<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Aditya Pidurkar</title>
    <description>The latest articles on Forem by Aditya Pidurkar (@adityapidurkar).</description>
    <link>https://forem.com/adityapidurkar</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3212617%2Fbe50406d-c2e6-494f-a92e-8d90f0cb1856.jpg</url>
      <title>Forem: Aditya Pidurkar</title>
      <link>https://forem.com/adityapidurkar</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/adityapidurkar"/>
    <language>en</language>
    <item>
      <title>Canva Down???</title>
      <dc:creator>Aditya Pidurkar</dc:creator>
      <pubDate>Sun, 22 Mar 2026 21:59:35 +0000</pubDate>
      <link>https://forem.com/adityapidurkar/canva-down-1pgm</link>
      <guid>https://forem.com/adityapidurkar/canva-down-1pgm</guid>
      <description>&lt;h2&gt;
  
  
  What Does “Error 503: Service Unavailable” Actually Mean?
&lt;/h2&gt;

&lt;p&gt;You click on a website, expecting it to load—and boom, you’re hit with &lt;strong&gt;“503 Service Unavailable.”&lt;/strong&gt; Frustrating, right?&lt;/p&gt;

&lt;p&gt;The good news? It’s usually not your fault.&lt;/p&gt;

&lt;p&gt;A 503 error basically means the website’s server is taking a break… not by choice, though. It’s still up and running, but it can’t handle your request at that moment. Think of it like calling customer support and hearing, &lt;em&gt;“All our agents are currently busy.”&lt;/em&gt; The system is there—it’s just overwhelmed.&lt;/p&gt;




&lt;h2&gt;
  
  
  So why does this happen?
&lt;/h2&gt;

&lt;p&gt;Most of the time, it’s one of these:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The website is getting &lt;strong&gt;way too much traffic&lt;/strong&gt; all at once
&lt;/li&gt;
&lt;li&gt;The server is down for &lt;strong&gt;maintenance&lt;/strong&gt; (planned or unplanned)
&lt;/li&gt;
&lt;li&gt;Something behind the scenes—like a &lt;strong&gt;database or service&lt;/strong&gt;—stopped working
&lt;/li&gt;
&lt;li&gt;The server simply &lt;strong&gt;ran out of resources&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  What can you do about it?
&lt;/h2&gt;

&lt;p&gt;Honestly, not much—and that’s okay.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Try &lt;strong&gt;refreshing the page&lt;/strong&gt; after a few seconds
&lt;/li&gt;
&lt;li&gt;Give it a minute or two and come back
&lt;/li&gt;
&lt;li&gt;If it’s a popular site, chances are they’re already fixing it
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;If you’re the one running the website, though, it’s a different story. You might need to check your server load, upgrade resources, or dig into logs to see what’s breaking.&lt;/p&gt;




&lt;blockquote&gt;
&lt;p&gt;At the end of the day, a 503 error is just the internet’s way of saying:&lt;br&gt;&lt;br&gt;
&lt;em&gt;"Hold on, I’m a bit overwhelmed right now."&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;And most of the time, it clears up pretty quickly.&lt;/p&gt;

</description>
      <category>canva</category>
      <category>down</category>
      <category>downdetector</category>
      <category>errorcodes</category>
    </item>
    <item>
      <title>End-to-End Encryption: How Secure Are Your Messages?</title>
      <dc:creator>Aditya Pidurkar</dc:creator>
      <pubDate>Fri, 06 Mar 2026 07:34:45 +0000</pubDate>
      <link>https://forem.com/adityapidurkar/end-to-end-encryption-how-secure-are-your-messages-32fj</link>
      <guid>https://forem.com/adityapidurkar/end-to-end-encryption-how-secure-are-your-messages-32fj</guid>
      <description>&lt;p&gt;In today's world using the internet has become a part of our daily routine and privacy of our data has become more valuable than ever. The messages we send travel through many servers, routers, satellites and other medium which makes us think that&lt;/p&gt;

&lt;p&gt;What if someone reads my messages? What if they are made public to all?&lt;br&gt;
Here’s Where End to End Encryption or E2EE comes into play, it acts as a shield for you messages and protects it. But even though apps claim to use E2EE, how safe are our messages really?&lt;/p&gt;

&lt;p&gt;So lets understand what E2EE is , how it works and its limitations and whether your favorite messaging app is secure enough?&lt;/p&gt;

&lt;h2&gt;
  
  
  What is End-to-End Encryption?
&lt;/h2&gt;

&lt;p&gt;End-to-End Encryption is a system where only the communicating users—sender and recipient—can read the messages. No third party, not even the service provider, can decrypt the content.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How It Works&lt;/strong&gt;:-&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Message Encryption&lt;/strong&gt;: On your device, your message is encrypted with the recipient’s public key.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Transmission&lt;/strong&gt;: The encrypted message travels through the internet and the app’s servers.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Message Decryption&lt;/strong&gt;: Only the recipient’s private key can decrypt the message.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This ensures confidentiality and integrity, even if the network is compromised.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh27tvwooik3i0qhcci9v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh27tvwooik3i0qhcci9v.png" alt=" " width="800" height="384"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Is E2EE Important?
&lt;/h2&gt;

