Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,039
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,657 reads from curated sources

The $442 Billion Siege: Why Your Banking App Is the Most Dangerous App on Your Phone
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The $442 Billion Siege: Why Your Banking App Is the Most Dangerous App on Your Phone
A silent war is already underway Continue reading on Medium »
The $442 Billion Siege: Why Your Banking App Is the Most Dangerous App on Your Phone
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The $442 Billion Siege: Why Your Banking App Is the Most Dangerous App on Your Phone
A silent war is already underway Continue reading on Medium »
Vibe-coded Mac apps are arriving fast — here is what gets lost in the process
Hackernoon 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Vibe-coded Mac apps are arriving fast — here is what gets lost in the process
AI-powered “vibe-coded” Mac apps are flooding GitHub, promising free alternatives to tools like CleanMyMac. But many lack reliability, proper permissions handli
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Active Reconnaissance: TryHackMe Walkthrough
Task 2: Web Browser: Continue reading on Medium »
RAM Is Lying to You — and Rowhammer Is the Proof
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
RAM Is Lying to You — and Rowhammer Is the Proof
Your RAM is supposed to be one of the safest parts of your computer. It doesn’t have persistent storage. It can’t be “infected” the way a… Continue reading on M
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Why Edge stores your passwords in plaintext, according to Microsoft
The behavior is by design, says Microsoft. But is this still a security risk?
TryHackMe: Bounty Hacker WriteUp
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
TryHackMe: Bounty Hacker WriteUp
TryHackMe: Bounty Hacker Write-Up Continue reading on Medium »
usefulness of Ipv4
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 2w ago
usefulness of Ipv4
IPv4 has been around for decades, and here are some of its advantages: -: IPv4 is widely supported by devices, networks, and applications… Continue reading on M
usefulness of Ipv4
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
usefulness of Ipv4
IPv4 has been around for decades, and here are some of its advantages: -: IPv4 is widely supported by devices, networks, and applications… Continue reading on M
The Future of Connectivity: Why Precision Fiber Testing is Non-Negotiable
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Future of Connectivity: Why Precision Fiber Testing is Non-Negotiable
Continue reading on Medium »
Why FC-10–0040F-247–02–12 is the Essential SMB License for the 2026 Threat Landscape
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Why FC-10–0040F-247–02–12 is the Essential SMB License for the 2026 Threat Landscape
Navigating the 2026 threat landscape: A deep dive into why the FC-10–0040F-247–02–12 SKU is the ultimate insurance policy for your network. Continue reading on
AI Just Made Kernel Zero-Days Cheap. Your Patch Process Is Not Ready.
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 2w ago
AI Just Made Kernel Zero-Days Cheap. Your Patch Process Is Not Ready.
Theori’s AI tool found a 9-year-old root-escalation bug in the Linux kernel in about an hour. Continue reading on That Infrastructure Guy »
AI Just Made Kernel Zero-Days Cheap. Your Patch Process Is Not Ready.
Medium · DevOps 🔐 Cybersecurity ⚡ AI Lesson 2w ago
AI Just Made Kernel Zero-Days Cheap. Your Patch Process Is Not Ready.
Theori’s AI tool found a 9-year-old root-escalation bug in the Linux kernel in about an hour. Continue reading on That Infrastructure Guy »
Someone Cloned My Startup. I Spent the Morning Taking It Down.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Someone Cloned My Startup. I Spent the Morning Taking It Down.
It was 8:47 AM and I was going through Ahrefs over coffee when I noticed something odd. A domain I’d never heard of was showing up in my… Continue reading on Me
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Zero Trust: The Newest Old Idea Everyone Just Discovered
I am still perseverating on Zero Trust. Continue reading on Medium »
How AI is Turning Cyber Note into Actionable Intelligence
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
How AI is Turning Cyber Note into Actionable Intelligence
Inside CenTinel 3.1 — a pipeline that transforms raw security logs into real-world threat insights Continue reading on Coffee☕ And Code »
Lattice-Based Cryptography: Foundation of PQC
Dev.to · Quantum Sequrity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Lattice-Based Cryptography: Foundation of PQC
Learn how lattice-based cryptography works, why the Learning With Errors problem is quantum-resistant, and how ML-KEM and ML-DSA use it.
