Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,042
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,660 reads from curated sources

Imposter Syndrome in Cybersecurity: Why AI Is Making It Feel Worse (and Why That’s Misleading)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Imposter Syndrome in Cybersecurity: Why AI Is Making It Feel Worse (and Why That’s Misleading)
Ever found a vulnerability — and still felt like you just got lucky? Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How I Built an Automated Incident Triage System Using n8n and VirusTotal
As a cybersecurity student, one of the most important skills I’m learning is automation — specifically how Security Operations Center… Continue reading on Mediu
Started with a Facebook DM To Hunting Down Pig Butchering Crypto Syndicate
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Started with a Facebook DM To Hunting Down Pig Butchering Crypto Syndicate
24–04–2026 2.19 Pm Friday Afternoon I received a Phishing message from a Facebook account including an obvious phishing link when i tried… Continue reading on M
Thinking About a Cybersecurity Career But Bon’t Know Where to Begin?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Thinking About a Cybersecurity Career But Bon’t Know Where to Begin?
Cybersecurity talent demand continues to grow globally. Continue reading on Medium »
We probed 20,338 x402 endpoints. 161 are agent honeypots.
Dev.to · AFX 🔐 Cybersecurity ⚡ AI Lesson 3w ago
We probed 20,338 x402 endpoints. 161 are agent honeypots.
We probed 20,338 x402 endpoints. 161 are agent honeypots. x402 lets HTTP servers charge per request...
What Happens 10 Minutes After You Get Hacked
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
What Happens 10 Minutes After You Get Hacked
You won’t hear an alarm. Continue reading on Medium »
You’re Probably Writing Insecure JavaScript.
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 3w ago
You’re Probably Writing Insecure JavaScript.
You’re Probably Writing Insecure JavaScript (And You Don’t Even Know It) Most JavaScript applications I review, even the good ones, have… Continue reading on Me
You’re Probably Writing Insecure JavaScript.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
You’re Probably Writing Insecure JavaScript.
You’re Probably Writing Insecure JavaScript (And You Don’t Even Know It) Most JavaScript applications I review, even the good ones, have… Continue reading on Me
Dark Web Leakage Diarisis
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Dark Web Leakage Diarisis
“Be careful, your breach is their business!”.. To show you exactly how that business operates, I just finished a write-up on my website… Continue reading on Med
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Ciberseguridad en México: la brecha invisible del sector público
La ciberseguridad hoy en día es pieza clave para empresas multinacionales, PyMEs, universidades, personas y gobierno. La privacidad de… Continue reading on Medi
Un grupo no autorizado asegura haber logrado acceso a Mythos, la herramienta de ciberseguridad de…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Un grupo no autorizado asegura haber logrado acceso a Mythos, la herramienta de ciberseguridad de…
Además, vulnerabilidades críticas en SharePoint, aplicaciones falsas en la App Store, el ICE utiliza spyware, extensiones de TikTok… Continue reading on Medium
Kendi Siber Güvenlik Laboratuvarınızı Kurun: Ağ Mimarisi ve pfSense Kurulumu
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Kendi Siber Güvenlik Laboratuvarınızı Kurun: Ağ Mimarisi ve pfSense Kurulumu
Siber Güvenlik alanında kendinize bir bakış açısı kazandırmak, bir şeyleri tecrübe etmek istiyorsanız size verilen tavsiyelerden birisi de… Continue reading on
HTB Footprinting Lab — Easy
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
HTB Footprinting Lab — Easy
Hey everyone! Today I’m sharing how I solved the Footprinting Lab — Easy on Hack The Box. This lab is all about enumerating services and… Continue reading on Me
Projects vs Certifications in Cybersecurity — What Actually Gets You Hired?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Projects vs Certifications in Cybersecurity — What Actually Gets You Hired?
