⤷ Title: Security Obscurity-7.19_Hiding From Data Breaches
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:27:11 GMT
════════════════════════
⌗ Tags: #data_breach #obscurity #cybersecurity #information_security #security
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:27:11 GMT
════════════════════════
⌗ Tags: #data_breach #obscurity #cybersecurity #information_security #security
Medium
Security Obscurity-7.19_Hiding From Data Breaches
*Note: This article was originally published by the author on July 8, 2019. It is re-published here by the author for archival purposes…
⤷ Title: Higher Education Desperately Needs a Cybersecurity Wake-Up Call
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:25:35 GMT
════════════════════════
⌗ Tags: #information_security #higher_ed #cybersecurity #colleges_and_universities #cybersecurity_awareness
════════════════════════
𐀪 Author: z3r0trust
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:25:35 GMT
════════════════════════
⌗ Tags: #information_security #higher_ed #cybersecurity #colleges_and_universities #cybersecurity_awareness
Medium
Higher Education Desperately Needs a Cybersecurity Wake-Up Call
*Note: This article was originally published by the author on July 18, 2019. It is re-published here by the author for archival purposes…
⤷ Title: AI Algorithmic Red Teaming Tools, Resources, and Mindmap
════════════════════════
𐀪 Author: Omar Santos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:23:30 GMT
════════════════════════
⌗ Tags: #ai_tools #owasp #ai #ai_red_teaming #cybersecurity
════════════════════════
𐀪 Author: Omar Santos
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:23:30 GMT
════════════════════════
⌗ Tags: #ai_tools #owasp #ai #ai_red_teaming #cybersecurity
Medium
AI Algorithmic Red Teaming Tools, Resources, and Mindmap
This week I am presenting two sessions at Cisco Live EMEA:
⤷ Title: AWS Bucketware: Investigating an Attack on a Compromised Cloud Environment
════════════════════════
𐀪 Author: Alfredo Zablah
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:01:41 GMT
════════════════════════
⌗ Tags: #aws #cybersecurity #lets_defend #log_analysis #incident_response
════════════════════════
𐀪 Author: Alfredo Zablah
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 02:01:41 GMT
════════════════════════
⌗ Tags: #aws #cybersecurity #lets_defend #log_analysis #incident_response
Medium
AWS Bucketware: Investigating an Attack on a Compromised Cloud Environment
🔍 AWS Bucketware Attack: Investigating how attackers used compromised AWS credentials for persistence & data exfiltration. #CyberSecurity
⤷ Title: Business of Cybersecurity
════════════════════════
𐀪 Author: Tal Eliyahu
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 01:47:32 GMT
════════════════════════
⌗ Tags: #finance #stock_market #cybersecurity #economics #marketing
════════════════════════
𐀪 Author: Tal Eliyahu
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 01:47:32 GMT
════════════════════════
⌗ Tags: #finance #stock_market #cybersecurity #economics #marketing
Medium
Business of Cybersecurity
It all began as an attempt to capture cybersecurity stocks and their AI capabilities on Awesome Cybersecurity Stocks, and it evolved into…
⤷ Title: Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 10:02:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 10:02:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: $16 Million Ransomware Operation Shut Down: 8Base Masterminds Apprehended
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 03:53:22 +0000
════════════════════════
⌗ Tags: #Cyber Security #8Base ransomware #Operation Phobos Aetor #Phobos Aetor
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 03:53:22 +0000
════════════════════════
⌗ Tags: #Cyber Security #8Base ransomware #Operation Phobos Aetor #Phobos Aetor
Cybersecurity News
$16 Million Ransomware Operation Shut Down: 8Base Masterminds Apprehended
Discover the recent takedown of the 8Base ransomware syndicate by international law enforcement. Learn about their notorious history and the global impact of their activities.
⤷ Title: Google Chrome Tests AI-Driven Auto Password Change for Breached Accounts
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 03:31:31 +0000
════════════════════════
⌗ Tags: #Technology #Automated password change #chrome #Chrome Automated password change
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 03:31:31 +0000
════════════════════════
⌗ Tags: #Technology #Automated password change #chrome #Chrome Automated password change
Cybersecurity News
Google Chrome Tests AI-Driven Auto Password Change for Breached Accounts
Enhancing password security with Automated password change feature in Google Chrome. Learn how AI generates secure passwords and syncs them with Chrome's password manager.
