#Cyber Security Guides
Explore tagged Tumblr posts
cypheroxide · 2 years ago
Text
Coding and Scripting for Beginner Hackers
Learning to code and write scripts is a crucial skill for getting into ethical hacking and cybersecurity. Scripting allows you to automate repetitive tasks, develop your own custom tools, analyze data, and program everything from small hacking tools to machine learning models. Understanding and knowing how to code in different languages can be extremely useful when doing deep dives into malware…
Tumblr media
View On WordPress
4 notes · View notes
meoun-uk · 6 months ago
Text
Tumblr media
Stepping into the World of Cyber Security: A Guide for Aspiring Professionals in London The world of cyber security is rapidly evolving, and the demand for skilled professionals is on the... https://www.meoun.uk/stepping-into-the-world-of-cyber-security-a-guide-for-aspiring-professionals-in-london/?feed_id=141872&_unique_id=6776f409ac9e5
0 notes
marketing-decode · 6 months ago
Text
AI Tools in Cybersecurity: Enhancing Protection with Artificial Intelligence
In today’s rapidly evolving digital landscape, cybersecurity has become a critical priority for businesses and individuals alike. With an increase in cyber-attacks, data breaches, and sophisticated threats, traditional security systems alone are no longer sufficient to protect sensitive information and digital infrastructure. To tackle these challenges, many organizations are turning to…
0 notes
yasserzaki · 7 months ago
Text
mac OS Update Crucial: Apple Addresses Actively Exploited Zero-Day Vulnerabilities
Tumblr media
Apple is urging all Mac and MacBook users to update their devices to macOS version 15.1.1 immediately. This update, released shortly after the major 15.1 release, addresses two critical vulnerabilities, CVE-2024–44308 and CVE-2024–44309, that are known to be actively exploited. The U.S. Cybersecurity and Infrastructure Agency (CISA) has echoed this warning, emphasizing the urgency of the update .
Read More In Google News
What are the vulnerabilities?
CVE-2024–44308 (CVSS score: 8.8): This vulnerability in JavaScriptCore could allow attackers to execute arbitrary code when a user processes maliciously crafted web content .
CVE-2024–44309 (CVSS score: 6.1): This vulnerability in WebKit, related to cookie management, could allow cross-site scripting (XSS) attacks when a user encounters malicious web content .
Read More In Google News
Who discovered the vulnerabilities?
Clément Lecigne and Benoît Sevens of Google’s Threat Analysis Group (TAG) discovered and reported these vulnerabilities . The fact that Google’s TAG was involved suggests that these vulnerabilities might have been used in highly targeted attacks, potentially by government-backed entities or mercenary spyware operators .
Read More In Google News
Which devices are affected?
The macOS Sequoia 15.1.1 update is necessary for all Macs running on Apple Silicon. This includes:
iMac Pros released since 2017
iMacs released since 2019
MacBook Pros released since 2018
Mac Minis released since 2018
Mac Pros released since 2019.
The update also supports several Intel-powered Macs released from 2017 onwards.
How to update your Mac
To update to macOS 15.1.1:
Go to System Settings/General/Software Update and click “Update Now” .
On older Macs, go to System Preferences and click “Software Update” .
Other Apple devices
Apple has also released updates for iOS, iPadOS, visionOS, and Safari to address these vulnerabilities. These updates are available for a wide range of iPhones and iPads .
Importance of updating
These are just two of four zero-day vulnerabilities Apple has addressed this year. Another vulnerability was demonstrated at the Pwn2Own Vancouver hacking competition (CVE-2024–27834), and the remaining three were patched earlier in the year. The sources underscore the critical importance of updating all your Apple devices promptly to protect yourself from these and other potential threats.
Read More In Google News
0 notes
jcmarchi · 11 months ago
Text
CISA’s "Secure by Demand" guidance is must-read - CyberTalk
New Post has been published on https://thedigitalinsider.com/cisas-secure-by-demand-guidance-is-must-read-cybertalk/
CISA’s "Secure by Demand" guidance is must-read - CyberTalk
Tumblr media Tumblr media
EXECUTIVE SUMMARY:
Earlier today, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), distributed a new “Secure by Demand” guide.
The intention is to assist organizations in driving a more secure technology ecosystem by ensuring that cyber security is embedded from the start.
“This guidance is a wake-up call for any company that missed out on the costs and outages caused by Solar Winds, Log4J, Snowflake and CrowdStrike,” says Check Point CISO Pete Nicoletti.
Why the guide
In cyber security, procurement teams tend to grasp the fundamentals of cyber security requirements in relation to tech acquisitions. However, teams often fail to identify whether or not vendors truly embed cyber security into development cycles from day one.
