⤷ Title: ECIH: Handling and Responding to Email Security Incidents
════════════════════════
𐀪 Author: Damian Villarreal
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:57:28 GMT
════════════════════════
⌗ Tags: #email #information_security #cybersecurity #information_technology #phishing
════════════════════════
𐀪 Author: Damian Villarreal
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:57:28 GMT
════════════════════════
⌗ Tags: #email #information_security #cybersecurity #information_technology #phishing
Medium
ECIH: Handling and Responding to Email Security Incidents
“ECIH: Handling and Responding to Email Security Incidents” is published by Damian Villarreal.
⤷ Title: NIS-2: Risikomanagement als strategischer Erfolgsfaktor
════════════════════════
𐀪 Author: Gereon Neuhaus
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:52:51 GMT
════════════════════════
⌗ Tags: #nis2 #risk_management #business_resilience #nis2_compliance #cybersecurity
════════════════════════
𐀪 Author: Gereon Neuhaus
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:52:51 GMT
════════════════════════
⌗ Tags: #nis2 #risk_management #business_resilience #nis2_compliance #cybersecurity
Medium
NIS-2: Risikomanagement als strategischer Erfolgsfaktor
Stell dir vor…
⤷ Title: Why KALI Linux?
════════════════════════
𐀪 Author: Martin Onyisi
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:47:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_science #programming #technology #data_engineering
════════════════════════
𐀪 Author: Martin Onyisi
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:47:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_science #programming #technology #data_engineering
Medium
Why KALI Linux?
The most used distro for Cybersecurity
⤷ Title: Inherent Vulnerabilities in AI Systems:
════════════════════════
𐀪 Author: Kai Aizen
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 22:08:34 GMT
════════════════════════
⌗ Tags: #llm #social_engineering #chatgpt #ai #penetration_testing
════════════════════════
𐀪 Author: Kai Aizen
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 22:08:34 GMT
════════════════════════
⌗ Tags: #llm #social_engineering #chatgpt #ai #penetration_testing
Medium
Inherent Vulnerabilities in AI Systems:
A Comprehensive Analysis of Contextual Inheritance, Adversarial Prompting, and Their Societal Implications
⤷ Title: TryHackMe — Smol (Writeup)
════════════════════════
𐀪 Author: ruruuu
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:25:24 GMT
════════════════════════
⌗ Tags: #ctf_writeup #tryhackme #tryhackme_walkthrough #cybersecurity #ctf
════════════════════════
𐀪 Author: ruruuu
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 21:25:24 GMT
════════════════════════
⌗ Tags: #ctf_writeup #tryhackme #tryhackme_walkthrough #cybersecurity #ctf
Medium
TryHackMe — Smol (Writeup)
Smol is a medium-difficulty box that presents a Wordpress website with a vulnerable plugin to an arbitrary file read, and a second plugin…
⤷ Title: The Hidden Business Logic Error That Exists On Most E-Commerce Web Application
════════════════════════
𐀪 Author: makarov
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 00:40:28 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #business_logic #bug_bounty #web_security
════════════════════════
𐀪 Author: makarov
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 00:40:28 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #business_logic #bug_bounty #web_security
Medium
The Hidden Business Logic Error That Exists On Most E-Commerce Web Applications
The subtle treasure
⤷ Title: The Hunt for the Xbox Hackers
════════════════════════
𐀪 Author: Friedrich R.
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 23:52:00 GMT
════════════════════════
⌗ Tags: #coding #data_science #programming #crime #hacking
════════════════════════
𐀪 Author: Friedrich R.