&lt;p&gt;● Prevents Surveillance: Not even governments or tech companies can read your data.&lt;br&gt;
● Secures Against Hackers: Intercepted messages are useless without the private key.&lt;br&gt;
● Critical for Journalists &amp;amp; Activists: In authoritarian regimes, privacy is a matter of life and death.&lt;/p&gt;




&lt;h2&gt;
  
  
  Limitations &amp;amp; Real-World Threats
&lt;/h2&gt;

&lt;p&gt;Even with E2EE, your messages aren’t bulletproof. Here's why:&lt;br&gt;
&lt;strong&gt;Device Compromise&lt;/strong&gt;(Endpoint Attacks)&lt;br&gt;
If your device is infected with spyware like Pegasus, encryption is useless—the attacker reads the message before or after it's encrypted.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fws7j5uuq6nuc7r791lur.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fws7j5uuq6nuc7r791lur.png" alt=" " width="800" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Metadata Exposure&lt;/strong&gt;&lt;br&gt;
E2EE protects content, not metadata (e.g., who messaged whom, when, how often). This can still reveal patterns of behavior.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fycm0nhu311yxndpdhxf7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fycm0nhu311yxndpdhxf7.png" alt=" " width="800" height="418"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Backups&lt;/strong&gt;&lt;br&gt;
If your chats are backed up to the cloud unencrypted (e.g., Google Drive or iCloud), they can be accessed by others—even law enforcement with a warrant.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7kxg040e9eoe8kk3zc1n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7kxg040e9eoe8kk3zc1n.png" alt=" " width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Man-in-the-Middle Attacks&lt;/strong&gt;&lt;br&gt;
Without authentication checks, an attacker could pose as your contact. Apps like Signal prevent this via safety numbers verification.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff7sy3fuo86doc9llr1nn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff7sy3fuo86doc9llr1nn.png" alt=" " width="800" height="364"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Popular Apps That Use E2EE
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;App&lt;/th&gt;
&lt;th&gt;End-to-End Encryption&lt;/th&gt;
&lt;th&gt;Default?&lt;/th&gt;
&lt;th&gt;Protocol Used&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;WhatsApp&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Signal Protocol&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Signal&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Signal Protocol&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Telegram&lt;/td&gt;
&lt;td&gt;Optional&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;MTProto (Secret Chats)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;iMessage&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Apple Proprietary&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Facebook Messenger&lt;/td&gt;
&lt;td&gt;Optional&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;Signal (Secret Chats)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Just because an app says &lt;strong&gt;“encrypted,”&lt;/strong&gt; it doesn’t mean it is &lt;strong&gt;end-to-end encrypted by default.&lt;/strong&gt; Be aware!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Pro Tips for Real Privacy
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Use Apps Like Signal: It’s open-source, audited, and built solely for privacy.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Turn Off Cloud Backups: Especially for apps like WhatsApp.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Verify Safety Numbers: Especially if you suspect tampering.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Keep OS &amp;amp; Apps Updated: To patch known vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Secure Your Endpoints: Use antivirus, avoid sketchy links, enable biometrics.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;So Never blindly trust an app just because it says end-to-end encryption. Don’t trust just verify whether E2EE is enabled by default, and stay informed. &lt;/p&gt;

&lt;p&gt;Awareness is your first line of defense to know which platforms truly protect your privacy, and which ones don’t. &lt;/p&gt;

&lt;p&gt;Stay cautious, stay encrypted, and message securely.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Secure Messaging Scorecard&lt;/li&gt;
&lt;li&gt; Pegasus Spyware: What you should know&lt;/li&gt;
&lt;li&gt; Why Opt-In Security Does Not Work: The WhatsApp Backup Example&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>cybersecurity</category>
      <category>e2e</category>
    </item>
    <item>
      <title>Agentic AI: The Next Big Cybersecurity Threat?</title>
      <dc:creator>Aditya Pidurkar</dc:creator>
      <pubDate>Thu, 26 Feb 2026 06:21:40 +0000</pubDate>
      <link>https://forem.com/adityapidurkar/agentic-ai-the-next-big-cybersecurity-threat-55dd</link>
      <guid>https://forem.com/adityapidurkar/agentic-ai-the-next-big-cybersecurity-threat-55dd</guid>
      <description>&lt;p&gt;Few years till today we used to have tools like chatbots who replied to what we asked, what we required with and only with specific info. But there was a problem it always required us to put something in it if we wanted it to find us something or do a task. It is way too tedious task.&lt;/p&gt;

&lt;p&gt;Now the AI world is changing with a new concept, something which can think on its own, take action on its own .. Known as &lt;strong&gt;Agentic AI&lt;/strong&gt;.&lt;/p&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fao40iv7dp5ogrhkc030w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fao40iv7dp5ogrhkc030w.png" alt=" " width="800" height="435"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What Exactly Is Agentic AI?
&lt;/h2&gt;

&lt;p&gt;Let's take a example&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"Find vulnerabilities in this system and report them."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;A normal AI might help analyze logs or scan code when told to.&lt;/p&gt;

&lt;p&gt;But Agentic AI would &lt;br&gt;
Decide where to start scanning -&amp;gt; Choose which tools to use -&amp;gt; Analyze data -&amp;gt; Adjust strategy if something fails -&amp;gt; Keep working until the objective is achieved&lt;/p&gt;

&lt;p&gt;All without our interaction. It doesn't just follow instructions, it takes decisions!&lt;/p&gt;




