Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,036
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,654 reads from curated sources

Authentication vs Authorization: Two Different Questions, Two Different Purposes
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Authentication vs Authorization: Two Different Questions, Two Different Purposes
Understanding how secure systems verify identity first and then control access to actions and resources  Continue reading on CodeX »
From Ingestion to Final Verdict: THREATRADAR’s Poisoning Detection Pipeline
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
From Ingestion to Final Verdict: THREATRADAR’s Poisoning Detection Pipeline
Welcome to the fourth article in the THREATRADAR series. We recommend reading Part 1 Design and Implementation of THREATRADAR: Open-Source… Continue reading on
When VirusTotal Can’t Name It: Identifying Malware Through Metadata
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
When VirusTotal Can’t Name It: Identifying Malware Through Metadata
Two samples sitting in my honeypot had 55+ detection flags on VirusTotal but no threat label. No family name, no classification. Just… Continue reading on Mediu
NoSQL Injection Guide: Fundamentals, Types, Exploitation, and Mitigation
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
NoSQL Injection Guide: Fundamentals, Types, Exploitation, and Mitigation
Learn the basics of NoSQL injection, attack vectors in MongoDB, and advanced exploitation and defense strategies. Continue reading on Medium »
The Authentication Debt Nobody Wants to Audit. And Attackers Know It.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Authentication Debt Nobody Wants to Audit. And Attackers Know It.
Zero Trust, MFA, cloud security the conversation never stops. But underneath it all, two protocols from the 1990s still decide who gets in… Continue reading on
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Multi-Layer Packet Processing Pipeline for DDoS Mitigation
Part of the Mirai Guard open research series on multi-layer DDoS defense architecture. Continue reading on Medium »
4 Gigabytes You Didn’t Download
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 1w ago
4 Gigabytes You Didn’t Download
Chrome silently installed Gemini Nano on your machine. Delete it and will bedownloaded again. Continue reading on AI Advances »
Quantum-Safe, or Quantum-Scented?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Quantum-Safe, or Quantum-Scented?
Why the cybersecurity industry’s quantum discourse is long on vocabulary and short on understanding — and who profits from the gap. Continue reading on Medium »
TryHackMe | Monitoring AWS Logins | WriteUp
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
TryHackMe | Monitoring AWS Logins | WriteUp
Explore AWS authentication, common IAM threats, and SIEM detection options. Continue reading on T3CH »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Artificial Intelligence in Cybersecurity: Why Cyberattacks Are Increasing and How Users Can Defend…
By Fabian Andres Naranjo Rodríguez Master’s in Cybersecurity | PMP® | AWS Certified Cloud Practitioner Senior IT Infrastructure… Continue reading on Medium »
7deadbone labs #002 — Threat Actor Gains Initial Access. Analyst Was Watching.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
7deadbone labs #002 — Threat Actor Gains Initial Access. Analyst Was Watching.
TLP: CLEAR | Classification: Homelab | Date: 2026–04–01 Continue reading on Medium »
Deep Diving into Digital Extortion: A Comparative Malware Analysis of WannaCrypt and AsyncRAT Phase…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Deep Diving into Digital Extortion: A Comparative Malware Analysis of WannaCrypt and AsyncRAT Phase…
Unmasking the Architecture of Modern Cyber Threats: From Global Ransomware Outbreaks to Persistent Remote Access Phase 3 Continue reading on System Weakness »
Why Security Engineers Who Ignore Claude Code Will Be Obsolete by 2027
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Why Security Engineers Who Ignore Claude Code Will Be Obsolete by 2027
Claude Code Is Changing What “High Performance” Looks Like in Security Teams Continue reading on InfoSec Write-ups »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Where Can Someone Access Your Business? The Access Points Every Company Must Review
Most companies invest in cybersecurity tools — but still overlook one fundamental question: where can someone actually access your… Continue reading on Medium »
TechRepublic 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Over 1 Million Baby Monitors, Security Cameras Exposed Through Meari Flaws
Meari IoT flaws reportedly exposed baby monitor images, camera activity, and device data across more than 1 million connected devices. The post Over 1 Million B
How to Survive the AIpocalypse & The Big Three Careers of the Future
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
