Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
npm Nightmares: Ethers Library Hijacked for Reverse Shell Chaos
Exploits

npm Nightmares: Ethers Library Hijacked for Reverse Shell Chaos

Direct Answer Overview On March 15, 2025, security researchers identified two malicious npm packages targeting the ethers library, a popular

by ☣️ Mr. The Plague ☣️
Read More
Next.js Auth Bypass – CVE-2025-29927
Educational

Next.js Auth Bypass – CVE-2025-29927

Key Points Vulnerability Overview CVE-2025-29927 is an authentication bypass issue in Next.js, a popular React framework for building web applications.

by ☣️ Mr. The Plague ☣️
Read More
SquidSec Podcast Episode One: Sam Bent, X@DoingFedTime
Podcast

SquidSec Podcast Episode One: Sam Bent, X@DoingFedTime

Key Points Introduction to Sam Bent’s Story Sam Bent, also known as @doingfedtime, has a complex background that spans from

by ☣️ Mr. The Plague ☣️
Read More
Cyber Security Morning Brief – Week of March 14–21, 2025
Cyber Security

Cyber Security Morning Brief – Week of March 14–21, 2025

Good morning, pentesters, red team, and blue team members! Welcome to your weekly cyber security briefing from SquidHacker.com, covering the

by ☣️ Mr. The Plague ☣️
Read More
Leaked: 200,000 Messages Uncover Russia’s Cybercrime Empire
Cyber Security

Leaked: 200,000 Messages Uncover Russia’s Cybercrime Empire

Russia’s Cybercrime Ties Exposed: Leaked Messages Reveal State-Sponsored Ransomware Operations Table of Contents Introduction Understanding Ransomware: A Growing Global Threat

by ☣️ Mr. The Plague ☣️
Read More
tj-actions/changed-files GitHub Attack: A Wake-Up Call for CI/CD Security
Educational

tj-actions/changed-files GitHub Attack: A Wake-Up Call for CI/CD Security

The GitHub ecosystem just took a brutal hit. On March 14, 2025, the widely-used tj-actions/changed-files GitHub Action—trusted by over 23,000

by ☣️ Mr. The Plague ☣️
Read More
Unveiling the Botnet Toothbrush: From Research to Reality
Cyber Security

Unveiling the Botnet Toothbrush: From Research to Reality

In an age where the Internet of Things (IoT) seamlessly merges with our daily routines, the smart toothbrush emerged as

by ☣️ Mr. The Plague ☣️
Read More
A Deep Dive into the Tor Network
AI Co-Author

A Deep Dive into the Tor Network

Prerequisite Knowledge It is assumed that the reader has an understanding of TCP, TLS and generally how the internet works.

by ☣️ Mr. The Plague ☣️
Read More
Insecure Direct Object References (IDOR)
Educational

Insecure Direct Object References (IDOR)

What are IDORs? Insecure Direct Object References (IDOR) is a type of vulnerability in web applications that allows attackers to

by ☣️ Mr. The Plague ☣️
Read More
Heartbleed Vulnerability – Breaking the Internet
Exploits

Heartbleed Vulnerability – Breaking the Internet

The Heartbleed vulnerability is a security flaw in the popular OpenSSL cryptographic software library. It was discovered in April 2014

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

Previous 1 … 5 6 7 Next
© Hack the Planet
Privacy Policy & Terms of Service