Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

7,027
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,646 reads from curated sources

How to Map Out Your Digital Footprint Before Attackers Do in 2026
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1h ago
How to Map Out Your Digital Footprint Before Attackers Do in 2026
In this article, I demonstrate how digital footprints can be mapped ethically through open-source intelligence techniques in order to… Continue reading on Mediu
The Most Dangerous Kind of Information
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1h ago
The Most Dangerous Kind of Information
The Meta‑Cognition Trap: Why a Single, Obvious Statement Can Collapse a System of Minds Continue reading on Medium »
Hardware End-of-Support-Life (EOSL) — The EOL Risk Nobody Tracks
Dev.to · endoflife-ai 🔐 Cybersecurity ⚡ AI Lesson 3h ago
Hardware End-of-Support-Life (EOSL) — The EOL Risk Nobody Tracks
Software gets all the attention. But end-of-support-life hardware creates the same CVE blind spot — with no patch path and no scanner that flags it. Here's what
Hidden Compliance Risks from Unsupported Software — What Auditors Find First
Dev.to · endoflife-ai 🔐 Cybersecurity ⚡ AI Lesson 3h ago
Hidden Compliance Risks from Unsupported Software — What Auditors Find First
SOC 2, PCI DSS, HIPAA, and ISO 27001 all share one quiet vulnerability — unsupported software. Here's what your auditors will find before you do.
O que ninguém te conta sobre audits de Solana
Dev.to · 38bits 🔐 Cybersecurity ⚡ AI Lesson 3h ago
O que ninguém te conta sobre audits de Solana
⚠ 90% dos audits de Solana focam em escanear o código em busca de padrões conhecidos de...
Authentication, Federation & Software Architecture
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3h ago
Authentication, Federation & Software Architecture
Federation & SSO — The Trust Chain Across Organizations Continue reading on Medium »
Internet knows more about you than you think
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3h ago
Internet knows more about you than you think
The moment you make a request to a URL, open an app, stream a video, join a meeting, or make a VoIP call, a massive amount of metadata… Continue reading on Medi
How to Stop Leaking AWS Keys to GitHub (And What to Do When You Already Did)
Dev.to · Alan West 🔐 Cybersecurity ⚡ AI Lesson 4h ago
How to Stop Leaking AWS Keys to GitHub (And What to Do When You Already Did)
A practical guide to detecting leaked credentials before they hit GitHub, scrubbing them from git history when they do, and preventing the next leak.
When a patched CVE comes back: detecting silent driver regressions
Dev.to · Alan West 🔐 Cybersecurity ⚡ AI Lesson 4h ago
When a patched CVE comes back: detecting silent driver regressions
Patched CVEs can silently regress after OS upgrades or incomplete fixes. Here's how to fingerprint, test, and monitor critical patches so you actually know.
Stop Pasting URLs into Security Header Sites - Use This CLI
Dev.to · David McHale 🔐 Cybersecurity ⚡ AI Lesson 7h ago
Stop Pasting URLs into Security Header Sites - Use This CLI
Get an A–F grade for your site's HTTP security headers without leaving the terminal. Use it...
26 of 39 AI Companies Use SPF Softfail — Their Email Can Be Spoofed
Dev.to · John Leslie 🔐 Cybersecurity ⚡ AI Lesson 7h ago
26 of 39 AI Companies Use SPF Softfail — Their Email Can Be Spoofed
I queried the DNS records for 39 AI companies — labs, safety orgs, tooling companies — and checked...
Lessons from operating a Cosmos validator: a year of slashing near-misses
Dev.to · Sonia 🔐 Cybersecurity ⚡ AI Lesson 7h ago
Lessons from operating a Cosmos validator: a year of slashing near-misses
I have been operating a Cosmos validator for just over a year. In that time, I have not been slashed...
Most Small Business Tech Problems Are Really Setup Problems
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 7h ago
Most Small Business Tech Problems Are Really Setup Problems
A lot of small business tech problems do not start as huge problems. Continue reading on Medium »
How To Mitigate The Microsoft Windows BitLocker ‘Angry Hacker’ 0-Day
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 9h ago
How To Mitigate The Microsoft Windows BitLocker ‘Angry Hacker’ 0-Day
Following the release of a BitLocker zero-day security bypass by a disgruntled hacker, Microsoft has now offered mitigation advice until a patch is available.
I rebuilt 18 billion photos. Now I hunt threats.
Dev.to · Dennis Kim 🔐 Cybersecurity ⚡ AI Lesson 10h ago
I rebuilt 18 billion photos. Now I hunt threats.
Hi DEV community 👋 I'm Dennis Kim (Kim HoKwang). I've been building things on the internet for a...
