Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,754
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,396 reads from curated sources

Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Invisible Trigger. On the The Com ecosystem and the evil that found a business model
In Place of a Preface: The Piece I Did Not Want to Write Continue reading on Medium »
Day 9: File Uploads Are More Dangerous Than I Thought
Dev.to · GraceSoft 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Day 9: File Uploads Are More Dangerous Than I Thought
I already had an attachments system. It worked across all modules. Reusable. Clean....
I Built an AI-Powered Network Intrusion Detection System for My Final Year Project — Here’s Exactly…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
I Built an AI-Powered Network Intrusion Detection System for My Final Year Project — Here’s Exactly…
And why “just training a model” was the least interesting part of the whole thing. Continue reading on Medium »
Journey toward the SOC Analyst
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Journey toward the SOC Analyst
Class 1: Introduction & importance of SOC in the blue team Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Why I built Activitee — and why the way most organisations prove compliance is quietly broken
The first time I watched a CISO open a SharePoint folder called IRAP Evidence 2024 FINAL_v3 the day before an assessor arrived, I thought… Continue reading on M
Why I Use Argon2id Instead of bcrypt for PDF Encryption Keys
Dev.to · hiyoyo 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Why I Use Argon2id Instead of bcrypt for PDF Encryption Keys
All tests run on an 8-year-old MacBook Air. When you encrypt a PDF with a password, that password...
ShinyHunters Unmasked: Exploring the Ethics and Implications of the World’s Leading Cyberhack…
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 2w ago
ShinyHunters Unmasked: Exploring the Ethics and Implications of the World’s Leading Cyberhack…
A shadowy collective is quietly harvesting the data of the digital age — exposing how our rush toward convenience, and our growing… Continue reading on Medium »
SOC251 — Quishing Detected (QR Code Phishing)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
SOC251 — Quishing Detected (QR Code Phishing)
Well giving you some information on Quishing this is a Phishing email where QR is used to phish the personal information or data. Continue reading on Medium »
What Government Data Breaches Teach Us About Access Control
Dev.to · logiQode 🔐 Cybersecurity ⚡ AI Lesson 2w ago
What Government Data Breaches Teach Us About Access Control
When a government agency confirms a breach only after a hacker begins advertising the stolen data for...
SSRF Master Guide: Exploitation and Mitigation Strategies
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
SSRF Master Guide: Exploitation and Mitigation Strategies
Learn how to identify and exploit SSRF vulnerabilities in cloud-native environments, from metadata services to filter bypass. Continue reading on Medium »
When the Responder Becomes the Risk
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
When the Responder Becomes the Risk
Most ransomware stories are told the same way. There is an attacker, a victim, a breach, a ransom demand, and then the long, messy process… Continue reading on
How Hackers Use OSINT Before Attacking
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
How Hackers Use OSINT Before Attacking
They do not start with exploits. They start with Google. Continue reading on OSINT Team »
How To Hire CISO For Tech Company
Dev.to · Willis Reed Fan 🔐 Cybersecurity ⚡ AI Lesson 2w ago
How To Hire CISO For Tech Company
The role of a Chief Information Security Officer (CISO) has become increasingly vital for tech...
This Chick Is Not Real
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
This Chick Is Not Real
The loneliest guys on the internet just found the perfect woman — and she doesn’t exist. Continue reading on Medium »
The Rediscovered Wheel: How a 2026 Cybersecurity Paper Dressed the 1960s in a Lab Coat
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Rediscovered Wheel: How a 2026 Cybersecurity Paper Dressed the 1960s in a Lab Coat
Author: Berend Watchus Independent AI & Cybersecurity Researcher. Continue reading on OSINT Team »
Stop Identity Hijacking in DaaS: A 2026 Guide to Passkeys and Token Protection
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Stop Identity Hijacking in DaaS: A 2026 Guide to Passkeys and Token Protection
A practical playbook: from passkeys and Conditional Access to token protection and JIT privileged access Continue reading on Medium »
5 Cyber Risks Boards Can’t Afford to Ignore
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
5 Cyber Risks Boards Can’t Afford to Ignore
Cybersecurity is now a leadership issue not just an IT problem. Continue reading on Medium »
Claude Mythos Probably Isn’t What You Think It Is
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Claude Mythos Probably Isn’t What You Think It Is
Dangerous AI? Marketing stunt? Or a protection racket? Continue reading on Medium »
I Told gVisor I Was Root & It Believed Me
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
I Told gVisor I Was Root & It Believed Me
How I Got Root in Google’s Secure Container Runtime With One Syscall Continue reading on Medium »
Environment Cross-Trust: Leveraging Staging APIs to “Buy” for $0.00
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Environment Cross-Trust: Leveraging Staging APIs to “Buy” for $0.00
Many bug hunters are afraid to delve into the scope of famous companies, thinking it’s the most complex system they’ve ever seen. Based on… Continue reading on
Azure Policy: Baking Security In part 1
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Azure Policy: Baking Security In part 1
Building an Azure Governance MVP Continue reading on Medium »
Why Your HTTPS Traffic Still Gets Blocked (and How DPI Evasion Works)
Dev.to · Alan West 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Why Your HTTPS Traffic Still Gets Blocked (and How DPI Evasion Works)
Understanding why HTTPS traffic gets blocked by DPI, how domain fronting and HTTP tunneling work, and practical solutions for restrictive networks.
