#application vulnerability scanning
Explore tagged Tumblr posts
blacklocksecuritynz · 3 months ago
Text
Blacklock Security Limited
Our vision is to bridge the gap between automated and manual penetration testing – with automation. Blacklock is an all-in-one Penetration Testing as a Service platform (PTaaS) that automates the discovery of security vulnerabilities in your infrastructure, web application, codebase and manages them from a single pane of glass. We love to make security things simpler, practical and approachable. As penetration testing experts ourselves, we’ve felt the complex process of getting a security testing completed and then continuously managing the vulnerabilities from pen testing, code review, infrastructure reports, recurring tests, their reports, etc. – it just becomes more complex, expensive and unmanageable overtime. Our team has built an easy and neat way to do security right!
0 notes
nyuway · 7 months ago
Text
The Role of DAST in Protecting Your Web Applications From Vulnerabilities
Nyuway
Tumblr media
As cyber attacks become increasingly sophisticated, enterprises require DAST to help defend their applications against sophisticated cyber threats. By scanning a running application and simulating hacker behavior, it can identify vulnerabilities before enterprising hackers exploit them.
DAST complements static application security testing (SAST) and software composition analysis (SCA), offering additional runtime insights beyond source-code scans. Furthermore, it serves as a valuable companion to manual penetration testing.
Web Application
Dynamic application security testing (DAST) scans running web applications by simulating malicious external attacks and identifying vulnerabilities which could be exploited. DAST can reveal business logic flaws like SQL injection, XSS attacks and authentication issues which often go undetected through static code analysis tools (SAST) or manual penetration testing methods.
While DAST tools can be effective, they do have their limitations. False positives and lack of context can result in security gaps when applied solely. To address this limitation, it may be useful to combine DAST with other methodologies like SAST, IAST or software composition analysis (SCA) in order to create a comprehensive security program.
Implementing DAST into your CI/CD pipeline can ensure vulnerabilities are identified and fixed as code changes are made, leading to decreased costs and speedier time to production. Furthermore, early detection helps minimize accidental releases or potential data breaches; many of today's most harmful cyberthreats rely on unpatched vulnerabilities within running applications for attack.
API Security
DAST tools differ from SAST in that they attack an API without knowledge of its application; instead, this kind of testing mimics how attackers would try to exploit it - thus helping detect vulnerabilities which are harder to spot with traditional testing techniques.
DAST can be particularly effective at protecting web APIs. It can scan API endpoints to expose vulnerabilities that attackers could exploit, such as injection attacks or misconfigurations; and can identify unexpected data leaks or performance issues which might signal deeper security holes.
DAST excels at scanning web application UIs, yet struggles to access and test APIs tucked behind dynamic behavior layers. These layers hide backend API calls behind their respective UI layers until JavaScript code executes and uses an appropriate request format for runtime visibility.
Continuous
As web applications continue to be developed and evolve, security risks continue to shift and adapt accordingly. DAST can help address this challenge effectively.
This type of testing works by simulating attacks a malicious actor might employ to penetrate an application. By employing a black box approach and looking at it from outside in, this approach can detect vulnerabilities which other methods such as SAST or SCA fail to find.
DAST provides feedback and reporting to help developers and security teams prioritize vulnerabilities for remediation. It can also be easily integrated with the CI/CD pipeline to scan at every stage of development, making it easy to detect security issues before they reach production.
DAST can provide an overall picture of your application's vulnerability to threats when used alongside SAST & IAST (which examine code line by line), to form part of an integrated security assessment process. DAST tests entry points such as forms & API endpoints while SAST & IAST examine internal risks like misconfigurations & coding errors to provide a full assessment.
Automated Vulnerability Scanning
DAST differs from traditional static testing by testing an application while it runs, simulating how a hacker would search for vulnerabilities in real time. DAST can run both unauthenticated and authenticated modes to see how the app responds to attacks that typically gain control over an account and reveal sensitive data.
