⤷ Title: Tanzania’s Blackout: Internet Shutdown Coincides with Violence and Disputed Election
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:08:30 +0000
════════════════════════
⌗ Tags: #Technology #Censorship #elections #free speech #internet shutdown #NetBlocks #political unrest #Samia Suluhu Hassan #Tanzania
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:08:30 +0000
════════════════════════
⌗ Tags: #Technology #Censorship #elections #free speech #internet shutdown #NetBlocks #political unrest #Samia Suluhu Hassan #Tanzania
Penetration Testing Tools
Tanzania's Blackout: Internet Shutdown Coincides with Violence and Disputed Election
Tanzania cut its internet for five days during disputed elections marked by mass protests and violence. Connectivity is restored, but social media remains restricted.
⤷ Title: Critical Flaws in Microsoft Teams Let Hackers Impersonate CEOs and Edit Messages Undetected
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:03:38 +0000
════════════════════════
⌗ Tags: #Vulnerability #Check Point #corporate messenger #CVE_2024_38197 #Impersonation #Microsoft Teams #Social Engineering #vulnerabilities
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:03:38 +0000
════════════════════════
⌗ Tags: #Vulnerability #Check Point #corporate messenger #CVE_2024_38197 #Impersonation #Microsoft Teams #Social Engineering #vulnerabilities
Penetration Testing Tools
Critical Flaws in Microsoft Teams Let Hackers Impersonate CEOs and Edit Messages Undetected
Four critical Microsoft Teams flaws allowed attackers to impersonate executives, spoof calls, and secretly alter messages, turning trust into a new target.
⤷ Title: Botnet Beats Big Tech: Aisuru Overtakes Google in Cloudflare’s Popularity Ranking
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:01:33 +0000
════════════════════════
⌗ Tags: #Malware #AISURU #BOTNET #Cloudflare #cybercrime #DDoS #DNS Attack #domain ranking #IoT #network security
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:01:33 +0000
════════════════════════
⌗ Tags: #Malware #AISURU #BOTNET #Cloudflare #cybercrime #DDoS #DNS Attack #domain ranking #IoT #network security
Penetration Testing Tools
Botnet Beats Big Tech: Aisuru Overtakes Google in Cloudflare's Popularity Ranking
The Aisuru botnet, built from compromised IoT devices, unexpectedly topped Cloudflare's domain ranking, exploiting a flaw to launch a DNS-layer attack.
⤷ Title: Snapchat’s ‘My AI’ Gets a Brain: $400M Deal Integrates Perplexity’s Advanced Search
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:12:35 +0000
════════════════════════
⌗ Tags: #Technology #AI Search #artificial intelligence #chatbot #My AI #Partnership #Perplexity #Snap #Snapchat #Tech News
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:12:35 +0000
════════════════════════
⌗ Tags: #Technology #AI Search #artificial intelligence #chatbot #My AI #Partnership #Perplexity #Snap #Snapchat #Tech News
Daily CyberSecurity
Snapchat's 'My AI' Gets a Brain: $400M Deal Integrates Perplexity's Advanced Search
Snap partners with AI search startup Perplexity in a $400M deal to integrate advanced search into the Snapchat chatbot "My AI," enhancing Q&A capabilities.
⤷ Title: Steam Store Gets a Massive Redesign: Wider Pages, New Trailer View, and Hi-Res Images
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:09:17 +0000
════════════════════════
⌗ Tags: #Technology #gaming #PC Gaming #platform overhaul #Redesign #Steam #Steam Store #update #User Experience #Valve
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:09:17 +0000
════════════════════════
⌗ Tags: #Technology #gaming #PC Gaming #platform overhaul #Redesign #Steam #Steam Store #update #User Experience #Valve
Daily CyberSecurity
Steam Store Gets a Massive Redesign: Wider Pages, New Trailer View, and Hi-Res Images
Valve rolls out a major redesign of the Steam Store pages to all users, introducing a wider 1200px layout, "Theater Mode" for trailers, and higher-resolution images.
⤷ Title: Warren Report Exposes Tech Tax Breaks: Enough to Fund Healthcare for Millions
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:04:52 +0000
════════════════════════
⌗ Tags: #Technology #ACA #Alphabet #Amazon #Elizabeth Warren #google #Medicaid #Microsoft #political economy #Republican bill #Snap #social welfare #tax breaks
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:04:52 +0000
════════════════════════
⌗ Tags: #Technology #ACA #Alphabet #Amazon #Elizabeth Warren #google #Medicaid #Microsoft #political economy #Republican bill #Snap #social welfare #tax breaks
Daily CyberSecurity
Warren Report Exposes Tech Tax Breaks: Enough to Fund Healthcare for Millions
Sen. Warren's report blasts Republican tax breaks for tech giants, showing Microsoft, Amazon, and Alphabet's savings could fund food or healthcare for millions of families.
