Tech Skills
Cybersecurity
Ethical hacking, penetration testing, network security, CTFs and defensive security
Skills in this topic
8 skills — Sign in to track your progress
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Showing 1,649 reads from curated sources

Dev.to · V G P
🔐 Cybersecurity
⚡ AI Lesson
6d ago
I Built a Zero-Dependency Browser Storage Encryption Library — Here's Why
A few months ago I found myself auditing a side project and noticed something uncomfortable: I was...

Dev.to · Mark0
🔐 Cybersecurity
⚡ AI Lesson
6d ago
Breaking things to keep them safe with Philippe Laulheret
Philippe Laulheret, a Senior Vulnerability Researcher at Cisco Talos, discusses the intricacies of...

Dev.to · AgentGraph
🔐 Cybersecurity
⚡ AI Lesson
6d ago
AgentGraph Update
Long-form (~1500 words). Walk through the five attack categories mcp-security-scan checks (credential...

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
6d ago
RiskwareSupplyChain: A Freemium Software Supply Chain Risk Intelligence Tool
Frustration Meets Function Continue reading on Medium »
Dev.to AI
🔐 Cybersecurity
⚡ AI Lesson
1w ago
How to use Vercel's Deepsec with ollama
How to run continuous, AI-powered security audits on your codebase — routed through a local proxy that picks the cheapest viable model for each file. Most secur
Dev.to AI
🔐 Cybersecurity
⚡ AI Lesson
1w ago
The Hidden Supply Chain Risk in Your `pip install`
This Is Not an Anomaly The LiteLLM incident is part of an accelerating pattern: 454,000+ new malicious packages in open-source registries in 2025 Malicious pack

Dev.to · James
🔐 Cybersecurity
⚡ AI Lesson
1w ago
OSINT for Businesses: Legal Web Intelligence in 2026
Open Source Intelligence: Tools and Techniques for 2026 Open Source Intelligence (OSINT)...

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
The Hidden Terminals of the Internet: A Guide to Ports
Why the “invisible cloud” is actually a massive transportation hub, and what it teaches us about boundaries. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
In this walkthrough, I am going to show how I investigated and successfully completed the “VPN…
A lot of people rush through alerts like this and immediately assume the account was compromised just because the login came from another… Continue reading on M

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Bir HTTP İsteği Gerçekten Nerede Biter?
Sen tarayıcı üzerinden bir siteye gitmek istediğinde tren hangi duraklarda geçiyor biliyor musun? Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Scoring Cyber Maturity Across 50+ Business Units That Looked Nothing Alike
A practical account of using NIST CSF to assess and score 50+ business units across finance, insurance, technology, and other verticals… Continue reading on Med

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Deepfakes et désinformation : la menace est là
Il y a quelques années, un deepfake se repérait assez facilement. Un visage qui bougeait de façon bizarre, un son légèrement décalé, une… Continue reading on Me

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Get PQC Ready PDQ — Part 1
Quantum, AI, and the Window That’s Already Closing Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
DVWA(SQL Injection)
Input 1 into the text box and submit. Code is suppose to print ID, first name and surname to the screen. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
AI Can Find Security Holes. But Who Will Close Them?
In a previous essay, I wrote about how companies, especially in the United States, seem increasingly willing to cut people because of AI. Continue reading on Me
Dev.to AI
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Complete Guide to Computer Hacking Forensic Investigation
Cybercrime is increasing rapidly as organizations continue relying on digital systems, online services, and cloud technologies. Businesses now face cyber threat

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
mTLS Var Ama Gerçekten Güvenli mi? Mimari Bir Check-Up
mTLS (Mutual TLS) Rehberi: Nedir, Nasıl Çalışır ve Sahada Nerede Kırılır? Continue reading on Medium »

Medium · DevOps
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Trusted Publishing Didn’t Save TanStack — Why npm Supply Chain Security Just Changed Again
A lot of developers still assume one thing about modern package security: Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Trusted Publishing Didn’t Save TanStack — Why npm Supply Chain Security Just Changed Again
A lot of developers still assume one thing about modern package security: Continue reading on Medium »

Dev.to · Beatriz Albernaz
🔐 Cybersecurity
⚡ AI Lesson
1w ago
We Built a Pentesting Company Because We Were Tired of Watching Startups Get Burned
There was a pattern we kept seeing that genuinely bothered us. A startup would get to Series A, or...

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
How I Lost All My Facebook Pages to a Malicious Chrome Extension And What Every Human Needs to…
A note before we begin: This is my first article on Medium. I am a cybersecurity professional currently in active training at a… Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
AI Model impersonation, why being slow is your weapon and why latest threat intelligence is needed
A fake Hugging Face repository called “Open-OSS/privacy-filter” recently appeared, designed to impersonate an OpenAI-style privacy… Continue reading on Medium »

Dev.to · Andrea Debernardi
🔐 Cybersecurity
⚡ AI Lesson
1w ago
The database has to be a defensive boundary again
For two decades the database has been able to outsource trust to the application layer. The app...

Dev.to · Teruo Kunihiro
🔐 Cybersecurity
⚡ AI Lesson
1w ago
TanStack Was Not the Whole Story: Mini Shai-Hulud Was an npm/PyPI Supply-Chain Worm
How the TanStack npm compromise fits into the broader Mini Shai-Hulud campaign across npm, PyPI, GitHub Actions, IDE hooks, and CI/CD secrets.