Chinese chamber of commerce puts a $432bn price tag on the EU’s cybersecurity overhaul
The Next Web AI 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Chinese chamber of commerce puts a $432bn price tag on the EU’s cybersecurity overhaul
A KPMG-conducted study commissioned by the CCCEU estimates that phasing Chinese suppliers out of 18 critical EU sectors between 2026 and 2030 would cost €367.8b
No Off Season: Three Supply Chain Campaigns Hit npm, PyPI, and Docker Hub in 48 Hours
Dev.to · Dwayne McDaniel 🔐 Cybersecurity ⚡ AI Lesson 2w ago
No Off Season: Three Supply Chain Campaigns Hit npm, PyPI, and Docker Hub in 48 Hours
After a few quieter weeks, three supply chain attacks put secrets back in the spotlight. Between...
Is Cyber Security Certification Worth the Cost in India?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Is Cyber Security Certification Worth the Cost in India?
Cyber security has become an important part of today’s world as more people and businesses depend on online systems. From banking to… Continue reading on Medium
J’ai arrêté de faire des screenshots : comment l’automatisation a sauvé mon audit SOC 2 type 2.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
J’ai arrêté de faire des screenshots : comment l’automatisation a sauvé mon audit SOC 2 type 2.
C’est officiel : chez AssessFirst, nous avons lancé l’audit SOC 2 Type 2 !Après avoir consolidé notre ISO 27001, cette nouvelle étape… Continue reading on Mediu
Content Security Policy | TryHackMe
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Content Security Policy | TryHackMe
In this room you’ll learn what CSP is, what it’s used for and how to recognize vulnerabilities in a CSP header. Continue reading on Medium »
Banking 3.0 | The Bankpocalypse Horror Story
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Banking 3.0 | The Bankpocalypse Horror Story
How to Avoid the Doomsday Triggered by Mythos-Like AI Models and safeguard billions of banking customers! Continue reading on Medium »
Step-by-step setup of Wazuh SIEM
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Step-by-step setup of Wazuh SIEM
Ubuntu server setup. Continue reading on Medium »
CYBERDUDEBIVASH ENTERPRISE SECURITY ARCHITECTURE
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
CYBERDUDEBIVASH ENTERPRISE SECURITY ARCHITECTURE
Author: CyberDudeBivash Powered by: CyberDudeBivash Brand | cyberdudebivash.com Related: cyberbivash.blogspot.com… Continue reading on Medium »
TryHackMe — Junior Security Analyst Walkthrough
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
TryHackMe — Junior Security Analyst Walkthrough
SOC | Blue Teaming | Incident Response — Investigated malicious alerts, escalated incidents within a simulated SOC environment, and… Continue reading on InfoSec
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Building a Tier-1 Firewall Troubleshooting Runbook: A Practical Framework for IT Support Teams
By Ahamd Alassadi— Network Security Engineer Reading time: 7 minutes Continue reading on Medium »
CVE-2026-6970: CVE-2026-6970: Local Privilege Escalation via Improper GID Assignment in Canonical authd
Dev.to · CVE Reports 🔐 Cybersecurity ⚡ AI Lesson 2w ago
CVE-2026-6970: CVE-2026-6970: Local Privilege Escalation via Improper GID Assignment in Canonical authd
CVE-2026-6970: Local Privilege Escalation via Improper GID Assignment in Canonical...
Urgensi Keamanan Berbasis Identitas: Mengatasi Kerentanan Autentikasi di Infrastruktur Digital
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Urgensi Keamanan Berbasis Identitas: Mengatasi Kerentanan Autentikasi di Infrastruktur Digital
Di balik sistem keamanan yang paling kompleks sekalipun, identitas pengguna tetap menjadi salah satu target utama bagi para peretas… Continue reading on Medium
Tether, Binance, and Others Freeze $41.5M of Stolen Funds
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Tether, Binance, and Others Freeze $41.5M of Stolen Funds
Stablecoin issuer Tether, alongside Binance, OKX, US law enforcement, and independent security agents, has frozen over $41.5 million tied… Continue reading on M
“Bisnis Kecil Nggak Bakal Kena Hack” Mitos yang Bisa Membunuh Usahamu
Medium · Startup 🔐 Cybersecurity ⚡ AI Lesson 2w ago
“Bisnis Kecil Nggak Bakal Kena Hack” Mitos yang Bisa Membunuh Usahamu
43% serangan siber di Indonesia menyasar usaha kecil. Bukan perusahaan besar. Bukan bank. Tapi bisnis seperti punyamu. Continue reading on Medium »
Reflected XSS into a JavaScript string with HTML-encoded angle brackets (<,>)
Medium · JavaScript 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Reflected XSS into a JavaScript string with HTML-encoded angle brackets (<,>)
Input is reflected immediately inside a JavaScript string, where angle brackets ( ) are HTML-encoded Continue reading on Medium »
Waspada Malware! Mengenal Jenis-Jenisnya, Cara Mengatasi, dan Mencegahnya
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Waspada Malware! Mengenal Jenis-Jenisnya, Cara Mengatasi, dan Mencegahnya
HP tiba-tiba lemot, data hilang, atau tiba-tiba ada tagihan aneh? Bisa jadi perangkatmu sudah terinfeksi malware. Yuk kenali musuhnya… Continue reading on Mediu
An AI Deleted Another Database. The Real Story Isn’t the AI.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
An AI Deleted Another Database. The Real Story Isn’t the AI.