⤷ Title: Google’s reCAPTCHA Fails to Stop Bots—But It’s Great at Harvesting Your Data
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 03:12:31 +0000
════════════════════════
⌗ Tags: #Data Leak #google #reCAPTCHA #reCAPTCHA v3
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 03:12:31 +0000
════════════════════════
⌗ Tags: #Data Leak #google #reCAPTCHA #reCAPTCHA v3
Cybersecurity News
Google’s reCAPTCHA Fails to Stop Bots—But It’s Great at Harvesting Your Data
The controversy surrounding reCAPTCHA Data. Explore how the system collects user information and its impact on privacy and user tracking.
⤷ Title: Easy $1000-$10000+ Bounty Using Wayback Machine
════════════════════════
𐀪 Author: Abhijeet kumawat
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:28:44 GMT
════════════════════════
⌗ Tags: #sensitive #bug_bounty #infosec #money #hacking
════════════════════════
𐀪 Author: Abhijeet kumawat
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:28:44 GMT
════════════════════════
⌗ Tags: #sensitive #bug_bounty #infosec #money #hacking
Medium
💵Easy $1000-$10000+ Bounty Using Wayback Machine
Bug bounty hunting is all about efficient recon and discovering overlooked vulnerabilities. One of the most underrated yet powerful tools…
⤷ Title: How CoinCollectExperts Recovered My BTC — A Life-Changing Experience
════════════════════════
𐀪 Author: Jamesgregory
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 03:43:52 GMT
════════════════════════
⌗ Tags: #recovery #recover_scammed_crypto #usd #recover_scammed_bitcoin #hacking
════════════════════════
𐀪 Author: Jamesgregory
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 03:43:52 GMT
════════════════════════
⌗ Tags: #recovery #recover_scammed_crypto #usd #recover_scammed_bitcoin #hacking
Medium
How CoinCollectExperts Recovered My BTC — A Life-Changing Experience
A few months ago, I faced one of the worst experiences of my life — I lost my Bitcoin in a scam. I had been saving for years, carefully investing in crypto, only to see it vanish in an instant. I…
⤷ Title: Thompson — TryHackMe
════════════════════════
𐀪 Author: cybersecuritywithme
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:56:24 GMT
════════════════════════
⌗ Tags: #tryhackme #thompson_tryhackme #tryhackme_walkthrough #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: cybersecuritywithme
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:56:24 GMT
════════════════════════
⌗ Tags: #tryhackme #thompson_tryhackme #tryhackme_walkthrough #cybersecurity #tryhackme_writeup
Medium
Thompson — TryHackMe
We have to find the user.txt and root.txt file.
⤷ Title: Agentic AI Predictive Analysis: Transforming Industries and Enhancing Cybersecurity
════════════════════════
𐀪 Author: Srinivas Chandupatla
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:54:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #llm #rnn #ai_agent #predictive_analytics
════════════════════════
𐀪 Author: Srinivas Chandupatla
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:54:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #llm #rnn #ai_agent #predictive_analytics
Medium
Agentic AI Predictive Analysis: Transforming Industries and Enhancing Cybersecurity
Agentic AI refers to autonomous systems capable of making decisions and taking actions without constant human intervention. These systems…
⤷ Title: How DeepSeek Cyber Defense Prevents Cyber Threats in 2025
════════════════════════
𐀪 Author: Cyber Security
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:53:43 GMT
════════════════════════
⌗ Tags: #data #internet #cybersecurity #security #deepseek
════════════════════════
𐀪 Author: Cyber Security
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:53:43 GMT
════════════════════════
⌗ Tags: #data #internet #cybersecurity #security #deepseek
Medium
How DeepSeek Cyber Defense Prevents Cyber Threats in 2025
DeepSeek Cyber Defense is at the forefront of innovation in the ever-evolving landscape of cybersecurity. As businesses, governments, and…
⤷ Title: AI-Powered Cyber threats: How Hackers are using AI for Cyber attacks
════════════════════════
𐀪 Author: Borderless CS
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:52:41 GMT
════════════════════════