Hackernoon
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Smart Contract Security: A Taxonomy of Vulnerabilities, Attacks, and Defenses
Smart contracts are immutable once deployed. A single bug can drain millions in minutes. This article builds a practical taxonomy of the most dangerous vulnerab

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Boot-to-Root Walkthrough: Compromising Devarea on HackTheBox — By BitR1FT
Today, we are taking on Devarea, a machine that tests your ability to string together multiple misconfigurations. We’ll start by… Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Mini Shai-Hulud: Yazılım Dünyasının Kalbine Sızan Görünmez Tehlikeyi Anlamak
Milyonlarca kez indirilen güvenilir altyapılar nasıl birer silaha dönüştü? Yazılım tedarik zinciri krizine ve siber güvenliğin yeni yüzüne… Continue reading on

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Synthetic Attack Log Generation for Splunk: A Detection Engineering Approach
1. Introduction and Scope Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
SOCFortress Vulnerability Operations Center — Part II: External Exposure Module
Intro: Seeing Your Internet-Facing Risk Before Attackers Do Continue reading on Medium »
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Top Cybersecurity Threats Indian Businesses Will Face in 2026
Why This Conversation Can’t Wait Anymore Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
The Cybersecurity Failure of Odido and the Erosion of Digital Trust in the Netherlands
The promise of the digital age was built on a foundation of seamless connectivity and the ironclad security of personal data. Continue reading on Medium »

Dev.to · Hamza
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Coming Soon: React2Shell
In the React2Shell exploitation, we can abuse a deserialization vulnerability in React Server...

Dev.to · curi0us_dev
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Best RBAC solutions: what to shortlist and why
If you are evaluating RBAC tools right now, you already know the hard part is not finding "features."...

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Is Using a VPN Enough to Stay Completely Anonymous on the Internet?
Online privacy has become a major concern in today’s digital world. Many people use VPNs to protect their internet activity and hide their… Continue reading on
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Setting Up My Mobile Application Testing Lab: What Worked, What Failed, and What I Learned
When I first started learning mobile application security testing, I honestly thought installing a few tools would be enough. I quickly… Continue reading on Med

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Day 1: Why I Chose to Start Slow Before Learning to Hack
Most people beginning their cybersecurity journey hear the same advice: jump straight into tools, labs, and exploits. Install Kali Linux… Continue reading on Me

Forbes Innovation
🔐 Cybersecurity
⚡ AI Lesson
1w ago
‘One Time Restart’—Microsoft Changes Windows After 15 Years
Microsoft starts expiring critical Secure Boot certificates in just 2 weeks.

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Soporte IT en Chile: ¿Por Qué Necesitas Pros para Proteger Tus Datos en la Era IA?
En Chile, donde ciberataques subieron 35% en 2025 (Cybersecurity Ventures), el soporte informático profesional es clave para pymes. Este… Continue reading on Me

Medium · AI
🔐 Cybersecurity
⚡ AI Lesson
1w ago
The Manufactured Mystery of Mythos
What does Mythos, a powerful cyber-weapon disguised as responsible AI stewardship, mean for cybersecurity professionals? Continue reading on ILLUMINATION »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Anatomi Serangan: Membedah Metodologi Penetration Testing
Dunia keamanan siber tidak hanya soal membangun benteng yang tinggi melalui enkripsi atau kebijakan Zero Trust yang ketat. Memiliki teori… Continue reading on M
Medium · AI
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Here are the lessons I learnt of NMIT Hacks, 2026:
In the era of AI bots crawling the internet we must ensure the protection of our software against masquerading and spoofing. Use SMS or… Continue reading on Med
Dev.to · Freedom Coder
🔐 Cybersecurity
⚡ AI Lesson
1w ago
CVE-2026-21643: Fortinet FortiClient EMS SQL Injection Vulnerability
Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specific

Medium · Data Science
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Authentication vs Authorization: Two Different Questions, Two Different Purposes
Understanding how secure systems verify identity first and then control access to actions and resources Continue reading on CodeX »

Medium · Programming
🔐 Cybersecurity
⚡ AI Lesson
1w ago
Authentication vs Authorization: Two Different Questions, Two Different Purposes
Understanding how secure systems verify identity first and then control access to actions and resources Continue reading on CodeX »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
From Ingestion to Final Verdict: THREATRADAR’s Poisoning Detection Pipeline
Welcome to the fourth article in the THREATRADAR series. We recommend reading Part 1 Design and Implementation of THREATRADAR: Open-Source… Continue reading on

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
When VirusTotal Can’t Name It: Identifying Malware Through Metadata
Two samples sitting in my honeypot had 55+ detection flags on VirusTotal but no threat label. No family name, no classification. Just… Continue reading on Mediu

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
NoSQL Injection Guide: Fundamentals, Types, Exploitation, and Mitigation
Learn the basics of NoSQL injection, attack vectors in MongoDB, and advanced exploitation and defense strategies. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
1w ago
The Authentication Debt Nobody Wants to Audit. And Attackers Know It.
Zero Trust, MFA, cloud security the conversation never stops. But underneath it all, two protocols from the 1990s still decide who gets in… Continue reading on
DeepCamp AI