How to Survive the AIpocalypse & The Big Three Careers of the Future
The AI era is here. Cybersecurity, cloud engineering & marketing may become the safest careers left in the modern world of "Good Enough". Continue reading on Me
SQL Injection- Walkthrough
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
SQL Injection- Walkthrough
Vulnerability Name/Title Continue reading on Medium »
Web Application Penetration Testing: What It Is and How It Works
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Web Application Penetration Testing: What It Is and How It Works
Your web application passed code reviews, sailed through QA, and looked clean in staging. Then someone found a SQL injection in your login… Continue reading on
Web Server Attacks — I | TryHackMe | practical challenge
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Web Server Attacks — I | TryHackMe | practical challenge
Enumerate and identify misconfigurations across Apache, Nginx, Node.js, and Python HTTP Server. Continue reading on Medium »
Introduction to Mark of the Web (MotW) & DLL Sideloading
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Introduction to Mark of the Web (MotW) & DLL Sideloading
แค่แปะป้ายว่ามาจาก Internet มันจะช่วยลดภัยคุกคาม Cybersecurity ได้มากแค่ไหนกัน Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
DNS Pentesting: What a Professional Bug Bounty Hunter Actually Checks When Port 53 is Open
When beginners start learning reconnaissance and bug bounty hunting, they usually focus on things like: Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Yggdrasil Network: A Decentralized, Privacy-Focused Mesh
The Yggdrasil Network is an experimental, end-to-end encrypted IPv6 overlay that connects nodes into a self-healing, decentralized mesh… Continue reading on Med
Metamorphosis (THM) Tryhackme WriteUp Answer
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Metamorphosis (THM) Tryhackme WriteUp Answer
Description : Part of Incognito CTF Continue reading on Medium »
InfoQ AI/ML 🔐 Cybersecurity ⚡ AI Lesson 1w ago
GitHub Expands Secret Scanning with General Availability of MCP Server Integration
GitHub has announced the general availability of secret scanning support through its MCP Server, extending automated credential detection and remediation capabi
Open Directory Listings: The WordPress Security Hole You Forgot
Dev.to · Jonathan Pimperton 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Open Directory Listings: The WordPress Security Hole You Forgot
Open Directory Listings: The WordPress Security Hole You Forgot Many web developers and...
OT Network Segmentation: The Foundation of Industrial Cybersecurity by Saleem Yousaf
Dev.to · Saleem Yousaf 🔐 Cybersecurity ⚡ AI Lesson 1w ago
OT Network Segmentation: The Foundation of Industrial Cybersecurity by Saleem Yousaf
Most OT cyber incidents become major business disruptions because attackers can move laterally...
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Debuggix vs. Snyk: Why "Identifying" Vulnerabilities Isn't Enough Anymore
In DevSecOps, Snyk has been the default. It's great at scanning dependencies. But it's a smoke detector — it tells you the house is on fire, but doesn't hand yo
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Saleem Yousaf insight: Understanding MITRE ATT&CK and MITRE ATLAS for Modern Cloud Security
Security isn’t just about firewalls anymore. Modern attacks target: • Cloud identities • SaaS apps • APIs • Containers • AI systems • Hybrid infrastructure To d
Mythos AI Found a Real Curl Vulnerability — What It Signals for Security Audits
Dev.to · pickuma 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Mythos AI Found a Real Curl Vulnerability — What It Signals for Security Audits
Daniel Stenberg confirmed Mythos surfaced a real bug in curl, one of the most-reviewed codebases on the planet. Here's what that means for AI-assisted security
HIPAA Compliant Software Development: Step-by-Step Guide for Healthtech Founders
Dev.to · Vladimir Levchenko 🔐 Cybersecurity ⚡ AI Lesson 1w ago
HIPAA Compliant Software Development: Step-by-Step Guide for Healthtech Founders
Step Two: Conduct a Risk Analysis Before Writing Any Code The HIPAA Security Rule explicitly requires...
When the Pentest Wins: Hardening a Legacy API Without Breaking the Business
Dev.to · Guy Gontar 🔐 Cybersecurity ⚡ AI Lesson 1w ago
When the Pentest Wins: Hardening a Legacy API Without Breaking the Business
The report was a disaster. During a scheduled Penetration Test, the security firm didn’t just find...
I shipped a public Apify actor that scans Supabase projects for RLS leaks (took 90 min, found a 895-record leak on the first real test run)
Dev.to · Perufitlife 🔐 Cybersecurity ⚡ AI Lesson 1w ago
I shipped a public Apify actor that scans Supabase projects for RLS leaks (took 90 min, found a 895-record leak on the first real test run)
Just shipped a new public Apify actor: Supabase RLS Security Scanner. What it does: paste your...
