#cybersecurity search results
Pentest-AI: Run Full Autonomous Pentests with One Command 🤖💀 Recon → Auth bypass → vuln discovery → exploit chaining → real PoCs → AI threat analysis → client-ready reports github.com/0xSteph/pentes… #CyberSecurity #Pentesting #RedTeam #BugBounty #AIsecurity
📢⚠️ Private chats, photos, and phone screengrabs of celebrities and influencers exposed after a suspected stalkerware setup left a database open. Over 86K files leaked. Read: hackread.com/private-chats-… #CyberSecurity #Privacy #Stalkerware #CyberCrime #DataBreach
🛡️ We added Linux kernel incorrect resource transfer between spheres vulnerability CVE-2026-31431 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec
🐀 RatLabs is live! 21 hands-on hacking challenges — from enumeration to advanced exploitation. XSS, SUID, TFTP, prompt injection & more. Register free, own the boxes, climb the leaderboard 👇 🔗 ratctf.thexssrat.com #CTF #HackingChallenges #CyberSecurity #BugBounty #PenTest
🚨 Speaker Reveal #10🚨 Purity Gachuhi will be co-leading the Sherlocks track 👀 If you are into DFIR, SOC, CTI etc this is the room to be in✅️💙 #HTBKenya #HTB #Cybersecurity #Kenya
🔐Atacurile de tip dictionary sunt tot mai frecvente și exploatează un obicei comun: folosirea unor parole simple și previzibile. 📘 Ghid „Inteligența Artificială & Manipularea Percepției Umane”: dnsc.ro/pagini/ghid-ai… 🔗 youtu.be/wce_Ix96y94 #DNSC #CyberSecurity #2FA
Newsletter: Anthropic's Mythos Hacked. What Is Protecting Our Water Supply? AI Is Reshaping Cyber Warfare. ow.ly/xtX950YRPz4 #cybersecurity
🚨 Speaker Reveal #9🚨 Blue teamer don't worry we've got you 😌 Hamza will be leading the Sherlocks track✅️ Get to learn how to be an effective investigator🕵♀️🕵♂️ #HTBKenya #HTB #Cybersecurity #Kenya
Ever wonder what actually happens when you type a URL? 🌐 DNS → HTTP → Load Balancers → Web Servers — it all connects. Put the full picture together in just 15 mins with our FREE beginner room 🧩 🔗 tryhackme.com/room/puttingit… #TryHackMe #bebfundamentals #cybersecurity
FIPS 140-2 retirement is now just 5 months away. Now is the time to review your environment and prepare for the transition to FIPS 140-3. Learn how Ubuntu Pro supports FIPS workloads: ubuntu.com/security/certi… #CyberSecurity #FIPS #OpenSource
🛡️ We added WebPros cPanel & WHM and WP2 (WordPress Squared) missing authentication for critical function vulnerability CVE-2026-41940 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity
China’s MSS isn’t just chasing spy secrets. It’s after medical research, tech flaws, and data that affect real people. One hacked server can ripple into hospitals, businesses, and homes. #China #CyberSecurity #NationalSecurity justice.gov/usao-sdtx/pr/p…
Time to start pushing out, Built an AI-powered phishing detection system that catches attacks blacklists can't see. 391K real-world domains trained. 20 security features extracted. 95%+ accuracy. It's trained to be able to handle Zero-day phishing attacks. #Cybersecurity #ML
CISA added CVE-2026-31431 to KEV. Linux LPE: low-priv user → root. Not remote by itself, but dangerous after a small foothold: SSH, CI, or container access. For Web3 infra, RPC config is only one layer. The host still matters. thehackernews.com/2026/05/cisa-a… #CyberSecurity #Web3Sec
labs.hackthebox.com/achievement/se… #HackTheBox #HTB #CyberSecurity #EthicalHacking #InfoSec #PenTesting
An AI coding agent reportedly deleted a production database — and said it “guessed instead of verifying.” That’s not an AI problem. It’s a permissions problem. Would you let an agent run destructive commands in prod? #AI #AIAgents #Cybersecurity
tomorow i have an exam but today i am going to download the pdf lol... #cybersecurity #ethicalhacking #examprep #lol
⚡ This week’s #cybersecurity recap is ugly in the usual way. • Poisoned password manager CLI • Fake Teams help desks • Federal firewall backdoor • Energy wiper • Booby-trapped AI pages • Fake Authenticator extensions • and many more... Read → thehackernews.com/2026/04/weekly…