Businesses using advanced DAST solutions that utilize proof-based scanning can quickly identify and prioritize critical vulnerabilities using sophisticated DAST solutions that use proof-based scanning to eliminate false positives, making their teams focus their efforts on real risks that could cause serious breaches instead of spending hours sifting through massive test results.
DAST tools also give development and QA teams detailed information on how they can reproduce and fix vulnerabilities more quickly, so as to minimise disruption in production environments. When integrated into the Continuous Integration and Continuous Deployment pipeline, DAST can detect vulnerabilities at each stage of development and production to decrease chances of breach as well as ensure compliance with regulatory standards such as PSI-DSS or HIPAA.
Managed DAST Services
DAST is an essential part of any comprehensive application security program, and an indispensable element for its testing capabilities. As the most adaptable security testing tool on the market, it can be integrated into each stage of development from early design through quality assurance testing, staging deployment and production deployment. When integrated into an CI/CD pipeline DAST can also help developers identify vulnerabilities before reaching production, saving both time and money in development costs.
DAST works by conducting automated tests simulating external attack behavior without understanding its internals, similar to malicious attackers' tactics, in order to uncover unexpected outcomes and vulnerabilities. Language independent, DAST can detect runtime issues like server configuration problems, authentication/encryption misconfigurations and more that SAST cannot.
To maximize the value of DAST, organizations should set clear security objectives and incorporate it into existing CI/CD and DevOps workflows. This includes developing strategies for handling false positives and regression tests to verify previously fixed vulnerabilities do not resurface. Ideally, DAST should be integrated with CI/CD pipeline so every code push or deployment triggers dynamic security checks automatically.
0 notes
wonyonwoo · 4 months ago
Text
The Mistake We Keep Making ~ P.SH
Tumblr media
warnings: angst, suggestive, depressed reader, infidelity, cheating, self hatred, toxic hwa.
wc: 1.5k
Just a little drabble.. I hope you enjoy!
Tumblr media
How did you end up here? Naked. Vulnerable. Sticky.
It’s a tale you’re all too familiar with, a story that should have ended long ago—one that should have never begun. You know it’s wrong, but you can’t help it. Not when he smiles at you like you’ve made his day, not when he brings you lunch during your grueling study sessions, not when he’s between your legs, devouring you like you’re his last meal, whispering how beautiful you are, how sweet you taste, how good you feel. Not when he looks up at you with hooded eyes, bottom lip quivering as he spills into you. Not when you collapse into each other, bodies tangled, drowning in a high you were never meant to share.
It wasn’t supposed to be like this. You weren’t supposed to be with him.
You both knew it.
--------
“Y/N.”
Your name pulls you back, snapping you out of your daze. You’ve been zoning out more lately—a side effect of exhaustion, of self-inflicted chaos. The weight of your last year in university, the pressures of grad school applications, a demanding internship, moving out of your old apartment before the lease expires. You’re barely holding it together, and maybe that’s why you keep making the same mistakes. Why you keep letting him in.
“Huh—oh, yes?” you blink, refocusing on Lara, her golden nose ring glinting under the soft apartment lighting. Gorgeous as ever, her warm brown skin flawless, her long red curls framing a face too symmetrical to be real.
“You’re scaring me,” she says, eyes scanning you with concern. “You keep zoning out. I think you have too much on your plate.”
She knows you too well. She always has. You’re a chronic overachiever, running yourself into the ground without ever leaving space to breathe. The difference is, Lara has balance. She’s just as busy—final year, business major, yet somehow her life is seamless. Perfect boyfriend, a family with money, an apartment that isn’t suffocating under the weight of bad decisions.
Meanwhile, you trick yourself into thinking that 5am gym sessions compensate for the disorder of your life, that productivity masks your wreckage. You can’t even remember a time when you weren’t a mess.
“I think so too,” you admit, sighing. “But I’m too deep in. I worked so hard for that internship, I can’t screw it up now. Maybe once I finish moving, things will settle.” You take a sip of your hot chocolate, hoping the warmth will calm your nerves.
“I literally offered to hire movers for you.”
“Okay, but who’s going to unpack all my shit?”
“I said I’d help you.”
You shake your head. “I don’t like people touching my things.”
