Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,037
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,655 reads from curated sources

Initial Access Brokers (IABs): The Hidden Supply Chain of Modern Cybercrime
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Initial Access Brokers (IABs): The Hidden Supply Chain of Modern Cybercrime
Cybercrime today is no longer driven only by individual hackers breaking into systems. Continue reading on Medium »
Initial Access Brokers (IABs): The Hidden Supply Chain of Modern Cybercrime
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Initial Access Brokers (IABs): The Hidden Supply Chain of Modern Cybercrime
Cybercrime today is no longer driven only by individual hackers breaking into systems. Continue reading on Medium »
Initial Access Brokers (IABs): The Hidden Supply Chain of Modern Cybercrime
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Initial Access Brokers (IABs): The Hidden Supply Chain of Modern Cybercrime
Cybercrime today is no longer driven only by individual hackers breaking into systems. Continue reading on Medium »
Building an Experimental TypeScript Cipher Inspired by 8 Dimensions
Dev.to · marcos n 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Building an Experimental TypeScript Cipher Inspired by 8 Dimensions
Over the last few days, I started an experimental study on cryptography with the goal of better...
The Bonus Hunter in the Next State: Why Sportsbook Promo-Abuse Red Teams Fit AgentHansa
Dev.to · Devin Valencia 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Bonus Hunter in the Next State: Why Sportsbook Promo-Abuse Red Teams Fit AgentHansa
The Bonus Hunter in the Next State: Why Sportsbook Promo-Abuse Red Teams Fit AgentHansa ...
I Was Given a Broken Java App. I Found Every Flaw, Proved Every Attack, Then Fixed Everything.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
I Was Given a Broken Java App. I Found Every Flaw, Proved Every Attack, Then Fixed Everything.
A complete security audit: five real vulnerabilities, five documented exploits, and the fixes that closed them all. Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Claude Mythos Found a 27-Year-Old Bug. Here’s Why That’s a Problem.
In April 2026, Anthropic announced Claude Mythos Preview — their most capable model yet. Continue reading on Medium »
RHC en contexto: Alineando un nuevo paradigma defensivo con los estándares de seguridad.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
RHC en contexto: Alineando un nuevo paradigma defensivo con los estándares de seguridad.
RHC en contexto: Alineando un nuevo paradigma defensivo con los estándares de seguridad. Continue reading on Medium »
Microsoft Why Microsoft Intune Matters in Modern Cybersecurity
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Microsoft Why Microsoft Intune Matters in Modern Cybersecurity
A few years ago, managing devices inside an organization was much simpler. Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Rotating Your Database Password Without Thinking About This Can Break Your Entire Application
If you are using Apache Tomcat to host a Java application connected to an AWS RDS database, there is a credential caching behavior worth… Continue reading on Me
SunnyDayBPF: Post-Syscall User-Buffer Telemetry Deception with eBPF
Dev.to · azqzazq1 🔐 Cybersecurity ⚡ AI Lesson 1w ago
SunnyDayBPF: Post-Syscall User-Buffer Telemetry Deception with eBPF
SunnyDayBPF: Post-Syscall User-Buffer Telemetry Deception with eBPF Security tools do not...
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Don't connect your smart plug to these 5 household devices - an expert warns
While smart plugs are very convenient, here are some things you should never plug into them.
BoogeyMan 1 -TryHackMe Write-up
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
BoogeyMan 1 -TryHackMe Write-up
Blue Team Challenge Room — Part of THM SOC Level 1 Capstone Challenge Continue reading on Medium »
Hackers breached five Polish water treatment plants. The attack vector was default passwords. Seventy per cent of American water utilities fail the same test.
The Next Web AI 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Hackers breached five Polish water treatment plants. The attack vector was default passwords. Seventy per cent of American water utilities fail the same test.
Hackers breached five Polish water treatment plants in 2025, gaining access to the industrial control systems that regulate pumps, filters, and chemical dosing.