By Karanam Shrivasta 15-Year-Old Cybersecurity Enthusiast Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
ByteCode C2 — Open source framework, 0/63 on VT, bypasses Defender
I developed a command-and-control (C2) framework with a primary focus on improving evasion techniques, motivated by observing that… Continue reading on Medium »
20 Penetration Testing Projects Worth Adding to Your Resume
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
20 Penetration Testing Projects Worth Adding to Your Resume
For job seekers aiming for penetration testing positions by curating 20 real-world projects spanning entry‑level to expert‑level scenarios. Continue reading on
iOS 26.4.2: Apple Emergency iPhone Update Fixes Deleted Notification Bug
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 3w ago
iOS 26.4.2: Apple Emergency iPhone Update Fixes Deleted Notification Bug
Apple has released a new iPhone update — that has taken many by surprise — to address a vulnerability that was recently exploited by the FBI.
Human-in-the-loop: OWASP GenAI Security Project, Anthropic’s Claude Mythos Preview & Project…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Human-in-the-loop: OWASP GenAI Security Project, Anthropic’s Claude Mythos Preview & Project…
“Human‑in‑the‑loop” means keeping humans actively involved in a process - whether by operating, supervising, or making key decisions… Continue reading on Medium
Cat Pictures — TryHackMe WalkThrough
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Cat Pictures — TryHackMe WalkThrough
Continue reading on Medium »
CYBERSECURITY | LLM09:2025
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
CYBERSECURITY | LLM09:2025
The Devil is in the Dependencies: When AI Hallucinations Turn Malicious Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Online vs Offline Cybersecurity Training: Which One Should You Choose?
Right now, web access fills every part of life. People tap into it to study, play, buy things, also chat with others they know. With so… Continue reading on Med
The Science of Protecting Information in the Digital World
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Science of Protecting Information in the Digital World
In the modern digital world, information is one of the most valuable assets. People use digital systems every day to send messages, make… Continue reading on Me
Eksperimen Keamanan Web: Mengamankan Portal Berita dari Serangan SQL Injection
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Eksperimen Keamanan Web: Mengamankan Portal Berita dari Serangan SQL Injection
Oleh: Fajar Fawwaz Atallah NIM: 312410357 Continue reading on Medium »
Eksperimen Keamanan Web: Mengamankan Portal Berita dari Serangan SQL Injection
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Eksperimen Keamanan Web: Mengamankan Portal Berita dari Serangan SQL Injection
Oleh: Fajar Fawwaz Atallah NIM: 312410357 Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Invisible Trigger. On the The Com ecosystem and the evil that found a business model
In Place of a Preface: The Piece I Did Not Want to Write Continue reading on Medium »
Day 9: File Uploads Are More Dangerous Than I Thought
Dev.to · GraceSoft 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Day 9: File Uploads Are More Dangerous Than I Thought
I already had an attachments system. It worked across all modules. Reusable. Clean....
I Built an AI-Powered Network Intrusion Detection System for My Final Year Project — Here’s Exactly…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
I Built an AI-Powered Network Intrusion Detection System for My Final Year Project — Here’s Exactly…
And why “just training a model” was the least interesting part of the whole thing. Continue reading on Medium »
Journey toward the SOC Analyst
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Journey toward the SOC Analyst
Class 1: Introduction & importance of SOC in the blue team Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Why I built Activitee — and why the way most organisations prove compliance is quietly broken
The first time I watched a CISO open a SharePoint folder called IRAP Evidence 2024 FINAL_v3 the day before an assessor arrived, I thought… Continue reading on M
Why I Use Argon2id Instead of bcrypt for PDF Encryption Keys
Dev.to · hiyoyo 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Why I Use Argon2id Instead of bcrypt for PDF Encryption Keys
All tests run on an 8-year-old MacBook Air. When you encrypt a PDF with a password, that password...
ShinyHunters Unmasked: Exploring the Ethics and Implications of the World’s Leading Cyberhack…
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 3w ago
ShinyHunters Unmasked: Exploring the Ethics and Implications of the World’s Leading Cyberhack…
A shadowy collective is quietly harvesting the data of the digital age — exposing how our rush toward convenience, and our growing… Continue reading on Medium »
SOC251 — Quishing Detected (QR Code Phishing)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
SOC251 — Quishing Detected (QR Code Phishing)
Well giving you some information on Quishing this is a Phishing email where QR is used to phish the personal information or data. Continue reading on Medium »
What Government Data Breaches Teach Us About Access Control
Dev.to · logiQode 🔐 Cybersecurity ⚡ AI Lesson 3w ago
What Government Data Breaches Teach Us About Access Control
When a government agency confirms a breach only after a hacker begins advertising the stolen data for...
