Articles by Tag #cybersecurity

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

A Year of Transformation: Reflecting on 2024's Journey in Tech and Beyond

This is a submission for the 2025 New Year Writing challenge: Retro’ing and Debugging 2024. As we...

Learn More 19 1Jan 2

How to Get Started with Bash Scripting for Automation

One of the most powerful tools for automation is Bash scripting. Whether you're a beginner or a...

Learn More 117 10Jan 12

SOC-CERT: Automated Threat Intelligence System with n8n & AI

This is a submission for the AI Agents Challenge powered by n8n and Bright Data 🛡️ What I...

Learn More 16 7Aug 27

Frontend Devs: Weaponize Beauty. Build UIs That Command Respect

TL;DR: I build offensive security frameworks. You build interfaces. Let's make tools that researchers...

Learn More 10 1Nov 14

KAPLAN — Stealthy Bulk Fetching Over Tor for Red Team Ops

A multithreaded, identity-rotating, resilient file fetcher built for covert red team reconnaissance...

Learn More 21 0Nov 5

Hunting API Keys in the Wild: How I Built FleaMarket to Find (and Help Fix) Real Leaks on GitHub

TL;DR: I built an ethical, open-source scanner called FleaMarket that finds exposed API keys in...

Learn More 15 4Nov 19

VLESS Protocol: How It Bypasses Censorship in Russia and Why It Works

Introduction In 2025, internet censorship has reached unprecedented levels in Russia,...

Learn More 4 1Oct 29

AI Can "Guess" Base64 Encoding - And That Changes Everything

The Experiment I was building a crypto-as-a-service API and needed to test gRPC endpoints...

Learn More 19 31Jul 1

What I Keep Finding When I Scan Small U.S. Municipal Websites (And How To Fix It In Under An Hour)

I’ve spent the last few months poking at public websites that belong to small U.S. towns, school...

Learn More 5 5Nov 24

Threat Modeling the YouTube Algorithm: A Security Researcher's Guide to Content Strategy

📌 Missed Part 1? Start here: YouTube Monetization, Speed, and Risks (Part 1) This section continues...

Learn More 5 7Nov 22

🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

How a fake job offer nearly installed malware on my machine through a malicious npm package. A cautionary tale about supply chain attacks.

Learn More 6 3Oct 27

I Analyzed 100 Claude MCP Servers and Found Critical Security Flaws in 43% of Them

What I discovered made me build an open-source security tool It started with a simple...

Learn More 4 2Oct 23

Why I Built a Free Security Scanner That Makes Sense

I just completed the Institute of Data / Michigan Tech Cybersecurity program, and for my capstone...

Learn More 4 1Oct 24

The Backbone of Global Scam: How NameSilo, Webnic, and NiceNic

Global scam thrives on registrar protection. 💥 Every second you read this, someone is being scammed...

Learn More 76 0Aug 31

I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated

The Strategic Insight That Changed Everything When I tested CyberLens v1.5 on "deepfake,"...

Learn More 10 1Oct 26

Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

Introduction: When Reality Hits Different My name is Namaneetha, and I recently landed my...

Learn More 1 0Oct 10

The Unspoken Conversation: When Your Code Attracts the Wrong Kind of Attention

There's a particular flavor of email that arrives dressed as opportunity but carries the subtle...

Learn More 8 3Oct 18

The state of Sui: What external-facing risk looks like (and why top engineers miss it)

TL;DR I analysed the externally-observable posture of 122 Sui network endpoints. What I found isn't...

Learn More 4 2Oct 20

Why I Quit Development to Break Into Cybersecurity

I started at the terminal with my fingers frozen, time ticking–tic-tic-tic–less than 5 minutes left...

Learn More 62 17Jun 15

🧪 Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security

How to objectively measure if an AI assistant is truly useful for real-world penetration testing —...

Learn More 29 2Nov 17

A US-Origin Attack Nearly Killed Our SEO

Back in March, our small team was hit by a sneaky and little-known attack: negative SEO. Negative...

Learn More 15 0Aug 8

Large Language Models for One-Day Vulnerability Detection

Hello fellow cybersecurity professionals and enthusiasts, In this article, I will share my graduate...

Learn More 4 0Sep 16

$100K+ Returned — Wallet Access Restored (Adverting Case)

A polished “ad deal” led to a wallet compromise. Funds had already moved. We restored access and...

Learn More 79 0Aug 31

Decoy-Hunter: Bypassing "All Ports Open" Deception in Offensive Security

The defensive idea belongs to https://t.me/s0i37_channel 🛡️→⚔️ Decoy-Hunter: Bypassing "All...

Learn More 47 21Sep 26

Build a SOC simulator using Google AI Studio

Hi! 🌟 Inspired by the #learningaistudio challenge, I decided to leverage the capabilities of Google...

Learn More 7 1Jul 3

DO NOT AUTOSCALE : PBCTF RCA

The Incident On 02.08.25, during PBCTF 4.0 - our college club Point Blank's flagship CTF...

Learn More 21 0Sep 24

The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

🔗 Research Series This article is part 1 of a 3-part research series: 🔜 Next: The Local...

Learn More 20 4Sep 24

Rethinking Security Resilience And Getting Back To Basics At CornCon 11

The first railroad bridge to span the Mississippi River was built between Davenport, IA, and Rock...

Learn More 5 0Oct 29

You Think You’re Safe Online? Hackers Think You’re a Joke.

Are you really secure, or just lucky you haven’t been hit yet? The gap between how secure people...

Learn More 7 2Apr 29

ん, and?

I recently came across a LinkedIn post about a typo squatting attack which transcended the well-known...

Learn More 4 0Aug 19