Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,036
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,654 reads from curated sources

KALI LINUX SETUP IN VMWARE
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
KALI LINUX SETUP IN VMWARE
A simple guide to installing Kali Linux in VMware Workstation for cybersecurity practice. Continue reading on Medium »
Scapy ile DeauthPacketDetector Pojesi
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Scapy ile DeauthPacketDetector Pojesi
Etrafınızdaki bir ağda deauth saldırısı yaşanıyor olabilir — ve bunu Python ile 50 satırda tespit edebilirsiniz. Python’ın derinlemesine… Continue reading on Me
Fragmented Cyber Risk Transfer Is Changing Board Oversight
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Fragmented Cyber Risk Transfer Is Changing Board Oversight
Cyber risk transfer is fragmenting, forcing boards to rethink cyber oversight, incident response, executive liability, and insurance gaps.
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Can hackers break encrypted USB drives? I tried to find out
The Kingston IronKey Locker+50 G2 offers a high level of data security and several unique features to deter hackers.
CVE-2026-27478: CVE-2026-27478: Authentication Bypass via Dynamic JWKS Discovery in Unity Catalog
Dev.to · CVE Reports 🔐 Cybersecurity ⚡ AI Lesson 1w ago
CVE-2026-27478: CVE-2026-27478: Authentication Bypass via Dynamic JWKS Discovery in Unity Catalog
CVE-2026-27478: Authentication Bypass via Dynamic JWKS Discovery in Unity...
Langflow CVE-2026-33017: 20 horas entre el advisory y el RCE masivo
Dev.to · lu1tr0n 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Langflow CVE-2026-33017: 20 horas entre el advisory y el RCE masivo
Un CVSS 9.8 en Langflow pasó del advisory a explotación masiva en honeypots en 20 horas, sin PoC público.
Secure Your Go Apps Before Production Does It For You
Dev.to · Shrijith Venkatramana 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Secure Your Go Apps Before Production Does It For You
Hello, I'm Shrijith Venkatramana. I'm building git-lrc, an AI code reviewer that runs on every...
GHSA-MHWJ-73QX-JQXM: GHSA-MHWJ-73QX-JQXM: Prototype Pollution in @theecryptochad/merge-guard via deepMerge()
Dev.to · CVE Reports 🔐 Cybersecurity ⚡ AI Lesson 1w ago
GHSA-MHWJ-73QX-JQXM: GHSA-MHWJ-73QX-JQXM: Prototype Pollution in @theecryptochad/merge-guard via deepMerge()
GHSA-MHWJ-73QX-JQXM: Prototype Pollution in @theecryptochad/merge-guard via...
This Is How I Could Have Reactivated Your Instagram Account Without Your Knowledge
Dev.to · Shubham Bhamare 🔐 Cybersecurity ⚡ AI Lesson 1w ago
This Is How I Could Have Reactivated Your Instagram Account Without Your Knowledge
In this write-up, I have shared the story of an Instagram bug where deactivated account could be...
FROM TOR TO TRACEABLE: WHY 90% OF 'ANONYMOUS' Threat actors ARE ONE MISTAKE AWAY FROM EXPOSURE
Dev.to · Adrian Alexandru Stinga 🔐 Cybersecurity ⚡ AI Lesson 1w ago
FROM TOR TO TRACEABLE: WHY 90% OF 'ANONYMOUS' Threat actors ARE ONE MISTAKE AWAY FROM EXPOSURE
After spending ~15 years monitoring underground ecosystems, I've observed a pattern so consistent it...
CVE-2026-40217: CVE-2026-40217: Remote Code Execution via Sandbox Escape in LiteLLM
Dev.to · CVE Reports 🔐 Cybersecurity ⚡ AI Lesson 1w ago
CVE-2026-40217: CVE-2026-40217: Remote Code Execution via Sandbox Escape in LiteLLM
CVE-2026-40217: Remote Code Execution via Sandbox Escape in LiteLLM Vulnerability ID:...