&lt;h2&gt;
  
  
  Why Cybersecurity Experts Are Getting Nervous
&lt;/h2&gt;

&lt;p&gt;Till now, we fought war(Attackers vs Defenders) but the point was it was all human driven.&lt;br&gt;
Even with the automated tools, the main strategies were planned by Humans.&lt;/p&gt;

&lt;p&gt;For the first time now, attackers can deploy systems that&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Think&lt;/li&gt;
&lt;li&gt;Adapt&lt;/li&gt;
&lt;li&gt;Persist&lt;/li&gt;
&lt;li&gt;Scale infinitely&lt;/li&gt;
&lt;li&gt;Operate 24/7 without fatigue&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  1. Attacks Could Become Fully Automated
&lt;/h3&gt;

&lt;p&gt;Right now, hackers spend a lot of time doing manual work: - Searching for weak points - Testing exploits - Trying different attack methods&lt;/p&gt;

&lt;p&gt;Agentic AI could do all of this automatically.&lt;/p&gt;

&lt;p&gt;It could: - Scan thousands of systems at once - Identify vulnerabilities instantly - Launch attacks continuously, day and night&lt;/p&gt;

&lt;p&gt;Unlike humans, AI doesn't sleep, take breaks, or lose focus.&lt;/p&gt;

&lt;p&gt;This means cyberattacks could become faster, cheaper, and massively scalable.&lt;/p&gt;




&lt;h3&gt;
  
  
  2. AI Can Adapt Faster Than Humans Can Defend
&lt;/h3&gt;

&lt;p&gt;One of the scariest things about Agentic AI is its ability to learn while attacking.&lt;/p&gt;

&lt;p&gt;Imagine this scenario:&lt;/p&gt;

&lt;p&gt;A security system blocks an intrusion attempt.&lt;/p&gt;

&lt;p&gt;A human hacker might take hours or days to figure out another approach.&lt;/p&gt;

&lt;p&gt;But an Agentic AI could: - Analyze why it failed - Generate new attack strategies - Try again immediately&lt;/p&gt;

&lt;p&gt;This creates a situation where defenses are constantly playing catch‑up.&lt;/p&gt;




&lt;h3&gt;
  
  
  3. Social Engineering Could Become Extremely Powerful
&lt;/h3&gt;

&lt;p&gt;Many cyberattacks don't rely on technical hacks --- they rely on&lt;br&gt;
tricking people.&lt;/p&gt;

&lt;p&gt;Agentic AI could take social engineering to a whole new level.&lt;/p&gt;

&lt;p&gt;Future AI agents may be able to: - Write highly personalized phishing&lt;br&gt;
emails - Hold realistic conversations with victims - Create deepfake&lt;br&gt;
voices or videos - Study a person's behavior to manipulate them&lt;/p&gt;

&lt;p&gt;In simple terms, scams could become &lt;strong&gt;almost impossible to distinguish&lt;br&gt;
from reality&lt;/strong&gt;.&lt;/p&gt;




&lt;h3&gt;
  
  
  4. The Rise of Self‑Evolving Malware
&lt;/h3&gt;

&lt;p&gt;Traditional malware is static --- once created, it has a fixed design.&lt;/p&gt;

&lt;p&gt;Agentic AI could change that completely.&lt;/p&gt;

&lt;p&gt;We may soon see malware that can: - Rewrite its own code - Change its&lt;br&gt;
attack patterns - Hide intelligently - Decide when to attack or stay&lt;br&gt;
silent&lt;/p&gt;

&lt;p&gt;This kind of malware would behave less like software... and more like a&lt;br&gt;
living digital organism.&lt;/p&gt;




&lt;h3&gt;
  
  
  5. Attacks That Never Stop
&lt;/h3&gt;

&lt;p&gt;Human hackers usually work in phases.&lt;/p&gt;

&lt;p&gt;Agentic AI could operate continuously for years.&lt;/p&gt;

&lt;p&gt;It could: - Monitor systems quietly - Collect data slowly - Expand&lt;br&gt;
access over time - Avoid detection strategically&lt;/p&gt;

&lt;p&gt;This would create a new category of threats: &lt;strong&gt;long‑term autonomous&lt;br&gt;
intrusions&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  Real‑World Threat Scenarios We Might See Soon
&lt;/h2&gt;

&lt;h4&gt;
  
  
  Autonomous Corporate Espionage
&lt;/h4&gt;

&lt;p&gt;An AI agent infiltrates a company network and silently gathers trade&lt;br&gt;
secrets for months without human involvement.&lt;/p&gt;

&lt;h4&gt;
  
  
  AI‑Driven Ransomware
&lt;/h4&gt;

&lt;p&gt;Instead of random attacks, AI could choose the most valuable targets and&lt;br&gt;
time the attack for maximum damage.&lt;/p&gt;

&lt;h4&gt;
  
  
  Autonomous Cyber Warfare
&lt;/h4&gt;

&lt;p&gt;Governments could deploy AI agents to: - Disrupt power grids - Attack&lt;br&gt;
financial systems - Interfere with communication networks&lt;/p&gt;

&lt;p&gt;This could lead to a future where cyber wars are fought largely by&lt;br&gt;
machines.&lt;/p&gt;




&lt;h2&gt;
  
