Tech Skills

Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

6,760
lessons
Skills in this topic
View full skill map →
Security Basics
beginner
Fix OWASP top 10 vulnerabilities
AI Security
intermediate
Identify and patch prompt injection vulnerabilities
Network Security
intermediate
Configure a firewall with proper inbound/outbound rules
Ethical Hacking & Pen Testing
intermediate
Conduct a full pen test with Kali Linux
Cloud Security
intermediate
Implement IAM least-privilege policies on AWS/GCP
Incident Response
intermediate
Build an incident response playbook
Security Compliance
intermediate
Map controls for SOC 2 Type II compliance
Defensive AI
advanced
Build an AI-powered log anomaly detector

Showing 1,401 reads from curated sources

Saving A Medical Facility Part 1
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Saving A Medical Facility Part 1
The reality here is that medical facilities and healthcare businesses need to be compliant with a magical federal act known as H.I.P.A.A… Continue reading on Me
Cyber guerra: il conflitto invisibile che sta già cambiando tutto
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Cyber guerra: il conflitto invisibile che sta già cambiando tutto
Non ha carri armati né confini visibili, ma ha effetti reali ogni giorno Continue reading on Medium »
OT/ICS: Introduction · TryHackMe Walkthrough
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
OT/ICS: Introduction · TryHackMe Walkthrough
Learn what Operational Technology (OT) and Industrial Control Systems (ICS) are, and how they function. Continue reading on Medium »
Safari Broke Our Authentication — Here’s What We Missed
Medium · Startup 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Safari Broke Our Authentication — Here’s What We Missed
(Cookies, tokens, and the cross-domain issue that nearly broke our login system) Continue reading on Medium »
Claude Mythos Preview Is Not Just a Better Claude. It Changes the Economics of Cybersecurity.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Claude Mythos Preview Is Not Just a Better Claude. It Changes the Economics of Cybersecurity.
Why Anthropic’s newest unreleased model matters, what most coverage misses, and why its biggest value and biggest risk come from the same… Continue reading on M
Attackers Actively Exploiting Critical Vulnerability in Ninja Forms — File Upload Plugin
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Attackers Actively Exploiting Critical Vulnerability in Ninja Forms — File Upload Plugin
Attackers Actively Exploiting Critical Vulnerability in Ninja Forms — File Upload Plugin Continue reading on Medium »
Reverse Engineering on CyberTalents: Solving All MEDIUM Challenges Part 5
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Reverse Engineering on CyberTalents: Solving All MEDIUM Challenges Part 5
Challenge 1 (They are many) : Continue reading on Medium »
Funbox Walkthrough (Proving ground-play-OSCP)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Funbox Walkthrough (Proving ground-play-OSCP)
By cyber_public_school | Cyber Security Researcher Continue reading on Medium »
Netwalker Configuration Extraction via Malcat
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Netwalker Configuration Extraction via Malcat
Introduction Continue reading on Medium »
AWS Community Day Bay Area 2026 (Security Edition): A Volunteer’s Recap and Your Guide to Every…
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 4w ago
AWS Community Day Bay Area 2026 (Security Edition): A Volunteer’s Recap and Your Guide to Every…
The cloud security community showed up. Here’s what went down and where you can watch all of it. Continue reading on Medium »
AWS Community Day Bay Area 2026 (Security Edition): A Volunteer’s Recap and Your Guide to Every…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
AWS Community Day Bay Area 2026 (Security Edition): A Volunteer’s Recap and Your Guide to Every…
The cloud security community showed up. Here’s what went down and where you can watch all of it. Continue reading on Medium »
I’ve Been in Cybersecurity 20+ Years… The Next Two Years are a wake up call
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
I’ve Been in Cybersecurity 20+ Years… The Next Two Years are a wake up call
The Future Is Not What You Think Continue reading on InfoSec Write-ups »
The Expiration Date of Secrecy: Why the Quantum Threat Has Already Begun
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
The Expiration Date of Secrecy: Why the Quantum Threat Has Already Begun
Your bank details, private emails, and crypto wallets might be secure today. But the "Harvest Now, Decrypt Later" reality means they are… Continue reading on Me
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Why Choosing the Right Cybersecurity Services Provider in Dubai is Crucial for Business Growth
In today’s digital-first world, businesses are more connected than ever, but this connectivity also brings increased exposure to cyber… Continue reading on Medi
Try Hack Me- Blue Walkthrough
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Try Hack Me- Blue Walkthrough
Hello, stranger — let’s begin. Continue reading on Medium »
TechRepublic 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites
