Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team

Category: Cyber Security

Critical Vulnerability in Langflow: CVE-2025-3248 Explained
red-team

Critical Vulnerability in Langflow: CVE-2025-3248 Explained

Introduction In the fast-evolving world of artificial intelligence, tools like Langflow are helping developers create powerful AI-driven applications. However, a

by ☣️ Mr. The Plague ☣️
Read More
4Chan Hack: Internal Data Leaked, Site Taken Offline
Exploits

4Chan Hack: Internal Data Leaked, Site Taken Offline

Key Points What Happened? On April 15, 2025, 4Chan, a well-known anonymous imageboard, went offline after what appears to be

by ☣️ Mr. The Plague ☣️
Read More
Mastering Docker in 2025: 100 Essential Commands and Practical Scripts for Developers
Tools

Mastering Docker in 2025: 100 Essential Commands and Practical Scripts for Developers

Docker is a game-changer for developers, streamlining workflows and ensuring consistency across environments. Whether you’re deploying a WordPress site or

by ☣️ Mr. The Plague ☣️
Read More
Cybersecurity Roundup: Major Incidents and Threats Since April 11, 2025
Cyber Security

Cybersecurity Roundup: Major Incidents and Threats Since April 11, 2025

The cybersecurity world has been anything but quiet since Friday morning, April 11, 2025. From exploited vulnerabilities and massive data

by ☣️ Mr. The Plague ☣️
Read More
Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet
red-team

Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet

Table of Contents Why John the Ripper Dominates in 2025 Developed by Openwall, John the Ripper (JtR) excels at cracking

by ☣️ Mr. The Plague ☣️
Read More
CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?
Cyber Security

CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?

Key Points NOTE: Much of this article’s information including the POC and detection template was sourced from ProjectDiscovery Blog –

by ☣️ Mr. The Plague ☣️
Read More
Exposed: The Windows Flaw Hackers Are Using to Take Over Systems Right Now!
Exploits

Exposed: The Windows Flaw Hackers Are Using to Take Over Systems Right Now!

Key Points Introduction CVE-2025-29824 is a major security flaw in Windows systems, recently patched by Microsoft. Actively exploited, it poses

by ☣️ Mr. The Plague ☣️
Read More
US OCC Email Hack: A Deep Dive into the Breach and a PoC Exploit
Educational

US OCC Email Hack: A Deep Dive into the Breach and a PoC Exploit

On April 8, 2025, the US Office of the Comptroller of the Currency (OCC) disclosed a significant breach involving hacked

by ☣️ Mr. The Plague ☣️
Read More
Ivanti Vulnerability CVE-2025-22457: Exploitation by China-Linked Actors
Cyber Security

Ivanti Vulnerability CVE-2025-22457: Exploitation by China-Linked Actors

The Ivanti Vulnerability, identified as CVE-2025-22457, is a critical security flaw affecting multiple Ivanti products, notably Ivanti Connect Secure, a

by ☣️ Mr. The Plague ☣️
Read More
Oracle Breached: 6M Records Stolen, Patient Data Exposed – What Went Wrong?
Cyber Security

Oracle Breached: 6M Records Stolen, Patient Data Exposed – What Went Wrong?

Key Points Overview Oracle, a leading cloud and enterprise software provider, experienced significant security breaches in early 2025, affecting both

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

Previous 1 2 3 … 5 Next
© Hack the Planet
Privacy Policy & Terms of Service