⤷ Title: Mitigating Software Supply Chain Vulnerabilities with Zero-Trust Dependencies
════════════════════════
𐀪 Author: James Davis
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:45:14 GMT
════════════════════════
⌗ Tags: #software_engineering #cybersecurity #software_development #software #security
════════════════════════
𐀪 Author: James Davis
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:45:14 GMT
════════════════════════
⌗ Tags: #software_engineering #cybersecurity #software_development #software #security
Medium
Mitigating Software Supply Chain Vulnerabilities with Zero-Trust Dependencies
This is a brief for the research paper “ZTDJava: Mitigating Software Supply Chain Vulnerabilities with Zero-Trust Dependencies”, published…
⤷ Title: Investigating Windows Logs
════════════════════════
𐀪 Author: Hritesh Tkr
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:42:56 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #cybercrime #blue_team
════════════════════════
𐀪 Author: Hritesh Tkr
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:42:56 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #cybercrime #blue_team
Medium
Investigating Windows Logs
Soon to be uplo
⤷ Title: Day 28: Bypassing GraphQL Introspection, Rate Limiting, and CSRF Defenses
════════════════════════
𐀪 Author: Agarwaldaksh
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:41:07 GMT
════════════════════════
⌗ Tags: #cybersecurity #red_team #ethical_hacking #web_security #graphql
════════════════════════
𐀪 Author: Agarwaldaksh
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:41:07 GMT
════════════════════════
⌗ Tags: #cybersecurity #red_team #ethical_hacking #web_security #graphql
Medium
Day 28: Bypassing GraphQL Introspection, Rate Limiting, and CSRF Defenses
“Attackers don’t break systems — they break assumptions.”
⤷ Title: 6 Types of Cyber Security You Should Know
════════════════════════
𐀪 Author: Ritik Yadav
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:41:02 GMT
════════════════════════
⌗ Tags: #types_of_cyber_security #cybersecurity #cybersecurity_awareness
════════════════════════
𐀪 Author: Ritik Yadav
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:41:02 GMT
════════════════════════
⌗ Tags: #types_of_cyber_security #cybersecurity #cybersecurity_awareness
Medium
6 Types of Cyber Security You Should Know
Do you know how many ways your data can be attacked online? From social media to cloud storage, cyber threats are everywhere. That’s why we…
⤷ Title: Cyber Security: A Beginner’s Guide for 2025
════════════════════════
𐀪 Author: Ritik Yadav
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:37:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberattack #cyber_security_awareness
════════════════════════
𐀪 Author: Ritik Yadav
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:37:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberattack #cyber_security_awareness
Medium
Cyber Security: A Beginner’s Guide for 2025
Have you ever clicked on a link and wondered if it’s safe? In today’s world, we are always online — browsing, shopping, studying, or…
⤷ Title: What Are Deepfakes? Intro to Deepfakes and How They Work
════════════════════════
𐀪 Author: Raphael Esezobor
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:35:08 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #deepfake_technology #cybersecurity #deepfakes #ai
════════════════════════
𐀪 Author: Raphael Esezobor
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:35:08 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #deepfake_technology #cybersecurity #deepfakes #ai
Medium
What Are Deepfakes? Intro to Deepfakes and How They Work
You shouldn’t believe everything you see on the internet. Due to advancements in artificial intelligence technology, anybody can create…
⤷ Title: Day 119 of 1000 – LiveGood 1000-Day Challenge
════════════════════════
𐀪 Author: LiveGood Js
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:30:59 GMT
════════════════════════
⌗ Tags: #typescript #cybersecurity #religion #data_engineering #bitcoin
════════════════════════
𐀪 Author: LiveGood Js
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:30:59 GMT
════════════════════════
⌗ Tags: #typescript #cybersecurity #religion #data_engineering #bitcoin
Medium
Day 119 of 1000 – LiveGood 1000-Day Challenge
Many people avoid supplements due to common myths and misconceptions. Let’s separate fact from fiction so you can make the best health choices! ✅ Fact: Many store-bought supplements contain fillers…
⤷ Title: US Warns of Hackers Targeting ICS/SCADA at Oil and Gas Organizations
════════════════════════
𐀪 Author: IT_Engineer
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:15:58 GMT
════════════════════════
⌗ Tags: #scada #oil_and_gas_industry #critical_infrastructure #cybersecurity #hacker
════════════════════════
𐀪 Author: IT_Engineer
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:15:58 GMT
════════════════════════
⌗ Tags: #scada #oil_and_gas_industry #critical_infrastructure #cybersecurity #hacker
Medium
US Warns of Hackers Targeting ICS/SCADA at Oil and Gas Organizations
A stark warning has been issued by US cybersecurity agencies: malicious actors are actively targeting the Industrial Control Systems (ICS)…
⤷ Title: Tool Deep Dives: Using Metasploit for Penetration Testing
════════════════════════
𐀪 Author: Cyber Sec Pro
════════════════════════
ⴵ Time: Wed, 07 May 2025 14:31:46 GMT
════════════════════════
⌗ Tags: #metasploit #tools #ethical_hacking #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Cyber Sec Pro
════════════════════════
ⴵ Time: Wed, 07 May 2025 14:31:46 GMT
════════════════════════
⌗ Tags: #metasploit #tools #ethical_hacking #penetration_testing #cybersecurity
Medium
Tool Deep Dives: Using Metasploit for Penetration Testing
Introduction
⤷ Title: In future wars, the first missile won’t fly-it will be coded.