OSINT (Open Source Intelligence / Açıq Mənbə Kəşfiyyatı) — Sofia Santos OSINT CTF Həlli və İzah
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
OSINT (Open Source Intelligence / Açıq Mənbə Kəşfiyyatı) — Sofia Santos OSINT CTF Həlli və İzah
Bu yazıda Sofia Santos’un məşhur OSINT CTF tapşırıqlarından biri olan Exercise #021 həllini və izahını addım-addım göstərəcəyəm. Ancaq… Continue reading on Medi
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 2w ago
FCC's router ban expands to portable hotspots - 4 things this means for you
It may get more difficult to upgrade your hotspot - and you'll have other things to worry about, too.
"5 Cybersecurity Threats React Developers Should Know in 2024"
Dev.to · wheelz27 🔐 Cybersecurity ⚡ AI Lesson 2w ago
"5 Cybersecurity Threats React Developers Should Know in 2024"
Written by Fenrir — Hunger Games Arena competitor 5 Cybersecurity Threats React Developers Should...
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Python Security Automation for Busy Sysadmins — 5 scripts that lock down SSH, au
Written by Brutus — Hunger Games Arena competitor Python Security Automation for Busy Sysadmins You’re drowning in alerts and manual log checks. Here are 5 Pyth
OWASP 2026 Smart Contract Vulnerabilities: Access Control (SC01:2026) Analysis
Dev.to · Meriç Cintosun 🔐 Cybersecurity ⚡ AI Lesson 2w ago
OWASP 2026 Smart Contract Vulnerabilities: Access Control (SC01:2026) Analysis
Access control failures represent the highest-severity class of smart contract vulnerabilities in the...
SecurityHeaders.com API Is Gone — Here's the Migration
Dev.to · Guardr 🔐 Cybersecurity ⚡ AI Lesson 2w ago
SecurityHeaders.com API Is Gone — Here's the Migration
The SecurityHeaders.com API is discontinued — no new or renewed subscriptions. If you had CI/CD pipelines or scheduled audits built on it, here's a practical dr
Offensive Security Intro
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Offensive Security Intro
Hack your first website (legally in a safe environment) and experience an ethical hacker’s job. Continue reading on Medium »
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 2w ago
"Cybersecurity Best Practices for React Developers: A Comprehensive Guide"
Written by Fenrir — Hunger Games Arena competitor Cybersecurity Best Practices for React Developers: A Comprehensive Guide As a React developer, you're likely n
I built a Cyber-Cipher Text Decoder on Vibe Code Arena
Dev.to · YASHWANTH REDDY K 🔐 Cybersecurity ⚡ AI Lesson 2w ago
I built a Cyber-Cipher Text Decoder on Vibe Code Arena
There’s a version of this app that’s technically correct. You type text. Click a button. It returns...
CORS Errors Explained: A Practical Debug Guide for 2026
Dev.to · Andrew Rozumny 🔐 Cybersecurity ⚡ AI Lesson 2w ago
CORS Errors Explained: A Practical Debug Guide for 2026
Access to fetch at 'https://api.example.com' from origin 'http://localhost:3000' has been blocked by...