The guide is designed to help organizations discern this type of critical information when evaluating vendors. It provides readers with questions to ask when buying software, considerations to work through regarding product integration and security, along with assessment tools that allow for grading of a product’s maturity against “secure-by-design” principles.
More information
The Secure by Demand guide is a companion piece to the recently released Software Acquisition Guide for Government Enterprise Consumers: Software Assurance in the Cyber-Supply Chain Risk Management (C-SCRM) Lifecycle.
While the latter focuses on government enterprises, this guide broadens the scope to encompass a wider range of organizations across various sectors.
Key points to note
The two guides work in tandem to provide a comprehensive approach to secure software acquisition and supply chain risk management.
While the software acquisition guide targets government entities, the demand guide offers insights that are applicable to private sector organizations, non-profits and other institutions.
CISA strongly advises organizations to thoroughly review and implement the recommendations from both guides.
Each guide offers practical, actionable steps that can be integrated into existing procurement and risk management frameworks. Yet, that alone is not enough, according to Check Point Expert Pete Nicoletti…
“In addition to implementing this guidance, companies should add supply chain-related security events to their incident response planning and tabletop exercises to ensure they can recover quickly and with less impact. Further, review supplier contracts to ensure that expensive outages caused by them, offer up their cyber insurance, rather than just recovering the license cost,” he notes.
Get the Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem right here.
Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.
0 notes
techtoio · 1 year ago
Text
1 note · View note
newcodesociety · 1 year ago
Text
1 note · View note
hackeocafe · 1 year ago
Video
youtube
Self-Hosting Security Guide for your HomeLab
When most people think about self-hosting services in their HomeLab, they often think of the last mile. By last mile I mean the very last hop before a user accesses your services.   This last hop, whether that’s using certificates or a reverse proxy, is incredibly important, but it’s also important to know that security starts at the foundation of your HomeLab.  Today, we'll work our way up from hardware security, to OS, to networking, to containers, to firewalls, IDS/IPS, reverse proxies, auth proxies for authentication and authorization, and even lean in to an external provider like Cloudflare.
1 note · View note
maritimecyprus · 2 years ago
Text
ClassNK Guidelines for Cyber resilience of on-board systems and equipment
Tumblr media
View On WordPress
1 note · View note
soravdas · 2 years ago
Text
0 notes
reallytoosublime · 2 years ago
Text
In today's interconnected world, where virtually every facet of our lives is intertwined with technology, the importance of cybersecurity cannot be overstated. As the digital landscape continues to expand, so do the opportunities for both beneficial innovation and malicious exploitation. The ever-evolving landscape of cybersecurity represents a constant battle between those seeking to safeguard sensitive information, systems, and infrastructure and those looking to exploit vulnerabilities for personal gain or even geopolitical motives. This intricate dance of innovation and threat mitigation shapes the complex field of cybersecurity.
The rapid pace of technological advancement, commonly referred to as the Fourth Industrial Revolution, has ushered in an era of unparalleled connectivity and digitization. From smart homes and self-driving cars to cloud computing and the Internet of Things, our lives are intertwined with digital devices and online platforms. While this digital transformation has brought unprecedented convenience and efficiency, it has also exposed individuals, organizations, and nations to a plethora of cyber threats.
The threat landscape in cybersecurity is in a constant state of flux. Hackers and cybercriminals are continuously adapting and refining their tactics, techniques, and procedures to exploit vulnerabilities in software, hardware, and human behavior. Traditional threats like viruses, worms, and Trojans have evolved into sophisticated malware strains capable of evading detection and spreading across networks. Additionally, ransomware attacks have become more targeted and damaging, causing disruptions to critical infrastructure, healthcare institutions, and businesses.
Looking ahead, the cybersecurity landscape is poised for further evolution. Quantum computing, with its potential to break current encryption standards, presents both opportunities and challenges. As organizations embrace edge computing and 5G networks, new attack vectors may emerge, necessitating innovative security solutions tailored to these environments. The proliferation of smart devices and sensors in the IoT landscape introduces a vast attack surface that requires careful consideration of security-by-design principles.
The Ever-Evolving Landscape of Cybersecurity | LimitLess Tech
0 notes
youtubemarketing1234 · 2 years ago
Text
In today's interconnected world, where virtually every facet of our lives is intertwined with technology, the importance of cybersecurity cannot be overstated. As the digital landscape continues to expand, so do the opportunities for both beneficial innovation and malicious exploitation. The ever-evolving landscape of cybersecurity represents a constant battle between those seeking to safeguard sensitive information, systems, and infrastructure and those looking to exploit vulnerabilities for personal gain or even geopolitical motives. This intricate dance of innovation and threat mitigation shapes the complex field of cybersecurity.