  
  But It's Not All Doom --- AI Can Also Defend
&lt;/h2&gt;

&lt;p&gt;The same technology can also protect us.&lt;/p&gt;

&lt;p&gt;Security teams are already developing AI agents that can:&lt;/p&gt;

&lt;p&gt;Monitor networks 24/7 -&amp;gt; Detect unusual behavior instantly -&amp;gt; Automatically patch vulnerabilities -&amp;gt; Respond to attacks in seconds&lt;/p&gt;

&lt;p&gt;In the future, cybersecurity may become a battlefield of &lt;strong&gt;AI vs AI&lt;/strong&gt;,&lt;br&gt;
where autonomous defenders fight autonomous attackers.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Bigger Questions We Need to Answer
&lt;/h2&gt;

&lt;p&gt;Agentic AI raises serious ethical and legal challenges:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;  Who is responsible if an AI launches an attack?&lt;/li&gt;
&lt;li&gt;  Can autonomous cyber weapons be controlled?&lt;/li&gt;
&lt;li&gt;  Should there be global rules limiting AI autonomy?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These are questions governments and tech leaders are still struggling to&lt;br&gt;
answer.&lt;/p&gt;




&lt;p&gt;The biggest challenge ahead isn't just building smarter AI.&lt;/p&gt;

&lt;p&gt;It's making sure we can &lt;strong&gt;control it, secure it, and defend against it&lt;/strong&gt;&lt;br&gt;
before it becomes a tool that attackers can fully exploit.&lt;/p&gt;

&lt;p&gt;Because one thing is clear:&lt;/p&gt;

&lt;p&gt;The future of cybersecurity will not just involve protecting systems...&lt;/p&gt;

&lt;p&gt;It will involve managing intelligent digital agents themselves.&lt;/p&gt;

&lt;p&gt;And that future has already begun.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>agentaichallenge</category>
    </item>
    <item>
      <title>Nobody Talks About This Cyber Threat, But It's Everywhere</title>
      <dc:creator>Aditya Pidurkar</dc:creator>
      <pubDate>Wed, 04 Feb 2026 11:35:11 +0000</pubDate>
      <link>https://forem.com/adityapidurkar/nobody-talks-about-this-cyber-threat-but-its-everywhere-1482</link>
      <guid>https://forem.com/adityapidurkar/nobody-talks-about-this-cyber-threat-but-its-everywhere-1482</guid>
      <description>&lt;p&gt;There's a class of attacks I see in incident reports again and again, TBs of data leaving the network but not a single security tool raised a red flag.&lt;/p&gt;

&lt;p&gt;No flashy zero-days. No nation-state tooling. No malware that triggers&lt;br&gt;
antivirus.&lt;/p&gt;

&lt;p&gt;Just &lt;strong&gt;someone who logged in&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;That's it.&lt;/p&gt;

&lt;p&gt;Not all breaches starts with dramatic zero days, ransomwares or any alert popping up saying Data Hacked!!!&lt;/p&gt;

&lt;p&gt;The threat I am talking about is &lt;strong&gt;Credential Abuse&lt;/strong&gt; : using valid credentials to walk straight in like invited ones!&lt;/p&gt;




&lt;h3&gt;
  
  
  Why This Matters More than any Vuln
&lt;/h3&gt;

&lt;p&gt;We focus more on CVEs, patch cycles, and EDR signatures but attackers skip those coz why stress over that if you can login directly!&lt;/p&gt;

&lt;p&gt;Your firewall won't care, EDR won't care and the SIEM will barely notice it even SOC Analyst will see it as normal user logging in.&lt;/p&gt;

&lt;p&gt;From the defender's side, it looks legitimate.&lt;br&gt;
From the attacker's side, it's perfect &lt;strong&gt;camouflage&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;In most enterprise breaches, the initial foothold was &lt;strong&gt;not&lt;/strong&gt; malware.&lt;/p&gt;




&lt;h3&gt;
  
  
  How Credential Abuse Works (Under the Hood)
&lt;/h3&gt;

&lt;p&gt;This is not guessing passwords blindly. It's much smarter.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7hx6unzk903g3tfm0orm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7hx6unzk903g3tfm0orm.png" alt="Provided by elastic.co" width="800" height="460"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  1) Credential Harvesting
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Phishing kits (evilginx-style reverse proxies)&lt;/li&gt;
&lt;li&gt;Infostealers&lt;/li&gt;
&lt;li&gt;Data breaches from unrelated websites&lt;/li&gt;
&lt;li&gt;Keylogging malware&lt;/li&gt;
&lt;li&gt;Browser password dumps&lt;/li&gt;
&lt;li&gt;OS cred dumping&lt;/li&gt;
&lt;li&gt;Credentials from Password stores&lt;/li&gt;
&lt;li&gt;unhashed or plain text creds passing over network&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  2) Credential Validation (Password Spraying)
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python3 o365spray.py &lt;span class="nt"&gt;--domain&lt;/span&gt; company.com &lt;span class="nt"&gt;--userlist&lt;/span&gt; users.txt &lt;span class="nt"&gt;--password&lt;/span&gt; &lt;span class="s1"&gt;'Winter@123'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  3) Living Off the Land After Login
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;  PowerShell&lt;/li&gt;
&lt;li&gt;  RDP&lt;/li&gt;
&lt;li&gt;  SMB&lt;/li&gt;
&lt;li&gt;  Azure portal&lt;/li&gt;
&lt;li&gt;  AWS console&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;No malware required.&lt;/p&gt;




