⤷ Title: Threat Intelligence Data Classification Comparison
════════════════════════
𐀪 Author: TΞLΞMΞTRY
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:47:56 GMT
════════════════════════
⌗ Tags: #threat_intelligence #cyber_threat_intelligence #data_classification #cybersecurity
════════════════════════
𐀪 Author: TΞLΞMΞTRY
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:47:56 GMT
════════════════════════
⌗ Tags: #threat_intelligence #cyber_threat_intelligence #data_classification #cybersecurity
Medium
Threat Intelligence Data Classification Comparison
Mapping government, corporate, and threat intelligence (TLP) sensitivity levels for consistent information handling
⤷ Title: Spicy Challenge — CyShield CTF
════════════════════════
𐀪 Author: Omar Ahmed Abdelslaam
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:39:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #cyctf
════════════════════════
𐀪 Author: Omar Ahmed Abdelslaam
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:39:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #cyctf
Medium
Spicy Challenge — CyShield CTF
Summary
⤷ Title: Monese, Android & Security — Inconveniencing Fraudsters or Customers?
════════════════════════
𐀪 Author: NSA
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:35:38 GMT
════════════════════════
⌗ Tags: #banking #cybersecurity #customer_service #android #debanking
════════════════════════
𐀪 Author: NSA
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:35:38 GMT
════════════════════════
⌗ Tags: #banking #cybersecurity #customer_service #android #debanking
Medium
Monese, Android & Security — Inconveniencing Fraudsters or Customers?
Part of a little rant series. The next and last one this round will be a bit more positive!
⤷ Title: CyCTF 2025 Inception | Web
════════════════════════
𐀪 Author: Abdelrahman Taymour
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:34:17 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #ctf_walkthrough #ctf_writeup
════════════════════════
𐀪 Author: Abdelrahman Taymour
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:34:17 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #ctf_walkthrough #ctf_writeup
Medium
CyCTF 2025 Inception | Web
Welcome to CyCTF Web Machine walk-through
⤷ Title: Side-Channel Attacks on Mobile and IoT what they are, why they matter, and how to defend against…
════════════════════════
𐀪 Author: Bervice
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:17:30 GMT
════════════════════════
⌗ Tags: #iot #bervice #side_channel #mobile_security #cybersecurity
════════════════════════
𐀪 Author: Bervice
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:17:30 GMT
════════════════════════
⌗ Tags: #iot #bervice #side_channel #mobile_security #cybersecurity
Medium
Side-Channel Attacks on Mobile and IoT what they are, why they matter, and how to defend against them
Side-channel attacks are the ugly truth most developers don’t want to face: they extract secrets without breaking crypto math or getting…
⤷ Title: Cisco ASA & Firewall Threat Defense (FTD) 0-Day Remote Code Execution Vulnerabilities
════════════════════════
𐀪 Author: Jason Hoskins Jr.
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:10:49 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cisco #firewall #0day #cybersecurity
════════════════════════
𐀪 Author: Jason Hoskins Jr.
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:10:49 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cisco #firewall #0day #cybersecurity
Medium
Cisco ASA & Firewall Threat Defense (FTD) 0-Day Remote Code Execution Vulnerabilities
Critical zero-day flaws in Cisco ASA and FTD firewalls are being actively exploited, giving attackers a potential foothold in enterprise…
⤷ Title: A2goethe,A2telc,A2ösd
════════════════════════
𐀪 Author: kaufen goethe telc
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:09:10 GMT
════════════════════════
⌗ Tags: #design #cybersecurity #cryptocurrency #data_science #entrepreneurship
════════════════════════
𐀪 Author: kaufen goethe telc
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:09:10 GMT
════════════════════════
⌗ Tags: #design #cybersecurity #cryptocurrency #data_science #entrepreneurship
Medium
Original-Hailpraktiker-Diplom,Goethe-telc Wir können jedem helfen, der ein Problem mit der deutschen Sprache hat🇩🇪🇦🇹
📧: [email protected]
⤷ Title: Thinking in Three Dimensions: How Security Analysts Can Balance Binary, Quantitative, and…
════════════════════════
𐀪 Author: Enleak
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 20:53:10 GMT
════════════════════════