A Kigali startup is offering the first "Personal Data Leak" audit for individuals today. 🕵️♂️ For 500 Frw, they scan your phone number against regional breach databases to see if your MoMo PIN is at risk. 🛡️💻 #CyberSecurity #FintechRwanda #RwOT
Hackers don’t wait. They scan → find → exploit. One vulnerability is enough. Vulota finds it first. 🔐 Secure before they breach. #CyberSecurity #Vulota
✅ Hide your IP address ✅ Access restricted content safely ✅ Block trackers and surveillance Learn how to use it properly in our complete guide: 🔗 lovefortechnology.org/2026/04/tor-br… #TorBrowser #Privacy #CyberSecurity #AnonymousBrowsing #TechTips (2/2)
Your web browser might be the biggest security blind spot in your company! A new 2026 report reveals how AI tools and SaaS apps are turning browsers into prime targets. Is your business data truly protected? #EnterpriseSecurity #Cybersecurity #TechTrends bleepingcomputer.com/news/security/…
iT4iNT SERVER CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV dlvr.it/TSLWsh VDS VPS Cloud #Cybersecurity #Linux #CISA #Vulnerability #CVE2026
Layers that matter for Web3 infra: 1. RPC exposure 2. node config 3. container isolation 4. CI/CD permissions 5. Linux host hardening Most people only look at layer 1. #CyberSecurity #Web3Security
CISA added CVE-2026-31431 to KEV. Linux LPE: low-priv user → root. Not remote by itself, but dangerous after a small foothold: SSH, CI, or container access. For Web3 infra, RPC config is only one layer. The host still matters. thehackernews.com/2026/05/cisa-a… #CyberSecurity #Web3Sec
#Poster क्या आप जानते हैं कि आपकी डिजिटल पहचान कैसे बनती है? जो आप साझा करते हैं और जो चुपचाप एकत्र होता है—दोनों को सुरक्षित रखना जरूरी है। #CyberSecurity #StaySafeOnline #DigitalFootprint #DataPrivacy #CyberAwareness #OnlineSafety #PrivacyMatters #ThinkBeforeYouClick
🐀 RatLabs is live! 21 hands-on hacking challenges — from enumeration to advanced exploitation. XSS, SUID, TFTP, prompt injection & more. Register free, own the boxes, climb the leaderboard 👇 🔗 ratctf.thexssrat.com #CTF #HackingChallenges #CyberSecurity #BugBounty #PenTest
🛠️Nice introduction to Windows kernel exploitation for beginners 🔹Part 1: mdanilor.github.io/posts/hevd-0/ 🔹Part 2: mdanilor.github.io/posts/hevd-1/ 🔹Part 3: mdanilor.github.io/posts/hevd-2/ 🔹Part 4: mdanilor.github.io/posts/hevd-3/ 🔹Part 5: mdanilor.github.io/posts/hevd-4/ 🔖#infosec #cybersecurity #hacking
Most websites don’t get hacked by advanced attacks — they get hacked because of basic vulnerabilities. Vulota finds them. Fixes them. Secures you. 🔐 Don’t wait for a breach. #CyberSecurity #Vulota #WebsiteSecurity
Schütze dein Unternehmen vor Spam, Phishing & Schad-Mails – mit dem Cloud Spamfilter 🚀 Gehostet in 🇩🇪, 24/7 geschützt – einfach aktivieren und sicherer arbeiten. Mehr erfahren unter: scoopex.de/cloud-security… #CyberSecurity #EmailSecurity #Spamfilter #ITSecurity #CloudSecurity
Cyber-physical resilience reshaping industrial cybersecurity beyond perimeter defense to protect core processes - Industrial Cyber news.google.com/rss/articles/C… #cybersecurity #hacking
Quantum leaps ⚡ MIT 3D-prints motors in hours as AI & quantum tech reshape security and connection. signaloftech.com/en/2026/05/qua… #technology #quantum #cybersecurity
CVE-2026-41940 was a cPanel/WHM zero-day for ~2 months before the April 28 patch. CISA added it to KEV the same week. ~650k exposed instances, 44k IPs Full details + 8 dark web leak claims in #Cybersecurity #ThreatIntel #InfoSec #CISO #CVE linkedin.com/posts/donald-h…
My Top 10 Articles of the Week Available here on @Medium Every Friday The @CorixPartners Friday Reading List: Hand-picked Content for Top #Leaders Check it Out >> buff.ly/7ht7nu3 #cybersecurity #business #leadership #management #governance #CISO #CIO #CTO #CEO