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 23:52:00 GMT
════════════════════════
⌗ Tags: #coding #data_science #programming #crime #hacking
Medium
The Hunt for the Xbox Hackers: A Digital Cat-and-Mouse Game
In the shadowy corners of the internet, where lines of code replace physical boundaries and anonymity is the ultimate currency, a high-stakes game of cat and mouse has been playing out for years…
⤷ Title: Are CSP Nonces Really Secure? A Deep Dive on .NET
════════════════════════
𐀪 Author: Stanislav Babenko
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 00:53:10 GMT
════════════════════════
⌗ Tags: #dot_net_training #dot_net_framework #dot_net_core #cybersecurity #dot_net_developers
════════════════════════
𐀪 Author: Stanislav Babenko
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 00:53:10 GMT
════════════════════════
⌗ Tags: #dot_net_training #dot_net_framework #dot_net_core #cybersecurity #dot_net_developers
Medium
Are CSP Nonces Really Secure? A Deep Dive
Introduction
⤷ Title: Networking Secure Protocols
════════════════════════
𐀪 Author: Demegorash
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 00:34:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #vpn #ssh #https
════════════════════════
𐀪 Author: Demegorash
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 00:34:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #vpn #ssh #https
Medium
Networking Secure Protocols
Learn how TLS, SSH, and VPN can secure your network traffic.
⤷ Title: Cybersecurity Roadmap 2025 For Navigating the Future of Digital Protection
════════════════════════
𐀪 Author: UniNets
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 00:29:05 GMT
════════════════════════
⌗ Tags: #cybersecurity #cybersecurity_training #cyber_security_awareness #cybersecurity_course
════════════════════════
𐀪 Author: UniNets
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 00:29:05 GMT
════════════════════════
⌗ Tags: #cybersecurity #cybersecurity_training #cyber_security_awareness #cybersecurity_course
Medium
Cybersecurity Roadmap 2025 For Navigating the Future of Digital Protection
As we approach 2025, the digital landscape continues to evolve at a rapid pace. With growing cyber threats and the increasing reliance on…
⤷ Title: Technical capability notice
════════════════════════
𐀪 Author: renaissance chambara
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 00:24:31 GMT
════════════════════════
⌗ Tags: #uk_politics #apple #cybersecurity
════════════════════════
𐀪 Author: renaissance chambara
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 00:24:31 GMT
════════════════════════
⌗ Tags: #uk_politics #apple #cybersecurity
Medium
Technical capability notice
The Washington Post alleged that the UK government had served a technical capability notice against Apple to provide global access
⤷ Title: AI vs. Child Online Predators: How ROOST Is Creating An Online Safe Haven For Kids
════════════════════════
𐀪 Author: Kelly Reeves
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 23:51:34 GMT
════════════════════════
⌗ Tags: #ai #technology #parenting #child_online_safety #cybersecurity
════════════════════════
𐀪 Author: Kelly Reeves
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 23:51:34 GMT
════════════════════════
⌗ Tags: #ai #technology #parenting #child_online_safety #cybersecurity
Medium
AI vs. Child Online Predators: How ROOST Is Creating An Online Safe Haven For Kids
As a cybersecurity professional and self-defense instructor, I’ve spent years teaching people how to protect themselves both online and…
⤷ Title: Hackers Use Google Tag Manager to Plant Skimmers on Magento Stores
════════════════════════
𐀪 Author: KBS
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 23:23:44 GMT
════════════════════════
⌗ Tags: #google_analytics #sql_injection #cybersecurity #vulnerability
════════════════════════
𐀪 Author: KBS
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 23:23:44 GMT
════════════════════════
⌗ Tags: #google_analytics #sql_injection #cybersecurity #vulnerability
Medium
Hackers Use Google Tag Manager to Plant Skimmers on Magento Stores
Magento-based online stores are in trouble again! This time, hackers are sneaking into a trusted marketing tool called Google Tag Manager…
⤷ Title: Why Threat Modeling is a Must for Every Developer
════════════════════════
𐀪 Author: Fahad Ali Shaikh
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 23:21:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #threat_modeling
════════════════════════
𐀪 Author: Fahad Ali Shaikh
