Skip to content
SQUID SEC
Menu
  • Home
  • Cheat Sheets
  • Hire SquidSec
  • SquidSec Team
  • Squid Sec Twitter
  • SquidSec Podcast
  • Home
  • Cheat Sheets
  • Hire SquidSec
  • SquidSec Team
  • Squid Sec Twitter
  • SquidSec Podcast

Category: blue-team

Major Cybersecurity Incidents and Trends in May 2025: A Comprehensive Overview
News

Major Cybersecurity Incidents and Trends in May 2025: A Comprehensive Overview

Cybersecurity threats continued to evolve in May 2025, with high-profile incidents, critical vulnerabilities, and emerging trends reshaping the landscape. From

by ☣️ Mr. The Plague ☣️
Read More
ScreenSniper: A Powerful Tool for PenTesting and Webpage Analysis
pentesting

ScreenSniper: A Powerful Tool for PenTesting and Webpage Analysis

In the fast-evolving world of cybersecurity, penetration testers need efficient tools to identify vulnerabilities quickly and accurately. Enter ScreenSniper, a

by ☣️ Mr. The Plague ☣️
Read More
Coinbase Catastrophe: Uncle Pennybags Loses Big in Bitcoin Hack!
Cyber Security

Coinbase Catastrophe: Uncle Pennybags Loses Big in Bitcoin Hack!

Key Points and Direct Answer Incident Overview On May 15, 2025, Coinbase disclosed a cyberattack where hackers bribed overseas support

by ☣️ Mr. The Plague ☣️
Read More
Critical SAP Vulnerability CVE-2025-31324: What You Need to Know
Cyber Security

Critical SAP Vulnerability CVE-2025-31324: What You Need to Know

In the fast-evolving world of cybersecurity, a new threat has emerged that demands immediate attention from organizations relying on SAP

by ☣️ Mr. The Plague ☣️
Read More
Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week
pentesting

Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week

In the ever-evolving world of cybersecurity, staying informed about the latest threats and incidents is crucial for professionals tasked with

by ☣️ Mr. The Plague ☣️
Read More
Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492
Cyber Security

Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492

In the ever-evolving landscape of cybersecurity, a new critical vulnerability has emerged that demands the attention of network administrators, penetration

by ☣️ Mr. The Plague ☣️
Read More
Cybersecurity Weekend Brief: April 19-20, 2025
pentesting

Cybersecurity Weekend Brief: April 19-20, 2025

Staying informed about recent cybersecurity incidents is critical for tailoring your testing methodologies to current threats. This brief compiles significant

by ☣️ Mr. The Plague ☣️
Read More
AWS CLI Cheat Sheet for Professionals
Tools

AWS CLI Cheat Sheet for Professionals

Top 100 AWS CLI Commands Below is a categorized list of 100 commonly used AWS CLI commands across various services,

by ☣️ Mr. The Plague ☣️
Read More
Critical Vulnerability in Langflow: CVE-2025-3248 Explained
Exploits

Critical Vulnerability in Langflow: CVE-2025-3248 Explained

Introduction In the fast-evolving world of artificial intelligence, tools like Langflow are helping developers create powerful AI-driven applications. However, a

by ☣️ Mr. The Plague ☣️
Read More
Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet
red-team

Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet

Table of Contents Why John the Ripper Dominates in 2025 Developed by Openwall, John the Ripper (JtR) excels at cracking

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

Previous 1 2 3 Next
SQUID SECURITY LLC 2026