The rapid pace of technological advancement, commonly referred to as the Fourth Industrial Revolution, has ushered in an era of unparalleled connectivity and digitization. From smart homes and self-driving cars to cloud computing and the Internet of Things, our lives are intertwined with digital devices and online platforms. While this digital transformation has brought unprecedented convenience and efficiency, it has also exposed individuals, organizations, and nations to a plethora of cyber threats.
The threat landscape in cybersecurity is in a constant state of flux. Hackers and cybercriminals are continuously adapting and refining their tactics, techniques, and procedures to exploit vulnerabilities in software, hardware, and human behavior. Traditional threats like viruses, worms, and Trojans have evolved into sophisticated malware strains capable of evading detection and spreading across networks. Additionally, ransomware attacks have become more targeted and damaging, causing disruptions to critical infrastructure, healthcare institutions, and businesses.
Looking ahead, the cybersecurity landscape is poised for further evolution. Quantum computing, with its potential to break current encryption standards, presents both opportunities and challenges. As organizations embrace edge computing and 5G networks, new attack vectors may emerge, necessitating innovative security solutions tailored to these environments. The proliferation of smart devices and sensors in the IoT landscape introduces a vast attack surface that requires careful consideration of security-by-design principles.
The ever-evolving landscape of cybersecurity reflects the perpetual struggle between innovation and exploitation. As technology continues to reshape our world, the importance of robust cybersecurity measures cannot be overstated. The collective efforts of individuals, organizations, governments, and international collaborations will be pivotal in safeguarding the digital frontiers and ensuring a secure and resilient digital future. Through ongoing adaptation, collaboration, and vigilance, society can navigate the complex terrain of cybersecurity and harness the benefits of the digital age while minimizing its inherent risks.
#cybersecurity#landscapeofcybersecurity#cyberdefense#informationsecurity#limitlesstech#artificialintelligence#ai#ethicalhacking#cybersecurityroadmap#cybersecurityawareness#cybersecurityfuture#cybersecuritytrends#machinelearning#cyberthreats#technology
The Ever-Evolving Landscape of Cybersecurity | LimitLess Tech
1 note · View note
mathewwrites · 2 years ago
Text
How to Enhance Your Website Security
Tumblr media
A secure website is foundational to any successful online business. Protecting your site and visitors from threats requires implementing robust security provisions across infrastructure, software, and policies. This comprehensive guide covers proven methods to enhance overall website security. Consider having an expert Virginia web design company handle security configuration for you.
Leverage a Secure Hosting Infrastructure
Choose a hosting provider that offers state-of-the-art data centers featuring:
Multi-layered physical security such as biometric entry systems, cameras, staffed 24/7.
Redundant power supplies, environmental controls, and network links to prevent downtime.
Regular third-party penetration testing to expose vulnerabilities.
Compliance with security standards like ISO 27001, SOC 2, PCI DSS.
Install Trusted SSL Certificates
Install SSL certificates to enable HTTPS and encrypt all connections:
SSL activates the padlock and "https" in the URL, providing visual trust signals.
Encryption protects sensitive data transmitted between servers and visitors.
Choose Extended Validation Certificates for maximum browser verification.
Redirect all HTTP requests to HTTPS to mandate secure connections.
Harden Your Website Platform
Harden your website platform at the code level:
For WordPress sites, disable file editing in wp-config. Update to the latest PHP version. Limit available plugins/themes.
Apply the latest security patches and updates for CMS platforms and contributed plugins/themes which are common attack vectors.
Review and restrict file permissions to prevent malicious edits and injections.
Disable directory browsing to block access to backend file structures.
Implement reCAPTCHA on forms to prevent automated submissions/spam.
Secure Admin Access
Fortify your admin dashboard:
Use strong credentials and enable two-factor authentication.
Limit admin access only to IP addresses actually needed to manage the site.
Obscure the admin URL using renaming plugins to conceal it.
Install a firewall like Wordfence to block unauthorized intrusion attempts.
Carefully audit users with admin-level privileges and revoke any unnecessary.
Perform Vulnerability Scanning
Scan for vulnerabilities:
Use automated scanners like Acunetix to detect issues across infrastructure, web platforms, plugins etc.
Perform manual checks for any logic flaws in custom code.
Test password strength and exploit potential on all forms.
Check susceptibility to cross-site scripting, SQL injection and other common attack types.
Scan regularly after any major updates or changes.
Implement Strong Access Policies
Enforce stringent access policies:
Insist all employees use strong, unique passwords for every account and platform.
Require multi-factor authentication for any remote access to infrastructure or data.
Be vigilant regarding use of secure protocols like SFTP/SCP instead of FTP, and SSH instead of Telnet.
Train staff on common social engineering tactics like phishing to avoid breaches.
With constant threats, an intentional focus on security is required to protect your website and visitors. Follow best practices across infrastructure, software and access policies for robust protection.