&lt;h3&gt;
  
  
  Real-Life Case: The Uber Breach (2022)
&lt;/h3&gt;

&lt;p&gt;A contractor working with Uber had their password stolen. Not from Uber. From their own personal machine earlier, thanks to an infostealer. Those logs were purchased by a hacker.&lt;/p&gt;

&lt;p&gt;He attempted login on Uber's VPN but&lt;br&gt;
MFA pops up! &lt;/p&gt;

&lt;p&gt;Instead of bypassing it or using any exploit the attacker simply kept spamming MFA Prompts and the contractor kept denying it but being tired he clicked Approve to make it stop and done was the play!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Instant Access&lt;/strong&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  Where Most Organizations Mess This Up
&lt;/h3&gt;

&lt;p&gt;I’ve seen this pattern so many times it’s almost predictable.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;“We have MFA, so we’re fine.”&lt;/li&gt;
&lt;li&gt;Nobody looks at impossible travel if the login worked&lt;/li&gt;
&lt;li&gt;Password spray attempts get ignored because no one got locked out&lt;/li&gt;
&lt;li&gt;A user adds a new MFA method and no alert is generated&lt;/li&gt;
&lt;li&gt;Mailbox rules get created and nobody ever checks them&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All of this comes from one dangerous assumption:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;If the login is successful, it must be the real user.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;That’s exactly what attackers rely on.&lt;br&gt;
&lt;br&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What You (or Your SOC) Should Actually Watch For
&lt;/h3&gt;

&lt;p&gt;Pay attention to things like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A successful login from a country the user has never been to&lt;/li&gt;
&lt;li&gt;A new MFA device getting added to an existing account&lt;/li&gt;
&lt;li&gt;Inbox rules being created, especially ones that hide or forward emails&lt;/li&gt;
&lt;li&gt;Large downloads from OneDrive or SharePoint&lt;/li&gt;
&lt;li&gt;Users granting permissions to random OAuth apps inside Microsoft 365

&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  If You Think This Already Happened to You
&lt;/h3&gt;

&lt;p&gt;If you faced something like this:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;You got MFA prompts you didn’t request&lt;/li&gt;
&lt;li&gt;Your mailbox had rules you don’t remember creating&lt;/li&gt;
&lt;li&gt;Security emails were marked as read or moved to folders&lt;/li&gt;
&lt;li&gt;Colleagues said you sent emails you don’t recall writing&lt;/li&gt;
&lt;li&gt;Login history shows locations you’ve never been to&lt;/li&gt;
&lt;li&gt;Your account suddenly asked you to re-authenticate everywhere&lt;/li&gt;
&lt;li&gt;Files in OneDrive or SharePoint show unusual download activity&lt;/li&gt;
&lt;li&gt;An unfamiliar app shows up in your Microsoft 365 app permissions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Then Do this&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Check and delete all mailbox rules&lt;/li&gt;
&lt;li&gt;Review MFA methods and remove anything you don’t recognize&lt;/li&gt;
&lt;li&gt;Force sign-out from all sessions&lt;/li&gt;
&lt;li&gt;Revoke OAuth app permissions you didn’t approve&lt;/li&gt;
&lt;li&gt;Inform your IT/SOC team with the timeline of what you noticed&lt;/li&gt;
&lt;li&gt;Ask for sign-in logs to be reviewed for the past 30–60 days&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;So stay safe, stay secure.&lt;br&gt;
Thank You for reading!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;a href="https://www.upguard.com/blog/what-caused-the-uber-data-breach#was-any-sensitive-user-data-stolen-during-the-uber-breach" rel="noopener noreferrer"&gt;Uber Data Breach&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.elastic.co/blog/elastic-global-threat-report-breakdown-credential-access" rel="noopener noreferrer"&gt;Elastic.co blog by Devon Kerr&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>cybersecurity</category>
      <category>credentialaccess</category>
      <category>threatanalysis</category>
      <category>databreach</category>
    </item>
    <item>
      <title>Setup Oracle VirtualBox in Windows 11</title>
      <dc:creator>Aditya Pidurkar</dc:creator>
      <pubDate>Tue, 20 Jan 2026 12:30:00 +0000</pubDate>
      <link>https://forem.com/adityapidurkar/setup-oracle-virtualbox-in-windows-11-phm</link>
      <guid>https://forem.com/adityapidurkar/setup-oracle-virtualbox-in-windows-11-phm</guid>
      <description>&lt;p&gt;Today lemme demonstrate how to download and setup &lt;strong&gt;Oracle VirtualBox in Windows 11&lt;/strong&gt;. I know its a vary basic thing to do but some of us dont know where and how to do this. &lt;/p&gt;

