mXgarweg
@michaelxg.bsky.social
I just completed module Introduction to Web Applications in HTB Academy! academy.hackthebox.com/achievement/... #hackthebox
Completed Introduction to Web Applications
In the Introduction to Web Applications module, you will learn all of the basics of how web applications work and begin to look at them from an information security perspective.
academy.hackthebox.com
November 10, 2025 at 6:17 PM
I just completed module Introduction to Web Applications in HTB Academy! academy.hackthebox.com/achievement/... #hackthebox
Sunrise Fire - Graveyard Chess
YouTube video by SunriseFireVEVO
youtu.be
November 7, 2025 at 7:15 AM
November 6, 2025 at 7:11 PM
"Basic Insecure direct object references (IDOR) in cookie"? #Pwned! It was a blast on #YesWeHack!
Think you can take it on? 🌟
dojo-yeswehack.com/challenge/pl...
#ChallengeAccepted
Think you can take it on? 🌟
dojo-yeswehack.com/challenge/pl...
#ChallengeAccepted
Basic Insecure direct object references (IDOR) in cookie - YesWeHack Dojo
# Basic Insecure direct object references (IDOR) in cookie
Send JSON data to the application and exploit the poor role verification process to get the flag.
dojo-yeswehack.com
October 31, 2025 at 5:02 PM
"Basic Insecure direct object references (IDOR) in cookie"? #Pwned! It was a blast on #YesWeHack!
Think you can take it on? 🌟
dojo-yeswehack.com/challenge/pl...
#ChallengeAccepted
Think you can take it on? 🌟
dojo-yeswehack.com/challenge/pl...
#ChallengeAccepted
I just completed Auditing and Monitoring room on TryHackMe. Learn about auditing, monitoring, logging, and SIEM. tryhackme.com/room/auditin... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
October 30, 2025 at 4:21 PM
I just completed Auditing and Monitoring room on TryHackMe. Learn about auditing, monitoring, logging, and SIEM. tryhackme.com/room/auditin... #tryhackme
Have you tried adding "combat boots" to your #cyberpunk #art #aiprompt?
www.seaart.ai/artWorkDetai...
Credits: le moi / seaart.ai
www.seaart.ai/artWorkDetai...
Credits: le moi / seaart.ai
Pink Power: Stärke pur! 💪
Comic Style: eine lesbische Frau, slim and toned, Pixie haircut, undercut frisur, pink hair color, leggings, combat boots, gym bra, exercises bench press on wei
www.seaart.ai
October 22, 2025 at 11:09 AM
Have you tried adding "combat boots" to your #cyberpunk #art #aiprompt?
www.seaart.ai/artWorkDetai...
Credits: le moi / seaart.ai
www.seaart.ai/artWorkDetai...
Credits: le moi / seaart.ai
Reposted by mXgarweg
The next industrial revolution:
Let's print all the emails as offline backup. Just to make sure if the data in the cloud is inaccessible.
Let's print all the emails as offline backup. Just to make sure if the data in the cloud is inaccessible.
love that this "resilience engineering" is basically: write things on paper www.bbc.co.uk/news/article...
Have plans on paper in case of cyber-attack, firms told
Prepare to switch to offline systems in the event of a cyber-attack, firms are being advised.
www.bbc.co.uk
October 15, 2025 at 6:00 AM
The next industrial revolution:
Let's print all the emails as offline backup. Just to make sure if the data in the cloud is inaccessible.
Let's print all the emails as offline backup. Just to make sure if the data in the cloud is inaccessible.
Reposted by mXgarweg
If you ever feel behind in tech — remember:
AI is still confidently hallucinating, and somehow raising billions.
You’re doing fine.
#DataScience #buildinpublic #100DaysOfCode
AI is still confidently hallucinating, and somehow raising billions.
You’re doing fine.
#DataScience #buildinpublic #100DaysOfCode
October 13, 2025 at 1:38 PM
If you ever feel behind in tech — remember:
AI is still confidently hallucinating, and somehow raising billions.