New Google Chrome Security Alert For 3.5 Billion Users
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 2w ago
New Google Chrome Security Alert For 3.5 Billion Users
Google has issued a new security update for 3.5 billion Chrome users. Here’s what you need to know and do.
Sloving CTF’s of flaws.cloud? Read this first.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Sloving CTF’s of flaws.cloud? Read this first.
Hacking Games: Level Up Your Cybersecurity Skills with Capture The Flag Continue reading on Medium »
SoSimple Walkthrough (Proving Ground-play-OSCP)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
SoSimple Walkthrough (Proving Ground-play-OSCP)
By cyber_public_school | Cyber Security Researcher Continue reading on Medium »
When Visibility Becomes Noise: It’s Context Dependent
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
When Visibility Becomes Noise: It’s Context Dependent
Think about it: what is the difference between an employee who is traveling logging in from a different country and a malicious login… Continue reading on Mediu
Bitwarden Confirms Compromise—Here Are The Facts For 10 Million Users
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Bitwarden Confirms Compromise—Here Are The Facts For 10 Million Users
Bitwarden has confirmed a serious security incident in which a compromised product was made public. Here's why most users need not worry.
The Register 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Microsoft beefs up Remote Desktop security with ... hard-to-read messages
Ailing scaling blamed by Windows-maker for unreadable missives Microsoft's update to harden Remote Desktop against phishing attacks has arrived. When users open
The Register 🔐 Cybersecurity ⚡ AI Lesson 2w ago
It's a myth that you need Mythos to find bugs: Open source models can do it just as well
OpenAI's first security hire, Ari Herbert-Voss, thinks more automated bug finding will improve security without costing jobs Black Hat Asia Open source models c
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Red Team vs Blue Team: Understanding the Two Sides of Cyber Defense
If I’m being honest, the whole “Red Team vs Blue Team” thing made way more sense in my head before I actually started learning… Continue reading on Medium »
Post-Quantum Cryptography
Dev.to · Christian Alt-Wibbing 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Post-Quantum Cryptography
Why the Future of Encryption Starts Today I have been developing software for over 20...
403 Forbidden to Established: Bypassing Academic Filters with Open Source
Dev.to · Andy Stewart 🔐 Cybersecurity ⚡ AI Lesson 2w ago
403 Forbidden to Established: Bypassing Academic Filters with Open Source
In my previous posts, I shared how I mastered C++, Assembly, and Haskell in the most chaotic...
The Register 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Researchers find cyber-sabotage malware that may predate Stuxnet by five years
FAST16 could be the first cyberweapon, and its effects could be with us today Black Hat Asia Infosec outfit SentinelOne found malware that tries to induce error
The Corix Partners Friday Reading List — April 24, 2026
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
The Corix Partners Friday Reading List — April 24, 2026
Top 10 Leadership and Management links of the week, curated by Corix Partners Founder and CEO JC Gaillard, focusing on cyber security of… Continue reading on Th
Why Data Security Is the Biggest Concern in MLM Software Migration (With Real Experience Insights)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 2w ago
Why Data Security Is the Biggest Concern in MLM Software Migration (With Real Experience Insights)
Why Data Security Is the Biggest Concern in MLM Software Migration (With Real Experience Insights) Continue reading on Medium »
CVE-2026-33318: CVE-2026-33318: Privilege Escalation via Sequential Exploit Chain in Actual sync-server
Dev.to · CVE Reports 🔐 Cybersecurity ⚡ AI Lesson 2w ago
CVE-2026-33318: CVE-2026-33318: Privilege Escalation via Sequential Exploit Chain in Actual sync-server
CVE-2026-33318: Privilege Escalation via Sequential Exploit Chain in Actual...
CVE-2026-34587: CVE-2026-34587: Server-Side Template Injection and Authorization Bypass in Kirby CMS
Dev.to · CVE Reports 🔐 Cybersecurity ⚡ AI Lesson 2w ago
CVE-2026-34587: CVE-2026-34587: Server-Side Template Injection and Authorization Bypass in Kirby CMS
CVE-2026-34587: Server-Side Template Injection and Authorization Bypass in Kirby...
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 2w ago
OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident
Forensic Summary A North Korean threat group (UNC1069) compromised the popular npm Axios library via a supply chain attack, injecting a backdoor (WAVESHAPER.V2)