&lt;p&gt;Lets start with Downloading required files&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Oracle VirtualBox&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://download.virtualbox.org/virtualbox/7.2.4/VirtualBox-7.2.4-170995-Win.exe" rel="noopener noreferrer"&gt;Download&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Extension Pack&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://download.virtualbox.org/virtualbox/7.2.4/Oracle_VirtualBox_Extension_Pack-7.2.4.vbox-extpack" rel="noopener noreferrer"&gt;Download&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now lets install it&lt;br&gt;
Double click to open the setup and proceed with this steps&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmju2d7i684zh2nr0ohzz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmju2d7i684zh2nr0ohzz.png" width="585" height="461"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click Next&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F78n5usyypnw5z6uu8g8m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F78n5usyypnw5z6uu8g8m.png" width="580" height="460"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Check the I accept the terms of the license agreement and click Next&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe6thxo0muacr45jai3r6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe6thxo0muacr45jai3r6.png" width="583" height="460"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Simply click Next&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftmtyiaqx0x0ssq5fj5cb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftmtyiaqx0x0ssq5fj5cb.png" width="585" height="463"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click Yes&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7042rgfsr3ooztrtv9kt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7042rgfsr3ooztrtv9kt.png" width="587" height="466"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click Yes&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7gcpa4xbapyeeac1td35.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7gcpa4xbapyeeac1td35.png" width="582" height="462"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl6bvhtrapasde77yr54g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl6bvhtrapasde77yr54g.png" width="584" height="461"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click Install&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2oqm9ex2trp0uocj1a44.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2oqm9ex2trp0uocj1a44.png" width="585" height="465"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click Finish Now and open VirtualBox&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy8t3rb83hd01hbxte52b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy8t3rb83hd01hbxte52b.png" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now press Ctrl+T to go to Extensions tab&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F33vbv9n65dpv4xhttetw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F33vbv9n65dpv4xhttetw.png" width="649" height="494"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then click on install and select the extension file we downloaded&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff9cg1pybrcjteuc7qtkx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff9cg1pybrcjteuc7qtkx.png" width="568" height="333"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click Install and press Agree&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Done!!!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you face any issues contact me at&lt;/p&gt;

&lt;p&gt;&lt;a href="mailto:adityapidurkar@proton.me"&gt;Mail&lt;/a&gt;&lt;/p&gt;

</description>
      <category>tutorial</category>
      <category>beginners</category>
      <category>cybersecurity</category>
      <category>virtualmachine</category>
    </item>
    <item>
      <title>20% of internet down: Why X, ChatGPT, and Cloudflare were Down</title>
      <dc:creator>Aditya Pidurkar</dc:creator>
      <pubDate>Tue, 18 Nov 2025 13:39:11 +0000</pubDate>
      <link>https://forem.com/adityapidurkar/update-why-x-chatgpt-and-cloudflare-are-down-14b6</link>
      <guid>https://forem.com/adityapidurkar/update-why-x-chatgpt-and-cloudflare-are-down-14b6</guid>
      <description>&lt;p&gt;&lt;strong&gt;Date:&lt;/strong&gt; November 18, 2025&lt;br&gt;
&lt;strong&gt;Status:&lt;/strong&gt; Ongoing / Recovering&lt;/p&gt;

&lt;p&gt;If you cannot refresh your X (Twitter) feed or log into your favorite game right now, you aren't alone. A massive chunk of the internet struggles at this moment.&lt;/p&gt;

&lt;p&gt;Rumors suggest a massive cyberattack causes this, but the reality involves a more technical explanation. Here is the full list of what broke, why it broke, and when it returns.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzh3gc52pf2px4p68s1h3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzh3gc52pf2px4p68s1h3.png" alt=" " width="800" height="404"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  The Full List of Affected Services
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Cloudflare&lt;/strong&gt; causes the issue. Cloudflare acts as a "backbone" provider for millions of websites. Because Cloudflare faces issues, every app that relies on them faces issues too.&lt;/p&gt;

&lt;p&gt;Based on Downdetector spikes and user reports, the following services currently fail:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Social Media:&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;X (formerly Twitter):&lt;/strong&gt; Fails to load feeds globally; users cannot post.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Facebook / Meta:&lt;/strong&gt; Rejects logins and fails to load pages.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Truth Social:&lt;/strong&gt; Displays accessibility errors.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Grindr:&lt;/strong&gt; App fails to connect.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;AI &amp;amp; Productivity:&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;OpenAI:&lt;/strong&gt; ChatGPT and even the new video tool, &lt;strong&gt;Sora&lt;/strong&gt;, deny access or show capacity errors.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Canva:&lt;/strong&gt; The editor runs slowly or fails to load entirely.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Amazon / AWS:&lt;/strong&gt; Specific services show instability (though core AWS remains up).&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Entertainment &amp;amp; Gaming:&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Spotify:&lt;/strong&gt; Stops music streams and prevents app access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;League of Legends:&lt;/strong&gt; Login servers and matchmaking systems fail.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Letterboxd:&lt;/strong&gt; The site refuses to load properly.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;bet365:&lt;/strong&gt; Cloudflare error messages block access to the betting site.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Utilities:&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;NJ Transit:&lt;/strong&gt; Commuters face disruptions on the app and site.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Downdetector:&lt;/strong&gt; Ironically, the outage briefly took down the very site used to track outages.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;




&lt;h3&gt;
  
