Tech Skills
Cybersecurity
Ethical hacking, penetration testing, network security, CTFs and defensive security
Skills in this topic
8 skills — Sign in to track your progress
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector
Showing 1,421 reads from curated sources

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
I Built a Tool That Simulates and Detects Linux Rootkits
There is something about the way rootkits work that I find genuinely fascinating. They do not break into a system; they hide inside it… Continue reading on Medi
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Securing the Backbone — Issue #22: When a $500 Radio Can Stop a Freight Train: What Critical Infra…
Date: July 21, 2025 Continue reading on Medium »
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Securing the Backbone — Issue #21: Software Supply Chain Failures Are Quietly Driving Breach Costs…
Date: July 14, 2025 Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Bankroll CTF@CIT 2026
Overview Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Building a Risk Register from Scratch: A Practical Exercise
Risk management is not just for enterprises with dedicated security teams and six-figure compliance budgets. I built this risk register as… Continue reading on

Forbes Innovation
🔐 Cybersecurity
⚡ AI Lesson
3w ago
If You See This Microsoft Login—Your Account Is Being Hacked
Do not sign-in on this page — it's an attack and your account will be hijacked.
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
LOOKBACK - TRY HACK ME- ROOM
Hello everyone! This is an easy rated room from the TryHackMe platform titled “LOOKBACK” Continue reading on System Weakness »
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Why Did Vercel Get Breached? What We Know About the April 2026 Attack
Vercel powers more than 4 million websites and processes 30 billion requests every week. Continue reading on Towards AI »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
PortSwigger “JWT authentication bypass via algorithm confusion” Lab Çözüm & Rehber
Algorithm confusion attacks nedir? Continue reading on Medium »
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Web Application Forensics
Web application forensics plays a critical role in modern cybersecurity by enabling organizations to detect, analyze, and respond to… Continue reading on Medium
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Tools Don’t Make You a Hacker-Thinking Does
A common belief in cybersecurity: Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
At 16, I Chose to Fight Cybercrime
“It took just one phone call to destroy everything.” No hacking. No warning. Just one moment of trust. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Introduction to SIEM | TryHackMe
Task 1 - Introduction: Continue reading on Medium »
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
A Complete Guide to Unified Threat Detection Across Cloud, Network & Endpoints
Modern enterprises operate in a highly distributed digital ecosystem. Employees work remotely, applications run across hybrid and… Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Beyond the Firewall: A Technical Post-Mortem of the 2022 Uber Breach
The September 2022 compromise of Uber’s internal infrastructure by the threat group Lapsus$ remains one of the most significant case… Continue reading on Medium
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Reaction vs Proaction in CyberSecurity
A simple Time-Line Observation: Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Building GhostTrap: My AI-Powered SSH Honeypot
I always wanted to build a practical cybersecurity project that could capture attacker behavior, log commands, and show everything in a… Continue reading on Med

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
AI SOC Hits Nasdaq: Why SEA CISOs Must Ignore the Hype and Prioritize Local Governance
Nasdaq’s "Autonomous Security" buzz is a landmark moment—but in the high-friction corridors of Jakarta, the human-in-the-loop is mandatory. Continue reading on
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Infosec Advanced: Kerberoasting
In a world where the majority of companies leverage Active Directory to handle authentication and access to resources in their environment… Continue reading on
Dev.to AI
🔐 Cybersecurity
⚡ AI Lesson
3w ago
IDOR in AI-Generated APIs: What Cursor Won't Check Automatically
TL;DR AI editors add auth middleware but skip ownership checks on resource endpoints Any authenticated user can read or modify another user's data (CWE-639) Fix

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Siber Güvenlikte Başarı: Eğitim Değil Süreç Meselesi
Uzun zamandır Siber güvenlik/Pentest dünyasının içinde olan biri olarak bu yazıda pentest yaparken yapılan bazı hatalardan bahsedeceğiz. Continue reading on Med
Dev.to AI
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Two DM-origin problems, not one: security hardening vs. compliance-bias hardening
Most plugin-layer DM-hardening conversations treat "a hostile DM" as one problem. After shipping v0.21 of @thecolony/elizaos-plugin (origin-tagging DMs to refus

