Gauri KaleStrengthening Cybersecurity: The Role of Privileged Access Management (PAM) SolutionsIn an era where cybersecurity threats are constantly evolving, Privileged Access Management (PAM) solutions have become essential for…Feb 6Feb 6
InGenerative AIbyThomas ReidIntroducing browser-use — a new agentic tool to control your browserThis new AI tool is crazy goodDec 5, 20242Dec 5, 20242
Ahmed🦈Wireshark 101: Finding Passwords & Credentials in Plain Text TrafficTable of Contents:Oct 14, 20241Oct 14, 20241
InAardvark InfinitybyAardvark InfinityHow TikTok’s Data Harvesting Could Be The Next Cybersecurity Crisis (And Why Your Boss is Probably…TikTok is a social media phenomenon, loved by millions for its short-form videos and viral trends. But while millions of teens are busy…Dec 20, 2024Dec 20, 2024
Scott Bolen | RONIN OWL CTIBuilding Your Threat Intelligence Home Lab: A Practical GuideSetting up a home lab is like having your own cybersecurity playground — a place to explore, learn, and sharpen your threat intelligence…Aug 13, 20242Aug 13, 20242
InOSINT TeambySatyam PathaniaGoogle Dorking: A Hacker’s Best FriendHey, hacker friends! Ever wonder why people say Google is a hacker’s best friend? Well, I’m about to show you why.Oct 13, 20247Oct 13, 20247
InOSINT TeambyLogicTechComplete Cybersecurity Roadmap 2024 (Part-1)Introduction to Ethical Hacking:-Jul 19, 20241Jul 19, 20241
InInfoSec Write-upsbybrutexploiterIDOR + Account Takeover: How I Secured Personal Information (PII) of 5.17M Electricity ConsumersThis blog discusses the discovery of 2 critical vulnerabilities at APDCL, exposing personal data of 5.17M electricity consumers.Jun 15, 202410Jun 15, 202410
Gnana Aravind KThe Art of Hacking Vending MachinesLet’s grab some snacks by breaking into the vending machines, but without touching it. Here’s your guide for hacking vending machines…Oct 13, 202414Oct 13, 202414
InOSINT TeambyShaikh MinhazUnlock Unlimited Access to ChatGPT-4: A Step-by-Step Guide to Using Images and Files Without LimitsChatGPT is a very dangerous tool if you understand it — it can literally do anything! From finding vulnerabilities in websites to editing…Oct 9, 20243Oct 9, 20243
SBN TechCyber Security in the Marine Industry | SHIPMATEIn the marine industry, cyber security risks can have potentially serious consequences concerning the safety and security of cargo…May 18, 2022May 18, 2022
Yash BansalWiretap Backdoors: How China Walked Through the Front Door of U.S. TelecomsThe Inevitable “We Told You So”Oct 8, 202414Oct 8, 202414
InThe Gray AreabyAttila VágóA Pragmatic Analysis Of OpenAI’s Testimony Before The SenateStarring none other but OpenAI’s CEO, Sam Altman. Seven key takeaways.May 19, 202331May 19, 202331
InInfoSec Write-upsbyOiQDark Web : A Journey into Hidden Networks and Black MarketsYour Guide to Exploring Underground Forums and Illicit MarketplacesSep 11, 2024Sep 11, 2024
Rah Tech Wiz (she, her)Cybersecurity Awareness Month: Securing Our WorldEmpowering Individuals & Organizations to Become Cyber ReadyOct 17, 2024Oct 17, 2024
InOffensive Black Hat Hacking & SecuritybyHarshad ShahKali New Release 2024.3 | Explore 11 New Tools for HackingAdvanced Penetration Testing using Kali Linux | Hacker AssociateSep 15, 20244Sep 15, 20244
lockHow To Detect ProxiesResidential Proxies are often used by malicious actors to mask their true identity or location, enabling them to bypass security measures…Sep 11, 202427Sep 11, 202427
NiemandIntermediate Cybersecurity Measures: A Practical Guide to Strengthen Your Digital DefenseStay One Step Ahead: Proven Strategies to Protect Your Data from Advanced Cyber ThreatsSep 15, 2024Sep 15, 2024
InLevel Up CodingbyJacob BartlettJailbreak your Enemies with a Link: Remote Execution on iOSThe Trident Exploit Chain deep-diveSep 16, 202425Sep 16, 202425