More than 30 WordPress plugins were shut down after a supply-chain backdoor compromised thousands of sites through the Essential Plugin portfolio. The post Mali
Rethinking How to Learn Cybersecurity in the Age of AI
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Rethinking How to Learn Cybersecurity in the Age of AI
I’ve always had an interest in cybersecurity. Continue reading on Medium »
IAM Engineer Salary in UAE: What Most Job Listings Don’t Tell You
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
IAM Engineer Salary in UAE: What Most Job Listings Don’t Tell You
When people research IAM Engineer salaries in the UAE, they usually expect a straightforward answer — a number based on years of… Continue reading on Medium »
Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways
Engineering at Meta 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways
We’re sharing lessons learned from Meta’s post-quantum cryptography (PQC) migration to help other organizations strengthen their resilience as industry transiti
Building a $40 Stingray Detector That Fits in an Altoids Tin
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Building a $40 Stingray Detector That Fits in an Altoids Tin
The tin clicks shut with that thin metallic snap. You toss it into a bag next to a half-dead USB cable and a notebook that smells faintly… Continue reading on M
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Over 100 Chrome extensions caught stealing your personal data
Security researchers uncover a coordinated campaign hidden inside games, Telegram clients, and browser tools. Continue reading on Medium »
800 Google Android Apps Targeted By PIN-Stealing Hackers
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 4w ago
800 Google Android Apps Targeted By PIN-Stealing Hackers
More than 800 Google Android apps have been targeted by a surge in PIN-stealing hack attacks. What you need to know.
TechCabal 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Kenya’s LOLC Microfinance Bank directors risk prosecution in data enforcement case
The decision signals a sharper enforcement stance in Kenya’s data protection regime.
Cross-site WebSocket Hijacking ; Lab Write-up
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Cross-site WebSocket Hijacking ; Lab Write-up
this challenge was part of the PortSwigger web security academy. Continue reading on Medium »
The Download: cyberscammers’ banking bypasses, and carbon removal troubles
MIT Technology Review 🔐 Cybersecurity ⚡ AI Lesson 4w ago
The Download: cyberscammers’ banking bypasses, and carbon removal troubles
This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. Cyberscammers are bypa
Investigating GotoHTTP on Windows: Behavior, Forensic Artifacts & Detection
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Investigating GotoHTTP on Windows: Behavior, Forensic Artifacts & Detection
Deep dive into GotoHTTP RMM and how to detect it if it ever lands on your corporate Windows workstation Continue reading on Medium »
Medium · Programming 🔐 Cybersecurity ⚡ AI Lesson 4w ago
The Retry Storm: How a Small Slowdown Can Take Down Your JVM
JVM Internals -Scenario 6 Continue reading on Medium »
Beyond Firewalls: Building Intelligent Cybersecurity Systems for AI-Driven Threat Landscapes
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Beyond Firewalls: Building Intelligent Cybersecurity Systems for AI-Driven Threat Landscapes
Enterprise security leaders are confronting an uncomfortable reality: the tools that once defined robust defense firewalls, rule engines… Continue reading on Me
The Ultimate 2026 Guide: Why a Cyber Security Diploma Course in Delhi is Your Shortcut to a ₹8 LPA…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
The Ultimate 2026 Guide: Why a Cyber Security Diploma Course in Delhi is Your Shortcut to a ₹8 LPA…
Landing a good job in 2026 is way more complicated than it was in 2020. We are no longer living in an era where a normal generic degree or… Continue reading on
The Cloud Evaporation: How to Sever the Invisible Tethers to Your Private Life
Medium · AI 🔐 Cybersecurity ⚡ AI Lesson 4w ago
The Cloud Evaporation: How to Sever the Invisible Tethers to Your Private Life
In the modern digital landscape, convenience is the ultimate Trojan horse. We’ve been conditioned to believe that “Syncing” is a safety… Continue reading on Med
How WordPress sites get hacked (common attack methods)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
How WordPress sites get hacked (common attack methods)
How WordPress Sites Get Hacked (Common Attack Methods) Continue reading on Medium »
Quantum Computing Is Breaking Encryption — Here’s What That Means for You
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Quantum Computing Is Breaking Encryption — Here’s What That Means for You
When Google introduced its Willow quantum chip it was not another announcement about new hardware. Continue reading on Medium »
Thieves Can Drain Funds From A Locked iPhone With This Trick: How To Protect Yourself
Forbes Innovation 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Thieves Can Drain Funds From A Locked iPhone With This Trick: How To Protect Yourself
An iPhone exploit allows bad actors to conduct high-value transactions from your locked phone. Here’s the simple step you need to take to prevent it.
