mXgarweg
banner
michaelxg.bsky.social
mXgarweg
@michaelxg.bsky.social
I just completed module Introduction to Web Applications in HTB Academy! academy.hackthebox.com/achievement/... #hackthebox
Completed Introduction to Web Applications
In the Introduction to Web Applications module, you will learn all of the basics of how web applications work and begin to look at them from an information security perspective.
academy.hackthebox.com
November 10, 2025 at 6:17 PM
Sunrise Fire - Graveyard Chess
YouTube video by SunriseFireVEVO
youtu.be
November 7, 2025 at 7:15 AM
Some evening study time.
#rateMySetup
#100DaysOfCode
November 6, 2025 at 7:11 PM
"Basic Insecure direct object references (IDOR) in cookie"? #Pwned! It was a blast on #YesWeHack!
Think you can take it on? 🌟
dojo-yeswehack.com/challenge/pl...
#ChallengeAccepted
Basic Insecure direct object references (IDOR) in cookie - YesWeHack Dojo
# Basic Insecure direct object references (IDOR) in cookie Send JSON data to the application and exploit the poor role verification process to get the flag.
dojo-yeswehack.com
October 31, 2025 at 5:02 PM
I just completed Auditing and Monitoring room on TryHackMe. Learn about auditing, monitoring, logging, and SIEM. tryhackme.com/room/auditin... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
October 30, 2025 at 4:21 PM
Reposted by mXgarweg
October 21, 2025 at 12:45 AM
October 20, 2025 at 2:52 PM
The next industrial revolution:

Let's print all the emails as offline backup. Just to make sure if the data in the cloud is inaccessible.
October 15, 2025 at 6:00 AM
Reposted by mXgarweg
If you ever feel behind in tech — remember:
AI is still confidently hallucinating, and somehow raising billions.
You’re doing fine.

#DataScience #buildinpublic #100DaysOfCode
October 13, 2025 at 1:38 PM
True that.
October 10, 2025 at 1:43 PM
Reposted by mXgarweg
Hieß es zunächst, es seien nur wenige Prozent der Sicherungsdaten betroffen, wird nun klar: Es sind tatsächlich 100 Prozent - Admins sollten handeln. #Security
Datenleck bei Sonicwall: Alle Cloud-Backups von Firewalls gestohlen
Hieß es zunächst, es seien nur wenige Prozent der Sicherungsdaten betroffen, wird nun klar: Es sind tatsächlich 100 Prozent - Admins sollten handeln.
www.heise.de
October 9, 2025 at 5:06 PM
Reposted by mXgarweg
The Leadership Vulnerability: How Charismatic Leaders Become Your Biggest Cybersecurity Risk

Introduction: The charismatic, authoritative leader can be a significant business liability, creating a culture of dependency that bypasses critical security protocols. This management style, while…
The Leadership Vulnerability: How Charismatic Leaders Become Your Biggest Cybersecurity Risk
Introduction: The charismatic, authoritative leader can be a significant business liability, creating a culture of dependency that bypasses critical security protocols. This management style, while effective for motivation, often centralizes decision-making and discourages questioning, creating blind spots that attackers are eager to exploit. This article deconstructs the technical security gaps fostered by an over-reliance on a single leader and provides the concrete commands and controls needed to decentralize security.
undercodetesting.com
October 6, 2025 at 5:48 AM
Reposted by mXgarweg
Many companies lack copy/paste controls into LLMs, raising concerns about the entry of proprietary information. This situation could lead to OpenAI holding vast amounts of sensitive data, posing significant risks if breached.
How many companies have no copy/paste controls into LLMs?
It's pretty wild to think about how many companies have no copy/paste or any controls for that matter when it comes to GenAI prompts. If proprietary information is constantly being entered, does O...
reddit.com
September 28, 2025 at 3:42 PM
I just completed File Inclusion, Path Traversal room on TryHackMe. Exploit File Inclusion and Path Traversal vulnerabilities. tryhackme.com/room/filepat... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
September 23, 2025 at 5:22 PM
I just completed XXE Injection room on TryHackMe. Exploiting XML External Entities. tryhackme.com/room/xxeinje... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
September 22, 2025 at 5:24 PM
Reposted by mXgarweg
Someone is going to fall for crap like this
September 21, 2025 at 8:56 AM
Reposted by mXgarweg
Breaking, new, by me:

Self-replicating "Shai-Hulud" worm hits 180+ Software Packages

At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and […]

[Original post on infosec.exchange]
September 16, 2025 at 2:15 PM
I just completed NoSQL Injection room on TryHackMe. A walkthrough depicting basic NoSQL injections on MongoDB.
#SyntaxInjection #OperatorInjection
tryhackme.com/room/nosqlin...
TryHackMe | Cyber Security Training
tryhackme.com
September 14, 2025 at 10:44 AM
I just completed OAuth Vulnerabilities room on TryHackMe. Learn how the OAuth protocol works and master techniques to exploit it. tryhackme.com/room/oauthvu... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
September 13, 2025 at 2:27 PM
Reposted by mXgarweg
We did it: DE 🇩🇪 LU🇱🇺 & SK🇸🇰 just decided to oppose Chat Control! 🥳

Thanks everyone for your help and keep fighting the good fight. 🫶

Chat Control will not get a majority - at least not today.

More on why it is the most criticized law of all times: tuta.com/blog/chat-co...
September 12, 2025 at 6:18 AM
I just completed Linux Privilege Escalation room on TryHackMe. Learn the fundamentals of Linux privilege escalation. From enumeration to exploitation, get hands-on with over 8 different privilege escalation techniques. tryhackme.com/room/linpriv... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
September 11, 2025 at 5:08 PM