Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
hacking
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
THM - Systems as Attack Vectors
mikensen
mikensen
mikensen
Follow
Mar 4
THM - Systems as Attack Vectors
#
tryhackme
#
slovensko
#
hacking
#
testing
1
 reaction
Comments
Add Comment
3 min read
One Hacker Used ChatGPT to Break Into 600 Firewalls Across 55 Countries. He Wasn't Even Good.
Moth
Moth
Moth
Follow
Mar 3
One Hacker Used ChatGPT to Break Into 600 Firewalls Across 55 Countries. He Wasn't Even Good.
#
security
#
ai
#
cybersecurity
#
hacking
Comments
Add Comment
3 min read
AWS IAM Security Best Practices — Why Over-Permissive Access Is Your Biggest Cloud Risk
Kuboid Secure Layer
Kuboid Secure Layer
Kuboid Secure Layer
Follow
Mar 3
AWS IAM Security Best Practices — Why Over-Permissive Access Is Your Biggest Cloud Risk
#
cybersecurity
#
hacking
#
aws
#
iam
1
 reaction
Comments
Add Comment
6 min read
ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs
Satyam Rastogi
Satyam Rastogi
Satyam Rastogi
Follow
Mar 1
ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs
#
security
#
hacking
#
pentesting
#
cybersecurity
Comments
Add Comment
6 min read
Claude Didn't Just Get Jailbroken. It Ran a 6-Week Cyberattack on an Entire Country.
rain
rain
rain
Follow
Feb 28
Claude Didn't Just Get Jailbroken. It Ran a 6-Week Cyberattack on an Entire Country.
#
aisecurity
#
cybersecurity
#
hacking
#
claude
Comments
Add Comment
9 min read
A Low-Skill Hacker Used AI to Breach 600+ Firewalls — Here Is What Defenders Must Know
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Feb 25
A Low-Skill Hacker Used AI to Breach 600+ Firewalls — Here Is What Defenders Must Know
#
security
#
ai
#
cybersecurity
#
hacking
Comments
Add Comment
3 min read
CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis
Satyam Rastogi
Satyam Rastogi
Satyam Rastogi
Follow
Feb 23
CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis
#
security
#
hacking
#
pentesting
#
cybersecurity
Comments
Add Comment
5 min read
Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation
Labby
Labby
Labby
Follow
for
LabEx
Feb 22
Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation
#
cybersecurity
#
hacking
#
pentesting
#
security
Comments
Add Comment
2 min read
Shields Up Defense Tech: Red Team Attack Surface Expansion
Satyam Rastogi
Satyam Rastogi
Satyam Rastogi
Follow
Feb 22
Shields Up Defense Tech: Red Team Attack Surface Expansion
#
security
#
hacking
#
pentesting
#
cybersecurity
Comments
Add Comment
5 min read
RIP Holehe: Why User-Scanner is the New King of Email OSINT đź‘‘
OpenCV
OpenCV
OpenCV
Follow
Feb 21
RIP Holehe: Why User-Scanner is the New King of Email OSINT đź‘‘
#
opensource
#
osint
#
cybersecurity
#
hacking
5
 reactions
Comments
Add Comment
3 min read
Tech Academy WriteUp
Obtuosa
Obtuosa
Obtuosa
Follow
Feb 7
Tech Academy WriteUp
#
hacking
#
php
#
node
#
security
Comments
Add Comment
8 min read
Hacking Grok 4 (xAI): "Chicken Run"
Dmitry Labintcev
Dmitry Labintcev
Dmitry Labintcev
Follow
Mar 2
Hacking Grok 4 (xAI): "Chicken Run"
#
security
#
ai
#
redteam
#
hacking
2
 reactions
Comments
Add Comment
8 min read
The Untouchable Hacker God: Deciphering Finland's Biggest Cybercrime
David DĂaz
David DĂaz
David DĂaz
Follow
Jan 18
The Untouchable Hacker God: Deciphering Finland's Biggest Cybercrime
#
cybersecurity
#
hacking
#
technology
5
 reactions
Comments
Add Comment
4 min read
Level Up Your Linux Game: My Journey Through OverTheWire’s Bandit & Natas
Lukas Hammer
Lukas Hammer
Lukas Hammer
Follow
Feb 9
Level Up Your Linux Game: My Journey Through OverTheWire’s Bandit & Natas
#
wargames
#
hacking
#
security
#
linux
Comments
1
 comment
2 min read
HackPrix Season 2 Recap
HackPrix Community
HackPrix Community
HackPrix Community
Follow
for
HackPrix Community
Jan 22
HackPrix Season 2 Recap
#
hacking
#
build
#
solve
#
hackprix
5
 reactions
Comments
2
 comments
4 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account