A critical vulnerability doesn't always mean it's complex. Sometimes, vulnerability hunting just takes patience and a bit of luck.
CVE-2025-9074 is exactly that: a case of curiosity meeting opportunity.
mp.weixin.qq.com/s/NpkvVdQw-tGr…
At the turn of the millennium, computer viruses spread like wildfire.
But what happened to the people who created them?
“Good or evil, karma always comes back.”
Discover the untold twists of fate behind the most infamous virus authors.
youtu.be/BlYf-SEAu_g?si… via @YouTube
Learning tech is like falling in love 💘
Curiosity, passion, and a bit of struggle — that’s how you grow.
In this new video I share 7 practical lessons for developers & cybersecurity beginners.
youtu.be/Qb4ooSNVfiM?si… via @YouTube
Only three weeks — that’s all it took for him to create Unix.
And though he wasn’t a cybersecurity specialist, he gave one of the most profound talks on security ever: Reflections on Trusting Trust.
It's the story of Kenneth Thompson.
youtu.be/CBu8aA7PJ3I?si… via @YouTube
In 1988, a 23-year-old grad student unleashed the first large-scale internet worm—by accident.
We dive into the story of the Morris Worm, the chaos it caused, and the life of its creator, Robert T. Morris.
#CyberSecurity#infosecyoutu.be/vjvT0gS9NtE?si… via @YouTube
We dug into the Top 20 OSS component vulnerabilities—but this isn’t just about numbers.
It’s about what these bugs reveal:
👉 Governance blind spots
👉 Unsafe defaults
👉 Why patching is harder than scanning
insbug.medium.com/from-the-top-2…
We released a video talk about the hacking skills in <Mr Robot> S04 E09.
If you also interested in this series, please check it.
youtu.be/6fcf4dV6aFg?si… via @YouTube
China's cybersecurity industry has hit a rough patch in recent years.
As a product manager and security tech leader, I made a video to talk about what’s really going on — from market slowdown to product design and security service issues.
youtu.be/U3myhPslb64?si…
Guess what brings in more money than my security job (well, almost)? 👀
Not bug bounties. Not side gigs.
It’s talking about security — writing, teaching, creating.
Turns out, people pay for what you explain well. 💡
Tech skills + clear words = 💰
✈️ What can cybersecurity learn from aviation safety?
In our latest video, we explore real-life air incidents to reveal why strict airport security measures matter — and how their principles can inspire better digital defenses.
youtu.be/6QPptoeyazE#CyberSecurity#infosec
🎯 Pass CISSP in 6 Months? Yes, You Can.
From study strategy to real test insights—this practical guide breaks down how to earn CISSP fast and smart.
Learn how to turn focused prep into career momentum.
medium.com/p/efficiently-…
🎬 What if a sci-fi film inspired real AI breakthroughs?
We break down how Arrival — the movie about alien linguistics — beautifully reflects the core ideas behind large language models.
youtu.be/i8NN_kLuzoA#AI#LLM#ArrivalMovie#SciFiTech
Does any chance to exchange the system in a computer?
Maybe it's your need to check this video about the scenes in <The day of the jackal>, the Jackal using a USB stick exchanged operation system in a cybercafe.
youtu.be/ZoqpxaXSis0?si…#TheDayOfTheJackal
🔐 What is MCP and why it matters for LLM security?
The Model Context Protocol enables LLMs to interact with tools & APIs in real time — but it also opens up serious attack surfaces.
🧠 Learn how MCP works and the key risks you must consider.
medium.com/@insbug/the-mo…
🚨 Control your laptop with a TV remote?
In this video, we show how to use Arduino UNO + IR receiver to remotely control a laptop.
Low-cost, high-impact — perfect for hackers, tinkerers & makers!
▶️ youtu.be/hW_nCnfsKL8#Arduino#CyberSecurity#TechDIY
290 Followers 7K FollowingBoost your YouTube channel globally using genuine promotions. Everyday you'll receive organic engagements on your YouTube channel
229K Followers 229 Following#1 Cyber Performance Center, providing a human-first platform to create and maintain high-performing cybersecurity individuals and organizations.
123K Followers 3K FollowingCybersecurity pros: Rapid7 lets you command your attack surface, smash silos, stay steps ahead of attackers, and take breaches from “inevitable” to preventable.
195K Followers 14K FollowingWe help professionals acquire the skills, knowledge and certificates by teaching defense through offense to advance their careers in cybersecurity.
83K Followers 16 FollowingTrend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
26K Followers 2 FollowingOffensiveCon Berlin is a technical international security conference focused on offensive security only. Organised by @Binary_Gecko. Stay tuned #OffensiveCon26.
4K Followers 1K FollowingYour sincere exploitation/malware developer, Cloud Hacking Helper and golang developer. Do what noone has ever done
Patreon:https://t.co/cJL5qLSGVq
2K Followers 853 FollowingFormer CTFer @Nu1L_Team & @StrawHat_CTF. Aspiring reverse engineer | Binary security padawan. 🌱 "The more I learn, the less I realize I know"
213K Followers 532 FollowingWe improve the security of apps with community-led open source projects, 260 local chapters, and tens of thousands of members worldwide. Famous for OWASP Top 10
253K Followers 185 FollowingOfficial account of the Metasploit Project, part of the @rapid7 family.
Mastodon: @[email protected]
Slack: https://t.co/ZOLPDG2O2s
87.8M Followers 154 FollowingOfficial NASA account. Exploring the universe, advancing science, and inspiring the next generation of explorers.
Verification: https://t.co/8nok3NP4PW
275K Followers 448 FollowingCo-Founder of ByteByteGo | Author of the bestselling book series: ‘System Design Interview’ | YouTube: https://t.co/9gPSJSrtPU
32K Followers 522 Followinglead communications for Microsoft. don't check this site often; best to try and reach me other ways.
@[email protected]
https://t.co/YrcUCZzARq
88K Followers 74 FollowingHi! I'm Dave Plummer. You might remember me from such Windows components as Task Manager, Windows Pinball, Calc, ZIPFolders, Product Activation, etc. Cheers!
240K Followers 1K FollowingCreator of @haveibeenpwned. Microsoft Regional Director. Pluralsight author. Online security, technology and “The Cloud”. Australian.
16K Followers 2K FollowingTargeted Ops Red Team @ TrustedSec | Hacking since Renegade BBS backdoors | Prior CrowdStrike/BHIS | In Christ's grip | I speak for myself only | K1HAQ
48K Followers 20 FollowingWelcome to CyberPatron. Your #1 Cybersecurity Network official X account. We bring you the best Cybersecurity Contents, Training and Mentorship. 💻🗝️