Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team

Category: Educational

tj-actions/changed-files GitHub Attack: A Wake-Up Call for CI/CD Security
Exploits

tj-actions/changed-files GitHub Attack: A Wake-Up Call for CI/CD Security

The GitHub ecosystem just took a brutal hit. On March 14, 2025, the widely-used tj-actions/changed-files GitHub Action—trusted by over 23,000

by ☣️ Mr. The Plague ☣️
Read More
Unveiling the Botnet Toothbrush: From Research to Reality
Cyber Security

Unveiling the Botnet Toothbrush: From Research to Reality

In an age where the Internet of Things (IoT) seamlessly merges with our daily routines, the smart toothbrush emerged as

by ☣️ Mr. The Plague ☣️
Read More
A Deep Dive into the Tor Network
Cyber Security

A Deep Dive into the Tor Network

Prerequisite Knowledge It is assumed that the reader has an understanding of TCP, TLS and generally how the internet works.

by ☣️ Mr. The Plague ☣️
Read More
Insecure Direct Object References (IDOR)
Educational

Insecure Direct Object References (IDOR)

What are IDORs? Insecure Direct Object References (IDOR) is a type of vulnerability in web applications that allows attackers to

by ☣️ Mr. The Plague ☣️
Read More
Heartbleed Vulnerability – Breaking the Internet
Cyber Security

Heartbleed Vulnerability – Breaking the Internet

The Heartbleed vulnerability is a security flaw in the popular OpenSSL cryptographic software library. It was discovered in April 2014

by ☣️ Mr. The Plague ☣️
Read More
Eternal Blue: The Exploit That Changed Network Security Forever
AI Co-Author

Eternal Blue: The Exploit That Changed Network Security Forever

The world of computer security was forever changed on March 14th, 2017, when a malicious piece of software known as

by ☣️ Mr. The Plague ☣️
Read More
Finding Hidden Things in Binaries with the Linux Tool strings
Educational

Finding Hidden Things in Binaries with the Linux Tool strings

The Linux command strings is an incredibly useful tool for finding hidden things in binaries. In this article, we’ll discuss

by ☣️ Mr. The Plague ☣️
Read More
OWASP Top 10 With Examples
Cyber Security

OWASP Top 10 With Examples

The OWASP Top 10 list is a list of the most critical web application security risks. It is compiled and

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

Previous 1 … 4 5
© Hack the Planet
Privacy Policy & Terms of Service