⤷ Title: 4 Arrested as Police Dismantle 8Base Ransomware, Seize Dark Web Sites
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:18:00 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Dark Web #Security #8Base #Cybersecurity #Dark Net #dark web #Ransom #Ransomware
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:18:00 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Dark Web #Security #8Base #Cybersecurity #Dark Net #dark web #Ransom #Ransomware
Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
4 Arrested as Police Dismantle 8Base Ransomware, Seize Dark Web Sites
Follow us on Bluesky, Twitter (X) and Facebook at @Hackread
⤷ Title: Apple Issues Emergency Updates to Patch Actively Exploited Zero-Day Vulnerability – CVE-2025-24200
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:16:39 +0000
════════════════════════
⌗ Tags: #Vulnerability #Apple #CVE_2025_24200 #ios
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:16:39 +0000
════════════════════════
⌗ Tags: #Vulnerability #Apple #CVE_2025_24200 #ios
Daily CyberSecurity
Apple Issues Emergency Updates to Patch Actively Exploited Zero-Day Vulnerability - CVE-2025-24200
Urgent security update: Apple patches zero-day vulnerability (CVE-2025-24200) actively exploited in targeted attacks.
⤷ Title: International Operation Dismantles Phobos Ransomware Gang: Key Arrests and 8Base Takedown
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:31 GMT
════════════════════════
⌗ Tags: #bug_bounty #malware #gangs #ai #money
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:31 GMT
════════════════════════
⌗ Tags: #bug_bounty #malware #gangs #ai #money
Medium
🚨International Operation Dismantles Phobos Ransomware Gang: Key Arrests and 8Base Takedown🚨
WIRE TOR — The Ethical Hacking Services
⤷ Title: Day 6: CSS Injection + Clickjacking to Account Takeover
════════════════════════
𐀪 Author: dani3l
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:19:26 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #account_takeover
════════════════════════
𐀪 Author: dani3l
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:19:26 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #account_takeover
Medium
Day 6: CSS Injection + Clickjacking to Account Takeover
Introduction
⤷ Title: E-commerce Under Attack: Google Tag Manager Skimmers Deployed
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:40 GMT
════════════════════════
⌗ Tags: #google #money #ai #hacking #usa
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:40 GMT
════════════════════════
⌗ Tags: #google #money #ai #hacking #usa
Medium
🚨E-commerce Under Attack: Google Tag Manager Skimmers Deployed🚨
WIRE TOR — The Ethical Hacking Services
⤷ Title: Major Cyberattack Cripples Newspaper Operations Nationwide
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:36 GMT
════════════════════════
⌗ Tags: #malware #ai #dallas_lee_news #hacking #money
════════════════════════
𐀪 Author: WIRE TOR - The Ethical Hacking Services
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:25:36 GMT
════════════════════════
⌗ Tags: #malware #ai #dallas_lee_news #hacking #money
Medium
🚨Major Cyberattack Cripples Newspaper Operations Nationwide🚨
WIRE TOR — The Ethical Hacking Services
⤷ Title: Como Iniciar na Cibersegurança?
════════════════════════
𐀪 Author: Onerio Ramos
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:58:26 GMT
════════════════════════
⌗ Tags: #hacking #cibersegurança #hacks #cybersecurity #professional
════════════════════════
𐀪 Author: Onerio Ramos
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:58:26 GMT
════════════════════════
⌗ Tags: #hacking #cibersegurança #hacks #cybersecurity #professional
Medium
Como Iniciar na Cibersegurança?
A cibersegurança é uma das áreas mais promissoras da tecnologia, com uma demanda crescente por profissionais qualificados. Mas por onde…
⤷ Title: Building a Pwnagotchi with a Raspberry Pi Zero 2 W, Waveshare V4, and PiSugar2 Battery
════════════════════════
𐀪 Author: josegpac
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:53:49 GMT
════════════════════════
⌗ Tags: #projects #security #information_security #cybersecurity #information_technology
════════════════════════
𐀪 Author: josegpac
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:53:49 GMT
════════════════════════
⌗ Tags: #projects #security #information_security #cybersecurity #information_technology
Medium
Building a Pwnagotchi with a Raspberry Pi Zero 2 W, Waveshare V4, and PiSugar2 Battery
Pwnagotchi is an AI-driven tool designed for Wi-Fi security research. It passively listens for Wi-Fi handshakes.
⤷ Title: What’s the Difference Between DevOps and DevSecOps?
════════════════════════
𐀪 Author: Eugene Voskoley
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:45:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #software_development #devops #cloud_computing #devsecops
════════════════════════
𐀪 Author: Eugene Voskoley
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:45:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #software_development #devops #cloud_computing #devsecops
Medium
What’s the Difference Between DevOps and DevSecOps?
