷ Title: Building a Pwnagotchi with a Raspberry Pi Zero 2 W, Waveshare V4, and PiSugar2 Battery
════════════════════════
𐀪 Author: josegpac
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:53:49 GMT
════════════════════════
⌗ Tags: #projects #security #information_security #cybersecurity #information_technology
════════════════════════
𐀪 Author: josegpac
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:53:49 GMT
════════════════════════
⌗ Tags: #projects #security #information_security #cybersecurity #information_technology
Medium
Building a Pwnagotchi with a Raspberry Pi Zero 2 W, Waveshare V4, and PiSugar2 Battery
Pwnagotchi is an AI-driven tool designed for Wi-Fi security research. It passively listens for Wi-Fi handshakes.
⤷ Title: What’s the Difference Between DevOps and DevSecOps?
════════════════════════
𐀪 Author: Eugene Voskoley
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:45:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #software_development #devops #cloud_computing #devsecops
════════════════════════
𐀪 Author: Eugene Voskoley
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:45:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #software_development #devops #cloud_computing #devsecops
Medium
What’s the Difference Between DevOps and DevSecOps?
DevOps is a methodology aimed at fostering collaboration between programmers and system administrators who work closely together to develop…
⤷ Title: Privacy-Enhancing Technologies: Keeping Your Data Safe in a Digital World
════════════════════════
𐀪 Author: Anitha Ramaswamy
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:42:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_privacy #data_security #pets #digital
════════════════════════
𐀪 Author: Anitha Ramaswamy
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:42:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_privacy #data_security #pets #digital
Medium
Privacy-Enhancing Technologies: Keeping Your Data Safe in a Digital World
Protecting Personal Information While Using Data Effectively
⤷ Title: Cloud Computing
════════════════════════
𐀪 Author: Justice Humphrey Ugochukwu
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:21:15 GMT
════════════════════════
⌗ Tags: #cloud_computing #kubernetes #devops #cybersecurity #business
════════════════════════
𐀪 Author: Justice Humphrey Ugochukwu
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:21:15 GMT
════════════════════════
⌗ Tags: #cloud_computing #kubernetes #devops #cybersecurity #business
Medium
Cloud Computing
Shared Responsibility Model
⤷ Title: Bypass Really Simple Security: TryHackMe Walkthrough
════════════════════════
𐀪 Author: IAMnk
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:19:18 GMT
════════════════════════
⌗ Tags: #cyber #cybersecurity #tryhackme_walkthrough #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: IAMnk
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:19:18 GMT
════════════════════════
⌗ Tags: #cyber #cybersecurity #tryhackme_walkthrough #tryhackme_writeup #tryhackme
Medium
Bypass Really Simple Security: TryHackMe Walkthrough
CVE-2024–10924: When 2FA Fails at Its One Job