You’re doing fine.
#DataScience #buildinpublic #100DaysOfCode
AI is still confidently hallucinating, and somehow raising billions.
You’re doing fine.
#DataScience #buildinpublic #100DaysOfCode
True that.
This is siiiiick
Some bash tunes. ;)
bsky.app/profile/thin...
bsky.app/profile/thin...
October 10, 2025 at 1:43 PM
True that.
Reposted by mXgarweg
Hieß es zunächst, es seien nur wenige Prozent der Sicherungsdaten betroffen, wird nun klar: Es sind tatsächlich 100 Prozent - Admins sollten handeln. #Security
Datenleck bei Sonicwall: Alle Cloud-Backups von Firewalls gestohlen
Hieß es zunächst, es seien nur wenige Prozent der Sicherungsdaten betroffen, wird nun klar: Es sind tatsächlich 100 Prozent - Admins sollten handeln.
www.heise.de
October 9, 2025 at 5:06 PM
Hieß es zunächst, es seien nur wenige Prozent der Sicherungsdaten betroffen, wird nun klar: Es sind tatsächlich 100 Prozent - Admins sollten handeln. #Security
Reposted by mXgarweg
The Leadership Vulnerability: How Charismatic Leaders Become Your Biggest Cybersecurity Risk
Introduction: The charismatic, authoritative leader can be a significant business liability, creating a culture of dependency that bypasses critical security protocols. This management style, while…
Introduction: The charismatic, authoritative leader can be a significant business liability, creating a culture of dependency that bypasses critical security protocols. This management style, while…
The Leadership Vulnerability: How Charismatic Leaders Become Your Biggest Cybersecurity Risk
Introduction: The charismatic, authoritative leader can be a significant business liability, creating a culture of dependency that bypasses critical security protocols. This management style, while effective for motivation, often centralizes decision-making and discourages questioning, creating blind spots that attackers are eager to exploit. This article deconstructs the technical security gaps fostered by an over-reliance on a single leader and provides the concrete commands and controls needed to decentralize security.
undercodetesting.com
October 6, 2025 at 5:48 AM
The Leadership Vulnerability: How Charismatic Leaders Become Your Biggest Cybersecurity Risk
Introduction: The charismatic, authoritative leader can be a significant business liability, creating a culture of dependency that bypasses critical security protocols. This management style, while…
Introduction: The charismatic, authoritative leader can be a significant business liability, creating a culture of dependency that bypasses critical security protocols. This management style, while…
Reposted by mXgarweg
Many companies lack copy/paste controls into LLMs, raising concerns about the entry of proprietary information. This situation could lead to OpenAI holding vast amounts of sensitive data, posing significant risks if breached.
How many companies have no copy/paste controls into LLMs?
It's pretty wild to think about how many companies have no copy/paste or any controls for that matter when it comes to GenAI prompts.
If proprietary information is constantly being entered, does O...
reddit.com
September 28, 2025 at 3:42 PM
Many companies lack copy/paste controls into LLMs, raising concerns about the entry of proprietary information. This situation could lead to OpenAI holding vast amounts of sensitive data, posing significant risks if breached.
I just completed File Inclusion, Path Traversal room on TryHackMe. Exploit File Inclusion and Path Traversal vulnerabilities. tryhackme.com/room/filepat... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
September 23, 2025 at 5:22 PM
I just completed File Inclusion, Path Traversal room on TryHackMe. Exploit File Inclusion and Path Traversal vulnerabilities. tryhackme.com/room/filepat... #tryhackme
I just completed XXE Injection room on TryHackMe. Exploiting XML External Entities. tryhackme.com/room/xxeinje... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
September 22, 2025 at 5:24 PM
I just completed XXE Injection room on TryHackMe. Exploiting XML External Entities. tryhackme.com/room/xxeinje... #tryhackme
Reposted by mXgarweg
Someone is going to fall for crap like this
September 21, 2025 at 8:56 AM
Someone is going to fall for crap like this
Reposted by mXgarweg
Breaking, new, by me:
Self-replicating "Shai-Hulud" worm hits 180+ Software Packages
At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and […]
[Original post on infosec.exchange]
Self-replicating "Shai-Hulud" worm hits 180+ Software Packages
At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and […]
[Original post on infosec.exchange]
September 16, 2025 at 2:15 PM
Breaking, new, by me:
Self-replicating "Shai-Hulud" worm hits 180+ Software Packages
At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and […]
[Original post on infosec.exchange]
Self-replicating "Shai-Hulud" worm hits 180+ Software Packages
At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and […]
[Original post on infosec.exchange]
I just completed NoSQL Injection room on TryHackMe. A walkthrough depicting basic NoSQL injections on MongoDB.
