Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,780
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,421 reads from curated sources

I Built a Tool That Simulates and Detects Linux Rootkits
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
I Built a Tool That Simulates and Detects Linux Rootkits
There is something about the way rootkits work that I find genuinely fascinating. They do not break into a system; they hide inside it… Continue reading on Medi
Securing the Backbone — Issue #22: When a $500 Radio Can Stop a Freight Train: What Critical Infra…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Securing the Backbone — Issue #22: When a $500 Radio Can Stop a Freight Train: What Critical Infra…
Date: July 21, 2025 Continue reading on Medium »
Securing the Backbone — Issue #21: Software Supply Chain Failures Are Quietly Driving Breach Costs…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Securing the Backbone — Issue #21: Software Supply Chain Failures Are Quietly Driving Breach Costs…
Date: July 14, 2025 Continue reading on Medium »
Bankroll CTF@CIT 2026
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Bankroll CTF@CIT 2026
Overview Continue reading on Medium »
Building a Risk Register from Scratch: A Practical Exercise
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Building a Risk Register from Scratch: A Practical Exercise
Risk management is not just for enterprises with dedicated security teams and six-figure compliance budgets. I built this risk register as… Continue reading on
If You See This Microsoft Login—Your Account Is Being Hacked
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 3w ago
If You See This Microsoft Login—Your Account Is Being Hacked
Do not sign-in on this page — it's an attack and your account will be hijacked.
LOOKBACK - TRY HACK ME- ROOM
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
LOOKBACK - TRY HACK ME- ROOM
Hello everyone! This is an easy rated room from the TryHackMe platform titled “LOOKBACK” Continue reading on System Weakness »
Why Did Vercel Get Breached? What We Know About the April 2026 Attack
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Why Did Vercel Get Breached? What We Know About the April 2026 Attack
Vercel powers more than 4 million websites and processes 30 billion requests every week. Continue reading on Towards AI »
PortSwigger “JWT authentication bypass via algorithm confusion” Lab Çözüm & Rehber
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
PortSwigger “JWT authentication bypass via algorithm confusion” Lab Çözüm & Rehber
Algorithm confusion attacks nedir? Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Web Application Forensics
Web application forensics plays a critical role in modern cybersecurity by enabling organizations to detect, analyze, and respond to… Continue reading on Medium
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Tools Don’t Make You a Hacker-Thinking Does
A common belief in cybersecurity: Continue reading on Medium »
At 16, I Chose to Fight Cybercrime
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
At 16, I Chose to Fight Cybercrime
“It took just one phone call to destroy everything.” No hacking. No warning. Just one moment of trust. Continue reading on Medium »
Introduction to SIEM | TryHackMe
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Introduction to SIEM | TryHackMe
Task 1 - Introduction: Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
A Complete Guide to Unified Threat Detection Across Cloud, Network & Endpoints
Modern enterprises operate in a highly distributed digital ecosystem. Employees work remotely, applications run across hybrid and… Continue reading on Medium »
Beyond the Firewall: A Technical Post-Mortem of the 2022 Uber Breach
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Beyond the Firewall: A Technical Post-Mortem of the 2022 Uber Breach
The September 2022 compromise of Uber’s internal infrastructure by the threat group Lapsus$ remains one of the most significant case… Continue reading on Medium
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Reaction vs Proaction in CyberSecurity
A simple Time-Line Observation: Continue reading on Medium »
Building GhostTrap: My AI-Powered SSH Honeypot
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Building GhostTrap: My AI-Powered SSH Honeypot
I always wanted to build a practical cybersecurity project that could capture attacker behavior, log commands, and show everything in a… Continue reading on Med
AI SOC Hits Nasdaq: Why SEA CISOs Must Ignore the Hype and Prioritize Local Governance
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
AI SOC Hits Nasdaq: Why SEA CISOs Must Ignore the Hype and Prioritize Local Governance
Nasdaq’s "Autonomous Security" buzz is a landmark moment—but in the high-friction corridors of Jakarta, the human-in-the-loop is mandatory. Continue reading on
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Infosec Advanced: Kerberoasting
In a world where the majority of companies leverage Active Directory to handle authentication and access to resources in their environment… Continue reading on
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 3w ago
IDOR in AI-Generated APIs: What Cursor Won't Check Automatically
TL;DR AI editors add auth middleware but skip ownership checks on resource endpoints Any authenticated user can read or modify another user's data (CWE-639) Fix
Siber Güvenlikte Başarı: Eğitim Değil Süreç Meselesi
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Siber Güvenlikte Başarı: Eğitim Değil Süreç Meselesi
Uzun zamandır Siber güvenlik/Pentest dünyasının içinde olan biri olarak bu yazıda pentest yaparken yapılan bazı hatalardan bahsedeceğiz. Continue reading on Med
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Two DM-origin problems, not one: security hardening vs. compliance-bias hardening
Most plugin-layer DM-hardening conversations treat "a hostile DM" as one problem. After shipping v0.21 of @thecolony/elizaos-plugin (origin-tagging DMs to refus
Breaking my own spam classifier: a hands-on tour of adversarial examples
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Breaking my own spam classifier: a hands-on tour of adversarial examples
“What I cannot create, I do not understand.” — Feynman Continue reading on Medium »
Security doesn’t have weekends.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Security doesn’t have weekends.