⤷ Title: Denmark Moves to Ban Social Media for Under-15s in World-Leading Digital Crackdown
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:48:22 +0000
════════════════════════
⌗ Tags: #Technology #age restriction #Age Verification #Denmark #digital regulation #government intervention #social media ban #Youth Protection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:48:22 +0000
════════════════════════
⌗ Tags: #Technology #age restriction #Age Verification #Denmark #digital regulation #government intervention #social media ban #Youth Protection
Daily CyberSecurity
Denmark Moves to Ban Social Media for Under-15s in World-Leading Digital Crackdown
Denmark plans to introduce legislation banning social media use for those under 15—one of the world's strictest measures—sparking debate over enforcement and privacy.
⤷ Title: LFI to RCE: Mastering the Step-by-Step Path from File Inclusion to Full Shell Access
════════════════════════
𐀪 Author: Very Lazy Tech
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:58:07 GMT
════════════════════════
⌗ Tags: #hacking #penetration_testing #bug_bounty #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Very Lazy Tech
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:58:07 GMT
════════════════════════
⌗ Tags: #hacking #penetration_testing #bug_bounty #cybersecurity #ethical_hacking
Medium
LFI to RCE: Mastering the Step-by-Step Path from File Inclusion to Full Shell Access
✨ Link for the full article in the first comment
⤷ Title: My Cybersecurity Journey — day 1–11/8/25
════════════════════════
𐀪 Author: Cliffetond
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:14:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Cliffetond
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:14:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty
Medium
My Cybersecurity Journey — day 1–11/8/25
This isn’t actually day 1 of my cybersecurity journey. I’ve been at it for a few years now.
⤷ Title: OWASP Top 10 (2025): What Changed — the Front Row Story, the Impact, and Practice Labs
════════════════════════
𐀪 Author: Atharva Shirude
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:12:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #owasp_top_10 #application_security #appsec #owasp_top_10_2025
════════════════════════
𐀪 Author: Atharva Shirude
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:12:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #owasp_top_10 #application_security #appsec #owasp_top_10_2025
Medium
OWASP Top 10 (2025): What Changed — the Front Row Story, the Impact, and Practice Labs
I still remember the moment vividly. The room at AppSec went quiet, the projector lit up: “Introducing the OWASP Top 10 for 2025.” The…
⤷ Title: ️ Meet Aardvark — OpenAI’s Agentic Security Researcher That Might Redefine Cyber Defense Forever
════════════════════════
𐀪 Author: Kumar Ankit
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:41:42 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #hacking #cybersecurity #futuristic_technologies #ai_research
════════════════════════
𐀪 Author: Kumar Ankit
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:41:42 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #hacking #cybersecurity #futuristic_technologies #ai_research
Medium
🛡️ Meet Aardvark — OpenAI’s Agentic Security Researcher That Might Redefine Cyber Defense Forever
🚀 The Dawn of a New Kind of Security Researcher
⤷ Title: Top 10 AI-Driven Cybersecurity Tools
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:39:50 GMT
════════════════════════
⌗ Tags: #cyberattack #cyber_security_awareness #ai #cybersecurity #hacking
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:39:50 GMT
════════════════════════
⌗ Tags: #cyberattack #cyber_security_awareness #ai #cybersecurity #hacking
Medium
Top 10 AI-Driven Cybersecurity Tools
Introduction: Top 10 AI-Driven Cybersecurity Tools
⤷ Title: How a File-Manager Link Could Be Your Biggest Cyber Security Threat
════════════════════════
𐀪 Author: Syed Muhammad Hatim Javaid
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:30:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #links #ethical_hacking #hacking
════════════════════════
𐀪 Author: Syed Muhammad Hatim Javaid
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:30:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #links #ethical_hacking #hacking
Medium
How a File-Manager Link Could Be Your Biggest Cyber Security Threat
In every organization, file-managers are used for convenience — sharing documents, collaborating, granting access. But what happens when…
⤷ Title: AI Prompt Injection Attack – A Technical Deep Dive into the Emerging AI Security Frontier
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:12:15 GMT
════════════════════════
⌗ Tags: #ai #cybersecurity #hacking #cybercrime #artificial_intelligence
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:12:15 GMT
════════════════════════
⌗ Tags: #ai #cybersecurity #hacking #cybercrime #artificial_intelligence
