Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,748
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,390 reads from curated sources

How I Built a Real-Time DDoS Detection Engine from Scratch
Medium · DevOps 🔐 Cybersecurity ⚡ AI Lesson 2w ago
How I Built a Real-Time DDoS Detection Engine from Scratch
A beginner-friendly walkthrough of building an anomaly detection daemon that watches HTTP traffic, learns what normal looks like, and… Continue reading on Mediu
How I Built a Real-Time DDoS Detection Engine from Scratch
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
How I Built a Real-Time DDoS Detection Engine from Scratch
A beginner-friendly walkthrough of building an anomaly detection daemon that watches HTTP traffic, learns what normal looks like, and… Continue reading on Mediu
How to Land a High-Paying Cybersecurity Job (Step-by-Step Career Switch Guide)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
How to Land a High-Paying Cybersecurity Job (Step-by-Step Career Switch Guide)
Introduction: Cybersecurity has quickly become one of the most in-demand and high-paying career paths worldwide. With the rise in data… Continue reading on Medi
How I Got Super Admin on My University’s Sports Booking Portal
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
How I Got Super Admin on My University’s Sports Booking Portal
Two misconfigurations, one exposed RPC endpoint, and zero RLS policies , a short story about what happens when Supabase defaults go… Continue reading on Medium
Flag Mastery: The Flags That Run Every Engagement
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Flag Mastery: The Flags That Run Every Engagement
curl is only simple until you learn which flags change everything. Continue reading on InfoSec Write-ups »
From Memory Dump to Attack Story: Building DeepProbe v2
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
From Memory Dump to Attack Story: Building DeepProbe v2
The gap we don’t talk about in incident response Continue reading on InfoSec Write-ups »
Hacking into Eternal.com | Hackerone
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Hacking into Eternal.com | Hackerone
Welcome back readers! It has been quite a while since I wrote on medium. This piece if writing will contain some of my findings which I… Continue reading on Inf
Hacking into Eternal.com | Hackerone
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Hacking into Eternal.com | Hackerone
Welcome back readers! It has been quite a while since I wrote on medium. This piece if writing will contain some of my findings which I… Continue reading on Inf
I Tried to Social Engineer My Friends (With Permission) — Every Single One Fell For It
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
I Tried to Social Engineer My Friends (With Permission) — Every Single One Fell For It
The most uncomfortable security experiment I’ve ever run Continue reading on InfoSec Write-ups »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The AI Security Debt: Why Your “Wrapper” App is a Liability
In the tech gold rush of the last three years, the mantra has been “Ship it yesterday.” Millions of dollars have been poured into… Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Can You Capture the Flag? — A Beginner’s Journey Into CTF Encoding Challenges
“c4n y0u c4p7u23 7h3 f149?” Continue reading on Medium »
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Scanned public repos and found a lot of errors
I tested Debuggix on 5 random GitHub repos this week: https://debuggix.space • Financial chat app → 136 issues • AI trading bot → JWT authentication bypass • AI
What End-to-End Encryption Actually Protects (And What It Doesn'''t)
Dev.to · Haven Messenger 🔐 Cybersecurity ⚡ AI Lesson 2w ago
What End-to-End Encryption Actually Protects (And What It Doesn'''t)
What end-to-end encryption protects — and what it misses — is one of the most important distinctions...
Buy a mac mini to Run OpenClaw? Anyone Can Get a Safer Sandbox in 1 Minute
Dev.to · rednakta 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Buy a mac mini to Run OpenClaw? Anyone Can Get a Safer Sandbox in 1 Minute
This is a submission for the OpenClaw Challenge. If you've been around the OpenClaw conversation...
