mXgarweg
banner
michaelxg.bsky.social
mXgarweg
@michaelxg.bsky.social
Reposted by mXgarweg
Viele MongoDB-Instanzen sind oder waren potenziell für MongoBleed anfällig. Ein Tool hilft bei der Server-Analyse auf Angriffsspuren. #Security
MongoBleed-Scanner für Admins
Viele MongoDB-Instanzen sind oder waren potenziell für MongoBleed anfällig. Ein Tool hilft bei der Server-Analyse auf Angriffsspuren.
www.heise.de
January 5, 2026 at 12:52 PM
I just completed tmux room on TryHackMe. Learn to use tmux, one of the most powerful multi-tasking tools on linux! tryhackme.com/room/rptmux?... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
January 3, 2026 at 5:21 PM
I just completed Regular Expressions room on TryHackMe. Learn and practise using regular expressions. tryhackme.com/room/catrege... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
January 1, 2026 at 2:17 PM
I just completed #XSS - Merry XSSMas room on TryHackMe. Learn about types of XSS vulnerabilities and how to prevent them. tryhackme.com/room/xss-aoc... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 28, 2025 at 7:23 PM
I just completed Intro to Cold System Forensics room on TryHackMe. A look into the concepts of cold system forensics and how DFIR teams examine offline systems. tryhackme.com/room/introto... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 26, 2025 at 8:01 PM
I just completed Exploitation with #cURL - Hoperation Eggsploit room on TryHackMe. tryhackme.com/room/webhack... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 24, 2025 at 5:08 PM
I just completed Corridor room on TryHackMe. Can you escape the Corridor? #IDOR

tryhackme.com/room/corrido... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 22, 2025 at 7:02 PM
I just completed #MITRE room on TryHackMe. Explore the various resources that MITRE has made available to the #cybersecurity community. tryhackme.com/room/mitre?u... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 21, 2025 at 4:41 PM
Reposted by mXgarweg
ENOUGH IS ENOUGH
May 3, 2025 at 6:54 PM
Reposted by mXgarweg
“Don’t waste your time on anything that doesn’t thrill you or bring you love. See you out somewhere in the cosmos.”

This is the posthumous message left by Gil Gerard. The actor who played Buck Rogers in Buck Rogers in the 25th Century (1979) has just passed away at the age of 82.
Gil Gerard Dies At 82: Star Of ‘Buck Rogers’ Leaves Posthumous Message For Fans
Gil Gerard, the star of 'Buck Rogers in the 25th Century' who battled cancer, advised, "Don’t waste your time on anything that doesn’t thrill you or bring you love"
deadline.com
December 17, 2025 at 9:41 AM
I just completed Geolocating Images room on TryHackMe. Room to understand how to geolocate images tryhackme.com/room/geoloca... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 15, 2025 at 4:45 PM
I just completed @pentesterlab.com 's Recon Badge!!!
December 14, 2025 at 4:21 PM
I just completed Next.js: CVE-2025-29927 room on TryHackMe. Explore an authorisation bypass vulnerability in Next.js. tryhackme.com/room/nextjsc... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 13, 2025 at 5:32 PM
Reposted by mXgarweg
December 13, 2025 at 12:50 AM
I just completed Introduction to Flask room on TryHackMe. How it works and how can you exploit it? tryhackme.com/room/flask?u... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 12, 2025 at 6:56 PM
Reposted by mXgarweg
The post warns software engineers about North Korean operatives who pose as recruiters and use a fake hiring process to deliver malware through backdoored code tests. They're mainly targeting developers in AI, Web3, and crypto sectors. Developers should use virtual machines for extra security.
A Serious Security Warning For Software Engineers, Especially Those Involved in AI/Web3/Crypto
Full disclosure: I work for an MDR company (Expel), but this post is not an attempt to pitch any kind of product or service. Rather, it's intended as an important PSA to be circulated to cybersecur...
reddit.com
December 11, 2025 at 7:42 PM
I just completed #React2Shell: CVE-2025-55182 room on TryHackMe. Explore the CVE-2025-55182 vulnerability in React server components. tryhackme.com/room/react2s... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 6, 2025 at 6:08 PM
I just completed IDOR - Santa’s Little IDOR room on TryHackMe. Learn about #IDOR while helping pentest the TrypresentMe website. tryhackme.com/room/idor-ao... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 5, 2025 at 4:50 PM
I just completed #WAF: Introduction room on TryHackMe. Learn about Web Application Firewalls and what differentiates them from other types of firewalls.
#DefenceInDepth
tryhackme.com/room/wafintr...
TryHackMe | Cyber Security Training
tryhackme.com
December 5, 2025 at 2:42 PM
I just completed Data Integrity & Model Poisoning room on TryHackMe. Understand how supply chain and model poisoning attacks can corrupt the underlying LLM. tryhackme.com/room/modelpo... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 5, 2025 at 1:59 PM
I just completed Splunk Basics - Did you SIEM? room on TryHackMe. Learn how to ingest and parse custom log data using Splunk. tryhackme.com/room/splunkf... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 3, 2025 at 4:59 PM
I just completed OWASP Top 10 2025: Insecure Data Handling room on TryHackMe. Learn about A04, A05, and A08 as they related to insecure data handling.
tryhackme.com/room/oscomma... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 3, 2025 at 11:37 AM
I just completed Phishing - Merry Clickmas room on TryHackMe. Learn how to use the Social-Engineer Toolkit to send phishing emails. tryhackme.com/room/phishin... #tryhackme
TryHackMe | Cyber Security Training
tryhackme.com
December 2, 2025 at 8:02 PM
My 2025 Duolingo stats are in! How did you do? #Duolingo365
December 2, 2025 at 6:16 PM