⤷ Title: सोशल मीडिया पर फूहड़तापन समय रैना और रणवीर इलाहाबादिया
════════════════════════
𐀪 Author: Ravish yadav
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:21:23 GMT
════════════════════════
⌗ Tags: #medium #psychology #justice #cybersecurity #deep_learning
════════════════════════
𐀪 Author: Ravish yadav
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:21:23 GMT
════════════════════════
⌗ Tags: #medium #psychology #justice #cybersecurity #deep_learning
Medium
सोशल मीडिया पर फूहड़तापन समय रैना और रणवीर इलाहाबादिया
समय रैना और रणवीर इलाहाबादिया के शो इंडियाज गॉट लेटेंट पर अश्लील भाषा और बेहूदा कंटेंट को लेकर विवाद खड़ा हो चुका है। इन दोनों पर आईपीसी की धारा 294 और आईटी एक्ट की धारा 67 के तहत एफआईआर दर्ज की गई…
⤷ Title: The “Exam: 312–50 CEHv12-Certified Ethical Hacker: +1000 Exam Practice Questions with Detailed…
════════════════════════
𐀪 Author: james William
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:10 GMT
════════════════════════
⌗ Tags: #education #cybersecurity
════════════════════════
𐀪 Author: james William
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:10 GMT
════════════════════════
⌗ Tags: #education #cybersecurity
Medium
The “Exam: 312–50 CEHv12-Certified Ethical Hacker: +1000 Exam Practice Questions with Detailed…
cybersecurity, Ethical hacker
⤷ Title: How to Prevent HTTP Parameter Pollution in Laravel: Best Practices & Code Examples
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:00:34 GMT
════════════════════════
⌗ Tags: #cybersecurity #laravel #http_parameter_pollution #penetration_testing #vulnerability
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:00:34 GMT
════════════════════════
⌗ Tags: #cybersecurity #laravel #http_parameter_pollution #penetration_testing #vulnerability
Medium
How to Prevent HTTP Parameter Pollution in Laravel: Best Practices & Code Examples
Introduction
⤷ Title: HTTP in detail — TryHackMe
════════════════════════
𐀪 Author: Avinash Nirmalkar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:23:30 GMT
════════════════════════
⌗ Tags: #networking #tryhackme #cybersecurity #tryhackme_walkthrough
════════════════════════
𐀪 Author: Avinash Nirmalkar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:23:30 GMT
════════════════════════
⌗ Tags: #networking #tryhackme #cybersecurity #tryhackme_walkthrough
Medium
HTTP in detail — TryHackMe
The internet is a vast and complex world, but at its heart lies a simple yet powerful language: HTTP. It’s the secret handshake between…
⤷ Title: 8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 12:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 12:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Gcore Radar report reveals 56% year-on-year increase in DDoS attacks
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:00:28 +0000
════════════════════════
⌗ Tags: #Press Release #Breach and Attack #Report #Research
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:00:28 +0000
════════════════════════
⌗ Tags: #Press Release #Breach and Attack #Report #Research
Hackread - Latest Cybersecurity, Tech, Crypto & Hacking News
Gcore Radar report reveals 56% year-on-year increase in DDoS attacks
Luxembourg, Luxembourg, 11th February 2025, CyberNewsWire
⤷ Title: SAP Security Patch Day February 2025: Multi Vulnerabilities Addressed
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:33:52 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2024_38819 #CVE_2024_38820 #CVE_2024_38828 #CVE_2025_0064 #CVE_2025_24876 #CVE_2025_25243 #SAP Security Patch Day
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:33:52 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2024_38819 #CVE_2024_38820 #CVE_2024_38828 #CVE_2025_0064 #CVE_2025_24876 #CVE_2025_25243 #SAP Security Patch Day
Cybersecurity News
SAP Security Patch Day February 2025: Multi Vulnerabilities Addressed
Discover the critical security vulnerabilities addressed in the latest SAP Patch Day. Take action to protect your SAP systems from CVE-2025-0064 and other high-severity flaws.