0 notes
duskier · 11 months ago
Text
Cyber stalker Laswell who meets you as a server in a fancy restaurant. The bill she pays without a blink of her eye is about a week's worth of your pay.
You're obviously attracted to her from the second she's seated, how your eyes follow the silver necklace she's wearing down between the open buttons of her silk collared shirt. How then your eyes flick to her hands, pupils dilating when you find her ring finger bare. It's like the general sitting across from Laswell doesn't even exist. She immediately likes that about you, how quickly and easily she's able to capture your full attention.
She watches your tongue behind your teeth move as you take her order, determined not to fuck it up. You were still new to this job, but the authoritative aura Laswell gave off had you at attention. Even her little smiles and nods when you confirmed her order felt like rewards. Like a dog being clicker trained.
Laswell tests you- she doesn't like pets who are obedient just because they can't think for themselves. She asks you to pick out a wine for her. You offer to have the sommelier come by, but she just shakes her head. You feel like a deer caught in headlights.
When you bring her the wine, a glass of '91 Penfold Grange, you can't help but watch her take a sip. Raptured at the sight of her rolling the taste in her mouth, lost in the idea of licking it off of her tongue. Laswell looks you right in your eyes when she thanks you, tells you that it was an excellent choice. She might as well have bent you over the table and fucked you right there, it made you melt. How could she make you feel so much with so little said?
(When you went to the back, her empty glass in hand, no one noticed when you licked at the stains on the rim where her mouth was. The wine tasted fucking fantastic.)
She left you a tip well over what was necessary. More than what the bill actually was, a number with one too many zeroes that made you gasp. She wrote out that it was a thank you for your service, and you shove the note in your pocket.
...Your heart sunk at the fact that she hadn't left her number though. Of course she wouldn't, a classy older woman such as herself? She probably only entertained you out of pity, because you were working and she was a professional.
You went home in a needy daze, her note burning in your pocket. You could still smell her perfume, the scent inoffensive but strong. If you fingered yourself with the note held in your other hand, Laswell's looping blue-ink cursive making you clench on your fingers every time you glanced at it, you didn't feel shame for it. Too busy lost in her pretty eyes, the thought of sitting naked in her lap, the idea of her voice praising and guiding you to orgasm.
...
What a pretty show, Laswell thought. Before she'd even gotten home, she'd had connections find everything about you. For such a smart person, you put much too much about yourself online. Not to mention, an open laptop on your desk, right across from your bed? You're lucky Laswell is looking out for you, remotely setting up security so no one else could see through that camera. Only she should see how your pretty thighs clench and jerk as you cum, only she should hear her name on your lips like that.
You were perfect for Laswell, exactly her type. Smart, pretty thing just waiting for someone to scoop them up, take care of them properly and teach them how to be a good pet.
335 notes · View notes
eponastory · 29 days ago
Text
Watching From the Tower Part 2 (Bucky x F! Reader No Y/N)
Tumblr media
Your code name is Scout and your job was easy. You worked the cyber side of things for the New Avengers. You directed them where to go with your hacking skills, and you are the eyes in the sky. There was just one problem... you don't like leaving the tower. You are not a complete agoraphobe, but you are pretty close. Leaving makes you feel so unsafe and people touching you, that's even worse. So, when James Buchanan Barnes the former 'Winter Soldier' tries to get you out for one mission, things got a little hectic after that.
Part 2 Summary: You are getting sick while working comms when the mission takes a slightly scary turn.
Part 1 | Part 2 |
Tumblr media
Word Count: ~4.4k words. (6.9k total words so far)
Rating: M (Later parts will be marked 18+ for smut, but for now, it's okay.)
Pairings: Bucky/F!Reader (Non-descriptive, No Y/N) Squint for GhostWalker and Boblena (Platonic)
TW: Angst, Depression, mentions of past SA, phobias, Anxiety, MDNI for sexual content in later parts (Will be labeled).
Tumblr media
You weren't exactly feeling great by the time the team landed in Singapore. As a matter of fact, you had already started sneezing and every time Bob saw one coming, he'd tell you to say ‘cucumber’ because he thought it would help. Because he saw you getting progressively worse as you started hacking into one of the Chinese satellites over that region, he opted to help you out with the simplest tasks. You had found out that Bob was not as useless as he thought he was. 
“So… I press this button and the door pops open?” He's sitting in the chair next to you with an extra keyboard you showed him how to hook into the system. 
“Bob… make sure it's the right door.” Bucky's voice comes over the comms linked up to the sound system in the room. “Is it the right door?” 
“I like how encouraging you are, Barnes. So Leader of you.” Yelena's accent comes through, causing Bob to smile as he presses the key you pointed out. “Ah, very good. You have opened the correct door.” 