⌗ Tags: #cyber_threat #cyberattack #cybersecurity #artificial_intelligence
════════════════════════
𐀪 Author: Borderless CS
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:52:41 GMT
════════════════════════
⌗ Tags: #cyber_threat #cyberattack #cybersecurity #artificial_intelligence
Medium
AI-Powered Cyber threats: How Hackers are using AI for Cyber attacks
Introduction of AI-Powered Cyber threats
⤷ Title: Unauthorized Access to the Uploads Directory in Web Applications
════════════════════════
𐀪 Author: Vikas Rai
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:52:03 GMT
════════════════════════
⌗ Tags: #security #web_development #penetration_testing #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Vikas Rai
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:52:03 GMT
════════════════════════
⌗ Tags: #security #web_development #penetration_testing #cybersecurity #ethical_hacking
Medium
Unauthorized Access to the Uploads Directory in Web Applications
Recently, I discovered a critical flaw in a web application that allowed unauthorized access to its uploads directory, exposing sensitive…
⤷ Title: Apple and Google Remove 20 Malicious Apps Infecting Users with Data-Stealing Malware!
════════════════════════
𐀪 Author: Rutuja Desai
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:35:46 GMT
════════════════════════
⌗ Tags: #google_play #app_store #data_breach #malwarealert #cybersecurity
════════════════════════
𐀪 Author: Rutuja Desai
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:35:46 GMT
════════════════════════
⌗ Tags: #google_play #app_store #data_breach #malwarealert #cybersecurity
Medium
Apple and Google Remove 20 Malicious Apps Infecting Users with Data-Stealing Malware!
Apple and Google have taken swift action to remove 20 malicious apps from their respective app stores after security researchers discovered…
⤷ Title: Best Solution to Avoid Phishing attacks in Chicago
════════════════════════
𐀪 Author: Cyber Bark LLC
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:31:41 GMT
════════════════════════
⌗ Tags: #usa #cyber_bark_llc #b2b #cybersecurity #phishing
════════════════════════
𐀪 Author: Cyber Bark LLC
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:31:41 GMT
════════════════════════
⌗ Tags: #usa #cyber_bark_llc #b2b #cybersecurity #phishing
Medium
Best Solution to Avoid Phishing attacks in Chicago
Today, one of the most hazardous cyber threats in businesses is a phishing attack. In such, employees or a person may fall into such traps…
⤷ Title: HTB Sherlock Writeup “Loggy”
════════════════════════
𐀪 Author: Joanbrea
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:20:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #malware_analysis #reverse_engineering #htb_writeup
════════════════════════
𐀪 Author: Joanbrea
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:20:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #malware_analysis #reverse_engineering #htb_writeup
Medium
Scenario
Writeup Loggy
⤷ Title: LFI to RCE, Web Exploitation - Watcher : TryHackMe Walkthrough
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:13:49 GMT
════════════════════════
⌗ Tags: #web_development #penetration_testing #cybersecurity #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:13:49 GMT
════════════════════════
⌗ Tags: #web_development #penetration_testing #cybersecurity #tryhackme #tryhackme_walkthrough
Medium
LFI to RCE, Web Exploitation - Watcher : TryHackMe Walkthrough - 210 points
Linux boot2root CTF! Explore Broken Object Level Authorization (BOLA), API3:2023 practicing Local File Inclusion (LFI), Remote Code…
⤷ Title: Elevating Security and Privacy with ServiceNow Vault
════════════════════════
𐀪 Author: Rachana Gupta
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:08:04 GMT
════════════════════════
⌗ Tags: #saas_security #servicenow #cybersecurity #saas #vault
════════════════════════
𐀪 Author: Rachana Gupta
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:08:04 GMT
════════════════════════
⌗ Tags: #saas_security #servicenow #cybersecurity #saas #vault
Medium
Elevating Security and Privacy with ServiceNow Vault
In today’s digital age, organizations increasingly rely on cloud platforms to manage workflows, store sensitive data, and drive efficiency…