SSRF Master Guide: Exploitation and Mitigation Strategies
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
SSRF Master Guide: Exploitation and Mitigation Strategies
Learn how to identify and exploit SSRF vulnerabilities in cloud-native environments, from metadata services to filter bypass. Continue reading on Medium »
When the Responder Becomes the Risk
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
When the Responder Becomes the Risk
Most ransomware stories are told the same way. There is an attacker, a victim, a breach, a ransom demand, and then the long, messy process… Continue reading on
How Hackers Use OSINT Before Attacking
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How Hackers Use OSINT Before Attacking
They do not start with exploits. They start with Google. Continue reading on OSINT Team »
How To Hire CISO For Tech Company
Dev.to · Willis Reed Fan 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How To Hire CISO For Tech Company
The role of a Chief Information Security Officer (CISO) has become increasingly vital for tech...
This Chick Is Not Real
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
This Chick Is Not Real
The loneliest guys on the internet just found the perfect woman — and she doesn’t exist. Continue reading on Medium »
The Rediscovered Wheel: How a 2026 Cybersecurity Paper Dressed the 1960s in a Lab Coat
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Rediscovered Wheel: How a 2026 Cybersecurity Paper Dressed the 1960s in a Lab Coat
Author: Berend Watchus Independent AI & Cybersecurity Researcher. Continue reading on OSINT Team »
Stop Identity Hijacking in DaaS: A 2026 Guide to Passkeys and Token Protection
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Stop Identity Hijacking in DaaS: A 2026 Guide to Passkeys and Token Protection
A practical playbook: from passkeys and Conditional Access to token protection and JIT privileged access Continue reading on Medium »
5 Cyber Risks Boards Can’t Afford to Ignore
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
5 Cyber Risks Boards Can’t Afford to Ignore
Cybersecurity is now a leadership issue not just an IT problem. Continue reading on Medium »
Claude Mythos Probably Isn’t What You Think It Is
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Claude Mythos Probably Isn’t What You Think It Is
Dangerous AI? Marketing stunt? Or a protection racket? Continue reading on Medium »
I Told gVisor I Was Root & It Believed Me
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
I Told gVisor I Was Root & It Believed Me
How I Got Root in Google’s Secure Container Runtime With One Syscall Continue reading on Medium »
Environment Cross-Trust: Leveraging Staging APIs to “Buy” for $0.00
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Environment Cross-Trust: Leveraging Staging APIs to “Buy” for $0.00
Many bug hunters are afraid to delve into the scope of famous companies, thinking it’s the most complex system they’ve ever seen. Based on… Continue reading on
Azure Policy: Baking Security In part 1
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Azure Policy: Baking Security In part 1
Building an Azure Governance MVP Continue reading on Medium »
Why Your HTTPS Traffic Still Gets Blocked (and How DPI Evasion Works)
Dev.to · Alan West 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Why Your HTTPS Traffic Still Gets Blocked (and How DPI Evasion Works)
Understanding why HTTPS traffic gets blocked by DPI, how domain fronting and HTTP tunneling work, and practical solutions for restrictive networks.
OSINT (Open Source Intelligence / Açıq Mənbə Kəşfiyyatı) — Sofia Santos OSINT CTF Həlli və İzah
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
OSINT (Open Source Intelligence / Açıq Mənbə Kəşfiyyatı) — Sofia Santos OSINT CTF Həlli və İzah
Bu yazıda Sofia Santos’un məşhur OSINT CTF tapşırıqlarından biri olan Exercise #021 həllini və izahını addım-addım göstərəcəyəm. Ancaq… Continue reading on Medi
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 3w ago
FCC's router ban expands to portable hotspots - 4 things this means for you
It may get more difficult to upgrade your hotspot - and you'll have other things to worry about, too.