Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,754
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,396 reads from curated sources

ASPM Helps You Prioritize, But What If the Findings Are Wrong?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
ASPM Helps You Prioritize, But What If the Findings Are Wrong?
A Practical Guide to Reducing False Positives and Validating Vulnerabilities in AppSec Continue reading on Medium »
167 Bugs Fixed, Two Already Being Used Against You, and One Deadline That Could Brick Your PC
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
167 Bugs Fixed, Two Already Being Used Against You, and One Deadline That Could Brick Your PC
Microsoft’s second-largest security update ever is out — and buried inside it is a SharePoint flaw attackers were already exploiting, a… Continue reading on Med
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Quantum Corner: April 2026 Update
The Quantum Threat Timeline Just Compressed Continue reading on Medium »
Havenlon: The Execution Control Layer Beneath Modern Business Systems
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Havenlon: The Execution Control Layer Beneath Modern Business Systems
Modern systems already have policy engines, risk controls, approval flows, and orchestration layers. Continue reading on Medium »
The Vercel Breach Wasn’t a Code Problem. It Was a Visibility Problem.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Vercel Breach Wasn’t a Code Problem. It Was a Visibility Problem.
Today Vercel disclosed a breach. The root cause wasn’t a zero-day. It wasn’t a vulnerability in their application layer. It was a… Continue reading on Medium »
:      …
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
: …
A new class of AI models is arriving to secure the digital world — introducing Project Glasswing. Continue reading on Medium »
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Cisco Calls OpenClaw an Absolute Security Nightmare: What You Need to Know
Cisco's AI Threat and Security Research team released a critical security assessment of OpenClaw on January 28, characterizing it as "an absolute nightmare from
The Vercel Breach Hit One of My Projects. Here's What 10 Minutes of Cleanup Looked Like.
Dev.to · Kai 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Vercel Breach Hit One of My Projects. Here's What 10 Minutes of Cleanup Looked Like.
I was in the affected subset. Not catastrophic — the service barely has users yet. But the cleanup has a lesson worth posting while it's fresh.
SaaS Compliance for Early-Stage Startups: Win Trust and Deal
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
SaaS Compliance for Early-Stage Startups: Win Trust and Deal
SaaS users place a very high value on safety, trust and privacy, especially when dealing with small start-ups. These should be your… Continue reading on Medium
Mastering Executive Security Leadership: Why CISO Foundation Training Matters
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Mastering Executive Security Leadership: Why CISO Foundation Training Matters
Did you know that nearly sixty percent of new cybersecurity leaders report feeling unprepared for boardroom expectations within their… Continue reading on Mediu
That’s how I turned a simple parameter into full email content injection in a trusted password…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
That’s how I turned a simple parameter into full email content injection in a trusted password…
بِسْمِ اللَّـهِ الرَّحْمَٰنِ الرَّحِيمِ، وَالصَّلَاةُ وَالسَّلَامُ عَلَىٰ الْمَبْعُوثِ رَحْمَةً لِلْعَالَمِينَ ﷺ Continue reading on Medium »
Composer Has Two Dangerous Security Flaws — Here’s Why You Need to Update Right Now
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Composer Has Two Dangerous Security Flaws — Here’s Why You Need to Update Right Now
“You don’t need Perforce installed. You don’t need to use Perforce at all. One crafted composer.json file is enough to run arbitrary… Continue reading on CodeX
CVE-2026–34197: A Bug That Hid Inside Apache ActiveMQ for 13 Years And Now It’s Being Exploited
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 3w ago
CVE-2026–34197: A Bug That Hid Inside Apache ActiveMQ for 13 Years And Now It’s Being Exploited
This is the first post in my “Threat Intel From the Lab” series where I take real, actively exploited CVEs, break them down from zero, and… Continue reading on
CVE-2026–34197: A Bug That Hid Inside Apache ActiveMQ for 13 Years And Now It’s Being Exploited
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
CVE-2026–34197: A Bug That Hid Inside Apache ActiveMQ for 13 Years And Now It’s Being Exploited
This is the first post in my “Threat Intel From the Lab” series where I take real, actively exploited CVEs, break them down from zero, and… Continue reading on
DATA IS THE NEW OIL: WHO REALLY OWNS YOUR DIGITAL LIFE?
