Skip to content
Saturday, May 16, 2026
S4M Security

S4M Security

Just Security

  • Home
  • About Me
  • Contact Us
  • Web Vulnerabilities

Category: Cyber Vulnerability and Abuse Incidents

  • Home
  • Cyber Vulnerability and Abuse Incidents
What is Prompt Injection? The Most Dangerous Vulnerability in Artificial Intelligence Systems.
  • Cyber Vulnerability and Abuse Incidents

What is Prompt Injection? The Most Dangerous Vulnerability in Artificial Intelligence Systems.

  • S4M Security
  • February 26, 2026
  • 0

Hello cyberman! Time flies, doesn’t it? I wanted to create this document about AI models and their uses, which have been trending lately. I also […]

Why Are Hackers Interested in Me?
  • Cyber Vulnerability and Abuse Incidents

Why Are Hackers Interested in Me?

  • S4M Security
  • July 28, 2024
  • 0

I know. Being on the writing side again after a long break feels strange for the reader as well. A few people I don’t know […]

Vulnhub: Quoaor – CTF
  • CTF
  • Cyber Vulnerability and Abuse Incidents

Vulnhub: Quoaor – CTF

  • S4M Security
  • November 10, 2022
  • 1

Hello Cyberman! This article subject CTF (Capture The Flag). This vulnerability machine is name “Quoaor”. And this CTF is level 1. This machine as Ubuntu. […]

Vulnhub: DC-7 – CTF
  • CTF
  • Cyber Vulnerability and Abuse Incidents

Vulnhub: DC-7 – CTF

  • S4M Security
  • October 22, 2022
  • 0

Hello Cyberman! This article subject CTF (Capture The Flag). This vulnerability machine is name “DC-7”. And this ctf is level 1. This machine has Debian. […]

Javascript Cannot Block It – 2
  • Cyber Vulnerability and Abuse Incidents
  • Web Vulnerabilities

Javascript Cannot Block It – 2

  • S4M Security
  • October 2, 2022
  • 3

Hello Cyberman! This article subject licence software with Javascript safety.There a program. And its name Mobirise. Really, wonderful program. This program website template create. And […]

Vulnhub: Monitoring 1 – CTF
  • CTF
  • Cyber Vulnerability and Abuse Incidents

Vulnhub: Monitoring 1 – CTF

  • S4M Security
  • September 26, 2022
  • 0

Hello cyberman! This article subject CTF (Capture To Flag). This vulnerability machine is name “Monitoring 1”. And this ctf is level 1. This machine has […]

I Think, That’s App has Something Wrong!
  • Cyber Vulnerability and Abuse Incidents

I Think, That’s App has Something Wrong!

  • S4M Security
  • July 9, 2022
  • 1

Hello Cyberman! How are you? I hope, you are nice. This article subject Android APK and its evil event. I’m have a friend and did […]

Be Careful What You Click!
  • Cyber Vulnerability and Abuse Incidents

Be Careful What You Click!

  • S4M Security
  • June 7, 2022
  • 0

Hello Cyberman! Again a Facebook problem and a again victim list… Recently, absurd pictures have increased again in Facebook groups. What would you say like: […]

  • Cyber Vulnerability and Abuse Incidents

There Is A Spy On The Mobile Device

  • S4M Security
  • December 15, 2021
  • 2

Hello Cyberman! This article will be about mobile spyware and how. With the spread of smartphones, spyware begin to proliferate.  And she recently reported that […]

Holidays Are Dangerous, Beware of Public Wifi!
  • Cyber Vulnerability and Abuse Incidents

Holidays Are Dangerous, Beware of Public Wifi!

  • S4M Security
  • July 21, 2021
  • 1

Hello Cyberman! English broadcasts will now be more frequent! Holidays… Holidays are beautiful. Sun, sand, summer, heat… There are also hotels that make these holidays […]

Posts pagination

1 2 Next

Recent Posts

  • What is Prompt Injection? The Most Dangerous Vulnerability in Artificial Intelligence Systems.
  • Gods and Titans of the Tech
  • Why Are Hackers Interested in Me?
  • What Is Email Injection? And What Can Be Done?
  • What Is LDAP And How To Hacking With LDAP?

Archives

  • February 2026
  • September 2024
  • July 2024
  • December 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • February 2022
  • December 2021
  • October 2021
  • August 2021
  • July 2021
  • June 2021
  • April 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • May 2020
  • December 2019

Categories

  • CTF
  • Cyber Security Tools
  • Cyber Vulnerability and Abuse Incidents
  • General Article
  • Hidden Surf
  • Technology Articles
  • Web Vulnerabilities

Tags

attack burpsuite cms crack ctf Cyber CyberInfo Cyber Security drupal earth gods hack hacker hacking Injection Internet javascript kali LDAP linux mail nagios pavel portswigger Proxy social media ssrf tech telegram titan ubuntu VPN vulnerability vulnhub webbrowser website wordpress zuckerberg
Copyright © 2026 S4M Security Theme: Social News By Adore Themes.