The Register 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Microsoft announces product it doesn't want you to buy: Extended security updates for old Exchange, and Skype for Biz
Just migrate already, would you? But if you can't, Redmond will take your cash Microsoft will keep delivering security updates for old versions of Exchange Serv
The 9:30 PM Service Call That Almost Drained My Bank Account
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
The 9:30 PM Service Call That Almost Drained My Bank Account
One ordinary evening, a routine conference call turned into a heart-stopping brush with cyber fraud. Continue reading on Write A Catalyst »
ZDNet 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Protect your devices with our pick for the best antivirus software, now over 60% off
Bitdefender Total Security offers protection against spam, malware, and more - and the software is heavily discounted on Amazon now.
Cyber Security Training in Hyderabad: Build a Future-Proof Career
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Cyber Security Training in Hyderabad: Build a Future-Proof Career
In today’s environment, cyber security threats are evolving rapidly. Continue reading on Medium »
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Advanced Threat Protection Features for Business Security in Dubai
Advanced Threat Protection Features for Modern Cyber Security Continue reading on Medium »
Techpoint Africa 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Corporate Affairs Commission hit by cyberattack in Nigeria
On Techpoint Digest, we talk about the CAC being hit by a cyberattack in Nigeria, Kenya tightening regulations on satellite Internet, and the SA Minister ignori
How n8n Webhooks Became a New Malware Delivery Channel Through Phishing Emails
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
How n8n Webhooks Became a New Malware Delivery Channel Through Phishing Emails
Cybercriminals are turning trusted low-code automation into a stealthy weapon for phishing, malware delivery, and device fingerprinting. Continue reading on Med
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
AWS Credentials in Plain Sight: What I Found Inside a Trading Competition Sandbox
The Discovery Continue reading on Medium »
Why "Smart" People Still Fall for Phishing.
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Why "Smart" People Still Fall for Phishing.
We’ve all seen the headlines. A multinational firm loses $25 million because an employee joined a video call where everyone else including… Continue reading on
Inside a FIFA-Themed Phishing Scheme: Identifying Malicious 2026 World Cup Domains and…
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Inside a FIFA-Themed Phishing Scheme: Identifying Malicious 2026 World Cup Domains and…
International sporting events are highly effective social engineering lures for attackers. In particular, globally recognized events such… Continue reading on O
Certified Red Team Expert (CRTE) Review 2026
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Certified Red Team Expert (CRTE) Review 2026
A no-fluff review of Altered Security’s Certified Red Team Expert certification. Continue reading on Medium »
What I Got Wrong About IP Addresses (Until I Learned This)
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
What I Got Wrong About IP Addresses (Until I Learned This)
“What I learned when I stopped treating IP addresses as exam content and started seeing them as systems” Continue reading on Medium »
TryHackMe: Shadow Trace | Write-Up
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
TryHackMe: Shadow Trace | Write-Up
This is a write-up for the Shadow Trace room on TryHackMe which is part of the SOC Level 1 pathway. I will describe how I completed this… Continue reading on Me
The Register 🔐 Cybersecurity ⚡ AI Lesson 4w ago
Google Chrome lacks protection against one of the most basic and common ways to track users online
Browser fingerprinting is everywhere Google markets its Chrome browser by citing its superior safety features, but according to privacy consultant Alexander Han
The Trojan Horse Quietly Hiding In Your Wordpress Website And How To Protect Yourself
Medium · Cybersecurity 🔐 Cybersecurity ⚡ AI Lesson 4w ago
The Trojan Horse Quietly Hiding In Your Wordpress Website And How To Protect Yourself
For over a decade, the standard advice for WordPress administrators has been: “There’s a plugin for that.” This simple “off the shelf… Continue reading on Mediu