⌗ Tags: #security_analysts #cybersecurity #incident_response
════════════════════════
𐀪 Author: Enleak
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 20:53:10 GMT
════════════════════════
⌗ Tags: #security_analysts #cybersecurity #incident_response
Medium
Thinking in Three Dimensions: How Security Analysts Can Balance Binary, Quantitative, and…
Sorry and thank you for reading this, just had some time and wanted to put some thoughts down over the weekend after an interesting…
⤷ Title: Why Passphrases Beat Passwords (And Why Yours Probably Needs an Upgrade)
════════════════════════
𐀪 Author: Hulo Biral - Cyber Security
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 20:48:28 GMT
════════════════════════
⌗ Tags: #safety #cybersecurity #lifestyle #cyber_security_awareness #password_management
════════════════════════
𐀪 Author: Hulo Biral - Cyber Security
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 20:48:28 GMT
════════════════════════
⌗ Tags: #safety #cybersecurity #lifestyle #cyber_security_awareness #password_management
Medium
Why Passphrases Beat Passwords (And Why Yours Probably Needs an Upgrade)
Why Passphrases Beat Passwords (And Why Yours Probably Needs an Upgrade) Be honest—how many times have you stared at your login screen, sweating over whether it was “FluffyDog2023!” or …
⤷ Title: My eMAPT Exam Experience — More About Building Than Breaking
════════════════════════
𐀪 Author: Tolga DEMIREL
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 20:59:16 GMT
════════════════════════
⌗ Tags: #android_security #android_app_development #penetration_testing #android_pentesting #emapt
════════════════════════
𐀪 Author: Tolga DEMIREL
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 20:59:16 GMT
════════════════════════
⌗ Tags: #android_security #android_app_development #penetration_testing #android_pentesting #emapt
Medium
My eMAPT Exam Experience — More About Building Than Breaking
Having earned the CAPT certification from MobileHackingLab in the past, I already had solid hands-on experience with mobile penetration…
⤷ Title: toc2 Walkthrough
════════════════════════
𐀪 Author: Shahd Mk
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:12:38 GMT
════════════════════════
⌗ Tags: #toc2_walkthrough #tryhackme_writeup #tryhackme_walkthrough #tryhackme #thm
════════════════════════
𐀪 Author: Shahd Mk
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:12:38 GMT
════════════════════════
⌗ Tags: #toc2_walkthrough #tryhackme_writeup #tryhackme_walkthrough #tryhackme #thm
Medium
toc2 Walkthrough
By Shahd Qishta
⤷ Title: “Hack the System (Legally): Your First Step into Ethical Hacking”
════════════════════════
𐀪 Author: Md Johirul Islam
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:33:52 GMT
════════════════════════
⌗ Tags: #security #cybersecurity #hacking #ethical_hacking
════════════════════════
𐀪 Author: Md Johirul Islam
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:33:52 GMT
════════════════════════
⌗ Tags: #security #cybersecurity #hacking #ethical_hacking
Medium
🧠💻 “Hack the System (Legally): Your First Step into Ethical Hacking”
🚀 Welcome to Lesson 1: What Is Ethical Hacking?
⤷ Title: How Impossible Is It to Guess a Crypto Wallet?
════════════════════════
𐀪 Author: Jeffrey Berthiaume
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:24:14 GMT
════════════════════════
⌗ Tags: #hacking #quantum_computing #passwords #cryptocurrency #crypto_wallet
════════════════════════
𐀪 Author: Jeffrey Berthiaume
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:24:14 GMT
════════════════════════
⌗ Tags: #hacking #quantum_computing #passwords #cryptocurrency #crypto_wallet
Medium
How Impossible Is It to Guess a Crypto Wallet?
When my 13-year-old asked, “What if someone just guesses my wallet words?”, I smiled. It sounds simple. You’ve got twelve words. You try…
⤷ Title: They’re Not After Your Password Anymore. Here’s What Phishers Really Want.
════════════════════════
𐀪 Author: Jamal Mammadli
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:30:58 GMT
════════════════════════
⌗ Tags: #social_engineering #phishing #tech #online_safety #cybersecurity
════════════════════════
𐀪 Author: Jamal Mammadli
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:30:58 GMT
════════════════════════
⌗ Tags: #social_engineering #phishing #tech #online_safety #cybersecurity
Medium
They’re Not After Your Password Anymore. Here’s What Phishers Really Want.
You receive an email that looks perfectly legitimate: “Your account has been suspended. Click this link to recover it.” You click. But your…
⤷ Title: Is the Modern internet that fragile?
