Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,762
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,403 reads from curated sources

Contextual AI is Changing How We Detect Phishing — And It’s About Time
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Contextual AI is Changing How We Detect Phishing — And It’s About Time
Have you ever opened an email that looked perfectly normal… same tone, same formatting, maybe even from a “known” sender — Continue reading on Medium »
Top Risks of Ignoring SDLC Gap Analysis
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Top Risks of Ignoring SDLC Gap Analysis
Software development is no longer just about building features; it’s about building secure and scalable software that closely aligns with… Continue reading on M
Building a cybersecurity agent with n8n: automating security operations
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Building a cybersecurity agent with n8n: automating security operations
how to create intelligent threat detection and response workflows without breaking the budget Continue reading on Medium »
Module 3 | Foundations of Cybersecurity | Google Professional Cybersecurity Certificate
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Module 3 | Foundations of Cybersecurity | Google Professional Cybersecurity Certificate
Module 3: Protect against threats, risks, and vulnerabilities. Continue reading on Medium »
Techpoint Africa 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Nigerian banks gain access to telecom data to stop fraud
On Techpoint Digest, we discuss how Nigeria plans to combat SIM-based financial fraud, why global tech is reconsidering its approach to Africa, and how ICASA ho
The NPM Trojan Horse: How I Locked Down My React App Before a Malicious Package Could Exfiltrate My…
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The NPM Trojan Horse: How I Locked Down My React App Before a Malicious Package Could Exfiltrate My…
You’re staring at your package.json, and it feels like home. You’ve got your favorite state manager, that sleek component library, and a… Continue reading on Me
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The NPM Trojan Horse: How I Locked Down My React App Before a Malicious Package Could Exfiltrate My…
You’re staring at your package.json, and it feels like home. You’ve got your favorite state manager, that sleek component library, and a… Continue reading on Me
New Mirai campaign exploits RCE flaw in EoL D-Link routers
Dev.to · Mark0 🔐 Cybersecurity ⚡ AI Lesson 3w ago
New Mirai campaign exploits RCE flaw in EoL D-Link routers
A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity...
Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API
Dev.to · Mark0 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API
The threat actor known as Harvester has expanded its toolset with a new Linux variant of its GoGra...
Stop Uploading Your Files to Random Websites
Dev.to · Kusuma Labs 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Stop Uploading Your Files to Random Websites
Ever noticed how most “free” image/PDF compressors work? 👉 Upload your file 👉 Wait 👉 Download Simple…...
I Coded a Zero-Knowledge Cryptography App on My Smartphone. Here’s the Stack.
Medium · JavaScript 🔐 Cybersecurity ⚡ AI Lesson 3w ago
I Coded a Zero-Knowledge Cryptography App on My Smartphone. Here’s the Stack.
The biggest lie new developers tell themselves is that they need a high-end MacBook, a dual-monitor setup, and a mechanical keyboard to… Continue reading on Med
Dark Web: The Hidden Side of the Internet
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Dark Web: The Hidden Side of the Internet
In the modern digital era, the internet has become one of the most powerful inventions in human history. It connects billions of people… Continue reading on Med
How to Delete Your Digital Footprint (Practical Guide)
Dev.to · Juan Diego Isaza A. 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How to Delete Your Digital Footprint (Practical Guide)
Learn how to delete your digital footprint with a practical workflow: inventory exposure, delete accounts, opt out of brokers, de-index results, and preven
AI Could Never Fully Take Over Cybersecurity
Dev.to · Somnath Das 🔐 Cybersecurity ⚡ AI Lesson 3w ago
AI Could Never Fully Take Over Cybersecurity
In an era where artificial intelligence is transforming industries at an unprecedented pace,...
CyberDefender — Psexec Hunt Walkthrough
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
CyberDefender — Psexec Hunt Walkthrough
Giriş: Görünmez Ayak İzlerini Takip Etmek Continue reading on Medium »
The Register 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Anthropic's super-scary bug hunting model Mythos is shaping up to be a nothingburger
And that unauthorized access? 'A nothing burger,' hacking startup CEO tells El Reg Anthropic's Mythos model is purportedly so good at finding vulnerabilities th
npm Supply Chain Forensics, Pack2TheRoot CVE, & AI-Driven Vulnerability Discovery
Dev.to · soy 🔐 Cybersecurity ⚡ AI Lesson 3w ago
npm Supply Chain Forensics, Pack2TheRoot CVE, & AI-Driven Vulnerability Discovery
npm Supply Chain Forensics, Pack2TheRoot CVE, & AI-Driven Vulnerability Discovery ...