The Hidden Dangers of Public Wi-Fi
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Hidden Dangers of Public Wi-Fi
And How to Actually Protect Yourself Continue reading on Medium »
The Death of the Password (Finally): What Passkeys Actually Mean for Everyday Users
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Death of the Password (Finally): What Passkeys Actually Mean for Everyday Users
*Cybersecurity 2026 | 12 min read* Continue reading on Medium »
The Death of the Password (Finally): What Passkeys Actually Mean for Everyday Users
Medium · LLM 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Death of the Password (Finally): What Passkeys Actually Mean for Everyday Users
*Cybersecurity 2026 | 12 min read* Continue reading on Medium »
The OSI Model (Except It Actually Makes Sense) — Part 2
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The OSI Model (Except It Actually Makes Sense) — Part 2
Hi, everyone! Welcome to part 2 of the OSI model! Continue reading on Medium »
Imposter Syndrome in Cybersecurity: Why AI Is Making It Feel Worse (and Why That’s Misleading)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Imposter Syndrome in Cybersecurity: Why AI Is Making It Feel Worse (and Why That’s Misleading)
Ever found a vulnerability — and still felt like you just got lucky? Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
How I Built an Automated Incident Triage System Using n8n and VirusTotal
As a cybersecurity student, one of the most important skills I’m learning is automation — specifically how Security Operations Center… Continue reading on Mediu
Started with a Facebook DM To Hunting Down Pig Butchering Crypto Syndicate
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Started with a Facebook DM To Hunting Down Pig Butchering Crypto Syndicate
24–04–2026 2.19 Pm Friday Afternoon I received a Phishing message from a Facebook account including an obvious phishing link when i tried… Continue reading on M
Thinking About a Cybersecurity Career But Bon’t Know Where to Begin?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Thinking About a Cybersecurity Career But Bon’t Know Where to Begin?
Cybersecurity talent demand continues to grow globally. Continue reading on Medium »
We probed 20,338 x402 endpoints. 161 are agent honeypots.
Dev.to · AFX 🔐 Cybersecurity ⚡ AI Lesson 2w ago
We probed 20,338 x402 endpoints. 161 are agent honeypots.
We probed 20,338 x402 endpoints. 161 are agent honeypots. x402 lets HTTP servers charge per request...
What Happens 10 Minutes After You Get Hacked
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
What Happens 10 Minutes After You Get Hacked
You won’t hear an alarm. Continue reading on Medium »
You’re Probably Writing Insecure JavaScript.
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 2w ago
You’re Probably Writing Insecure JavaScript.
You’re Probably Writing Insecure JavaScript (And You Don’t Even Know It) Most JavaScript applications I review, even the good ones, have… Continue reading on Me
You’re Probably Writing Insecure JavaScript.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
You’re Probably Writing Insecure JavaScript.
You’re Probably Writing Insecure JavaScript (And You Don’t Even Know It) Most JavaScript applications I review, even the good ones, have… Continue reading on Me
Dark Web Leakage Diarisis
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Dark Web Leakage Diarisis
“Be careful, your breach is their business!”.. To show you exactly how that business operates, I just finished a write-up on my website… Continue reading on Med
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Ciberseguridad en México: la brecha invisible del sector público
La ciberseguridad hoy en día es pieza clave para empresas multinacionales, PyMEs, universidades, personas y gobierno. La privacidad de… Continue reading on Medi
Un grupo no autorizado asegura haber logrado acceso a Mythos, la herramienta de ciberseguridad de…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Un grupo no autorizado asegura haber logrado acceso a Mythos, la herramienta de ciberseguridad de…
Además, vulnerabilidades críticas en SharePoint, aplicaciones falsas en la App Store, el ICE utiliza spyware, extensiones de TikTok… Continue reading on Medium
Kendi Siber Güvenlik Laboratuvarınızı Kurun: Ağ Mimarisi ve pfSense Kurulumu
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Kendi Siber Güvenlik Laboratuvarınızı Kurun: Ağ Mimarisi ve pfSense Kurulumu
Siber Güvenlik alanında kendinize bir bakış açısı kazandırmak, bir şeyleri tecrübe etmek istiyorsanız size verilen tavsiyelerden birisi de… Continue reading on
HTB Footprinting Lab — Easy
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
HTB Footprinting Lab — Easy
Hey everyone! Today I’m sharing how I solved the Footprinting Lab — Easy on Hack The Box. This lab is all about enumerating services and… Continue reading on Me
Projects vs Certifications in Cybersecurity — What Actually Gets You Hired?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Projects vs Certifications in Cybersecurity — What Actually Gets You Hired?
