Articles by Tag #cybersecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

TryHackMe | Search Skills | RSCyberTech

➡️ By @RSCyberTech Website: RSCyberTech.com LinkedIn: linkedin.com/in/ricardoams Platform:...

Learn More 155 0Nov 2 '24

How to Get Started with Bash Scripting for Automation

One of the most powerful tools for automation is Bash scripting. Whether you're a beginner or a...

Learn More 117 10Jan 12

The Beginner's Guide to Understanding WebSocket

About the Author I'm Carrie, a cybersecurity engineer and writer, working for SafeLine...

Learn More 101 10Nov 5 '24

$100K+ Returned — Wallet Access Restored (Adverting Case)

A polished “ad deal” led to a wallet compromise. Funds had already moved. We restored access and...

Learn More 79 0Aug 31

The Backbone of Global Scam: How NameSilo, Webnic, and NiceNic

Global scam thrives on registrar protection. 💥 Every second you read this, someone is being scammed...

Learn More 76 0Aug 31

PhishDestroy: A Direct War on Phishing Operations

We are PhishDestroy, a global volunteer community engaged in a direct war on cybercrime. Since our...

Learn More 75 0Aug 31

I Built an Nmap GUI Client Using Tkinter to Simplify Network Scanning for You

abubakerx1da49 / Nmap-GUI-Client-using-Tkinter ...

Learn More 65 0Feb 19

Why I Quit Development to Break Into Cybersecurity

I started at the terminal with my fingers frozen, time ticking–tic-tic-tic–less than 5 minutes left...

Learn More 62 17Jun 15

Cybersecurity Beginner's Guide: Build Your Own Vulnerable Lab in 5 Minutes (DVWA + More)

In cybersecurity learning and hands-on training, a cyber range is a must-have environment. It...

Learn More 55 5Apr 17

How to Increase Your Azure Secure Score and Strengthen Your Cloud Security

“Security is not just about locking the doors but it’s about knowing which doors you forgot to lock...

Learn More 49 0Aug 14

Think You’re Secure? Penetration Testing Will Tell You the Truth

“You can’t defend what you don’t test. Penetration testing reveals the cracks before attackers...

Learn More 44 0Aug 29

Ashkan Rajaee's Warning: The Remote Hiring Scam No One Talks About (And What You Can Do)

Controversial Take: Remote work is not just the future. It has become the playground of modern...

Learn More 37 31Jun 2

Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

The defensive idea belongs to https://t.me/s0i37_channel 🛡️→⚔️ Decoy-Hunter: Bypassing "All...

Learn More 36 21Sep 26

Flipper Zero NFC Hacking - EMV Banking, Man-in-the-Middle, and Relay Attacks

In our previous post, we explored how the Flipper can function as both an NFC contactless card reader...

Learn More 35 2Dec 12 '24

🚀 Unlocking Fine-Grained Access Control with Cerbos

🌟 In an era where security is paramount, managing user access and permissions effectively is crucial...

Learn More 34 4Nov 26 '24

Why Chrome Users Are Turning to VPNs for Better Privacy and Control

As our daily browsing habits grow increasingly complex, including streaming, working remotely,...

Learn More 30 0Jul 9

Free Resources for Learning Kali Linux

About the Author I'm Carrie, a cybersecurity engineer and writer, working for SafeLine...

Learn More 26 0Nov 13 '24

How to Transition from IT Support to Cybersecurity: A Complete Career Guide

Cybersecurity is the new rave, probably even a bigger rave than devops. I believe that cybersecurity...

Learn More 26 6Feb 27

My CloudSEK Internship Experience

This article is about my internship at CloudSEK. CloudSEK is a cybersecurity company that uses...

Learn More 26 3Nov 11 '24

The Ghibli Trend: How to Make Your Own AI-Generated Ghibli Art 🎨🤖

Unless you've been living under a digital rock, you've probably seen the latest Instagram craze:...

Learn More 25 1Mar 31

SECURITY ALERT: Hacker Used AI to Automate $500K Cybercrime Spree - Every Developer Needs to Read This

A single hacker just proved that AI can fully automate cybercrime. Here's what it means for your...

Learn More 24 0Aug 30

The Art of Not Overthinking: Occam’s Razor for Developers

You know that moment when your laptop won’t boot, and your brain goes straight to "Maybe the...

Learn More 23 0Apr 10

Building a Home Lab for Cybersecurity Practice: A Step-by-Step Guide

In the world of cybersecurity, hands-on experience is invaluable. One of the best ways to gain...

Learn More 22 0Jan 19

Lock & Key: A Developer’s Guide to Encryption and Decryption in JavaScript

In a world where data is the new oil, encryption is the refinery. Whether you're building a simple...

Learn More 22 5Jun 21

HackTeam.RED: From API Keys to Full Infrastructure Compromise

🚀 HackTeam.RED: From API Keys to Full Infrastructure Compromise Professional Penetration...

Learn More 21 12Aug 26

DO NOT AUTOSCALE : PBCTF RCA

The Incident On 02.08.25, during PBCTF 4.0 - our college club Point Blank's flagship CTF...

Learn More 21 0Sep 24

""Rediska" - a bad man" - Redis in Kubernetes Ecosystems: From Configuration Leaks to Lateral Movement in Red Team.

A comprehensive Red Team guide to Redis exploitation with AI-assisted result analysis 🎯...

Learn More 20 2Sep 11

The Internet’s Roadmap: Discovering Network Routes with Traceroute

Ever wished you had x-ray vision for the internet? What if you could see how your data travels...

Learn More 20 0Apr 2

A Year of Transformation: Reflecting on 2024's Journey in Tech and Beyond

This is a submission for the 2025 New Year Writing challenge: Retro’ing and Debugging 2024. As we...

Learn More 19 1Jan 2

Red vs Blue vs Purple: The Colorful World of Cybersecurity

If you’ve been hanging around the cybersecurity world (or just scrolling through tech Twitter),...

Learn More 19 1Apr 7