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 12h ago
We tested the most popular VPNs in New York, London, and Tokyo - this one is the best for traveling
ZDNET's latest Lab Award goes to the travel VPN with the fasted download speeds.
InfoQ AI/ML 🔐 Cybersecurity ⚡ AI Lesson 13h ago
Pip 26.1 Ships Dependency Cooldowns and Experimental Lockfile Support to Combat Supply Chain Attacks
Pip 26.1 ships dependency cooldowns that enforce a waiting period before newly published packages can be installed, and experimental pylock.toml lockfile suppor
Managing SSL across multiple projects still feels more manual than it should be
Dev.to · Lcy0128 🔐 Cybersecurity ⚡ AI Lesson 13h ago
Managing SSL across multiple projects still feels more manual than it should be
For a single site, SSL is mostly solved. But across multiple projects, domains, or environments, it...
Manifold Security Just Scored 7,700 MCP Servers. Here's Why That Number Should Worry You.
Dev.to · Om Shree 🔐 Cybersecurity ⚡ AI Lesson 13h ago
Manifold Security Just Scored 7,700 MCP Servers. Here's Why That Number Should Worry You.
The MCP ecosystem grew faster than anyone could audit it. Now there's a tool trying to catch up — and...
The Evolution of SQL Injection Detection: Why Blacklists Are Losing the Battle
Dev.to · Hawkinsdev 🔐 Cybersecurity ⚡ AI Lesson 14h ago
The Evolution of SQL Injection Detection: Why Blacklists Are Losing the Battle
For nearly two decades, SQL Injection (SQLi) defense has revolved around the same core idea: identify...
5 API Key Security Mistakes That Expose Your App (And How to Fix Them)
Dev.to · Forgelab Africa 🔐 Cybersecurity ⚡ AI Lesson 14h ago
5 API Key Security Mistakes That Expose Your App (And How to Fix Them)
If you've ever hardcoded an API key and pushed it to GitHub, you're not alone — and your key is...
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 14h ago
🛡️ Sentry Security – Täglicher Rückblick (2026-05-20) 😏
🛡️ Sentry Security – Täglicher Rückblick (2026-05-20) 😏 Kategorie Werte Gesamtangriffe 123883 Neue Angreifer-IPs 13780 Ausgeführte Banns 13780 Aktivster Serve
node-ipc Had a 69 Trust Score Before It Got Hacked. TanStack Had 91.
Dev.to · Pico 🔐 Cybersecurity ⚡ AI Lesson 14h ago
node-ipc Had a 69 Trust Score Before It Got Hacked. TanStack Had 91.
Two npm supply chain attacks hit the same week. One was predictable. One wasn't. That's the...
Your SDK Dependencies May Be Parsing Untrusted XML Without Protection
Medium · Python 🔐 Cybersecurity ⚡ AI Lesson 15h ago
Your SDK Dependencies May Be Parsing Untrusted XML Without Protection
Your SDK dependencies may be parsing untrusted XML without protection — and you wouldn’t know until an incident. Continue reading on Medium »
Your SDK Dependencies May Be Parsing Untrusted XML Without Protection
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 15h ago
Your SDK Dependencies May Be Parsing Untrusted XML Without Protection
Your SDK dependencies may be parsing untrusted XML without protection — and you wouldn’t know until an incident. Continue reading on Medium »
Why Passing Tests Are Sometimes the Most Dangerous Thing in Your Pipeline
Dev.to · Sophie Lane 🔐 Cybersecurity ⚡ AI Lesson 17h ago
Why Passing Tests Are Sometimes the Most Dangerous Thing in Your Pipeline
There is a specific kind of confidence that comes from watching a CI pipeline run green. You pushed a...
What security UX designers get wrong about Privacy by Design
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 17h ago
What security UX designers get wrong about Privacy by Design
GDPR has direct interface implications. Here’s what the law requires from security UX designers, and where most of them aren’t looking. Continue reading on Boot
You Clicked Accept.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 17h ago
You Clicked Accept.