DevOps is a methodology aimed at fostering collaboration between programmers and system administrators who work closely together to develop…
⤷ Title: Privacy-Enhancing Technologies: Keeping Your Data Safe in a Digital World
════════════════════════
𐀪 Author: Anitha Ramaswamy
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:42:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_privacy #data_security #pets #digital
════════════════════════
𐀪 Author: Anitha Ramaswamy
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:42:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_privacy #data_security #pets #digital
Medium
Privacy-Enhancing Technologies: Keeping Your Data Safe in a Digital World
Protecting Personal Information While Using Data Effectively
⤷ Title: Cloud Computing
════════════════════════
𐀪 Author: Justice Humphrey Ugochukwu
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:21:15 GMT
════════════════════════
⌗ Tags: #cloud_computing #kubernetes #devops #cybersecurity #business
════════════════════════
𐀪 Author: Justice Humphrey Ugochukwu
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:21:15 GMT
════════════════════════
⌗ Tags: #cloud_computing #kubernetes #devops #cybersecurity #business
Medium
Cloud Computing
Shared Responsibility Model
⤷ Title: Bypass Really Simple Security: TryHackMe Walkthrough
════════════════════════
𐀪 Author: IAMnk
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:19:18 GMT
════════════════════════
⌗ Tags: #cyber #cybersecurity #tryhackme_walkthrough #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: IAMnk
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:19:18 GMT
════════════════════════
⌗ Tags: #cyber #cybersecurity #tryhackme_walkthrough #tryhackme_writeup #tryhackme
Medium
Bypass Really Simple Security: TryHackMe Walkthrough
CVE-2024–10924: When 2FA Fails at Its One Job
⤷ Title: Shiba Insider — Blue Team Lab
════════════════════════
𐀪 Author: Afrin Jahan
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:05:29 GMT
════════════════════════
⌗ Tags: #cybersecurity #blueteamlabs #blue_team
════════════════════════
𐀪 Author: Afrin Jahan
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:05:29 GMT
════════════════════════
⌗ Tags: #cybersecurity #blueteamlabs #blue_team
Medium
Shiba Insider — Blue Team Lab
To solve this lab you need to basic understand about Wireshark, Exiftool, Steghide.
⤷ Title: API1:2023 — Broken Object Level Authorization (BOLA) — PT-BR
════════════════════════
𐀪 Author: Tamy Angel
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:03:30 GMT
════════════════════════
⌗ Tags: #owasp #api #web #cybersecurity #technology
════════════════════════
𐀪 Author: Tamy Angel
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:03:30 GMT
════════════════════════
⌗ Tags: #owasp #api #web #cybersecurity #technology
Medium
API1:2023 — Broken Object Level Authorization (BOLA) — PT-BR
OWASP API top 10 na prática.
⤷ Title: SRUM (System Resource Usage Monitor) Nedir ve Nasıl Analiz Edilir ? Windows Adli Bilişim #6
════════════════════════
𐀪 Author: Emrecan Altıparmak
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:00:32 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #digital_forensics #windows #blue_team
════════════════════════
𐀪 Author: Emrecan Altıparmak
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 20:00:32 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #digital_forensics #windows #blue_team
Medium
SRUM (System Resource Usage Monitor) Nedir ve Nasıl Analiz Edilir ? Windows Adli Bilişim #6
SRUM (System Resource Usage Monitor) ve Adli Bilişimdeki Rolü
⤷ Title: Why Hackers Don’t Skip Small Businesses
════════════════════════
𐀪 Author: Mikhael Esterez
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:56:47 GMT
════════════════════════
⌗ Tags: #small_business #cybersecurity #ransomware #security #business
════════════════════════
𐀪 Author: Mikhael Esterez
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:56:47 GMT
════════════════════════
⌗ Tags: #small_business #cybersecurity #ransomware #security #business
Medium
Why Hackers Don’t Skip Small Businesses
“We’re too small — why would hackers be interested in us?”
⤷ Title: Include (CTF) — TryHackMe Writeup
════════════════════════
𐀪 Author: Muhammad Kahfi Darmawan
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:29:20 GMT
════════════════════════
⌗ Tags: #writeup #tryhackme_writeup #tryhackme #tryhackme_walkthrough #ctf
════════════════════════
𐀪 Author: Muhammad Kahfi Darmawan
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 19:29:20 GMT
════════════════════════
⌗ Tags: #writeup #tryhackme_writeup #tryhackme #tryhackme_walkthrough #ctf
Medium
Include (CTF) — TryHackMe Writeup
Use your server exploitation skills to take control of a web app.
⤷ Title: Understanding and Exploiting an Open Redirect Vulnerability in NVIDIA
════════════════════════
𐀪 Author: g0kb0ru
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:26:54 GMT
════════════════════════
⌗ Tags: #open_redirect #bug_bounty #bug_bounty_writeup #pentesting #bug_bounty_tips
════════════════════════
𐀪 Author: g0kb0ru
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:26:54 GMT
════════════════════════
⌗ Tags: #open_redirect #bug_bounty #bug_bounty_writeup #pentesting #bug_bounty_tips
Medium
Understanding and Exploiting an Open Redirect Vulnerability in NVIDIA
Introduction
⤷ Title: HTB Password Attacks Network Services — Medium
════════════════════════
𐀪 Author: HckaSamurai
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 22:38:13 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #hackthebox #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: HckaSamurai
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 22:38:13 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #hackthebox #cybersecurity #ethical_hacking
Medium
HTB Password Attacks Network Services — Medium
This is my first walkthrough, and I’ll do my best to keep it simple and clear. While working on the Network Services section of the…
⤷ Title: Encrypting Strings to Evade Static Detection
════════════════════════
𐀪 Author: S12 - H4CK
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 22:09:48 GMT
════════════════════════
⌗ Tags: #malware #pentesting #development #hacking #cybersecurity
════════════════════════
𐀪 Author: S12 - H4CK
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 22:09:48 GMT
════════════════════════
⌗ Tags: #malware #pentesting #development #hacking #cybersecurity
Medium
Encrypting Strings to Evade Static Detection
Welcome to this Medium post! Today, I’ll demonstrate a straightforward technique to bypass the malicious string detection mechanisms…
⤷ Title: HTB — Valentine (OSCP Prep)
════════════════════════
𐀪 Author: serkanbenol
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:17:30 GMT
════════════════════════
⌗ Tags: #hacking #hackthebox_writeup #cybersecurity #hackthebox #oscp
════════════════════════
𐀪 Author: serkanbenol
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:17:30 GMT
════════════════════════
⌗ Tags: #hacking #hackthebox_writeup #cybersecurity #hackthebox #oscp
Medium
HTB — Valentine (OSCP Prep)
“Some things cost more than you realize.”― Radiohead