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
DATA IS THE NEW OIL: WHO REALLY OWNS YOUR DIGITAL LIFE?
By Lakshani Kaveesha Continue reading on Medium »
Techpoint Africa 🔐 Cybersecurity ⚡ AI Lesson 3w ago
At 22, this cybersecurity graduate is building an anti-piracy creator platform with his father
In this edition of After Hours, Adeyemi Akitoye, a cybersecurity graduate and the co-founder of Knowvas, a creator platform, shares his journey building a start
The Register 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Indonesia’s game rating system paused amid claims it leaked developer creds and glimpses of major new titles
PLUS: India bins ID app pre-install plan; Robot wins Beijing half-marathon; AI writing Manga speech bubbles; and more! Asia In Brief Indonesia’s Ministry of Com
Vercel Got Powned By An OAuth App. Again… Here Is What Happened and What You Should Do
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Vercel Got Powned By An OAuth App. Again… Here Is What Happened and What You Should Do
And if you installed the same AI tool they did, you’re already in the blast radius. Continue reading on Towards AI »
7 ferramentas de engenharia social
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
7 ferramentas de engenharia social
Há um ponto em que a conversa sobre engenharia social deixa de ser abstrata e passa a tocar a infraestrutura concreta do ataque. É aí que… Continue reading on M
Trust Without Timing: Why Security Must Be Independent of When
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Trust Without Timing: Why Security Must Be Independent of When
1. The Hidden Dependency: Time as a Security Primitive Continue reading on Medium »
The Phrase Gap: AI Won’t Pull the Trigger, But It’ll Hand You the Loaded Gun
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
The Phrase Gap: AI Won’t Pull the Trigger, But It’ll Hand You the Loaded Gun
I red-teamed an AI agent with real tool access. 87% of attacks succeeded. Then my own classifier turned out to be wrong — and the real… Continue reading on Medi
Hacker News (AI) 🔐 Cybersecurity ⚡ AI Lesson 3w ago
2,100 Swiss municipalities showing which provider handles their official email
Comments
I Built a Tool That Simulates and Detects Linux Rootkits
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 3w ago
I Built a Tool That Simulates and Detects Linux Rootkits
There is something about the way rootkits work that I find genuinely fascinating. They do not break into a system; they hide inside it… Continue reading on Medi
I Built a Tool That Simulates and Detects Linux Rootkits
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
I Built a Tool That Simulates and Detects Linux Rootkits
There is something about the way rootkits work that I find genuinely fascinating. They do not break into a system; they hide inside it… Continue reading on Medi
Securing the Backbone — Issue #22: When a $500 Radio Can Stop a Freight Train: What Critical Infra…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Securing the Backbone — Issue #22: When a $500 Radio Can Stop a Freight Train: What Critical Infra…
Date: July 21, 2025 Continue reading on Medium »
Securing the Backbone — Issue #21: Software Supply Chain Failures Are Quietly Driving Breach Costs…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Securing the Backbone — Issue #21: Software Supply Chain Failures Are Quietly Driving Breach Costs…
Date: July 14, 2025 Continue reading on Medium »
Bankroll CTF@CIT 2026
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Bankroll CTF@CIT 2026
Overview Continue reading on Medium »
Building a Risk Register from Scratch: A Practical Exercise
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Building a Risk Register from Scratch: A Practical Exercise
Risk management is not just for enterprises with dedicated security teams and six-figure compliance budgets. I built this risk register as… Continue reading on
If You See This Microsoft Login—Your Account Is Being Hacked
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 3w ago
If You See This Microsoft Login—Your Account Is Being Hacked
Do not sign-in on this page — it's an attack and your account will be hijacked.
