Tech Skills
Cybersecurity
Ethical hacking, penetration testing, network security, CTFs and defensive security
Skills in this topic
8 skills — Sign in to track your progress
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Showing 1,660 reads from curated sources

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Demystifying Hong Kong’s New Cybersecurity Law: A Deep Dive for SMEs (Plus Your Free Compliance…
A few days ago, I wrote about what Hong Kong’s new Protection of Critical Infrastructure (Computer System) Bill (CI Bill) means for your… Continue reading on Me

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Supply Chain Attacks: Exploiting Trust in Modern Digital Ecosystems
Supply chain attacks have emerged as a primary threat vector in modern cybersecurity, not because they rely on entirely new exploitation… Continue reading on Me

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Active Directory Pentesting 101 — Pt1.
# The Basic Definitions Continue reading on Medium »
Hacker News (AI)
🔐 Cybersecurity
⚡ AI Lesson
3w ago
GoDaddy Gave a Domain to a Stranger Without Any Documentation
Comments

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Understanding Cloud Computing Security: Necessity, Risks, and Best Practices
Cloud computing offers “immense benefits — scalability, flexibility, cost-efficiency,” but it also introduces new cybersecurity challenges… Continue reading on
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Meet Trestan "Romeo" Renzetti: The 25-Year-Old Paid to Hack the Human Mind
By Roman Zuniga Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
From LinkedIn to Root Access: How a Phone Number, an Old Password Dump, and a Cache Poisoning Bug…
Free Link Continue reading on InfoSec Write-ups »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Social Engineering: The Most Powerful Hacking Technique
Social Engineering: The Most Powerful Hacking Technique Why Hackers Don’t Need to Break In—They Just Ask Let me tell you something… Continue reading on Me

Hackernoon
🔐 Cybersecurity
⚡ AI Lesson
3w ago
How to Secure Accurate Measurements in a Decentralized System Without Oracles
O Coin needs two kinds of truth in code: (1) local water price in each fiat lane where we can observe it, and (2) a connected graph of cross-country references
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Critical SQL Injection in Sourcecodester Complaint Management System (CVE-2020–24932)
How an unauthenticated cid parameter exposed complete databases — what went wrong, how it was fixed, and how to avoid it. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
What Scarlet Goldfinch shows us about detection at scale
A year of paste-and-run evolution, the disclosure paradox, and why behavioral chain detection potentially survives the arms race Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
ColdBoxEasy Walkthrough (Proving Ground-play-OSCP)
By cyber_public_school | Cyber Security Researcher Continue reading on Medium »

Dev.to · Haruki Kondo
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Building a Full-Stack ZK-Privacy App on Midnight: A Step-by-Step Guide
Introduction Hello everyone! 🚀 In this post, we are diving deep into Midnight, the...

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
“Bug Bounty Bootcamp #36: SSRF Hands-On — Confirming the Server Makes the Request and Reading Local…
You think you found an SSRF. But how do you prove the request came from the server and not your browser? And once confirmed, how do you… Continue reading on Med
Medium · Python
🔐 Cybersecurity
⚡ AI Lesson
3w ago
I Ran 60 Cryptanalysis Experiments on SHA-256. Here’s What I Found.
R0-2: 100% deterministic R3: carry breaks control (→22%) R4: nonce enters R6-7: 26 trackable channels R8: ALL 26 destroyed — 17× drop… Continue reading on Med

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Stop Treating AI Like a Cure. It’s Often Just a Mask.
Sharpening Both Sides: When AI Security Fixes Create New Bugs Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Your Scanner Found Nothing. I Found 3 Bugs — With Just My Brain.
Stop hoarding tools. Start developing the one skill that actually makes you dangerous. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
They Already Know Where You Slept Last Night
Trying to live anonymously in 2026 isn’t paranoia. It’s a full-time job — and you’re probably already losing. Continue reading on Medium »

Forbes Innovation
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Update Your Safari Browser —1Password Users Warned
1Password for Safari users have been warned that they must update their browser before May 24, or app security improvements will no longer be available.

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
You Don’t Have a Coverage Problem — You Have a Confidence Problem
Most security leaders believe they have coverage. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
What Bug Bounty Culture Isn’t Telling You
The security community has a copy-paste problem. AI is making it worse. And the job market is about to make it matter. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
CROSS-SITE SCRIPTING A HACKERS GUIDE
WHAT IS CROSS SITE SCRIPTING?? Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Mahalleden Dünyaya: Bir Veri Paketinin LAN’dan WAN’a Büyük Göçü (Bölüm 6)
Yerel ağın (LAN) tüm sırlarını çözdük; verinin mahalle içindeki o mikroskobik el sıkışmalarını ve dijital zırhlanma süreçlerini en ince… Continue reading on Med

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
The Journey of a Click: How the Internet Actually Works
Most of us treat the internet like magic. You click a link, and a millisecond later, a cat video appears. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
What Threat‑Informed IAM Actually Means (And Why It Matters)
Most identity and access management (IAM) programmes fail quietly. They pass audits, hit delivery milestones, and implement modern tooling… Continue reading on
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Dark Web Myths vs. Reality: A Computer Science Student’s Breakdown
Separating Hollywood fiction from technical fact — because understanding the dark web matters more than fearing it. Every time "dark web"… Continue reading on M

Dev.to · Philippe Quattrociocchi
🔐 Cybersecurity
⚡ AI Lesson
3w ago
# How MemoraEU Cannot Read Your Memories — Even If We Wanted To
How MemoraEU Cannot Read Your Memories — Even If We Wanted To Zero-knowledge architecture...

