Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
SquidSec Podcast Episode One: Sam Bent, X@DoingFedTime
Educational

SquidSec Podcast Episode One: Sam Bent, X@DoingFedTime

Key Points Introduction to Sam Bent’s Story Sam Bent, also known as @doingfedtime, has a complex background that spans from

by ☣️ Mr. The Plague ☣️
Read More
Cyber Security Morning Brief – Week of March 14–21, 2025
pentesting

Cyber Security Morning Brief – Week of March 14–21, 2025

Good morning, pentesters, red team, and blue team members! Welcome to your weekly cyber security briefing from SquidHacker.com, covering the

by ☣️ Mr. The Plague ☣️
Read More
Leaked: 200,000 Messages Uncover Russia’s Cybercrime Empire
Educational

Leaked: 200,000 Messages Uncover Russia’s Cybercrime Empire

Russia’s Cybercrime Ties Exposed: Leaked Messages Reveal State-Sponsored Ransomware Operations Table of Contents Introduction Understanding Ransomware: A Growing Global Threat

by ☣️ Mr. The Plague ☣️
Read More
tj-actions/changed-files GitHub Attack: A Wake-Up Call for CI/CD Security
Cyber Security

tj-actions/changed-files GitHub Attack: A Wake-Up Call for CI/CD Security

The GitHub ecosystem just took a brutal hit. On March 14, 2025, the widely-used tj-actions/changed-files GitHub Action—trusted by over 23,000

by ☣️ Mr. The Plague ☣️
Read More
Unveiling the Botnet Toothbrush: From Research to Reality
Exploits

Unveiling the Botnet Toothbrush: From Research to Reality

In an age where the Internet of Things (IoT) seamlessly merges with our daily routines, the smart toothbrush emerged as

by ☣️ Mr. The Plague ☣️
Read More
A Deep Dive into the Tor Network
Cyber Security

A Deep Dive into the Tor Network

Prerequisite Knowledge It is assumed that the reader has an understanding of TCP, TLS and generally how the internet works.

by ☣️ Mr. The Plague ☣️
Read More
Insecure Direct Object References (IDOR)
Cyber Security

Insecure Direct Object References (IDOR)

What are IDORs? Insecure Direct Object References (IDOR) is a type of vulnerability in web applications that allows attackers to

by ☣️ Mr. The Plague ☣️
Read More
Heartbleed Vulnerability – Breaking the Internet
Educational

Heartbleed Vulnerability – Breaking the Internet

The Heartbleed vulnerability is a security flaw in the popular OpenSSL cryptographic software library. It was discovered in April 2014

by ☣️ Mr. The Plague ☣️
Read More
Eternal Blue: The Exploit That Changed Network Security Forever
Educational

Eternal Blue: The Exploit That Changed Network Security Forever

The world of computer security was forever changed on March 14th, 2017, when a malicious piece of software known as

by ☣️ Mr. The Plague ☣️
Read More
Finding Hidden Things in Binaries with the Linux Tool strings
cheat-sheet

Finding Hidden Things in Binaries with the Linux Tool strings

The Linux command strings is an incredibly useful tool for finding hidden things in binaries. In this article, we’ll discuss

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

Previous 1 … 5 6 7 Next
© Hack the Planet
Privacy Policy & Terms of Service