How to Abuse APIs (or protect them)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
How to Abuse APIs (or protect them)
Today I want to tell a slightly different story. Continue reading on System Weakness »
Tips for scaling your network with the right switches and routers
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Tips for scaling your network with the right switches and routers
NetworkTigers discusses how to approach scaling your network. First published January 3, 2025, on NetworkTigers News. Continue reading on Medium »
Your Job Interview Video May Be Training the AI That Will Impersonate You
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Your Job Interview Video May Be Training the AI That Will Impersonate You
Recruitment platforms collect high-fidelity biometric recordings from verified professionals at scale. The market for that data extends… Continue reading on Med
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Worried about the nationwide Canvas data breach? Take these 6 steps now
A ransomware group behind the attacks claims to have stolen 275 million records connected to students, teachers, and staff. Here's how to deal with it.
The Flipper Zero Black Book: Useful, Strange, and Slightly Concerning Payloads
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Flipper Zero Black Book: Useful, Strange, and Slightly Concerning Payloads
The Flipper Zero was sitting beside a basket of fhttps://numbpilled.gumroad.com/l/obsidian-operator-guideries in a diner somewhere off the… Continue reading on
I Turned Obsidian Into a Live SOC Dashboard
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
I Turned Obsidian Into a Live SOC Dashboard
The coffee shop Wi Fi portal had one of those fake-friendly names. “BeanHouse Guest.” Beige wallpaper. Soft jazz. The kind of network name… Continue reading on
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Digital Fortress: Why Dubai Businesses are Leading the AI-Security Revolution
The Evolution of the Modern Threat Landscape Continue reading on Medium »
How I Accidentally Became a Malware Therapist While Solving BTLO’s “Macro-ni”
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
How I Accidentally Became a Malware Therapist While Solving BTLO’s “Macro-ni”
You know that moment when you open a Word document and your antivirus suddenly starts breathing heavily? Continue reading on Medium »
“It Started with a Whistle — Today, It Has Become the World’s Most Dangerous Weapon.”
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
“It Started with a Whistle — Today, It Has Become the World’s Most Dangerous Weapon.”
The story of cyber attacks that no one has fully told — from the beginning until today. Continue reading on Medium »
Parallel Thought in the AI Era: Why Chronology Matters More Than Accusation
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Parallel Thought in the AI Era: Why Chronology Matters More Than Accusation
By Mitchell D. McPhetridge Continue reading on Medium »
How Social Engineering Hacks Humans Instead of Systems
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
How Social Engineering Hacks Humans Instead of Systems
Why manipulating people is often easier than breaking secure infrastructure. Continue reading on Medium »
AI-Powered Cyber Attacks vs AI-Driven Defense
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
AI-Powered Cyber Attacks vs AI-Driven Defense
Introduction Continue reading on Medium »
The PCPJack Worm and the Death of Cloud Isolation
Dev.to · Ali-Funk 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The PCPJack Worm and the Death of Cloud Isolation
The discovery of the PCPJack malware framework in late April 2026 should serve as a wake up call for...
The Invisible Target: Why Your Digital “Armor” Needs a Human Touch
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Invisible Target: Why Your Digital “Armor” Needs a Human Touch
We’ve all felt that slight shiver. You’re talking to a friend about a specific brand of coffee, and ten minutes later, there it is — a… Continue reading on Medi
I Built an AI-Driven Active Directory Attack Pipeline Using Claude Code + MCP — Here’s How It Works
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
I Built an AI-Driven Active Directory Attack Pipeline Using Claude Code + MCP — Here’s How It Works
From zero to forest compromise — without remembering a single impacket flag. Continue reading on Medium »
I Rebuilt My Authentication System After a Hacker Found This Flaw
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 1w ago
I Rebuilt My Authentication System After a Hacker Found This Flaw
Most security incidents do not begin with alarms. Continue reading on Medium »
I Rebuilt My Authentication System After a Hacker Found This Flaw
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
I Rebuilt My Authentication System After a Hacker Found This Flaw
Most security incidents do not begin with alarms. Continue reading on Medium »
OSINT Industries CTF writeup: Holehe and the secret email
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
OSINT Industries CTF writeup: Holehe and the secret email