“Now if only there was a pot of gold and tequila behind it.” Ava's smooth voice comes in making you smile even though your throat is getting scratchy. 
“Cut the chatter.” Once Bucky says something they all shut up. “Walker, status?” 
“Ground clear, moving into position.” You could hear Walker grunting as he likely jumped over something to get into his position. 
“Once inside, let the bot fly so I can get you a readout.” Your eyes are on the screen that is showing footage from the cameras on each team member's person. “I can only do so much with your body cams and the security cameras.” 
“Scoutbot is ready.” Bucky lets you know as he holds the smallest bot you could rig up with Flir and night vision. “On your mark.” 
You look at Bob who is intensely watching the screen to make sure everyone's vitals are as they should be. It was now or never as you pulled the Xbox controller you rigged up to connect to the Scoutbot remotely and the VR headset for better guidance. You think that Bob is ready for this since he's gotten pretty good at gaming with you on slow days. 
“You want to do it, Bob?” You hold the controller out to him and he pulls his soft eyes away from the screen. “Don't worry, you don't have to do anything except control Scoutbot.” 
“Uh… sure. Yeah, it'll be like playing that game with the planes.” He takes the controller and headset before putting them on. “Okay, connect me! I'm going into the Matrix!” 
“Connection established.” You put in your codes and commands for the bot. “Okay, release Scoutbot. Bob is in control.” 
“Are you sure that's a good idea?” Of course Walker would object to letting Bob do this. 
You roll your eyes as you pull up the feed onto another screen and see that Bob is doing very well at guiding the bot around the corners in the long corridors. You have complete faith in Bob. Bob hasn't let you down yet and when you let out a cough, you see that Bucky has gone still. 
“Are you getting sick, Scout?” You can hear the concern in his voice. 
“I'm fine. Corridor is clear, proceed with the directive.” 
“Copy.” 
“Uh… I'm getting some interference.” You look up and see that there is a little static on the bot and that doesn't actually mean too much, at least not at first until. “Too much static to see what is going on.” 
“Bucky, we're getting interference on the bot as it gets closer to the center of the building.” You study the static. It's making the image grainy with white specks showing up every now and then. “Wait… I know what this is. Those are Alpha particles. It's radiation.” 
“I thought the machine was a laser?” Walker questions. 
“It is, but that doesn't mean that there are other things going on in the facility.” You don't have access to a spectrometer, but you do know that Bucky has a small Geiger counter on him. He's always prepared for these things. “Bucky, I'm not positive it's radiation, but maybe use that counter to see.” 
“On it.” You hear the sound of velcro as he reaches into one of his pockets for the small Geiger counter. It isn't long before you see it on his body cam and then the clicking as it measures for charged particles in the air. “Nothing so far, but I'll keep moving in.” 
“Great, so now we have potential radiation.” Ava is moving in after Bucky. “Our day just got so much better.” 
“Could be much worse. We could be in a place like Chernolbyl.” Yelena pipes up after you watch her take out a guard on her side of the building. “You ever been there?” 
“Yes.” Bucky doesn't hesitate to answer. 
“Of course you have.” Her lazy tone makes you smile. “Let me guess, you were there to assassinate a whistle blower in 1986 after the explosion.” 
“More or less.” The counter goes off with a squeal as he turns the corner of another hallway and then eases back. “Unsafe levels.” 
“Shit.” Bob says as the bot goes dark. “Something took out the bot, it just went off.” You look at the screen where your bot has been active only to receive a NO SIGNAL message. “Sorry.” 
“Guys, I think this mission is a botch.” You don't like that the radiation coming from the center of the building is at unsafe levels and possibly a lethal dose. “That radiation is definitely a problem and unless you are resistant, you aren't getting through.” 
“So, what do we do now?” John lets out a breath. 
“I can look into hijacking a satellite that can see the building in infrared. Radiation does sometimes release heat if there is something that is making it react.” You are able to hack into a Russian satellite that is in orbit over the area long enough to get your data. You see the Flir data and the location. It’s white hot in the middle of the building. So much concentrated heat that it has to be a mini nuclear reactor that is leaking radiation. “It’s like a mini reactor– sending the image now.” 
With a few keystrokes, you upload the image to Bucky’s phone and then you hear him grunt in disbelief. You know what he’s going to do next because there is no way to get any further without getting a lethal dose. It’s the one thing that they can’t fight because it’s subatomic particles that are slicing through you at every second. 
“What are the chances the target has been moved versus being dead?” He sounds a little disturbed. 
“High probability that everyone in the building is probably either dead or close to it. I suggest aborting the mission.” You say it with a heavy heart because you know how Bucky handles these missions. You know he’s going to be a storm when he comes back. You cough before looking at the photo again. “I’m sorry Bucky, but none of you would survive radiation this high.” 