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The patching treadmill: Why traditional application security is no longer enough
Find-and-fix security once made sense, but AI-assisted development, continuous deployment, and exploding vulnerability backlogs are changing the rules. The old
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Beyond the cleanup job: Redefining application security for the modern enterprise
Secure-by-design is no longer just a developer concern. Enterprise leaders must treat application security as a board-level responsibility, with accountability,
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Stopping bugs before they ship: The shift to preventative security
Secure software starts before coding begins. Threat modeling, safer defaults, dependency hygiene, and developer workflow guardrails can help prevent vulnerabili
The Cybersecurity Budget Nobody Approves Until the Breach
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Cybersecurity Budget Nobody Approves Until the Breach
Why hospitals keep treating cybersecurity like an expense until it becomes the most expensive emergency in the building Continue reading on Medium »
Ağda Ne Var? Kali ile İlk Keşif
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Ağda Ne Var? Kali ile İlk Keşif
Öğrenerek Yazıyorum #1 Continue reading on Medium »
Delete the Vercel Claude Code Plugin. Here's Why I Did.
Dev.to · taekim34 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Delete the Vercel Claude Code Plugin. Here's Why I Did.
TL;DR The Vercel Claude Code plugin creates a permanent device UUID on your machine the...
TechCabal 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Three of Nigeria’s biggest banks lost $1.56 million to fraud in 2025
Nigeria's biggest banks lost $1.56 million to fraud in 2025. While incidents fell, fraudsters are extracting more per attack as digital payments scale.
‘Signifcant Threat’—Billions Of Gmail Users At Risk From Google Gaffe
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 1w ago
‘Signifcant Threat’—Billions Of Gmail Users At Risk From Google Gaffe
New research has confirmed that almost every individual with a Gmail account is at significant risk from dangerous Google security flaw—what you need to know.
How I fixed network state corruption in my Linux Tor proxy
Dev.to · onyks 🔐 Cybersecurity ⚡ AI Lesson 1w ago
How I fixed network state corruption in my Linux Tor proxy
Most transparent proxy scripts share a fatal flaw: if they crash, they take your system's network...
Customer-Driven AI CTI Project Template. Part 1: Foundations
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Customer-Driven AI CTI Project Template. Part 1: Foundations
From pure CTI to hands-on detection engineering with strict validation gates Continue reading on Medium »
Threat Intelligence: From Data to Decision in Cybersecurity Operations
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Threat Intelligence: From Data to Decision in Cybersecurity Operations
How organizations transform raw threat data into actionable security decisions Continue reading on Medium »
Moving From a Managed WAF to One We Actually Owned
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Moving From a Managed WAF to One We Actually Owned
A practical account of evaluating, proof-of-concepting, and migrating 100+ web assets to Imperva over four months, without taking down a… Continue reading on Me
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Bypassing Stack Canaries: Your Next Step in Exploit Development (2025)
Tags: cybersecurity exploit-development stack-canary buffer-overflow format-string binary-exploitation ethical-hacking ctf infosec… Continue reading on Medium »
LetsDefend: SOC141 — Phishing URL Detected | Event ID 86
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
LetsDefend: SOC141 — Phishing URL Detected | Event ID 86
Today, we will be stepping into the shoes of a SOC Analyst to investigate and contain the SOC141 — Phishing URL Detected alert on the… Continue reading on Mediu
The Identity Crisis: Why 2026 is the Year We Stop Trusting Our Eyes
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Identity Crisis: Why 2026 is the Year We Stop Trusting Our Eyes
I remember the first time I saw a deepfake that actually worked. Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Defense in Depth
Introduction to Defense in Depth Continue reading on Medium »
The Illusion of Deletion: When Companies Say Your Data Is Gone, How Do You Know?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Illusion of Deletion: When Companies Say Your Data Is Gone, How Do You Know?
We live in an age where companies increasingly promise users more control over their personal data. Continue reading on Medium »
Google And Microsoft Warn Passkeys May Not Stop Hackers
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Google And Microsoft Warn Passkeys May Not Stop Hackers
Your passkey alone is not enough — here's what you must do to secure your accounts.
How I Found Unlimited Account Creation Vulnerability Due to Improper Access Control
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
How I Found Unlimited Account Creation Vulnerability Due to Improper Access Control
A deep dive into a registration logic flaw that allowed mass account creation without email verification. Continue reading on Medium »
Why I’m Not Switching My VPN: A Deep Dive into Digital Sovereignty
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Why I’m Not Switching My VPN: A Deep Dive into Digital Sovereignty
In 2026, the internet is faster, smarter, and unfortunately, more intrusive than ever. Continue reading on Medium »
HackTheBox: Campfire-1 Sherlock Walkthrough
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
HackTheBox: Campfire-1 Sherlock Walkthrough
Detecting Kerberoasting Activity: Correlating Kerberos Events, PowerShell Logs, and Prefetch Artifacts Continue reading on Medium »
Fixing NVIDIA BadTLP PCIe Freezes on Linux - or an ASUS TUF gaming laptop odyssey
Dev.to · Pedro Tolvo 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Fixing NVIDIA BadTLP PCIe Freezes on Linux - or an ASUS TUF gaming laptop odyssey
Preface Firstly, I truly hope this little article could help someone with similar problem....