  
  Did a DDoS Attack Cause This?
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Short Answer:&lt;/strong&gt; No, a maintenance error caused this.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Long Answer:&lt;/strong&gt; Confusion exists because two big stories broke at the same time:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;strong&gt;The Real Issue (Cloudflare Outage):&lt;/strong&gt; Cloudflare officially attributes the problem to &lt;strong&gt;internal infrastructure issues&lt;/strong&gt;. Engineers performed scheduled maintenance in several data centers, but the traffic re-routing failed. This failure created a cascade of "500 errors."&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;The "Fake" News (Azure Attack):&lt;/strong&gt; You might read headlines today about the "Largest DDoS Attack in History" (15.7 Terabits per second). &lt;strong&gt;Microsoft blocked this attack weeks ago.&lt;/strong&gt; They simply released the report today. That attack &lt;strong&gt;did not&lt;/strong&gt; cause the outages you see right now.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Current Status (As of 7:10 PM IST)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Cloudflare:&lt;/strong&gt; Engineers identified the fix and are implementing it now.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Recovery:&lt;/strong&gt; Services slowly return online, but expect error pages for the next few hours as traffic stabilizes.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;The Bottom Line:&lt;/strong&gt; Do not change your passwords or reset your router. Engineers are currently fixing the internet's plumbing. We simply wait for the water to flow again.&lt;/p&gt;

&lt;h3&gt;
  
  
  More Updates coming soon!!!
&lt;/h3&gt;

</description>
      <category>ddos</category>
      <category>outage</category>
      <category>cyberattack</category>
      <category>cloudflare</category>
    </item>
    <item>
      <title>OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker</title>
      <dc:creator>Aditya Pidurkar</dc:creator>
      <pubDate>Fri, 14 Nov 2025 12:30:00 +0000</pubDate>
      <link>https://forem.com/adityapidurkar/owasp-top-10-2025-what-you-need-to-know-as-a-security-engineer-or-hacker-1cp1</link>
      <guid>https://forem.com/adityapidurkar/owasp-top-10-2025-what-you-need-to-know-as-a-security-engineer-or-hacker-1cp1</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2zemn9o92eywqmtxur8m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2zemn9o92eywqmtxur8m.png" alt="owasptop10" width="800" height="437"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The OWASP Top 10 is one of the first things people mention when they talk about web security. But if you work in security long enough, you learn that most people talk about it without ever reading the details.&lt;br&gt;&lt;br&gt;
So let me explain you through the &lt;strong&gt;2025 edition&lt;/strong&gt; in a clear, direct way. I’ll mention what changed, why it matters, and where you should focus if you break, test, or defend web apps.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why the 2025 Edition Matters
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe8631hlu5x64mv0xqxp7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe8631hlu5x64mv0xqxp7.png" alt="order" width="800" height="221"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;OWASP didn’t just reshuffle the list. They &lt;strong&gt;added two new categories&lt;/strong&gt;, &lt;strong&gt;expanded supply-chain risk&lt;/strong&gt;, and &lt;strong&gt;grouped weaknesses by root cause&lt;/strong&gt;, not by symptom. That gives you a more precise view of &lt;em&gt;where systems actually fail&lt;/em&gt; today.&lt;/p&gt;

&lt;h3&gt;
  
  
  The 2025 Top 10 focuses on:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Bad access rules
&lt;/li&gt;
&lt;li&gt;Misconfigured systems
&lt;/li&gt;
&lt;li&gt;Compromised dependencies
&lt;/li&gt;
&lt;li&gt;Weak cryptography
&lt;/li&gt;
&lt;li&gt;Injection flaws
&lt;/li&gt;
&lt;li&gt;Poor design
&lt;/li&gt;
&lt;li&gt;Broken authentication
&lt;/li&gt;
&lt;li&gt;Integrity failures
&lt;/li&gt;
&lt;li&gt;Missing alerts
&lt;/li&gt;
&lt;li&gt;Unsafe error handling
&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;A01 — Broken Access Control&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Developers still trust user input too much and protect data too little. You’ll see users reaching admin functions, bypassing role checks, or escalating privileges. SSRF now lives here because it crosses trust boundaries.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;A02 — Security Misconfiguration&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Cloud, containers, and complex frameworks create endless ways to misconfigure systems: debug modes left open, unsafe headers, open buckets, or weak CORS rules.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;A03 — Software Supply Chain Failures&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Expanded beyond “Vulnerable Components.” This covers malicious packages, poisoned builds, dependency confusion, and unsafe update paths.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;A04 — Cryptographic Failures&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Most crypto issues come from bad implementation: outdated ciphers, hardcoded keys, weak TLS, or plaintext secrets.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;A05 — Injection&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Still a core issue: SQLi, OS command injection, XSS, template injection, LDAP injection. Assume injection exists until proven otherwise.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;A06 — Insecure Design&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Deep structural flaws: missing threat modeling, unsafe workflows, weak trust boundaries, and flawed business logic.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;A07 — Authentication Failures&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Modern frameworks help, but issues remain: broken session handling, missing MFA, weak password rules, and leaked tokens.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;A08 — Software or Data Integrity Failures&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Covers unsafe deserialization, unverified updates, manipulated files, and missing integrity checks.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;A09 — Logging &amp;amp; Alerting Failures&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Systems that fail to log events, never alert, or log the wrong data leave teams blind during attacks.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;A10 — Mishandling of Exceptional Conditions&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;A new category highlighting failures under stress: resource exhaustion, unexpected states, bad error handling, or fail-open behavior.&lt;/p&gt;




&lt;h2&gt;
  
  
  How OWASP Built the List
&lt;/h2&gt;