🚀 A I completed the “Walking An Application” room on @tryhackme. 🔐 Web Security 🛡️ Ethical Hacking Every small win counts. Keep learning, keep practicing! #CyberSecurity #TryHackMe #PenetrationTesting #EthicalHacking #WebSecurity #InfoSec #LearningInPublic #GermanyJobs
🚨 Speaker Reveal #10🚨 Purity Gachuhi will be co-leading the Sherlocks track 👀 If you are into DFIR, SOC, CTI etc this is the room to be in✅️💙 #HTBKenya #HTB #Cybersecurity #Kenya
🚨 Speaker Reveal #9🚨 Blue teamer don't worry we've got you 😌 Hamza will be leading the Sherlocks track✅️ Get to learn how to be an effective investigator🕵♀️🕵♂️ #HTBKenya #HTB #Cybersecurity #Kenya
Ethical Hacking Roadmap 🔥 Telegram: t.me/hackinarticles #CyberSecurity #InfoSec #PenetrationTesting #EthicalHacking #BugBounty #ThreatIntelligence #RedTeam #BlueTeam #CloudSecurity #DataSecurity #CyberSecurityAwareness #AI
🛡️ We added Linux kernel incorrect resource transfer between spheres vulnerability CVE-2026-31431 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec
Ever wonder what actually happens when you type a URL? 🌐 DNS → HTTP → Load Balancers → Web Servers — it all connects. Put the full picture together in just 15 mins with our FREE beginner room 🧩 🔗 tryhackme.com/room/puttingit… #TryHackMe #bebfundamentals #cybersecurity
🛡️ We added four vulnerabilities to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity #InfoSec
🛡️ We added WebPros cPanel & WHM and WP2 (WordPress Squared) missing authentication for critical function vulnerability CVE-2026-41940 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q for more information. #Cybersecurity
Red Team | Cyber Security | Linux 🔥 Telegram: t.me/hackinarticles #CyberSecurity #InfoSec #PenetrationTesting #EthicalHacking #BugBounty #ThreatIntelligence #RedTeam #BlueTeam #CloudSecurity #DataSecurity #CyberSecurityAwareness #AI
⏰2 days left. 📅May 5, 16:00 CEST. How to catch 0-days – Boris Larin, Kaspersky GReAT. Your industry. Your risks. Your response. 👉Register free: kas.pr/1w8m #zeroday #cybersecurity #GReAT
📢 Stay informed on the latest vulnerabilities with @CISAgov's Vulnerability Bulletin & gain valuable insights into emerging threats. 💡Check out the latest updates: cisa.gov/news-events/bu… #Cybersecurity #InfoSec #VulnerabilityManagement
Become a #CyberSecurity Expert w/ this Book Bundle! #BigData #Analytics #DataScience #IoT #IIoT #PyTorch #Python #RStats #TensorFlow #Java #JavaScript #ReactJS #GoLang #CloudComputing #Serverless #DataScientist #Linux #Programming #Coding #100DaysofCode geni.us/CyberBook-Bund…
FIPS 140-2 retirement is now just 5 months away. Now is the time to review your environment and prepare for the transition to FIPS 140-3. Learn how Ubuntu Pro supports FIPS workloads: ubuntu.com/security/certi… #CyberSecurity #FIPS #OpenSource
🚨 Scam Alert: No, you didn't win the lottery. 🚨 If an email promises you a huge monetary prize, it's a trap to steal your personal and financial info. Keep your data safe: Never reply. Never click. Stay curious but stay secure. #CyberSecurity #StaySafeOnline #DigitalIndia
Module 1 of @CiscoNetAcad NETWORKING BASICS. DONE ☑️ Covered everything from network types to the math behind bits and terabits. Also finally cleared up the difference between Bandwidth (the max capacity) and Throughput (the actual speed) #CyberSecurity #Cisco #Networking
Switched lanes to @CiscoNetAcad TryHackMe was a good start, but diving into the raw basics of Data Transmission and Network Types today. Realizing everything we do online eventually just boils down to bits and ASCII #CyberSecurity #Networking #Cisco #LearningInPublic
Something went wrong.
Something went wrong.
United States Trends
- 1. Benavidez N/A
- 2. #DMDLAND3DAY2 N/A
- 3. Canelo N/A
- 4. Celtics N/A
- 5. Bivol N/A
- 6. #saturdaynightliv N/A
- 7. Embiid N/A
- 8. Good Sunday N/A
- 9. Tatum N/A
- 10. T'Challa N/A
- 11. El Paso N/A
- 12. #LoveYouTeacherSeriesEP8 N/A
- 13. Sixers N/A
- 14. Shuri N/A
- 15. #Toonami N/A
- 16. Maxey N/A
- 17. #EVOJapan2026 N/A
- 18. Golden Tempo N/A
- 19. Jaylen Brown N/A
- 20. Emerson Hancock N/A