HI, another OSINT writeup …the challenge is by OSINT Industries, titled “Holehe and the secret email”. Here is a brief description of the… Continue reading on M
Project Glasswing: Who Gets to Hold Mythos, and Why It Matters
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Project Glasswing: Who Gets to Hold Mythos, and Why It Matters
Anthropic gated Mythos to twelve partners. Here’s what that signals for builders and attackers in the gated era. Continue reading on Medium »
A 4-year-old auth-bypass vulnerability hidden in our password-reset API — discovery, hot fix, recovery
Dev.to · edhiblemeer 🔐 Cybersecurity ⚡ AI Lesson 1w ago
A 4-year-old auth-bypass vulnerability hidden in our password-reset API — discovery, hot fix, recovery
One customer support ticket — "I can't log in, but I never changed my password" — turned into the discovery of a 4-year-old auth-bypass vulnerability in our Saa
Your CEO Just Tanked Your Stock From a Silent Retreat (And Other Deepfake Horrors)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Your CEO Just Tanked Your Stock From a Silent Retreat (And Other Deepfake Horrors)
The “Big Hack” used to be simple. Some guy in a hoodie would find an unpatched SQL injection, exfiltrate your customer database, and sell… Continue reading on M
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Why the Microsoft Edge Password Issue Matters More Than Microsoft Edge
On May 4, 2026, a Norwegian security researcher revealed that Microsoft Edge stores saved passwords in plaintext memory after startup —… Continue reading on Med
How SPF Pushes Scam Defence Toward Shared Intelligence
Dev.to · Dylan Gan 🔐 Cybersecurity ⚡ AI Lesson 1w ago
How SPF Pushes Scam Defence Toward Shared Intelligence
Australia’s Scams Prevention Framework is not only a regulatory development. It is a signal that scam...
1 Million AI Services Were Exposed. The Security Disaster Is Worse Than Anyone Thought
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
1 Million AI Services Were Exposed. The Security Disaster Is Worse Than Anyone Thought
A recent investigation into more than 1 million exposed AI services uncovered something deeply unsettling: public chatbots leaking… Continue reading on Medium »
Waspada Risiko Insider Threat dalam Perusahaan, Apa yang Harus Dilakukan?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Waspada Risiko Insider Threat dalam Perusahaan, Apa yang Harus Dilakukan?
Dalam menghadapi ancaman siber, banyak organisasi cenderung memfokuskan pertahanan mereka pada serangan dari pihak luar, seperti peretas… Continue reading on Me
DevOps Is No Longer About Speed — It’s About Control
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
DevOps Is No Longer About Speed — It’s About Control
From rapid deployment pipelines to full-scale risk, security, and compliance engines shaping modern digital warfare Continue reading on DevSecOps & AI »
Privacy-first journaling: what it actually means in code
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Privacy-first journaling: what it actually means in code
The five choices that turn “we take privacy seriously” from boilerplate into something you can verify. Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
VAPT Services Explained, What Every Company Should Know
Cyberattacks are no longer limited to large corporations. Continue reading on Medium »
Breaking Infinity
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Breaking Infinity
Anatomy of Lock-Free Ring Buffer Vulnerabilities and Defensive Engineering Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
When Our Digital Infrastructure Goes Offline: Lessons from the Global Canvas Breach
What a real-world supply chain attack taught me about systems, security, and shared responsibility Continue reading on Medium »
Breaking Authentication Through Password Change Logic Flaws — PortSwigger Lab Walkthrough
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Breaking Authentication Through Password Change Logic Flaws — PortSwigger Lab Walkthrough
Authentication mechanisms are often heavily protected against brute-force attacks on the main login page. However, developers sometimes… Continue reading on Med
AWS Elastic Beanstalk Pentesting with AWS CLI
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
AWS Elastic Beanstalk Pentesting with AWS CLI
Disclaimer: This walkthrough was performed in a controlled lab environment for educational and authorized security testing purposes only. Continue reading on Me
Open Source Firewall for Small Business: What You Actually Need to Know
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Open Source Firewall for Small Business: What You Actually Need to Know
Most small businesses don’t struggle with firewall technology because it’s unavailable — they struggle because it’s either too complex… Continue reading on Medi
Advancing the Project of Secure CI/CD pipeline -3
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Advancing the Project of Secure CI/CD pipeline -3
If you have followed the previous series -2 then you would have understood what we are following in this project Continue reading on Medium »