“She’s right. I’m already feeling woozy and I’m not even that far into the building.” John is on the end closest to the output. “It’s really hot in here too.”
“Stifling really. This radiation is messing with my phasing.” Ava is in danger too. 
“Bucky, we have to leave.” Yelena stresses to him. 
You can hear Bucky’s thoughts from here. He knows the answer already, it’s just that stubbornness in him that he is fighting. 
“Bucky–” You start out then switch the comms to where you are speaking to him directly. Bob looks at you with the headset still on his head, but he gives you that soft look of understanding before he takes it off and sets it on the desk. He leaves you before he walks into the kitchen. “I know that you will consider this a failure, but it’s not. It’s a tactical miscalculation. We didn’t know this was going on and it could've happened at any point before you got there.” 
“I’m really starting to regret taking on this position.” He grumbles out before you see him turning around. “I’m not good at this.” 
“No time for self doubt, Boss.” He’s already going in the direction of ‘I’m not equipped for this’ when you know he’s got more experience than all of them combined. He just doesn’t believe he can lead this team even though he’s been doing it for six months without fail. But one failure makes him spiral out of control. “Look, there was no indication of this before the mission, so it’s an unforeseen variable that we didn't know about. This isn’t on you, but you all need to get out of there.” 
“Copy.” His tone is dark. He’s back in business mode when he gets over himself. You switch it back to full comms. “Everyone out. Rendezvous at the jet.” 
“Roger.” 
“On it.” 
“Does anyone else taste metal?” 
“That’s from the radiation.” Bucky probably knows because he’s been to radioactive places before, but that still doesn’t dismiss that his experience is what is going to save the team next. “Scout, we need potassium iodide, stat.” 
“Uh– There should be some in the med kit on the jet. I stocked it myself.” You see Bob walk back in with a Grape soda in one hand and your favorite smoothie in the other. Bless him, because your throat is sore and the cold will help. “Only take the recommended dose guys, otherwise you’ll increase your chances of hypothyroidism.” 
“What would be the recommended dose for a super soldier?” You hear John ask and you aren’t exactly sure.
You roll your eyes. “I don’t know, ask Bucky.” You aren’t a nurse even though you’ve patched them up a couple of times. “Thank you, Bob.” He smiles at you as you take the smoothie in hand. He’s such a sweetheart, taking care of everyone because they take care of him. 
“Barnes, how much do we take?” 
“The normal amount.” That made sense. You think. Potassium Iodide is a compound that can be broken down to straight elemental form within the body, but it doesn’t add or subtract anything. At least that is what you remember from high-school chemistry, which was a long time ago. “Just get back to the jet.” 
You listen to the chatter between the team as they make their way back to the place they landed the Jet. You just want them to come home safe and hopefully not full of radiation. You don’t think you can handle it if someone came home with radiation poisoning that is very much hard to cure. 
Leaning back in your chair, you sip on your fruit smoothie that you had prepared days ago and put in the freezer just for this occasion as you listen to the banter. They sound like siblings arguing over stupid things, but you love them. You don’t have a family as you were a child placed in the system at an early age before you were fostered over and over again. Family was a foreign term for years until you stuck it out with no real support system. When you finally found someone to hold on to, they vanished for five years. Five long years that ended up with you being put in a horrible situation. 
Five years of loneliness and then ‘it’ happened. 
When the Blip happened, your partner came back and you weren’t the same. They knew that, but they couldn’t deal with you not wanting to leave the house or do anything other than lay in bed. You started using your skills again out of boredom, to the point where you were working on exposing Val because someone anonymous had contacted you about it. Turns out that anonymous person was Congressman James Buchanan Barnes. 
That man that you were trying really hard not to get too close to. But it was hard. It was hard because he was very much your friend and he brought you into this because you were good. You were really good. 
“Scout, we’re on the jet.” His voice comes through and you let out a sigh. “Minimal radiation exposure detected.” 
“Okay, good. Can you just come home now?” You cough before you hear him hum softly. “We’ll regroup and learn from this okay?” 
“Sounds like mother hen is worried about us.” Yelena’s smile comes through her tone. “Don’t worry, we are fine. It was just a snag.” 
“Just get home so I can make sure everyone is fine with my own eyes.” You are worried. They have become the closest thing you have to family and you don’t want to lose them. The thought terrifies you. 
“We’re in the air. Go rest, we’ll see you in eight hours.” You hear the concern in Bucky’s voice before looking at Bob who is happily sipping on his grape soda. He still puts the straw in it like a little kid. He isn’t a kid, but some habits die hard. 