GHSA-HPPC-G8H3-XHP3: GHSA-HPPC-G8H3-XHP3: Out-of-Bounds Read via Unchecked Callback Length in rust-openssl
Dev.to · CVE Reports 🔐 Cybersecurity ⚡ AI Lesson 3w ago
GHSA-HPPC-G8H3-XHP3: GHSA-HPPC-G8H3-XHP3: Out-of-Bounds Read via Unchecked Callback Length in rust-openssl
GHSA-HPPC-G8H3-XHP3: Out-of-Bounds Read via Unchecked Callback Length in...
TechRepublic 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Microsoft Patch Still Leaves 1,300 SharePoint Servers Exposed
More than 1,300 internet-exposed SharePoint servers remain unpatched against CVE-2026-32201, a spoofing flaw Microsoft says was exploited as a zero-day. The pos
Lovable's 48-Day Silent Breach Shows Why AI Platforms Need Audit Trails, Not Just Bug Bounties
Dev.to · Logan 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Lovable's 48-Day Silent Breach Shows Why AI Platforms Need Audit Trails, Not Just Bug Bounties
A security researcher found that anyone with a free Lovable account could read the source code,...
The Axios npm Supply Chain Attack (March 2026): How North Korean Hackers Poisoned 100 Million…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Axios npm Supply Chain Attack (March 2026): How North Korean Hackers Poisoned 100 Million…
Published: April 23, 2026 Author: Cahal Agarwalla Tags: #CyberSecurity #SupplyChain #npm #JavaScript #DevSecOps #NorthKorea #InfoSec… Continue reading on Medium
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
TryHackMe SOC Analyst Road Map Part-26
-OWASP TOP 10 2025:IAAA FAILURES- Task 1 — Introduction Bu oda, 2025 yılının En Önemli 10 güvenlik kategorisinden 3 tanesini ele… Continue reading on Medium »
The Truth About Public Wi-Fi (and How to Protect Yourself)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Truth About Public Wi-Fi (and How to Protect Yourself)
Public Wi-Fi convenience comes with hidden cybersecurity risks. Continue reading on Medium »
GHSA-MGCP-MFP8-3Q45: GHSA-MGCP-MFP8-3Q45: Path Traversal and URL Injection in i18next-locize-backend
Dev.to · CVE Reports 🔐 Cybersecurity ⚡ AI Lesson 3w ago
GHSA-MGCP-MFP8-3Q45: GHSA-MGCP-MFP8-3Q45: Path Traversal and URL Injection in i18next-locize-backend
GHSA-MGCP-MFP8-3Q45: Path Traversal and URL Injection in...
TryHackMe: Alert Triage with Splunk — Praktiki SOC Analizi
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
TryHackMe: Alert Triage with Splunk — Praktiki SOC Analizi
Bu məqalədə mən TryHackMe platformasındakı “Alert Triage with Splunk” otağı üzərindən real bir insidentin analiz prosesini bölüşəcəm. Continue reading on Medium
New Cross Domain Guidance for Government, Industry and the Wider Security Community
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
New Cross Domain Guidance for Government, Industry and the Wider Security Community
On April 21, 2026, the National Cyber Security Centre (NCSC) published a comprehensive guide aimed at helping organizations across all… Continue reading on Medi
I Audited 12 Open Source Projects' JWT Implementations and Found the Same 6 Mistakes in All of Them
Dev.to · SHAHJAHAN MD. SWAJAN 🔐 Cybersecurity ⚡ AI Lesson 3w ago
I Audited 12 Open Source Projects' JWT Implementations and Found the Same 6 Mistakes in All of Them
It started with a throwaway comment in a code review. I was scanning through a popular Node.js...
Microsoft issues emergency update for macOS and Linux ASP.NET threat
ArsTechnica Tech 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Microsoft issues emergency update for macOS and Linux ASP.NET threat
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The shadowy SIM farms behind those incessant scam texts - and how to stay safe
These fraud factories operate quietly to support large-scale scamming and phishing. Here's how they work and what to do if you're targeted.