What Building an AWS Security Audit Tool Taught Me That Tutorials Never Could
Medium · DevOps 🔐 Cybersecurity ⚡ AI Lesson 1w ago
What Building an AWS Security Audit Tool Taught Me That Tutorials Never Could
Most cloud security tutorials give you a dangerous illusion. Continue reading on Medium »
DNS Security Misconfigurations: 12 Real-World Cases Every Pentester Should Master
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
DNS Security Misconfigurations: 12 Real-World Cases Every Pentester Should Master
Did you know that a single misconfigured DNS record can open your entire organization to malware, phishing, or even full system compromise… Continue reading on
Your next supply-chain attack will come from a package you've never heard of
Dev.to · LayerZero 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Your next supply-chain attack will come from a package you've never heard of
The TanStack npm compromise wasn't sophisticated — one maintainer's token was enough. Here are the three changes that actually shrink your blast radius.
HSC RTV CTF — Unknown Architect (Reversing — 200 pts)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
HSC RTV CTF — Unknown Architect (Reversing — 200 pts)
This was an easy one. The title gives the hint of finding the right architecture in which the binary should be run on. Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
THME Notes — Part 1
Cybersecurity 101 > Windows and AD fundamentals > Continue reading on Medium »
AI Hacking for Beginners: A Five-Article Series
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
AI Hacking for Beginners: A Five-Article Series
Article 4: How to Pentest an AI System Without Getting Lost Continue reading on MeetCyber »
AI-Powered Zero-Day Attack: A Turning Point for Cybersecurity
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
AI-Powered Zero-Day Attack: A Turning Point for Cybersecurity
Keywords: Cybersecurity, Zero-Day, AI, Threat Intelligence, Zero Trust Continue reading on Medium »
Stop Leaking API Keys: Managing Secrets in Kamal 2
Dev.to · Zil Norvilis 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Stop Leaking API Keys: Managing Secrets in Kamal 2
I see developers make a mistake that can ruin their entire month. They are building a new Rails...
SQL Server Altyapısında gMSA Dönüşümü Nasıl Yapılır
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
SQL Server Altyapısında gMSA Dönüşümü Nasıl Yapılır
Group Managed Service Accounts (gMSA), Windows Server 2012 ile tanıtılan, domain düzeyinde yönetilen özel bir hesap türüdür. Standart… Continue reading on Mediu
DeepSeek V4 Just Changed the Game Again — Here’s Why It Actually Matters
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
DeepSeek V4 Just Changed the Game Again — Here’s Why It Actually Matters
It won’t replicate the shock of R1. But what it signals is more consequential Continue reading on Medium »
After The Canvas Hack, Here’s What Students And Colleges Should Do Next
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 1w ago
After The Canvas Hack, Here’s What Students And Colleges Should Do Next
While students change passwords and watch out for imposter scams, schools should start scrutinizing their third party providers and practice for the next hack.
I launched a free software end-of-life tracker — here's why it matters more than most people realize
Dev.to · endoflife-ai 🔐 Cybersecurity ⚡ AI Lesson 1w ago
I launched a free software end-of-life tracker — here's why it matters more than most people realize
Running legacy software isn't just a technical debt problem. It's a security emergency that most...
Windows Event Viewer Rehberi: SOC Perspektifinden Windows Log Analizi
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Windows Event Viewer Rehberi: SOC Perspektifinden Windows Log Analizi
Windows işletim sistemleri, kullanıcı aktivitelerinden sistem servislerine, güvenlik olaylarından uygulama hatalarına kadar birçok işlemi… Continue reading on M
Your Website Is Leaking Data Right Now
Medium · DevOps 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Your Website Is Leaking Data Right Now
Here’s How to Plug the Holes in 15 Minutes Continue reading on Webmaster Nexus »
Your Website Is Leaking Data Right Now
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Your Website Is Leaking Data Right Now
Here’s How to Plug the Holes in 15 Minutes Continue reading on Webmaster Nexus »
WireGuard on macOS: Multi-Config Setup with Leak Protection
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
WireGuard on macOS: Multi-Config Setup with Leak Protection
The problem: you want to use two WireGuard VPNs simultaneously on a Mac: one for work and another personal VPN for AI tools, browsing and… Continue reading on M