There are now more than 5,000 AI-powered plugins available across the Chrome Web Store, the GPT plugin marketplace, and the various AI… Continue reading on Medi
Why Financial Brands Digital Infrastructure Is Critical for Success
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 19h ago
Why Financial Brands Digital Infrastructure Is Critical for Success
Financial brands handle sensitive data every day. One small mistake can erode trust and cost millions. That’s why building a credible… Continue reading on Mediu
Guarding the AI Revolution: Inside AI-Guardian 1.7 and 1.8
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 22h ago
Guarding the AI Revolution: Inside AI-Guardian 1.7 and 1.8
As AI-powered coding assistants like Claude Code, GitHub Copilot, and Cursor integrate deeply into our daily software development… Continue reading on Medium »
LetsDefend — Investigate Web Attack
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 23h ago
LetsDefend — Investigate Web Attack
In this write-up, I will investigate logs from the bWAPP application that was attacked. Continue reading on Medium »
Breaking OAuth Trust: An Analysis of CVE-2026–45430 in Backdrop CMS
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1d ago
Breaking OAuth Trust: An Analysis of CVE-2026–45430 in Backdrop CMS
Recently, a critical vulnerability affecting the Salesforce module of Backdrop CMS was assigned as CVE-2026–45430. Continue reading on Medium »
Discord now encrypts every voice and video call by default, and not even it can listen in
The Next Web AI 🔐 Cybersecurity ⚡ AI Lesson 1d ago
Discord now encrypts every voice and video call by default, and not even it can listen in
Discord has flipped the switch on end-to-end encryption for every voice and video call on its platform, a move that means not even the company itself can access
Mythic C2 Server ile AS-REP Roasting Attack ve Splunk ile Detection
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1d ago
Mythic C2 Server ile AS-REP Roasting Attack ve Splunk ile Detection
Bu yazıda, Mythic C2 Server kullanılarak gerçekleştirilen bir AS-REP Roasting saldırısı yapacak ve saldırı sırasında oluşan event’leri… Continue reading on Medi
Linux Capture The Flag Bandit Level 14
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1d ago
Linux Capture The Flag Bandit Level 14
Bandit Level 14 introduces one of the most fundamental concepts in networking — localhost and ports — and pairs it with a practical tool… Continue reading on Me
The Architecture of Trust
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1d ago
The Architecture of Trust
From backstage passes to Multi-Factor Authentication: Why single checkpoints fail in digital life and human relationships. Continue reading on Medium »
The GRC Professional of the Future: Why Context Beats Frameworks
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 1d ago
The GRC Professional of the Future: Why Context Beats Frameworks
The era of memorizing frameworks is over in Cybersecurity Continue reading on Medium »
The GRC Professional of the Future: Why Context Beats Frameworks
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1d ago
The GRC Professional of the Future: Why Context Beats Frameworks
The era of memorizing frameworks is over in Cybersecurity Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1d ago
Why I Started Building a SOC Lab at Home.
Security is actually a mindset. To have the proper mindset, you need to know whats happening on the ground level. Continue reading on Medium »
Session Recording Is Not Least Privilege
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1d ago
Session Recording Is Not Least Privilege
One thing still bothers me about Privileged Access Management. Continue reading on Medium »
Week 8: How to Stay Anonymous on the Internet Using Linux
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1d ago
Week 8: How to Stay Anonymous on the Internet Using Linux
Welcome back to the Linux for Hackers series! If you’ve been following along, you’ve learned the command line, file permissions… Continue reading on MeetCyber »
ASN Lookup for Security Engineers: From Concept to Code
Dev.to · ABDULLAH AFZAL 🔐 Cybersecurity ⚡ AI Lesson 1d ago
ASN Lookup for Security Engineers: From Concept to Code
An ASN lookup is the fastest way to find out who actually operates the network behind an IP address....
PoC Repos Are Underrated: Why Every Dev Should Read Exploit Code
Dev.to · Alan West 🔐 Cybersecurity ⚡ AI Lesson 1d ago
PoC Repos Are Underrated: Why Every Dev Should Read Exploit Code
Why reading proof-of-concept exploit repos like v12-security/pocs makes you a better backend developer — and how to do it safely.
Transforming theory into practical resilience: Uniting the CISA Zero Trust Maturity Model (ZTMM)…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1d ago
Transforming theory into practical resilience: Uniting the CISA Zero Trust Maturity Model (ZTMM)…
Throughout my career working with Oracle technologies, I’ve realized that one of the biggest challenges for large organizations isn’t… Continue reading on Mediu
Pentest Copilot | AI-Powered Ethical Hacking Assistant
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 1d ago
Pentest Copilot | AI-Powered Ethical Hacking Assistant
Artificial Intelligence is rapidly transforming cybersecurity, and one of the most exciting developments is the rise of AI-powered… Continue reading on Medium »
Pentest Copilot | AI-Powered Ethical Hacking Assistant
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1d ago
Pentest Copilot | AI-Powered Ethical Hacking Assistant
Artificial Intelligence is rapidly transforming cybersecurity, and one of the most exciting developments is the rise of AI-powered… Continue reading on Medium »
The Ecosystem Is the Attack
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 1d ago
The Ecosystem Is the Attack
Every major infrastructure shift of the last decade produced the same governance lag. Continue reading on Governed at the Source »
AI Will Exploit What Businesses Refuse to Fix
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 1d ago
AI Will Exploit What Businesses Refuse to Fix
About 50 thousand vulnerabilities were discovered last year and many are either not being fixed or the patching is purposely delayed. The… Continue reading on M