Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team

Category: red-team

Cybersecurity Under Siege: Major Incidents and Actionable Strategies for 2025
Cyber Security

Cybersecurity Under Siege: Major Incidents and Actionable Strategies for 2025

The cybersecurity landscape is evolving at breakneck speed, and the past 72 hours (May 25–27, 2025) have unleashed a torrent

by ☣️ Mr. The Plague ☣️
Read More
Major Cybersecurity Incidents and Trends in May 2025: A Comprehensive Overview
pentesting

Major Cybersecurity Incidents and Trends in May 2025: A Comprehensive Overview

Cybersecurity threats continued to evolve in May 2025, with high-profile incidents, critical vulnerabilities, and emerging trends reshaping the landscape. From

by ☣️ Mr. The Plague ☣️
Read More
ScreenSniper: A Powerful Tool for PenTesting and Webpage Analysis
Cyber Security

ScreenSniper: A Powerful Tool for PenTesting and Webpage Analysis

In the fast-evolving world of cybersecurity, penetration testers need efficient tools to identify vulnerabilities quickly and accurately. Enter ScreenSniper, a

by ☣️ Mr. The Plague ☣️
Read More
Mastering Server-Side Request Forgery (SSRF) Exploitation in 2025
pentesting

Mastering Server-Side Request Forgery (SSRF) Exploitation in 2025

Server-Side Request Forgery (SSRF) is one of the most critical web vulnerabilities professionals in cybersecurity must understand. This powerful exploit

by ☣️ Mr. The Plague ☣️
Read More
Critical SAP Vulnerability CVE-2025-31324: What You Need to Know
Cyber Security

Critical SAP Vulnerability CVE-2025-31324: What You Need to Know

In the fast-evolving world of cybersecurity, a new threat has emerged that demands immediate attention from organizations relying on SAP

by ☣️ Mr. The Plague ☣️
Read More
Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week
blue-team

Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week

In the ever-evolving world of cybersecurity, staying informed about the latest threats and incidents is crucial for professionals tasked with

by ☣️ Mr. The Plague ☣️
Read More
Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492
Exploits

Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492

In the ever-evolving landscape of cybersecurity, a new critical vulnerability has emerged that demands the attention of network administrators, penetration

by ☣️ Mr. The Plague ☣️
Read More
AWS CLI Cheat Sheet for Professionals
Cyber Security

AWS CLI Cheat Sheet for Professionals

Top 100 AWS CLI Commands Below is a categorized list of 100 commonly used AWS CLI commands across various services,

by ☣️ Mr. The Plague ☣️
Read More
Top 100 Linux Commands Cheat Sheet for Power Users
Tools

Top 100 Linux Commands Cheat Sheet for Power Users

Welcome to the ultimate Linux commands cheat sheet, designed for beginners and seasoned sysadmins alike. This comprehensive guide covers 100

by ☣️ Mr. The Plague ☣️
Read More
Critical Vulnerability in Langflow: CVE-2025-3248 Explained
Educational

Critical Vulnerability in Langflow: CVE-2025-3248 Explained

Introduction In the fast-evolving world of artificial intelligence, tools like Langflow are helping developers create powerful AI-driven applications. However, a

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

1 2 Next
© Hack the Planet
Privacy Policy & Terms of Service