Medium · JavaScript
🔐 Cybersecurity
⚡ AI Lesson
3w ago
HttpOnly — Your First Line of Defense
I’ve worked on a lot of projects over the years, and some used HttpOnly cookies for auth (access tokens, refresh tokens… let’s be honest… Continue reading on Me

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
HttpOnly — Your First Line of Defense
I’ve worked on a lot of projects over the years, and some used HttpOnly cookies for auth (access tokens, refresh tokens… let’s be honest… Continue reading on Me

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
SMB Relay Attack Home Lab
How to use a LLMNR Poisoning to steal hashes using SMB Relay attacks Continue reading on Medium »

Medium · DevOps
🔐 Cybersecurity
⚡ AI Lesson
3w ago
How I Built a Real-Time DDoS Detection Engine from Scratch
A beginner-friendly walkthrough of building an anomaly detection daemon that watches HTTP traffic, learns what normal looks like, and… Continue reading on Mediu

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
How I Built a Real-Time DDoS Detection Engine from Scratch
A beginner-friendly walkthrough of building an anomaly detection daemon that watches HTTP traffic, learns what normal looks like, and… Continue reading on Mediu

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
How to Land a High-Paying Cybersecurity Job (Step-by-Step Career Switch Guide)
Introduction: Cybersecurity has quickly become one of the most in-demand and high-paying career paths worldwide. With the rise in data… Continue reading on Medi

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
How I Got Super Admin on My University’s Sports Booking Portal
Two misconfigurations, one exposed RPC endpoint, and zero RLS policies , a short story about what happens when Supabase defaults go… Continue reading on Medium

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Flag Mastery: The Flags That Run Every Engagement
curl is only simple until you learn which flags change everything. Continue reading on InfoSec Write-ups »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
From Memory Dump to Attack Story: Building DeepProbe v2
The gap we don’t talk about in incident response Continue reading on InfoSec Write-ups »
Medium · Programming
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Hacking into Eternal.com | Hackerone
Welcome back readers! It has been quite a while since I wrote on medium. This piece if writing will contain some of my findings which I… Continue reading on Inf
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Hacking into Eternal.com | Hackerone
Welcome back readers! It has been quite a while since I wrote on medium. This piece if writing will contain some of my findings which I… Continue reading on Inf

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
I Tried to Social Engineer My Friends (With Permission) — Every Single One Fell For It
The most uncomfortable security experiment I’ve ever run Continue reading on InfoSec Write-ups »
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
The AI Security Debt: Why Your “Wrapper” App is a Liability
In the tech gold rush of the last three years, the mantra has been “Ship it yesterday.” Millions of dollars have been poured into… Continue reading on Medium »
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Can You Capture the Flag? — A Beginner’s Journey Into CTF Encoding Challenges
“c4n y0u c4p7u23 7h3 f149?” Continue reading on Medium »
Dev.to AI
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Scanned public repos and found a lot of errors
I tested Debuggix on 5 random GitHub repos this week: https://debuggix.space • Financial chat app → 136 issues • AI trading bot → JWT authentication bypass • AI

Dev.to · Haven Messenger
🔐 Cybersecurity
⚡ AI Lesson
3w ago
What End-to-End Encryption Actually Protects (And What It Doesn'''t)
What end-to-end encryption protects — and what it misses — is one of the most important distinctions...

Dev.to · rednakta
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Buy a mac mini to Run OpenClaw? Anyone Can Get a Safer Sandbox in 1 Minute
This is a submission for the OpenClaw Challenge. If you've been around the OpenClaw conversation...

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
The Hidden Dangers of Public Wi-Fi
And How to Actually Protect Yourself Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
The Death of the Password (Finally): What Passkeys Actually Mean for Everyday Users
*Cybersecurity 2026 | 12 min read* Continue reading on Medium »

Medium · LLM
🔐 Cybersecurity
⚡ AI Lesson
3w ago
The Death of the Password (Finally): What Passkeys Actually Mean for Everyday Users
*Cybersecurity 2026 | 12 min read* Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
The OSI Model (Except It Actually Makes Sense) — Part 2
Hi, everyone! Welcome to part 2 of the OSI model! Continue reading on Medium »
DeepCamp AI