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Breaking my own spam classifier: a hands-on tour of adversarial examples
“What I cannot create, I do not understand.” — Feynman Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Security doesn’t have weekends.
And people who truly admire security don’t either. Continue reading on Medium »
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
How SaaS Teams Can Validate Real Risk Before Launch
Launch pressure hides security risk. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
⚙️ 01. — Authentication bypass via OAuth implicit flow
Difficulty: Apprentice Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Why Security Scanners Miss Real Risk — And What Web Attack Simulation Shows Instead
Most security tools are very good at producing findings. That does not mean they are good at showing risk. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
OAuth 2.0 Authetication Vulnerabilities
What is OAuth? {#what-is-oauth} Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
From Nothing to Full Admin Access: Chaining Broken Access Controls
Broken Access Controls are everywhere. In application security, they show up in many different ways. Sometimes they come from poorly… Continue reading on InfoSe
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
The Data Exposure Risk: Why Sensitive Data Is Still Your Biggest Liability
Data is your most valuable asset. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
HK Cap 653: Is Your Architecture Audit-Ready?
Compliance is now an architectural challenge. Bridge the Cap. 653 gap with AI-native ZTNA and automated audit trails. Continue reading on Medium »
Dev.to AI
🔐 Cybersecurity
⚡ AI Lesson
3w ago
cmpli
cmpli (pronounced "comply") is an uncomplicated security guidance platform for small businesses. It walks owners through an assessment of how their business act
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
The "Informative" Trap: A Bug Bounty Autopsy
Continue reading on Medium »
Dev.to AI
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Mythos, Memory Loss, and the Part InfoSec Keeps Missing
The article discusses Mythos, an AI-powered capability that significantly accelerates vulnerability research and exploit development. While acknowledging its te

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Zero-Trust System Design: How We Used JWT as an Immutable Context Boundary in Spring-Boot…
We didn’t just use JSON Web Tokens (JWT) for the login page; we injected them directly into our lowest-level business logic to eliminate… Continue reading on Me

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
My First 10 Days on TryHackMe: A Complete Beginner’s Journey
Can a first-year BTech student with zero cybersecurity experience maintain a 10-day learning streak? Here’s what happened. Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Learn Faster or Fall Behind. Cybersecurity in the AI Era.
“In the Era of Machine Learning, we have to be Learning Machines” Continue reading on Medium »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Booking.com Hacked — Attackers Obtain Personal Data of Thousands of Travelers
Booking.com in the hands of hackers. 78 million records from GTA on a leak site. A Microsoft Defender that opens doors instead of guarding… Continue reading on

Forbes Innovation
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Apple Changes iPhone After 15 Years—Do You Stop Texting Now?
Do you really stop sending texts as Apple upgrades iPhone following FBI warning?
Medium · Programming
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Why Subfinder Is Every Hacker’s Favorite “Quiet” Tool
No noise. No alerts. Just pure discovery Continue reading on System Weakness »
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Why Subfinder Is Every Hacker’s Favorite “Quiet” Tool
No noise. No alerts. Just pure discovery Continue reading on System Weakness »

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
From Zero to Cloud: A Complete AWS CTF Writeup (HiveCTF Cloud Challenges)
How a beginner can learn real-world AWS security concepts through Capture the Flag challenges — from leaked credentials to cross-account… Continue reading on Me

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
NIST Stops Scoring Most CVEs: What Security Teams Must Do Now
After a 263% surge in vulnerability submissions, NIST moved 29,000 CVEs to “Not Scheduled” — leaving patch prioritization in limbo for… Continue reading on Medi

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Security Vaults: Protect Your Keys Before They Protect Nothing
In modern software systems — especially cloud-native and SaaS architectures — keys are the crown jewels. API keys, database credentials… Continue reading on ज्ञ

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
The $250K Bug That Broke Everything: How to Chain Vulnerabilities Like the Elite 0.1%
Read Full Writeup Because It’s Worth it. Continue reading on Medium »
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Security Questions Bypassed to Change User’s Password
Hi everyone, in this article, I’ll walk you guys through a small bypass I found that helped me bypass the security questions altogether… Continue reading on Inf

Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
Postman Secret Scanning: A Practical Guide to Finding Exposed APIs
One public Postman workspace exposed the full chatbot infrastructure of a government service — endpoints, authentication flows, live… Continue reading on InfoSe
Medium · Cybersecurity
🔐 Cybersecurity
⚡ AI Lesson
3w ago
The Bug Hunting Mistake That Slowed My Progress
I spent months chasing the wrong targets. One change turned everything around. Continue reading on InfoSec Write-ups »
DeepCamp AI