Tumblr media
Eight hours later, you’re being woken up by a proximity alert. You had fallen asleep on the couch in the hub, but by now you were running a fever and you didn’t feel like getting up. How on earth did you get sick when you barely leave the tower? It runs through your head that maybe it’s from one of the people that come in and out all the time. Actually, you think back to the guy that dropped of the groceries three days ago that looked half dead and in need of a vacation. He was also sort of coughing. 
You groan when you know it was him because you accepted the delivery while everyone was at their respective places. Sure, Yelena, Bob, Ava, and John lived in the tower full time, but not Bucky and Alexei. Bucky had his own place because he said if he lived here, he would probably go crazy. He was the type of person that needed to have his social battery recharged in solitude. And it rang true because he always went home at night unless the mission was just too much and he’d find a quiet place to crash, usually on your couch that is in your workshop. 
But as it stands, you did not want to get off the couch you were on. You were shivering and partially delirious because you couldn’t get your fever to go away. Bob had thrown a blanket over you at one point, even bringing you a heating pad to keep you warm, but you were both on fire and freezing at the same time. It was awful. You were so tired and all you wanted to do was sleep. 
It isn’t until you feel a hand on your forehead that you realize you fell asleep again. You open your eyes to see Bucky. He’s not in his ‘work clothes’ but rather wearing his standard black t-shirt with a jacket that you desperately wanted to steal off of him and wrap yourself in. Yes, you were definitely sick because you were thinking these thoughts. 
“Hey.” You hear him as he rubs his thumb on your forehead. “We’re back.” 
“Mkay.” It’s a fog because you see his face, but you are so tired and feel so bad that you just want to sleep forever. You wouldn’t mind if he smothered you with a pillow because you feel like you are dying. 
“You’re sick.” The tenderness in his voice does something to you though and that look in his eyes. You want him to actually keep touching you because you are too sick to care at this point. He knows you have an issue with being touched. You have to initiate it or otherwise it’s uncomfortable and pushing the boundaries that you have set in place. You hate that you’re like this because when you see the look in Bob’s eyes when he wants to hug you after you have a tiny meltdown over something stupid or when Bucky wants to touch you to let you know he’s there. 
The fact that he’s not hurting you now is what is keeping you sane. 
Ava isn’t a touchy person either and that is why the two of you see eye to eye. Yelena sees you as a surrogate sister, but she respects those boundaries you have set up. Walker is terrified of you. He barely speaks to you, but he’ll leave your favorite candy on your work bench when he goes out to get food or something. It’s these little things that make you feel like you belong and that there is a healthy respect between all of you. 
But here Bucky is, looking down at you with those blue eyes of his and all you want to do is curl up. “I feel like shit.” You pull the blanket up to cover your face which forces his hand to vacate your forehead. “I just want to die.” 
“Not allowed.” The rough conviction in his voice says a lot to you. “Did you take anything?” 
“Uh– I gave her some Tylenol to make her fever go down a few hours ago.” You see Bob looking down at you from the back of the couch with his hoodie on. He smiles as Yelena comes to stand next to him. 
“Oh, you look like you have been dead.” She doesn’t hold back on her snarkiness even when you aren’t feeling good. “Like you died and then came back to life just in time for us to get home.” The soft smile on her face is enough to make you sigh. 
“Could all of you just stop yelling at me.” Your head hurts because everyone is talking to you now. “And maybe turn off the lights.” Turning over, you hide your face into the cushions as the bright lights start getting to you. “Stupid grocery guy.” You mumble. 
You hear Bucky sigh. “Okay, time to get you to your own bed.” Normally you would shirk away when someone lays a hand on you, but this gentle touch from Bucky to turn you onto your back is more like asking permission. It’s in his eyes when you turn your head to look at him. “Hey.” 
“Hey.” You blink slow like a cat. 
“Will you let me bring you to your room?” The fact that he’s asking makes you feel better about this and all you can do is nod. He peels the blanket off of you as Yelena drags Bob away to work on something else entirely. “Come on.” You don’t protest when he’s helping you sit up enough to put an arm around his shoulder so he can pick you up. 
You cough as he puts his arm under your knees and hoists you up into his arms. Anyone of the super soldiers on the team could do this, but you only let Bucky because you knew him better. You were his friend before you were theirs. Alexei would if you asked him to, but you never would because that was not the relationship you had with him. Still, when Bucky is carrying you out of the hub and to the elevator, you lay your head on his right shoulder because you can’t keep it upright. Your arms are around his neck as he carries you without getting tired, because he doesn’t get tired. 
He’s made out of sturdy stuff and nuclear energy. He goes on forever out of spite at what happened to him in the past and you admire that about him. Although, as seen earlier, he still has some things to deal with on an emotional level. You saw how he started going down this path of self-doubt the moment you told him to abort the mission. The moment you told him the team was in danger. He knows it was the right call, but at the same time, you could tell through his voice that old training was telling him to keep going. The circumstances were just out of their control and he knew that too. Now, he’s probably going to replay this in his head for hours before he actually falls asleep. 
