Articles by Tag #cybersecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

The Day I Stopped Chasing Everything and Found My One Thing

So let me tell you a story. It's mine, but honestly, it might be yours too. When I was a kid, I used...

Learn More 39 3Dec 21 '25

SOC-CERT: Automated Threat Intelligence System with n8n & AI

This is a submission for the AI Agents Challenge powered by n8n and Bright Data 🛡️ What I...

Learn More 25 7Aug 27 '25

Frontend Devs: Weaponize Beauty. Build UIs That Command Respect

TL;DR: I build offensive security frameworks. You build interfaces. Let's make tools that researchers...

Learn More 10 1Nov 14 '25

Hunting API Keys in the Wild: How I Built FleaMarket to Find (and Help Fix) Real Leaks on GitHub

TL;DR: I built an ethical, open-source scanner called FleaMarket that finds exposed API keys in...

Learn More 18 6Nov 19 '25

I’ve Been Doing This for 25 Years and I Still Google Everything

Let's get this out of the way up front: I’ve been working in IT for about 25 years, and I still...

Learn More 10 2Dec 27 '25

KAPLAN — Stealthy Bulk Fetching Over Tor for Red Team Ops

A multithreaded, identity-rotating, resilient file fetcher built for covert red team reconnaissance...

Learn More 21 0Nov 5 '25

VLESS Protocol: How It Bypasses Censorship in Russia and Why It Works

Introduction In 2025, internet censorship has reached unprecedented levels in Russia,...

Learn More 3 1Oct 29 '25

🫡 Introducing Nikki: Your Offline, Uncensored AI Red Team Assistant in the Terminal

No cloud. No censorship. No hallucinated APIs. Just battle-tested code, curated from real offensive...

Learn More 7 0Dec 12 '25

Threat Modeling the YouTube Algorithm: A Security Researcher's Guide to Content Strategy

📌 Missed Part 1? Start here: YouTube Monetization, Speed, and Risks (Part 1) This section continues...

Learn More 5 7Nov 22 '25

What I Keep Finding When I Scan Small U.S. Municipal Websites (And How To Fix It In Under An Hour)

I’ve spent the last few months poking at public websites that belong to small U.S. towns, school...

Learn More 5 5Nov 24 '25

🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

How a fake job offer nearly installed malware on my machine through a malicious npm package. A cautionary tale about supply chain attacks.

Learn More 7 5Oct 27 '25

AI Can "Guess" Base64 Encoding - And That Changes Everything

The Experiment I was building a crypto-as-a-service API and needed to test gRPC endpoints...

Learn More 19 31Jul 1 '25

The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

Every vulnerability wears a disguise. Some dress up as convenience. Others as legacy. A few parade...

Learn More 3 2Dec 1 '25

My Writeup (0day in Zsh (RCE))

I am Rana M.Sinan Adil aka (livepwn). I am 17 years old i was working on bug and also created a...

Learn More 6 1Dec 20 '25

I Analyzed 100 Claude MCP Servers and Found Critical Security Flaws in 43% of Them

What I discovered made me build an open-source security tool It started with a simple...

Learn More 4 2Oct 23 '25

Why I Built a Free Security Scanner That Makes Sense

I just completed the Institute of Data / Michigan Tech Cybersecurity program, and for my capstone...

Learn More 4 1Oct 24 '25

Beyond 'Correct Horse Battery Staple': Passphrases in Inflected Languages

A developer's journey through grammatical cases, gender agreements, and the unexpected complexity of...

Learn More 3 2Jan 11

The Modern Home Network Has No Safe Mode

At three in the morning, the router light is still blinking. Not the angry red one. Not the dramatic...

Learn More 2 0Jan 4

I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated

The Strategic Insight That Changed Everything When I tested CyberLens v1.5 on "deepfake,"...

Learn More 10 1Oct 26 '25

Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

Introduction: When Reality Hits Different My name is Namaneetha, and I recently landed my...

Learn More 1 0Oct 10 '25

The Backbone of Global Scam: How NameSilo, Webnic, and NiceNic

Global scam thrives on registrar protection. 💥 Every second you read this, someone is being scammed...

Learn More 76 0Aug 31 '25

The Unspoken Conversation: When Your Code Attracts the Wrong Kind of Attention

There's a particular flavor of email that arrives dressed as opportunity but carries the subtle...

Learn More 8 3Oct 18 '25

The state of Sui: What external-facing risk looks like (and why top engineers miss it)

TL;DR I analysed the externally-observable posture of 122 Sui network endpoints. What I found isn't...

Learn More 4 2Oct 20 '25

LanManVan: My Journey Building a Modular Security Framework in Go

A few months ago, I started working on a personal project to create a flexible and powerful tool for...

Learn More 5 0Dec 28 '25

I built a beginner-friendly reverse engineering challenge using Ghidra

Spoiler Warning: The breakdown below explains how each challenge works. If you want to...

Learn More 0 3Nov 30 '25

Security Incident Report: Cryptominer Attack on Next.js Application

Introduction On December 7-8, 2025, my Next.js portfolio application luisfaria.dev running...

Learn More 1 0Dec 13 '25

Enterprise Architecture for a blog nobody reads

The previous incarnation of this site lived happily on a Digital Ocean droplet - until react2shell...

Learn More 0 1Dec 12 '25

🕵️‍♂️ DestroyScammers: De-anonymizing Crypto Thieves with Open Source Intelligence

TL;DR: Crypto scammers act like jurisdiction doesn’t apply to them. It does. We built the...

Learn More 0 0Nov 30 '25

Why I Quit Development to Break Into Cybersecurity

I started at the terminal with my fingers frozen, time ticking–tic-tic-tic–less than 5 minutes left...

Learn More 62 17Jun 15 '25

🧪 Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security

How to objectively measure if an AI assistant is truly useful for real-world penetration testing —...

Learn More 30 2Nov 17 '25