And people who truly admire security don’t either. Continue reading on Medium »
How SaaS Teams Can Validate Real Risk Before Launch
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How SaaS Teams Can Validate Real Risk Before Launch
Launch pressure hides security risk. Continue reading on Medium »
⚙️ 01. — Authentication bypass via OAuth implicit flow
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
⚙️ 01. — Authentication bypass via OAuth implicit flow
Difficulty:  Apprentice Continue reading on Medium »
Why Security Scanners Miss Real Risk — And What Web Attack Simulation Shows Instead
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Why Security Scanners Miss Real Risk — And What Web Attack Simulation Shows Instead
Most security tools are very good at producing findings. That does not mean they are good at showing risk. Continue reading on Medium »
OAuth 2.0 Authetication Vulnerabilities
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
OAuth 2.0 Authetication Vulnerabilities
 What is OAuth? {#what-is-oauth} Continue reading on Medium »
From Nothing to Full Admin Access: Chaining Broken Access Controls
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
From Nothing to Full Admin Access: Chaining Broken Access Controls
Broken Access Controls are everywhere. In application security, they show up in many different ways. Sometimes they come from poorly… Continue reading on InfoSe
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Data Exposure Risk: Why Sensitive Data Is Still Your Biggest Liability
Data is your most valuable asset. Continue reading on Medium »
HK Cap 653: Is Your Architecture Audit-Ready?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
HK Cap 653: Is Your Architecture Audit-Ready?
Compliance is now an architectural challenge. Bridge the Cap. 653 gap with AI-native ZTNA and automated audit trails. Continue reading on Medium »
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 3w ago
cmpli
cmpli (pronounced "comply") is an uncomplicated security guidance platform for small businesses. It walks owners through an assessment of how their business act
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The "Informative" Trap: A Bug Bounty Autopsy
Continue reading on Medium »
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Mythos, Memory Loss, and the Part InfoSec Keeps Missing
The article discusses Mythos, an AI-powered capability that significantly accelerates vulnerability research and exploit development. While acknowledging its te
Zero-Trust System Design: How We Used JWT as an Immutable Context Boundary in Spring-Boot…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Zero-Trust System Design: How We Used JWT as an Immutable Context Boundary in Spring-Boot…
We didn’t just use JSON Web Tokens (JWT) for the login page; we injected them directly into our lowest-level business logic to eliminate… Continue reading on Me
My First 10 Days on TryHackMe: A Complete Beginner’s Journey
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
My First 10 Days on TryHackMe: A Complete Beginner’s Journey
Can a first-year BTech student with zero cybersecurity experience maintain a 10-day learning streak? Here’s what happened. Continue reading on Medium »
Learn Faster or Fall Behind. Cybersecurity in the AI Era.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Learn Faster or Fall Behind. Cybersecurity in the AI Era.
“In the Era of Machine Learning, we have to be Learning Machines” Continue reading on Medium »
Booking.com Hacked — Attackers Obtain Personal Data of Thousands of Travelers
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Booking.com Hacked — Attackers Obtain Personal Data of Thousands of Travelers
Booking.com in the hands of hackers. 78 million records from GTA on a leak site. A Microsoft Defender that opens doors instead of guarding… Continue reading on
Apple Changes iPhone After 15 Years—Do You Stop Texting Now?
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Apple Changes iPhone After 15 Years—Do You Stop Texting Now?
Do you really stop sending texts as Apple upgrades iPhone following FBI warning?
Why Subfinder Is Every Hacker’s Favorite “Quiet” Tool
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Why Subfinder Is Every Hacker’s Favorite “Quiet” Tool
No noise. No alerts. Just pure discovery Continue reading on System Weakness »
Why Subfinder Is Every Hacker’s Favorite “Quiet” Tool
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Why Subfinder Is Every Hacker’s Favorite “Quiet” Tool
No noise. No alerts. Just pure discovery Continue reading on System Weakness »
From Zero to Cloud: A Complete AWS CTF Writeup (HiveCTF Cloud Challenges)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
From Zero to Cloud: A Complete AWS CTF Writeup (HiveCTF Cloud Challenges)
How a beginner can learn real-world AWS security concepts through Capture the Flag challenges — from leaked credentials to cross-account… Continue reading on Me
NIST Stops Scoring Most CVEs: What Security Teams Must Do Now
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
NIST Stops Scoring Most CVEs: What Security Teams Must Do Now
After a 263% surge in vulnerability submissions, NIST moved 29,000 CVEs to “Not Scheduled” — leaving patch prioritization in limbo for… Continue reading on Medi
Security Vaults: Protect Your Keys Before They Protect Nothing
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Security Vaults: Protect Your Keys Before They Protect Nothing
In modern software systems — especially cloud-native and SaaS architectures — keys are the crown jewels. API keys, database credentials… Continue reading on ज्ञ
The $250K Bug That Broke Everything: How to Chain Vulnerabilities Like the Elite 0.1%
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The $250K Bug That Broke Everything: How to Chain Vulnerabilities Like the Elite 0.1%
Read Full Writeup Because It’s Worth it. Continue reading on Medium »
Security Questions Bypassed to Change User’s Password
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Security Questions Bypassed to Change User’s Password
Hi everyone, in this article, I’ll walk you guys through a small bypass I found that helped me bypass the security questions altogether… Continue reading on Inf
Postman Secret Scanning: A Practical Guide to Finding Exposed APIs
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Postman Secret Scanning: A Practical Guide to Finding Exposed APIs
One public Postman workspace exposed the full chatbot infrastructure of a government service — endpoints, authentication flows, live… Continue reading on InfoSe
The Bug Hunting Mistake That Slowed My Progress
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Bug Hunting Mistake That Slowed My Progress
I spent months chasing the wrong targets. One change turned everything around. Continue reading on InfoSec Write-ups »