Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team

Category: blue-team

Critical SAP Vulnerability CVE-2025-31324: What You Need to Know
Exploits

Critical SAP Vulnerability CVE-2025-31324: What You Need to Know

In the fast-evolving world of cybersecurity, a new threat has emerged that demands immediate attention from organizations relying on SAP

by ☣️ Mr. The Plague ☣️
Read More
Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week
pentesting

Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week

In the ever-evolving world of cybersecurity, staying informed about the latest threats and incidents is crucial for professionals tasked with

by ☣️ Mr. The Plague ☣️
Read More
Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492
News

Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492

In the ever-evolving landscape of cybersecurity, a new critical vulnerability has emerged that demands the attention of network administrators, penetration

by ☣️ Mr. The Plague ☣️
Read More
Cybersecurity Weekend Brief: April 19-20, 2025
Cyber Security

Cybersecurity Weekend Brief: April 19-20, 2025

Staying informed about recent cybersecurity incidents is critical for tailoring your testing methodologies to current threats. This brief compiles significant

by ☣️ Mr. The Plague ☣️
Read More
AWS CLI Cheat Sheet for Professionals
pentesting

AWS CLI Cheat Sheet for Professionals

Top 100 AWS CLI Commands Below is a categorized list of 100 commonly used AWS CLI commands across various services,

by ☣️ Mr. The Plague ☣️
Read More
Critical Vulnerability in Langflow: CVE-2025-3248 Explained
pentesting

Critical Vulnerability in Langflow: CVE-2025-3248 Explained

Introduction In the fast-evolving world of artificial intelligence, tools like Langflow are helping developers create powerful AI-driven applications. However, a

by ☣️ Mr. The Plague ☣️
Read More
Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet
red-team

Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet

Table of Contents Why John the Ripper Dominates in 2025 Developed by Openwall, John the Ripper (JtR) excels at cracking

by ☣️ Mr. The Plague ☣️
Read More
CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?
News

CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?

Key Points NOTE: Much of this article’s information including the POC and detection template was sourced from ProjectDiscovery Blog –

by ☣️ Mr. The Plague ☣️
Read More
Ivanti Zero-Day Malware: What You Need to Know
AI Co-Author

Ivanti Zero-Day Malware: What You Need to Know

Key Points Overview A newly discovered zero-day vulnerability, known as CVE-2025-0282, has been found in Ivanti products like Connect Secure,

by ☣️ Mr. The Plague ☣️
Read More
The Check Point Breach: A Detailed Analysis
AI Co-Author

The Check Point Breach: A Detailed Analysis

Key Points The Check Point Breach: A Detailed Analysis Overview On March 30, 2025, at 09:20 AM PDT, the cybersecurity

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

1 2 Next
© Hack the Planet
Privacy Policy & Terms of Service