⤷ Title: Robust Open Online Safety Tools (ROOST): Tech Giants Unite to Build AI-Era Security Infrastructure
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:23:38 +0000
════════════════════════
⌗ Tags: #Technology #Discord #google #OpenAI #Roblox #Robust Open Online Safety Tools #ROOST
════════════════════════
𐀪 Author: do son
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:23:38 +0000
════════════════════════
⌗ Tags: #Technology #Discord #google #OpenAI #Roblox #Robust Open Online Safety Tools #ROOST
Cybersecurity News
Robust Open Online Safety Tools (ROOST): Tech Giants Unite to Build AI-Era Security Infrastructure
Learn about ROOST, the non-profit organization formed by Roblox, Discord, OpenAI, and Google to develop advanced open-source security tools for a safer online environment, particularly for children.
⤷ Title: HTB: Preignition Walkthrough
════════════════════════
𐀪 Author: Araiz Naqvi
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:09:52 GMT
════════════════════════
⌗ Tags: #pentesting #cybersecurity #hackthebox #ethical_hacking #hacking
════════════════════════
𐀪 Author: Araiz Naqvi
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:09:52 GMT
════════════════════════
⌗ Tags: #pentesting #cybersecurity #hackthebox #ethical_hacking #hacking
Medium
HTB: Preignition Walkthrough
Prepared By Araiz Naqvi. In case you’re not able to view the entire writeup, visit my personal blog here to view it fully.
⤷ Title: Exploiting UART to Gain Shell Access on a Security Camera
════════════════════════
𐀪 Author: Horrow
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:16:32 GMT
════════════════════════
⌗ Tags: #hardware #cybersecurity #uart #hardware_hacking #hacking
════════════════════════
𐀪 Author: Horrow
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:16:32 GMT
════════════════════════
⌗ Tags: #hardware #cybersecurity #uart #hardware_hacking #hacking
Medium
Exploiting UART to Gain Shell Access on a Security Camera
Serial communication interfaces like UART (Universal Asynchronous Receiver-Transmitter) are often overlooked attack surfaces in embedded…
⤷ Title: HackTheBox Spookifier Writeup | SSTI Exploit Explained
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:16:08 GMT
════════════════════════
⌗ Tags: #hackthebox #cybersecurity #hackthebox_writeup #hacking #infosec
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:16:08 GMT
════════════════════════
⌗ Tags: #hackthebox #cybersecurity #hackthebox_writeup #hacking #infosec
Medium
HackTheBox Spookifier Writeup | SSTI Exploit Explained
Introduction
⤷ Title: Securing the Future: A&Q’s Hybrid Network Transition
════════════════════════
𐀪 Author: Joanorifha
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:27:51 GMT
════════════════════════
⌗ Tags: #network_security #cybersecurity #network
════════════════════════
𐀪 Author: Joanorifha
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:27:51 GMT
════════════════════════
⌗ Tags: #network_security #cybersecurity #network
Medium
Securing the Future: A&Q’s Hybrid Network Transition
As the world increasingly becomes a global marketplace, many organizations are transitioning from on-premise systems to the cloud. The need…
⤷ Title: Beware of IDN homograph attacks: A Deceptive trick that can trap you
════════════════════════
𐀪 Author: zen8labs
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:25:27 GMT
════════════════════════
⌗ Tags: #idn #cybersecurity #idn_homograph #it_consulting #zen8labs
════════════════════════
𐀪 Author: zen8labs
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:25:27 GMT
════════════════════════
⌗ Tags: #idn #cybersecurity #idn_homograph #it_consulting #zen8labs
Medium
Beware of IDN homograph attacks: A Deceptive trick that can trap you
Do you know what an IDN is or how it can attack your data? Here is the chance to understand IDNs in greater detail
⤷ Title: Simulation and Testing of Autonomous Cybersecurity Systems: Methodologies for Simulating…
════════════════════════
𐀪 Author: Anahita Tasdighi
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:16:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #python #technology #space #javascript
════════════════════════
𐀪 Author: Anahita Tasdighi
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:16:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #python #technology #space #javascript
Medium
Simulation and Testing of Autonomous Cybersecurity Systems: Methodologies for Simulating…
Simulation and Testing of Autonomous Cybersecurity Systems: Methodologies for Simulating Cyber-Attacks in Space to Test Effectiveness and Human Interactions
⤷ Title: Cyber threats are constantly evolving, making it essential for organizations to proactively test…
════════════════════════
𐀪 Author: Keployio
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:18:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #keploy #testing #test
════════════════════════
𐀪 Author: Keployio
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:18:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #keploy #testing #test
Medium
Cyber threats are constantly evolving, making it essential for organizations to proactively test…
What is Penetration Testing?