#SyntaxInjection #OperatorInjection
tryhackme.com/room/nosqlin...
#SyntaxInjection #OperatorInjection
tryhackme.com/room/nosqlin...
TryHackMe | Cyber Security Training
tryhackme.com
September 14, 2025 at 10:44 AM
I just completed NoSQL Injection room on TryHackMe. A walkthrough depicting basic NoSQL injections on MongoDB.
#SyntaxInjection #OperatorInjection
tryhackme.com/room/nosqlin...
#SyntaxInjection #OperatorInjection
tryhackme.com/room/nosqlin...
I just completed module Web Requests in HTB Academy! academy.hackthebox.com/achievement/... #hackthebox #htbacademy #cybersecurity
Completed Web Requests
This module introduces the topic of HTTP web requests and how different web applications utilize them to communicate with their backends.
academy.hackthebox.com
September 13, 2025 at 6:21 PM
I just completed module Web Requests in HTB Academy! academy.hackthebox.com/achievement/... #hackthebox #htbacademy #cybersecurity
I just completed OAuth Vulnerabilities room on TryHackMe. Learn how the OAuth protocol works and master techniques to exploit it. tryhackme.com/room/oauthvu... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
September 13, 2025 at 2:27 PM
I just completed OAuth Vulnerabilities room on TryHackMe. Learn how the OAuth protocol works and master techniques to exploit it. tryhackme.com/room/oauthvu... #tryhackme
Reposted by mXgarweg
We did it: DE 🇩🇪 LU🇱🇺 & SK🇸🇰 just decided to oppose Chat Control! 🥳
Thanks everyone for your help and keep fighting the good fight. 🫶
Chat Control will not get a majority - at least not today.
More on why it is the most criticized law of all times: tuta.com/blog/chat-co...
Thanks everyone for your help and keep fighting the good fight. 🫶
Chat Control will not get a majority - at least not today.
More on why it is the most criticized law of all times: tuta.com/blog/chat-co...
September 12, 2025 at 6:18 AM
We did it: DE 🇩🇪 LU🇱🇺 & SK🇸🇰 just decided to oppose Chat Control! 🥳
Thanks everyone for your help and keep fighting the good fight. 🫶
Chat Control will not get a majority - at least not today.
More on why it is the most criticized law of all times: tuta.com/blog/chat-co...
Thanks everyone for your help and keep fighting the good fight. 🫶
Chat Control will not get a majority - at least not today.
More on why it is the most criticized law of all times: tuta.com/blog/chat-co...
1994 Hacked successfully // Synthwave, Retrowave, Outrun, Cyberpunk, Chillwave
YouTube video by VHS FM Memory
youtu.be
September 11, 2025 at 7:43 PM
I just completed Linux Privilege Escalation room on TryHackMe. Learn the fundamentals of Linux privilege escalation. From enumeration to exploitation, get hands-on with over 8 different privilege escalation techniques. tryhackme.com/room/linpriv... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
September 11, 2025 at 5:08 PM
I just completed Linux Privilege Escalation room on TryHackMe. Learn the fundamentals of Linux privilege escalation. From enumeration to exploitation, get hands-on with over 8 different privilege escalation techniques. tryhackme.com/room/linpriv... #tryhackme