By Karanam Shrivasta 15-Year-Old Cybersecurity Enthusiast Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
ByteCode C2 — Open source framework, 0/63 on VT, bypasses Defender
I developed a command-and-control (C2) framework with a primary focus on improving evasion techniques, motivated by observing that… Continue reading on Medium »
20 Penetration Testing Projects Worth Adding to Your Resume
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
20 Penetration Testing Projects Worth Adding to Your Resume
For job seekers aiming for penetration testing positions by curating 20 real-world projects spanning entry‑level to expert‑level scenarios. Continue reading on
iOS 26.4.2: Apple Emergency iPhone Update Fixes Deleted Notification Bug
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 2w ago
iOS 26.4.2: Apple Emergency iPhone Update Fixes Deleted Notification Bug
Apple has released a new iPhone update — that has taken many by surprise — to address a vulnerability that was recently exploited by the FBI.
Human-in-the-loop: OWASP GenAI Security Project, Anthropic’s Claude Mythos Preview & Project…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Human-in-the-loop: OWASP GenAI Security Project, Anthropic’s Claude Mythos Preview & Project…
“Human‑in‑the‑loop” means keeping humans actively involved in a process - whether by operating, supervising, or making key decisions… Continue reading on Medium
Cat Pictures — TryHackMe WalkThrough
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Cat Pictures — TryHackMe WalkThrough
Continue reading on Medium »
CYBERSECURITY | LLM09:2025
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
CYBERSECURITY | LLM09:2025
The Devil is in the Dependencies: When AI Hallucinations Turn Malicious Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Online vs Offline Cybersecurity Training: Which One Should You Choose?
Right now, web access fills every part of life. People tap into it to study, play, buy things, also chat with others they know. With so… Continue reading on Med
The Science of Protecting Information in the Digital World
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Science of Protecting Information in the Digital World
In the modern digital world, information is one of the most valuable assets. People use digital systems every day to send messages, make… Continue reading on Me
Eksperimen Keamanan Web: Mengamankan Portal Berita dari Serangan SQL Injection
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Eksperimen Keamanan Web: Mengamankan Portal Berita dari Serangan SQL Injection
Oleh: Fajar Fawwaz Atallah NIM: 312410357 Continue reading on Medium »
Eksperimen Keamanan Web: Mengamankan Portal Berita dari Serangan SQL Injection
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Eksperimen Keamanan Web: Mengamankan Portal Berita dari Serangan SQL Injection
Oleh: Fajar Fawwaz Atallah NIM: 312410357 Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Invisible Trigger. On the The Com ecosystem and the evil that found a business model
In Place of a Preface: The Piece I Did Not Want to Write Continue reading on Medium »
Day 9: File Uploads Are More Dangerous Than I Thought
Dev.to · GraceSoft 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Day 9: File Uploads Are More Dangerous Than I Thought
I already had an attachments system. It worked across all modules. Reusable. Clean....
I Built an AI-Powered Network Intrusion Detection System for My Final Year Project — Here’s Exactly…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
I Built an AI-Powered Network Intrusion Detection System for My Final Year Project — Here’s Exactly…
And why “just training a model” was the least interesting part of the whole thing. Continue reading on Medium »
Journey toward the SOC Analyst
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Journey toward the SOC Analyst
Class 1: Introduction & importance of SOC in the blue team Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Why I built Activitee — and why the way most organisations prove compliance is quietly broken
The first time I watched a CISO open a SharePoint folder called IRAP Evidence 2024 FINAL_v3 the day before an assessor arrived, I thought… Continue reading on M
Why I Use Argon2id Instead of bcrypt for PDF Encryption Keys
Dev.to · hiyoyo 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Why I Use Argon2id Instead of bcrypt for PDF Encryption Keys
All tests run on an 8-year-old MacBook Air. When you encrypt a PDF with a password, that password...