⤷ Title: How VAPT Enhances Mobile App Security: A Guide for Business Owners
════════════════════════
𐀪 Author: West Advanced Technologies Inc
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:22:59 GMT
════════════════════════
⌗ Tags: #information_security #penetration_testing #vapt_services #pentesting #mobile_app_security
════════════════════════
𐀪 Author: West Advanced Technologies Inc
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:22:59 GMT
════════════════════════
⌗ Tags: #information_security #penetration_testing #vapt_services #pentesting #mobile_app_security
Medium
How VAPT Enhances Mobile App Security: A Guide for Business Owners
As mobile applications become essential to businesses and user engagement, they also pose significant security risks. Vulnerability…
⤷ Title: Agent Sudo - TryHackMe Writeup
════════════════════════
𐀪 Author: Sondip Roy
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:07:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #privilege_escalation #ctf_walkthrough #ctf_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: Sondip Roy
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:07:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #privilege_escalation #ctf_walkthrough #ctf_writeup #tryhackme_walkthrough
Medium
Agent Sudo - TryHackMe Writeup
Hello, cyber enthusiasts! Today, we embark on an exhilarating journey through Agent Sudo, an easy-rated TryHackMe room. Imagine being…
⤷ Title: Complete Beginner-Web Hacking Fundamentals-OWASP Top 10–2021-TryHackMe
════════════════════════
𐀪 Author: thomazs06
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:08:41 GMT
════════════════════════
⌗ Tags: #tryhackme #cyber_security_risks #complete_beginner #web_vulnerabilities #owasp_top_10
════════════════════════
𐀪 Author: thomazs06
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 08:08:41 GMT
════════════════════════
⌗ Tags: #tryhackme #cyber_security_risks #complete_beginner #web_vulnerabilities #owasp_top_10
Medium
Complete Beginner-Web Hacking Fundamentals-OWASP Top 10–2021-TryHackMe
Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.
⤷ Title: Hire a Hacker to Recover an Account
════════════════════════
𐀪 Author: Hire a Hacker (Hubert Rally)
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:37:48 GMT
════════════════════════
⌗ Tags: #account_recovery #hire_a_hacker #recovery_service #ethical_hacking
════════════════════════
𐀪 Author: Hire a Hacker (Hubert Rally)
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:37:48 GMT
════════════════════════
⌗ Tags: #account_recovery #hire_a_hacker #recovery_service #ethical_hacking
Medium
Hire a Hacker to Recover an Account
Hire a hacker to recover an account and regain access quickly. Learn about ethical hacking, recovery steps, and protect your account.
⤷ Title: Certified Ethical Hacker V12: A Comprehensive Guide to Ethical Hacking
════════════════════════
𐀪 Author: Certocean
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:37:27 GMT
════════════════════════
⌗ Tags: #ethical_hacking_training #ceh_certification #ethical_hacking #ceh_training
════════════════════════
𐀪 Author: Certocean
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:37:27 GMT
════════════════════════
⌗ Tags: #ethical_hacking_training #ceh_certification #ethical_hacking #ceh_training
Medium
Certified Ethical Hacker V12: A Comprehensive Guide to Ethical Hacking
Great is the pursuit of careers while the demand for cybersecurity experts has never been higher. Amongst the most well-known are the…
⤷ Title: Ethical Hacking: The Art of Securing the Digital World
════════════════════════
𐀪 Author: Srimanthaakila
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:06:39 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Srimanthaakila
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 07:06:39 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
Ethical Hacking: The Art of Securing the Digital World
Ethical Hacking