LOOKBACK - TRY HACK ME- ROOM
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
LOOKBACK - TRY HACK ME- ROOM
Hello everyone! This is an easy rated room from the TryHackMe platform titled “LOOKBACK” Continue reading on System Weakness »
Why Did Vercel Get Breached? What We Know About the April 2026 Attack
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Why Did Vercel Get Breached? What We Know About the April 2026 Attack
Vercel powers more than 4 million websites and processes 30 billion requests every week. Continue reading on Towards AI »
PortSwigger “JWT authentication bypass via algorithm confusion” Lab Çözüm & Rehber
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
PortSwigger “JWT authentication bypass via algorithm confusion” Lab Çözüm & Rehber
Algorithm confusion attacks nedir? Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Web Application Forensics
Web application forensics plays a critical role in modern cybersecurity by enabling organizations to detect, analyze, and respond to… Continue reading on Medium
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Tools Don’t Make You a Hacker-Thinking Does
A common belief in cybersecurity: Continue reading on Medium »
At 16, I Chose to Fight Cybercrime
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
At 16, I Chose to Fight Cybercrime
“It took just one phone call to destroy everything.” No hacking. No warning. Just one moment of trust. Continue reading on Medium »
Introduction to SIEM | TryHackMe
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Introduction to SIEM | TryHackMe
Task 1 - Introduction: Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
A Complete Guide to Unified Threat Detection Across Cloud, Network & Endpoints
Modern enterprises operate in a highly distributed digital ecosystem. Employees work remotely, applications run across hybrid and… Continue reading on Medium »
Beyond the Firewall: A Technical Post-Mortem of the 2022 Uber Breach
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Beyond the Firewall: A Technical Post-Mortem of the 2022 Uber Breach
The September 2022 compromise of Uber’s internal infrastructure by the threat group Lapsus$ remains one of the most significant case… Continue reading on Medium
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Reaction vs Proaction in CyberSecurity
A simple Time-Line Observation: Continue reading on Medium »
Building GhostTrap: My AI-Powered SSH Honeypot
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Building GhostTrap: My AI-Powered SSH Honeypot
I always wanted to build a practical cybersecurity project that could capture attacker behavior, log commands, and show everything in a… Continue reading on Med
AI SOC Hits Nasdaq: Why SEA CISOs Must Ignore the Hype and Prioritize Local Governance
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
AI SOC Hits Nasdaq: Why SEA CISOs Must Ignore the Hype and Prioritize Local Governance
Nasdaq’s "Autonomous Security" buzz is a landmark moment—but in the high-friction corridors of Jakarta, the human-in-the-loop is mandatory. Continue reading on
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Infosec Advanced: Kerberoasting
In a world where the majority of companies leverage Active Directory to handle authentication and access to resources in their environment… Continue reading on
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 3w ago
IDOR in AI-Generated APIs: What Cursor Won't Check Automatically
TL;DR AI editors add auth middleware but skip ownership checks on resource endpoints Any authenticated user can read or modify another user's data (CWE-639) Fix
Siber Güvenlikte Başarı: Eğitim Değil Süreç Meselesi
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Siber Güvenlikte Başarı: Eğitim Değil Süreç Meselesi
Uzun zamandır Siber güvenlik/Pentest dünyasının içinde olan biri olarak bu yazıda pentest yaparken yapılan bazı hatalardan bahsedeceğiz. Continue reading on Med
Dev.to AI 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Two DM-origin problems, not one: security hardening vs. compliance-bias hardening
Most plugin-layer DM-hardening conversations treat "a hostile DM" as one problem. After shipping v0.21 of @thecolony/elizaos-plugin (origin-tagging DMs to refus
Breaking my own spam classifier: a hands-on tour of adversarial examples
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Breaking my own spam classifier: a hands-on tour of adversarial examples
“What I cannot create, I do not understand.” — Feynman Continue reading on Medium »
Security doesn’t have weekends.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
Security doesn’t have weekends.
And people who truly admire security don’t either. Continue reading on Medium »
How SaaS Teams Can Validate Real Risk Before Launch
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 3w ago
How SaaS Teams Can Validate Real Risk Before Launch
Launch pressure hides security risk. Continue reading on Medium »