Homepage
Open in app
Sign in
Get started
MeetCyber
Hack the Present, Secure the Future
Write for Us
Cybersecurity
Hacking
Careers
Certs
Trends
Archive
LinkedIn
Follow
Latest
Introduction to Security Assessment and Testing
Introduction to Security Assessment and Testing
Testing and Evaluation: Because “Trust Me, It Works” Isn’t a Strategy
Igor Berner
Jul 7
Best Free Threat Intelligence Feeds and How to Use Them with MISP/Splunk
Best Free Threat Intelligence Feeds and How to Use Them with MISP/Splunk
A comprehensive guide to leveraging open-source threat intelligence for enhanced security operations
Saikat Paul
Jul 7
Stop Hunting for XSS: How to Find Your Bug Bounty Niche and Dominate
Stop Hunting for XSS: How to Find Your Bug Bounty Niche and Dominate
The real money in bug bounties lies in specialization, not XSS. Find out more...
Andrei Ivan
Jul 6
ZoomEye Dorking | Advanced OSINT
ZoomEye Dorking | Advanced OSINT
Techniques for Advanced Cyber Reconnaissance
AbhirupKonwar
Jul 6
Overview of RMC, Security Kernel, & TCB
Overview of RMC, Security Kernel, & TCB
Let’s talk about the Reference Model Concept, the Security Kernel, and the Trusted Computing Base (TCB). If these terms have ever made your…
Igor Berner
Jul 6
RFD Vulnerability Hunting
RFD Vulnerability Hunting
Reflected File Download Bug Hunting & Pentesting
AbhirupKonwar
Jul 4
Vulnerabilities in Architectures & Designs
Vulnerabilities in Architectures & Designs
Over the past few modules, we’ve unpacked the core components that make up a system — the “what’s what” of architecture. Now it’s time to…
Igor Berner
Jul 4
Cariddi: Ultimate Bug Bounty Recon
Cariddi: Ultimate Bug Bounty Recon
Tool Author: Edoardo Ottavianelli (aka edoardottt)
AbhirupKonwar
Jul 3
🚨 MOVEit Servers Under Mass Scanning — Patch Now
🚨 MOVEit Servers Under Mass Scanning — Patch Now
300+ malicious IPs in 24 hours: Hackers retesting old ransomware bugs to breach unpatched systems.
Aj
Jul 1
Cyberbullying and Cybersecurity
Cyberbullying and Cybersecurity
A Dangerous Affair
O. J. Okpabi
Jun 30
Understanding Risk Analysis
Understanding Risk Analysis
Qualitative vs. Quantitative Approaches
Cyber T
Jun 30
Why Your Business Is One Click Away from a Very Bad Day
Why Your Business Is One Click Away from a Very Bad Day
Spoiler alert: It’s not like the movies, and it’s definitely not fun
Eina Schroeder
Jun 30
Why I Always Start With Manual Testing in Bug Bounties — And Why You Should Too
Why I Always Start With Manual Testing in Bug Bounties — And Why You Should Too
How Human Intuition and Creative Testing Uncover High-Value Vulnerabilities That Automation Misses
Andrei Ivan
Jun 29
On Prem Cloud or Hybrid: What Is Truly Cost Effective in 2025
On Prem Cloud or Hybrid: What Is Truly Cost Effective in 2025
For over a decade, businesses have been debating whether to stay on premise go full cloud or take a hybrid approach. Every year the answer…
Saikat Paul
Jun 29
Mastering Idle Resource Cleanup in Azure and GCP
Mastering Idle Resource Cleanup in Azure and GCP
Cloud platforms have changed how we build and run software. Instead of buying hardware we now rent it on demand. But while this makes…
Saikat Paul
Jun 29
Bypassing Blockchain Capabilities: How a $2,000 Exploit Let Contracts Do the Forbidden
Bypassing Blockchain Capabilities: How a $2,000 Exploit Let Contracts Do the Forbidden
A flaw in CosmWasm’s capability checks allowed attackers to execute restricted actions exposing critical gaps in contract-level…
Monika sharma
Jun 28
BlueTeamGPT: The AI Defender Every Security Team Needs
BlueTeamGPT: The AI Defender Every Security Team Needs
In today’s fast-paced digital world, cyber threats are constantly evolving, becoming more sophisticated and harder to detect.
Saikat Paul
Jun 28
This is how I ditched the official solution for the lab and created my own. 😎
This is how I ditched the official solution for the lab and created my own. 😎
They said you have to upload 2 files for the solution — then why did I upload 9? And somehow, it was easier?
Rabia Riaz
Jun 27
METABIGOR - OSINT Tool
METABIGOR - OSINT Tool
Recon tool for pentesters and bug bounty hunters
AbhirupKonwar
Jun 27
Navigating the Known and the Unknowns of Emerging Cyber Risks
Navigating the Known and the Unknowns of Emerging Cyber Risks
Introduction: A Personal Reflection
Dileep R A Raj
Jun 26
Undust: URL Pattern Generator
Undust: URL Pattern Generator
Latest tool to find archive, backup and temp files on the server
AbhirupKonwar
Jun 25
The Unspoken Threat Of Digital Guilt Engineering
The Unspoken Threat Of Digital Guilt Engineering
O. J. Okpabi
Jun 24
What Is VMware ESXi 8 ?
What Is VMware ESXi 8 ?
I recently encountered something called VMware ESXi -lets you run, manage, and monitor multiple virtual machines on a single physical…
Bridget
Jun 24
Share fast. Act faster. Win always.
Share fast. Act faster. Win always.
ICT Information Sharing Frameworks: A DORA Compliance Review
Maman Ibrahim
Jun 23
Act Fast. Recover Faster.
Act Fast. Recover Faster.
Operational resilience starts where hope ends.
Maman Ibrahim
Jun 23
About MeetCyber
Latest Stories
Archive
About Medium
Terms
Privacy
Teams