The Register 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Linux may get a hall pass from one state age-check bill, but Congress plays hall monitor
Colorado amendments could exempt open source OSes, code repos, and containers The prospect of OS-level age checks applying to open source systems is a serious c
The Juice Shop Chronicles | Part 1: Authentication Bypass via SQL Injection
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Juice Shop Chronicles | Part 1: Authentication Bypass via SQL Injection
Understanding the Flow Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How I Found and Reported My First XSS Vulnerability
It started with curiosity Continue reading on Medium »
Sigstore Deep Dive: Unmasking the Magic Behind Keyless Verification
Dev.to · kt 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Sigstore Deep Dive: Unmasking the Magic Behind Keyless Verification
A complete teardown of Fulcio, Rekor, and TUF powering `cosign sign`. Short-lived certificates, Merkle tree inclusion proofs, and trust bootstrapping—explained
I Ran a 13-Point Security Audit on My AI-Built SaaS Before My First Customer — Here's What It Found
Dev.to · APIBuilderHQ 🔐 Cybersecurity ⚡ AI Lesson 3w ago
I Ran a 13-Point Security Audit on My AI-Built SaaS Before My First Customer — Here's What It Found
I have a Stripe integration, a JWT auth system, magic link recovery, Redis-backed rate limiting, and...
Why Your Phone Number Became Your Digital Identity — And What Comes Next
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Why Your Phone Number Became Your Digital Identity — And What Comes Next
Messaging apps promise encryption, but most still require an identity to participate. That requirement — often a phone number — quietly… Continue reading on Med
Korku ve Merak Arasında Dark Web'e Yolculuk
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Korku ve Merak Arasında Dark Web'e Yolculuk
Dark Web denildiğinde çoğu insanın zihninde karanlık bölgelerdeki hacker'lar, kiralık katil ilanları veya kullanılabilir pazarları… Continue reading on Medium »
Review: Altered Security, Certified Azure Red Team Professional (CARTP) (taken in 2025)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Review: Altered Security, Certified Azure Red Team Professional (CARTP) (taken in 2025)
If you’ve spent any time in cloud security, you already know Azure is everywhere. It’s used by the vast majority of Fortune 500 companies… Continue reading on M
AWS patched the logging. Your data already left.
Dev.to · Bala Paranj 🔐 Cybersecurity ⚡ AI Lesson 3w ago
AWS patched the logging. Your data already left.
Varonis found that anonymous S3 requests via VPC endpoints were invisible to CloudTrail. AWS added...
HTB (Bashed) — Walkthrough
Dev.to · Michael Oladele 🔐 Cybersecurity ⚡ AI Lesson 3w ago
HTB (Bashed) — Walkthrough
Bashed is one of the beginner-friendly machines on Hack The Box that focuses on web exploitation and...
The Cost of Logs: SIEM Economics
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Cost of Logs: SIEM Economics
For many years, SIEM pricing was handled as a technical line item: purchase sufficient intake capacity, estimate daily log volume, and… Continue reading on Meet
Do stealer ao acesso corporativo: onde a segurança quebra
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Do stealer ao acesso corporativo: onde a segurança quebra
Sabemos que um dos mercados mais “fáceis” e lucrativos explorados por cibercriminosos hoje é a propagação, distribuição, infecção e… Continue reading on Medium
UK Faces State-Backed Cyber Pressure; What European Leaders Must Do on Critical Infrastructure
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
UK Faces State-Backed Cyber Pressure; What European Leaders Must Do on Critical Infrastructure
Gibraltar: Wednesday, 22 April 2026–11:30 CEST Continue reading on Medium »
Cyber Security Professional Services Chicago — What to Expect | Cepoch
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Cyber Security Professional Services Chicago — What to Expect | Cepoch
Cyber Security Professional Services: What’s Included and What to Expect (Chicago, USA Guide) Continue reading on Medium »
The “Digital Ghost” Protocol: Why 2026 is the Year We Stop Being Searchable
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The “Digital Ghost” Protocol: Why 2026 is the Year We Stop Being Searchable
There is a specific, cold shiver that hits you when you realize your digital footprint is no longer a trail, but a cage. Continue reading on Medium »
GDPR Erasure Is Not DELETE FROM users
Dev.to · Sharjeel Zubair 🔐 Cybersecurity 📄 Paper ⚡ AI Lesson 3w ago
GDPR Erasure Is Not DELETE FROM users
When a parent on our school platform submits a deletion request, an administrator approves it, and...
I Found An Agent Running Under A Rotated API Key - Here's What KYA Finally Named
Dev.to · Mykola Kondratiuk 🔐 Cybersecurity ⚡ AI Lesson 3w ago
I Found An Agent Running Under A Rotated API Key - Here's What KYA Finally Named
I Found An Agent Running Under A Rotated API Key - Here's What KYA Finally Named Last...
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Target Spotted
(like literally) Continue reading on Medium »
Benign | TryHackMe — Challenge | Writeup — Splunk-Investigation
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Benign | TryHackMe — Challenge | Writeup — Splunk-Investigation
hey all , hope you are doing well, in this write up we will cover the fifth room on the SIEM Triage for soc module in the soc level 1 path… Continue reading on