Stack Trace Exposure via Malformed Authorization Header
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Stack Trace Exposure via Malformed Authorization Header
Weakness: Information Exposure Through an Error Message Severity:Medium (6.1) Status: Triaged (Open) — Fix Pending Continue reading on Medium »
Exposed Database Dump via Directory Listing on ETH Zurich Infrastructure
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Exposed Database Dump via Directory Listing on ETH Zurich Infrastructure
Weakness:Sensitive Information Disclosure / Improper Access Control Severity: High Status: Resolved Program: Responsible Disclosure… Continue reading on Medium
GraphQL API Vulnerability: From Lab Swagger to Battle-Ready
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
GraphQL API Vulnerability: From Lab Swagger to Battle-Ready
GraphQL is quickly becoming the standard for modern APIs, but as the saying goes, “with great power comes great responsibility” — or in… Continue reading on Med
What the heck is a Passkey? (And why do they make my life so much easier?)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
What the heck is a Passkey? (And why do they make my life so much easier?)
The actual cryptography, the actual reason phishing fails, and the rare truce between Apple, Google, and Microsoft. Continue reading on Medium »
Your AI Agent Dockerfile Might Be Leaking Secrets
Dev.to · Raju Dandigam 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Your AI Agent Dockerfile Might Be Leaking Secrets
Learn how to use Docker Build Secrets to prevent credential leaks in Node.js AI applications
The Browser Is Not a Security Boundary
Dev.to · Anonymous Security Researcher 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Browser Is Not a Security Boundary
Photo by Zulfugar Karimov on Unsplash Modern web applications increasingly push business logic...
‘One Time Restart’—Microsoft Changes Windows After 15 Years
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 1w ago
‘One Time Restart’—Microsoft Changes Windows After 15 Years
Microsoft starts expiring critical Secure Boot certificates in just 2 weeks.
CYBERDUDEBIVASH SENTINEL APEX — AI-Powered Cyber Threat Intelligence Platform for Modern Enterprise…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
CYBERDUDEBIVASH SENTINEL APEX — AI-Powered Cyber Threat Intelligence Platform for Modern Enterprise…
Daily Threat Intel by CyberDudeBivash Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks. Continue reading on Medium »
Ubuntu Blocked One Door. Dirty Frag Found Another
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Ubuntu Blocked One Door. Dirty Frag Found Another
A Linux kernel bug, a blocked path, and a painful reminder that attackers do not need every door open. They only need one. Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
AltaySec ile Geleceğin Siber Güvenlik Ekosistemi
AltaySec; siber güvenlik eğitimleri, yapay zeka güvenliği, phishing simülasyonları ve veri koruma çözümleri geliştiren yerli ve milli bir… Continue reading on M
CRA Technical Documentation: Complete Checklist for Manufacturers
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
CRA Technical Documentation: Complete Checklist for Manufacturers
Everything your engineering team needs to build an Annex VII-compliant technical file before the December 2027 deadline. Continue reading on Medium »
The Best Bug Bounty Skill Isn’t Hacking… It’s Pattern Recognition
Medium · Machine Learning 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Best Bug Bounty Skill Isn’t Hacking… It’s Pattern Recognition
How I started finding vulnerabilities faster without learning new exploits Continue reading on Level Up Coding »
The Best Bug Bounty Skill Isn’t Hacking… It’s Pattern Recognition
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Best Bug Bounty Skill Isn’t Hacking… It’s Pattern Recognition
How I started finding vulnerabilities faster without learning new exploits Continue reading on Level Up Coding »
The Best Bug Bounty Skill Isn’t Hacking… It’s Pattern Recognition
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1w ago
The Best Bug Bounty Skill Isn’t Hacking… It’s Pattern Recognition
How I started finding vulnerabilities faster without learning new exploits Continue reading on Level Up Coding »
Inner Warden: A Lightweight Open Source eBPF EDR for Linux that Actually Blocks Attacks
Dev.to · Maicon Ribeiro Esteves 🔐 Cybersecurity ⚡ AI Lesson 1w ago
Inner Warden: A Lightweight Open Source eBPF EDR for Linux that Actually Blocks Attacks
Inner Warden: an autonomous eBPF security agent that fights back Most security tools only...