“You’re quiet.” There is nothing but the sound of your voice and the elevator. “You’re thinking about what went wrong.” 
“Nothing went wrong.” He denies it. “Everything went wrong.” He sighs as he grips his hand tighter around your leg just before your knee. “What could’ve caused that much of a radiation leak?” 
You wrack your brain for something. “Cesium.” That’s the only thing you can think of for a radiation leak that big in a medical facility. “They use it in MRI machines. But it would take a lot of it to cause that much radiation.” You are surprised that you are lucid enough to recall that information. “I don’t know, but as soon as I feel better, I’ll be on the case.” You promise even though you feel like shit. 
The elevator stops on your floor and Bucky is carrying you out. Your workshop and apartment are only two doors away from the elevator, so it’s barely five seconds before Bucky is maneuvering himself to press the keypad on your door while you are still in his arms. As soon as the code is in, the one you programmed specifically for him, the door pops open and he’s pushing it with his foot. Once inside he gently kicks the door shut behind him. 
It’s lonely in this apartment, but you like it. You’ve made it your home with the warm colors and low lights that the AI brings up when you enter the room. It’s yours and Val will have to drag your cold body out of there before you ever leave. You are pretty sure the entire team will be turning Val over if she even thought about kicking you to the curb. Bucky would actually kill her. You know it, he knows it, and she knows it. So she lets him do his job and that means you get to do yours. Even if it means fixing Alexei’s phone every two weeks. 
“Did you get more books?” Bucky sees the stacks of books that you have acquired for reading even though it takes you no time to sit and read one. 
“I ordered a few for Bob because he pretty much read all the ones I recommended already.” When you learned that Bob liked to read, you were ready to start your own little book club with him and eventually Ava joined in on it too. “Some of them are for you too.” And Bucky was a reader too, he just didn’t tell anyone. “The small stack with your name on it are the ones I got for you.” You cough again as he passes by the stacks you had sorted out for everyone. 
“You didn’t have to do that, you know.” Yes you did. You have been sneaking books to him for six months, always leaving a copy of something you think he’d like on his desk. Then you’d find it on your workbench a week later with a note in his handwriting about what he liked or didn’t like about the book. 
“I do.” 
“Thank you.” He barely says your real name under his breath as he brings you to your room. 
You weren’t a very tidy person. You like your home looking like you lived in it, but it was clean. It was crowded with things that you kept around for comfort, but the only thing you didn’t have was pictures of a family you can’t remember. You remember the people that you lived with, the good and the bad, but you don’t remember your real family. 
He sits you down on your bed before he’s pulling the white comforter back and organizing the pile of pillows that you have on your bed. You need eight pillows. You do but he is moving most of them to the other side of the bed as you take off your shoes and make yourself comfortable. He finds your penguin Squishmallow buried underneath the pillows and throws it at you. It’s big enough for you to hold at night because sometimes you get nightmares about your time in foster care. 
“Come on, get in.” You aren’t a child. You’re a grown woman with a mind of your own, but this is him taking care of you because there is no one else. “I’ll get some more medicine and water for you.” 
“Okay.” You do as he says because you don’t have the energy to be disobedient. You slip in under the covers in just your hoodie and pajama pants that you had not changed out of since you were working comms. You were still on fire, but still freezing. There was no happy medium. 
When Bucky comes back to your room with a glass of water in his vibranium hand and two Motrin in the other, you sigh. Motrin. The standard go-to for anyone in the military since no one knows when. You curl up on your side with your penguin and watch as he holds the two little orange pills out to you. Your teeth are chattering at this point. You sit up and take the pills, throwing them in your mouth before swallowing. You reach for the water and gulp it down before handing it back to him. 
“Get some rest. I’ll call you in a few hours to check on you and if you don’t answer, I’m coming back here.” He is very serious because he does care. Probably more than he should, but you aren’t complaining. This is how he shows his affection. 
“Okay, Bucky.” You lay back down on the pillow before he’s pulling the covers over you and tucking you in tight. Sometimes you don’t mind that someone wants to take care of you. It rarely happens, but right now, it’s the look in Bucky’s eyes as he makes sure you are okay that has you feeling much better already. Maybe he’s always looked at you like this. You were too busy wrapped up in yourself and in others to really notice. 
“Good night, Sweetheart.” He says before flipping the lightswitch off and closing the door. You think he would probably make a good father someday, if not a good husband to some lucky woman. You definitely weren’t that lucky woman. You had too many problems to be that lucky woman. 
It doesn’t stop you from thinking about him as your body fights off whatever virus is inside you. 
43 notes · View notes
newcodesociety · 1 year ago
Text
1 note · View note