════════════════════════
𐀪 Author: Olabisi Oduola
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:29:14 GMT
════════════════════════
⌗ Tags: #open_source #technology #internet #linux #cybersecurity
════════════════════════
𐀪 Author: Olabisi Oduola
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:29:14 GMT
════════════════════════
⌗ Tags: #open_source #technology #internet #linux #cybersecurity
Medium
Is the Modern internet that fragile?
A satire of how fragile the modern internet can be
⤷ Title: Access Control Deconstructed: Why a Single Admin Key is a Critical Threat?
════════════════════════
𐀪 Author: Zainab Ibrahim
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:36:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethereum #web3 #smart_contracts
════════════════════════
𐀪 Author: Zainab Ibrahim
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:36:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethereum #web3 #smart_contracts
Medium
Access Control Deconstructed: Why a Single Admin Key is a Critical Threat?
Access Control Deconstructed: Why a Single Admin Key is a Critical Threat? INTRODUCTION: THE SINGLE POINT OF FAILURE IN MODERN DEFI Every experienced developer understands the onlyOwner modifier …
⤷ Title: My eCTHP Experience: A 4-Day Marathon, a 46-Page Report, and Way Too Much Coffee
════════════════════════
𐀪 Author: Tolga DEMIREL
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:33:39 GMT
════════════════════════
⌗ Tags: #blue_team #threat_hunting #cybersecurity #mitre_attack #ecthp
════════════════════════
𐀪 Author: Tolga DEMIREL
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:33:39 GMT
════════════════════════
⌗ Tags: #blue_team #threat_hunting #cybersecurity #mitre_attack #ecthp
Medium
My eCTHP Experience: A 4-Day Marathon, a 46-Page Report, and Way Too Much Coffee
I’ve been wanting to improve myself on the Blue Team side for quite some time.
After spending months solving labs on BTLO, playing with…
After spending months solving labs on BTLO, playing with…
⤷ Title: Introduction to SOAR — Try Hack Me Walkthrough
════════════════════════
𐀪 Author: Chaitanya Garware
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:32:14 GMT
════════════════════════
⌗ Tags: #soar #tryhackme_writeup #tryhackme_walkthrough #blue_team #cybersecurity
════════════════════════
𐀪 Author: Chaitanya Garware
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:32:14 GMT
════════════════════════
⌗ Tags: #soar #tryhackme_writeup #tryhackme_walkthrough #blue_team #cybersecurity
Medium
Introduction to SOAR — Try Hack Me Walkthrough
## Task 1—Introduction
⤷ Title: Understanding Covert Channels: Hidden Pathways of Data Leakage
════════════════════════
𐀪 Author: Raviteja Mureboina
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:19:48 GMT
════════════════════════
⌗ Tags: #data #transmission #covert_channel #cybersecurity #leaked
════════════════════════
𐀪 Author: Raviteja Mureboina
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:19:48 GMT
════════════════════════
⌗ Tags: #data #transmission #covert_channel #cybersecurity #leaked
Medium
Understanding Covert Channels: Hidden Pathways of Data Leakage
In the world of cybersecurity, not all data transmissions occur through authorized or visible means. Some communications sneak through the…
⤷ Title: TryHackMe — File Inclusion — Walkthrough
════════════════════════
𐀪 Author: Alan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:10:20 GMT
════════════════════════
⌗ Tags: #remote_file_inclusion #tryhackme #cybersecurity #local_file_inclusion #tryhackme_walkthrough
════════════════════════
𐀪 Author: Alan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:10:20 GMT
════════════════════════
⌗ Tags: #remote_file_inclusion #tryhackme #cybersecurity #local_file_inclusion #tryhackme_walkthrough
Medium
TryHackMe — File Inclusion — Walkthrough
Welcome to this walkthrough of the File Inclusion room on TryHackMe. Remember that this post will contain the answers to the questions. I…
⤷ Title: AI: technical problems
════════════════════════
𐀪 Author: Jhoan Sebastián Fuentes Hernández
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:07:04 GMT
════════════════════════
⌗ Tags: #ai #technology #deep_learning #cybersecurity
════════════════════════
𐀪 Author: Jhoan Sebastián Fuentes Hernández
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:07:04 GMT
════════════════════════
⌗ Tags: #ai #technology #deep_learning #cybersecurity
Medium
AI: technical problems
AI has at least three technical problems that not only haven’t been solved, but have evolved.