&lt;p&gt;OWASP used &lt;strong&gt;real-world testing data&lt;/strong&gt; and &lt;strong&gt;expert survey feedback&lt;/strong&gt;. Instead of counting raw vulnerabilities, they looked at whether an app had &lt;em&gt;at least one instance&lt;/em&gt; of a weakness. That paints a clearer picture of prevalence and risk. The data has came from reputated companies and community surveys.&lt;/p&gt;




&lt;h2&gt;
  
  
  What This Means for Security Professionals
&lt;/h2&gt;

&lt;p&gt;If you test or defend applications:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Start with &lt;strong&gt;access control&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Hunt for &lt;strong&gt;misconfiguration&lt;/strong&gt; early
&lt;/li&gt;
&lt;li&gt;Treat &lt;strong&gt;supply-chain attacks&lt;/strong&gt; as routine
&lt;/li&gt;
&lt;li&gt;Encourage &lt;strong&gt;secure design&lt;/strong&gt; from day one
&lt;/li&gt;
&lt;li&gt;Verify &lt;strong&gt;crypto correctness&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Review &lt;strong&gt;logging and alerting&lt;/strong&gt; for IR readiness
&lt;/li&gt;
&lt;li&gt;Stress-test &lt;strong&gt;error paths&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This version reflects real attacks and real failures more than past editions.&lt;/p&gt;

&lt;p&gt;Got questions about these 10? Don’t worry — I got a full series coming your way, each topic explained with ease!&lt;/p&gt;

&lt;p&gt;STAY CONNECTED!!&lt;/p&gt;

</description>
      <category>owasp</category>
      <category>owasptop10</category>
      <category>security</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Blackbird: The AI-Powered OSINT Account Enumeration Tool</title>
      <dc:creator>Aditya Pidurkar</dc:creator>
      <pubDate>Fri, 10 Oct 2025 04:11:28 +0000</pubDate>
      <link>https://forem.com/adityapidurkar/blackbird-the-ai-powered-osint-account-enumeration-tool-4382</link>
      <guid>https://forem.com/adityapidurkar/blackbird-the-ai-powered-osint-account-enumeration-tool-4382</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhisk9ul28mm2lob8ybq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhisk9ul28mm2lob8ybq.png" alt="1" width="800" height="828"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  About
&lt;/h2&gt;

&lt;p&gt;Blackbird is a fast and powerful Open Source Intelligence (OSINT) tool designed to search for user accounts by &lt;strong&gt;username&lt;/strong&gt; and &lt;strong&gt;email address&lt;/strong&gt; across a massive range of online platforms, often exceeding 600 sites.&lt;/p&gt;

&lt;p&gt;It distinguishes itself by including &lt;strong&gt;free AI-powered profiling&lt;/strong&gt;, which analyzes the platforms a target is found on to generate a behavioral and technical summary of the user. It ensures high-quality results by leveraging community-driven data sources like WhatsMyName.&lt;/p&gt;




&lt;h2&gt;
  
  
  Overview
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Detail&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Github link&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="https://github.com/p1ngul1n0/blackbird" rel="noopener noreferrer"&gt;https://github.com/p1ngul1n0/blackbird&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Devloper&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;p1ngul1n0&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;License&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Open Source (Check the repository for the specific license file.)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  How to set it up
&lt;/h2&gt;

&lt;p&gt;Blackbird requires Python 3 and its dependencies.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Clone the repository:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone &lt;span class="o"&gt;[&lt;/span&gt;https://github.com/p1ngul1n0/blackbird]&lt;span class="o"&gt;(&lt;/span&gt;https://github.com/p1ngul1n0/blackbird&lt;span class="o"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Navigate to the directory:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;cd &lt;/span&gt;blackbird
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Install the necessary dependencies:&lt;/strong&gt;&lt;br&gt;
Use &lt;code&gt;pip&lt;/code&gt; or &lt;code&gt;pip3&lt;/code&gt; depending on your system's Python configuration.&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pip &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; requirements.txt
OR
pip3 &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; requirements.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Usage
&lt;/h2&gt;

&lt;p&gt;The tool can be run using the Command Line Interface (CLI) or as a self-hosted Web interface.&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Command Line Usage&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Search by Username&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Search across platforms using a target username (e.g., &lt;code&gt;johndoe&lt;/code&gt;).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;python blackbird.py --username johndoe&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Search by Email&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Search platforms to see if an account is registered with the provided email.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;python blackbird.py --email johndoe@example.com&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Export Results (PDF)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Execute a search and save the output, including the AI analysis, as a formatted PDF report.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;python blackbird.py --username johndoe --pdf&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Export Results (CSV)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Export the findings into a CSV file for further data analysis.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;python blackbird.py --username johndoe --csv&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Web Interface Mode&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Start a local web server to use the tool with a Graphical User Interface (GUI).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;python blackbird.py --web&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;
&lt;em&gt;Access the GUI via your browser (usually&lt;/em&gt; &lt;code&gt;http://127.0.0.1:5000&lt;/code&gt;&lt;em&gt;).&lt;/em&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Advanced Filtering&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Use filters to limit the search to specific categories (e.g., only "social" networks).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;python blackbird.py --filter "cat=social" --username johndoe&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

</description>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>opensource</category>
      <category>tooling</category>
    </item>
  </channel>
</rss>