════════════════════════
𐀪 Author: Rathinavel M.S
════════════════════════
ⴵ Time: Wed, 07 May 2025 14:17:52 GMT
════════════════════════
⌗ Tags: #after_12th #digital_defense #career_in_tech #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Rathinavel M.S
════════════════════════
ⴵ Time: Wed, 07 May 2025 14:17:52 GMT
════════════════════════
⌗ Tags: #after_12th #digital_defense #career_in_tech #cybersecurity #ethical_hacking
Medium
In future wars, the first missile won’t fly-it will be coded.
How to become an 𝗘𝘁𝗵𝗶𝗰𝗮𝗹 𝗛𝗮𝗰𝗸𝗲𝗿 like the cyber warriors in digital battles? 💻🛡️
⤷ Title: SQL Injection PortSwigger Lab-3
════════════════════════
𐀪 Author: Şamil Alpay
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:01:03 GMT
════════════════════════
⌗ Tags: #portswigger #sql_injection
════════════════════════
𐀪 Author: Şamil Alpay
════════════════════════
ⴵ Time: Wed, 07 May 2025 15:01:03 GMT
════════════════════════
⌗ Tags: #portswigger #sql_injection
Medium
SQL Injection PortSwigger Lab-3
SQL injection attack, querying the database type and version on Oracle
⤷ Title: SQL Injection Explained: How to Avoid the Classic Mistake
════════════════════════
𐀪 Author: Muhammad Umar Hanif
════════════════════════
ⴵ Time: Wed, 07 May 2025 14:53:58 GMT
════════════════════════
⌗ Tags: #data_science #data_analytics #programming #dbms #sql_injection
════════════════════════
𐀪 Author: Muhammad Umar Hanif
════════════════════════
ⴵ Time: Wed, 07 May 2025 14:53:58 GMT
════════════════════════
⌗ Tags: #data_science #data_analytics #programming #dbms #sql_injection
Medium
SQL Injection Explained: How to Avoid the Classic Mistake
Despite being one of the oldest and most well-known security vulnerabilities, SQL injection (SQLi) continues to compromise applications…
⤷ Title: ClickFunnels Investigates Breach After Hackers Leak Business Data
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Wed, 07 May 2025 17:04:18 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attacks #BreachForums #ClickFunnels #Cyber Attack #Cybersecurity #data breach #LEAKS #Satanic #Telegram
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Wed, 07 May 2025 17:04:18 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attacks #BreachForums #ClickFunnels #Cyber Attack #Cybersecurity #data breach #LEAKS #Satanic #Telegram
Hackread
ClickFunnels Investigates Breach After Hackers Leak Business Data
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Deathnote | Vulnweb | CTF
════════════════════════
𐀪 Author: neerajjayesh
════════════════════════
ⴵ Time: Wed, 07 May 2025 17:40:23 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #ctf_walkthrough #hacking #cybersecurity
════════════════════════
𐀪 Author: neerajjayesh
════════════════════════
ⴵ Time: Wed, 07 May 2025 17:40:23 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #ctf_walkthrough #hacking #cybersecurity
Medium
Deathnote | Vulnweb | CTF
This CTF room is based on the Japanese anime/manga series called “Deathnote”. One of the best psychological thriller and mystery anime…
⤷ Title: The Fall of Knights of Old: A Shattered Legacy
════════════════════════
𐀪 Author: O. J. Okpabi
════════════════════════
ⴵ Time: Wed, 07 May 2025 17:36:24 GMT
════════════════════════
⌗ Tags: #business #cybersecurity #hacking #technology #true_crime
════════════════════════
𐀪 Author: O. J. Okpabi
════════════════════════
ⴵ Time: Wed, 07 May 2025 17:36:24 GMT
════════════════════════
⌗ Tags: #business #cybersecurity #hacking #technology #true_crime
Medium
The Fall of Knights of Old: A Shattered Legacy
The Cyber Hit That Crushed a Century-Old Haulage Empire
⤷ Title: The Yale Health Hack: A Dangerous Cyber Breach
════════════════════════
𐀪 Author: O. J. Okpabi
════════════════════════
ⴵ Time: Wed, 07 May 2025 17:34:52 GMT
════════════════════════
⌗ Tags: #true_crime #cybersecurity #technology #health #hacking
════════════════════════
𐀪 Author: O. J. Okpabi
════════════════════════
ⴵ Time: Wed, 07 May 2025 17:34:52 GMT
════════════════════════
⌗ Tags: #true_crime #cybersecurity #technology #health #hacking
Medium
The Yale Health Hack: A Dangerous Cyber Breach
The 2024 Exposure Of Hundreds Of Thousands And Digital Scars Across America.