PocketOS, Replit, and the three architectural control gaps behind agent-driven production failures. Continue reading on Medium »
Learning Fortinet Firewall — LESSON 8: Software Switch / Layer 2
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Learning Fortinet Firewall — LESSON 8: Software Switch / Layer 2
Welcome to my Fortinet Firewall (FortiGate) learning journey! Continue reading on Medium »
See You Space Cowboy: Bounty Hunting Threats with Splunk
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
See You Space Cowboy: Bounty Hunting Threats with Splunk
Spike Spiegel didn’t wait for bounties to come to him. He hunted them down. Continue reading on Medium »
Systems Should Trust Less: Why Verification Must Replace Assumption
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Systems Should Trust Less: Why Verification Must Replace Assumption
Introduction Continue reading on Medium »
Guía Definitiva GraphQL para Bug Bounty: Vulnerabilidades y Explotación
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Guía Definitiva GraphQL para Bug Bounty: Vulnerabilidades y Explotación
Domina el hacking de GraphQL: desde el bypass de introspección hasta Mass Assignment y ataques BOLA para Bug Bounty. Continue reading on Medium »
Exploiting vsftpd 2.3.4 on Metasploitable2 (Step-by-Step Guide for Beginners)
Dev.to · Alex Agyei 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Exploiting vsftpd 2.3.4 on Metasploitable2 (Step-by-Step Guide for Beginners)
One of the biggest turning points in learning cybersecurity is understanding how attackers move...
Search Engine Journal 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Google Is Testing New Bot Authorization Standard via @sejournal, @martinibuster
Google is testing a cryptographic protocol for verifying bot traffic that could make unwanted crawlers easier to identify. The post Google Is Testing New Bot Au
LFI Prevention: How to Actually Fix File Inclusion Vulnerabilities
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
LFI Prevention: How to Actually Fix File Inclusion Vulnerabilities
From input validation to server hardening — what developers should be doing to prevent LFI from the ground up. Continue reading on MeetCyber »
LFI Automated Scanning: Finding and Fuzzing with ffuf
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
LFI Automated Scanning: Finding and Fuzzing with ffuf
Using wordlists and fuzzing tools to automate LFI discovery and server file enumeration. Part 6 of the File Inclusion series. Continue reading on MeetCyber »
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Silent Backdoor in Enterprise Security: Why Unmanaged OAuth Tokens Are the New High-Risk Vector
The rapid adoption of AI productivity tools is exposing a dangerous blind spot in enterprise security architecture. Organizations invest heavily in firewalls, S
Local Code Execution via Git Workspace Poisoning (FSMonitor)
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Local Code Execution via Git Workspace Poisoning (FSMonitor)
Why blindly unzipping code into your IDE might be more dangerous than you think. Continue reading on Medium »
Attackers Actively Exploiting Critical Vulnerability in Breeze Cache Plugin
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Attackers Actively Exploiting Critical Vulnerability in Breeze Cache Plugin
On April 22nd, 2026, the Wordfence Intelligence Vulnerability Database publicly disclosed a critical arbitrary file upload vulnerability… Continue reading on Me
The 8th Continent: How the Internet Became a Nation-State and Nobody Noticed
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The 8th Continent: How the Internet Became a Nation-State and Nobody Noticed
It has more citizens than any country on earth. It has its own economy, its own wars, its own warlords, and its own currency. The only… Continue reading on Medi
The Register 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Viva la revolución: LinkedIn profile visitor lists belong to the people, says Noyb
GDPR Article 15 doesn't care if you want to make money by selling users' data back to them A LinkedIn feature the average non-paying user likely only glances pa
The Dreadful 9:00 AM Assessment Call
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Dreadful 9:00 AM Assessment Call
Ever feel like the first assessment meeting is more of a pissing match than a kickoff — or like you’re dancing with a partner who has two… Continue reading on M