cybersecurity
A Roadmap For Transitioning Into Cybersecurity
This roadmap encompasses 5 fundamental areas of cybersecurity and is packed with various resources to help you get started.

How To Optimise Your LinkedIn Profile For Cybersecurity
In this blog post, we'll discuss 4 key elements that you should optimize to create a strong online presence and increase your chances of landing your first job in cybersecurity.
Cybersecurity Platforms Compared
In this blog post, I will guide you through an in-depth comparison of popular cybersecurity platforms, including Hack The Box (HTB), TryHackMe, Immersive Labs, Cybrary, and Let's Defend.

CVE-2023-1374 - Solidres <= 0.9.4 - Authenticated (Admin+) Stored Cross-Site Scripting
Solidres – Hotel Booking Plugin for WordPress version 0.9.4 has been found to have a POST-based cross-site scripting (XSS) vulnerability in the "add new currency" feature of the plugin.

CVE-2023-1372 - WH Testimonials <= 3.0.0 - Unauthenticated Stored Cross-Site Scripting
A stored XSS vulnerability has been identified in the WH Testimonials WordPress plugin. The vulnerable parameter is "wh_homepage", which is submitted via an HTTP POST request to the add testimonial functionality of the plugin.

TCD #004: Staying Updated In Cybersecurity
In this issue, I wanted to share some practical tips on how to stay up-to-date in cybersecurity, which is essential in such a rapidly changing field.

TCD #000: Full Time Bug Bounty Hunting
In this week's issue, I wanted to address a topic that I receive numerous messages about - getting started with bug bounty hunting.