⤷ Title: Vault Proving Ground Walk-Through
════════════════════════
𐀪 Author: Muhammed Aktepe
════════════════════════
ⴵ Time: Wed, 07 May 2025 17:21:38 GMT
════════════════════════
⌗ Tags: #provinggrounds #walkthrough #writeup #hacking
════════════════════════
𐀪 Author: Muhammed Aktepe
════════════════════════
ⴵ Time: Wed, 07 May 2025 17:21:38 GMT
════════════════════════
⌗ Tags: #provinggrounds #walkthrough #writeup #hacking
Medium
Vault Proving Ground Walk-Through
Hello friend I demonstrate how to capture ntlmv2 hash via url file attack and abusing writedacl right over domain group policy, leading…
⤷ Title: Data Exfiltration | Tips | Consult Hacker
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Wed, 07 May 2025 16:08:37 GMT
════════════════════════
⌗ Tags: #money #tech #artificial_intelligence #cybersecurity #hacking
════════════════════════
𐀪 Author: BlackHat
════════════════════════
ⴵ Time: Wed, 07 May 2025 16:08:37 GMT
════════════════════════
⌗ Tags: #money #tech #artificial_intelligence #cybersecurity #hacking
Medium
Data Exfiltration | Tips | Consult Hacker
Data exfiltration refers to the unauthorized transfer of data from a computer or network. It involves the extraction and movement of sensitive or confidential information to a location controlled by…
⤷ Title: Threadless Code Injection: Abusing Windows Fibers for Stealthy In-Memory Execution
════════════════════════
𐀪 Author: Maxwell Cross
════════════════════════
ⴵ Time: Wed, 07 May 2025 16:02:37 GMT
════════════════════════
⌗ Tags: #rust #programming #windows #hacking #infosec
════════════════════════
𐀪 Author: Maxwell Cross
════════════════════════
ⴵ Time: Wed, 07 May 2025 16:02:37 GMT
════════════════════════
⌗ Tags: #rust #programming #windows #hacking #infosec
Medium
Threadless Code Injection: Abusing Windows Fibers for Stealthy In-Memory Execution
In the realm of Windows post-exploitation, attackers continually seek ways to run malicious code stealthily. Windows fibers present a…
⤷ Title: The Intersection of AI and IoMT: Benefits, Threats, and the Future of Healthcare Cybersecurity
════════════════════════
𐀪 Author: Murali Ravi Narayan
════════════════════════
ⴵ Time: Wed, 07 May 2025 16:52:33 GMT
════════════════════════
⌗ Tags: #infosec #ai #cybersecurity #iomt #healthcare
════════════════════════
𐀪 Author: Murali Ravi Narayan
════════════════════════
ⴵ Time: Wed, 07 May 2025 16:52:33 GMT
════════════════════════
⌗ Tags: #infosec #ai #cybersecurity #iomt #healthcare
Medium
The Intersection of AI and IoMT: Benefits, Threats, and the Future of Healthcare Cybersecurity
Introduction
⤷ Title: The Growing Threat of Ransomware-as-a-Service (RaaS): How Cybercriminals Are Industrializing…
════════════════════════
𐀪 Author: Murali Ravi Narayan
════════════════════════
ⴵ Time: Wed, 07 May 2025 16:45:24 GMT
════════════════════════
⌗ Tags: #infosec #ransomware #ai #cyberterrorism #cybersecurity
════════════════════════
𐀪 Author: Murali Ravi Narayan
════════════════════════
ⴵ Time: Wed, 07 May 2025 16:45:24 GMT
════════════════════════
⌗ Tags: #infosec #ransomware #ai #cyberterrorism #cybersecurity
Medium
The Growing Threat of Ransomware-as-a-Service (RaaS): How Cybercriminals Are Industrializing Extortion
Introduction