Medium
AI Prompt Injection Attack – A Technical Deep Dive into the Emerging AI Security Frontier
AI Prompt Injection Attack – A Technical Deep Dive into the Emerging AI Security Frontier As AI systems evolve from passive information retrieval tools to autonomous agents capable of browsing the …
⤷ Title: Metasploitable 3 (Windows) Write-up — Part [III]: Port 80 — CVE-2015–1635 & FTP Upload Exploitation
════════════════════════
𐀪 Author: Kalash Kundaliya
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:11:21 GMT
════════════════════════
⌗ Tags: #linux #cybersecurity #metasploitable #hacking #privilege_escalation
════════════════════════
𐀪 Author: Kalash Kundaliya
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:11:21 GMT
════════════════════════
⌗ Tags: #linux #cybersecurity #metasploitable #hacking #privilege_escalation
Medium
Metasploitable 3 (Windows) Write-up — Part [III]: Port 80 — CVE-2015–1635 & FTP Upload Exploitation
This guide is strictly for educational purposes only. All demonstrations are performed in a controlled environment using Metasploitable 3…
⤷ Title: Blockchain & Cryptography Development: The Real Difference Between Shor, Grover, and Annealing
════════════════════════
𐀪 Author: SORA SS256 Satoshi is SHA-256
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:07:01 GMT
════════════════════════
⌗ Tags: #quantum_computing #blockchain #web3 #bitcoin #hacking
════════════════════════
𐀪 Author: SORA SS256 Satoshi is SHA-256
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:07:01 GMT
════════════════════════
⌗ Tags: #quantum_computing #blockchain #web3 #bitcoin #hacking
Medium
Blockchain & Cryptography Development: The Real Difference Between Shor, Grover, and Annealing
I get this question all the time:
“What’s the difference between Shor and Grover?”
“What’s the difference between Shor and Grover?”
⤷ Title: Top 10 Cybersecurity Trends to Watch Out for in 2026
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:42:07 GMT
════════════════════════
⌗ Tags: #hacking #cyberattack #cyber_security_awareness #ai #cybersecurity
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:42:07 GMT
════════════════════════
⌗ Tags: #hacking #cyberattack #cyber_security_awareness #ai #cybersecurity
Medium
Top 10 Cybersecurity Trends to Watch Out for in 2026
Introduction: Top 10 Cybersecurity Trends to Watch Out for in 2026
⤷ Title: Supply-Chain Attacks Explained: Lessons from Recent Incidents
════════════════════════
𐀪 Author: Hania Khan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:36:07 GMT
════════════════════════
⌗ Tags: #zero_trust #cybersecurity #software_development #infosec #supply_chain_attack
════════════════════════
𐀪 Author: Hania Khan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:36:07 GMT
════════════════════════
⌗ Tags: #zero_trust #cybersecurity #software_development #infosec #supply_chain_attack
Medium
Supply-Chain Attacks Explained: Lessons from Recent Incidents
The Code You Trust Is Betraying You
⤷ Title: Whisper Leak: How Encrypted AI Chats Aren’t as Private as You Think
════════════════════════
𐀪 Author: Virus Vanguard
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:54:06 GMT
════════════════════════
⌗ Tags: #machine_learning #technology #cybersecurity #artificial_intelligence
════════════════════════
𐀪 Author: Virus Vanguard
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:54:06 GMT
════════════════════════
⌗ Tags: #machine_learning #technology #cybersecurity #artificial_intelligence
Medium
Whisper Leak: How Encrypted AI Chats Aren’t as Private as You Think
Whisper Leak: How Encrypted AI Chats Aren’t as Private as You Think Encryption makes us feel safe. When you use an AI chat service, you generally assume that your conversation is …
⤷ Title: Before You Laugh at the Louvre, Check your own Passwords
════════════════════════
𐀪 Author: Raphael Moutard
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:44:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #cyber_security_awareness
════════════════════════
𐀪 Author: Raphael Moutard
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:44:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #cyber_security_awareness
Medium
Before You Laugh at the Louvre, Check your own Passwords
What this story says about real-world security
⤷ Title: The Most Influential Phrases About Achieving Your Goals
════════════════════════
𐀪 Author: Aliyu Ibrahim
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:21:38 GMT
════════════════════════
⌗ Tags: #bloody_sweet_writers #google #love_letters #writers_on_medium #cybersecurity
════════════════════════
𐀪 Author: Aliyu Ibrahim
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:21:38 GMT
════════════════════════
⌗ Tags: #bloody_sweet_writers #google #love_letters #writers_on_medium #cybersecurity
Medium
The Most Influential Phrases About Achieving Your Goals
Because sometimes all it takes is one line to spark an idea. I learned that words could save my life on the day I realized it.