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 23:21:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #threat_modeling
Medium
Why Threat Modeling is a Must for Every Developer
In today’s digital landscape, security isn’t just a checkbox , it’s an essential part of building reliable and resilient applications…
⤷ Title: Shortcuts
════════════════════════
𐀪 Author: phonescaler
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 11:21:01 GMT
════════════════════════
⌗ Tags: #tinder #python #frida #penetration_testing
════════════════════════
𐀪 Author: phonescaler
════════════════════════
ⴵ Time: Mon, 10 Feb 2025 11:21:01 GMT
════════════════════════
⌗ Tags: #tinder #python #frida #penetration_testing
Medium
Shortcuts
Shortcuts to the X678B Tutorial
⤷ Title: airgorah: A WiFi auditing software that can perform deauth attacks and passwords cracking
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:10:03 +0000
════════════════════════
⌗ Tags: #Ethical Hacking #Network Attacks #WiFi auditing
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:10:03 +0000
════════════════════════
⌗ Tags: #Ethical Hacking #Network Attacks #WiFi auditing
Penetration Testing Tools
airgorah: A WiFi auditing software that can perform deauth attacks and passwords cracking
Airgorah is a WiFi auditing software that can discover the clients connected to an access point, perform deauthentication attacks
⤷ Title: Open Firmware Reverse Analysis Konsole: binary analysis and modification platform
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:01:46 +0000
════════════════════════
⌗ Tags: #Reverse Engineering
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:01:46 +0000
════════════════════════
⌗ Tags: #Reverse Engineering
Penetration Testing Tools
Open Firmware Reverse Analysis Konsole: binary analysis and modification platform
Open Firmware Reverse Analysis (OFRAK) supports a range of embedded firmware file formats beyond userspace executables
⤷ Title: EscalateGPT: leverages the power of OpenAI to analyze AWS IAM misconfigurations
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 01:59:13 +0000
════════════════════════
⌗ Tags: #Web AppSec #AWS IAM misconfigurations #EscalateGPT
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 01:59:13 +0000
════════════════════════
⌗ Tags: #Web AppSec #AWS IAM misconfigurations #EscalateGPT
Penetration Testing Tools
EscalateGPT: leverages the power of OpenAI to analyze AWS IAM misconfigurations
EscalateGPT is a powerful Python tool that leverages the power of OpenAI to analyze AWS IAM misconfigurations.
⤷ Title: GitHub Enterprise SAML Bypass Flaw (CVE-2025-23369) Exposed – Technical Analysis and Exploit PoC
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:38:14 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2025_23369 #CVE_2025_23369 PoC #GitHub Enterprise
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:38:14 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2025_23369 #CVE_2025_23369 PoC #GitHub Enterprise
Cybersecurity News
GitHub Enterprise SAML Bypass Flaw (CVE-2025-23369) Exposed – Technical Analysis and Exploit PoC
Discover the details of the SAML authentication flaw in GitHub Enterprise (CVE-2025-23369) that allows attackers to bypass security measures.
⤷ Title: Multiple Security and Privacy Flaws Found in DeepSeek iOS App
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:36:17 +0000
════════════════════════
⌗ Tags: #Data Leak #Vulnerability #ByteDance #DeepSeek #DeepSeek Privacy Flaw #Privacy Flaw
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:36:17 +0000
════════════════════════
⌗ Tags: #Data Leak #Vulnerability #ByteDance #DeepSeek #DeepSeek Privacy Flaw #Privacy Flaw
Daily CyberSecurity
Multiple Security and Privacy Flaws Found in DeepSeek iOS App
Learn about the alarming security vulnerabilities found in the popular DeepSeek iOS app. Find out why several governments have banned its use.
⤷ Title: Alabama Man Pleads Guilty in Bitcoin Price Manipulation Scheme Involving Hacked SEC X Account
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:31:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #Bitcoin #SEC
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:31:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #Bitcoin #SEC
Cybersecurity News
Alabama Man Pleads Guilty in Bitcoin Price Manipulation Scheme Involving Hacked SEC X Account
Learn about the shocking hack of the SEC's X account and its impact on the cryptocurrency market. Find out the role of Eric Council Jr. in the fraudulent Bitcoin ETF announcement.