Lara scoffs. “Why do you make things so hard for yourself?”
You don’t know. You really don’t. But it’s a pattern—one you can’t seem to break.
“You know I like doing things myself, Lara. If I can’t handle it alone, then what’s the point?” It’s a mindset etched into your bones.
She exhales sharply, rolling her eyes. “I don’t understand you.”
“Me neither.” You chuckle, but it’s hollow.
She convinces you to let her help with the move, and though you resist, you’re relieved. You’re grateful to have her, even if a small, ugly part of you resents how effortlessly put-together she is.
You’ve known Lara since third grade, since you found her beating up the class bully, Seth. You were inseparable after that. Her 4’9, 60-pound eight-year-old self had taken on the biggest guy in the grade and won. She was fearless, independent, kind—all the things you pretend to be. Maybe that’s why you push away her help. Accepting it feels like pity. It’s cruel to feel that way about your best friend, but you can’t help it.
She’s perfect without trying. And you…
You’re crying. Alone. In your car. In the parking garage of Lara’s apartment.
Pathetic.
You slam your forehead against the steering wheel, frustration bubbling up in your throat. You’re so sick of crying. Sick of feeling. Sick of yourself. The weight of everything—the past, the present, the future—presses down on your chest, suffocating.
Your phone vibrates.
A name you should’ve erased long ago lights up your screen.
Hwa: I want to see you.
You exhale sharply, fingers tightening around your phone. He always seems to find you when you’re at your lowest. As if he has a sixth sense for your weakness. But the truth is, you wouldn’t have said no even if he’d texted at any other time.
You: I need you, Hwa.
And that’s the worst part.
Because it’s not just loneliness. It’s not just sex. It’s something much darker, much deeper. A sickness rooted in your bones, in your mind, in the way you let yourself believe that this—this—is the only way you can feel anything at all.
Maybe that’s why you always end up in his bed.
Even though you know that’s not where you’re supposed to be.
-------
Seonghwa’s fingers trace the curve of your jaw, tilting your face toward his. The warmth of his touch sends a slow burn through your veins, igniting something reckless inside you.
“Angel,” he murmurs, voice smooth, coaxing. “Look at me.”
You do, blinking up at him from where you rest in his lap, curled into him on the couch. He smells like cedarwood and sin, his presence intoxicating. The movie playing on the screen is long forgotten, drowned out by the steady drum of your pulse.
It’s always the same routine—he comes over, you eat, you talk, you fuck. Repeat. Some nights feel different. Some nights, he lingers. Holds you a little longer. Whispers things in the dark that make your chest ache. Tonight is one of those nights.
His wife and daughter are away for the weekend, visiting family. He couldn’t go because of work.
You don’t know who you hate more. Him. His wife. Or yourself.
You hum softly, lashes fluttering as you meet his gaze. His thumb brushes against your lower lip, eyes darkening.
“You’re so quiet tonight,” he muses. “What’s on your mind?”
Everything. Nothing. You.
Instead of answering, you shift in his lap, pressing your thighs together. The movement doesn’t go unnoticed. His hand tightens on your jaw, the other gripping your waist. His tongue darts out to wet his lips, eyes locked onto yours, heavy with intent.
He leans in, breath warm against your skin.
“Tell me what you need.”
You swallow, heart hammering. You shouldn’t. You shouldn’t. But your body betrays you, melting into him, chasing his warmth.
You whisper the words you always do, the ones that keep you bound to him in this cycle of ruin.
“You.”
Without hesitation, Hwa leans down, his lips meeting yours with a tenderness that should not belong to you. It is slow, deliberate—loving. The kind of kiss a man gives his wife, the kind of kiss a man should give his wife. And yet, here he is, pressing that devotion into you, stealing what was never yours to have.
"Hwa," you breathe between his kisses, your voice barely a whisper, more of a plea than a protest. 
"Hm?" He hums, lost in you, unaware—or perhaps too aware—of how he unravels you piece by piece. 
"You're so gentle tonight," you murmur, tilting your head to grant him access, surrendering before you can think twice. His lips trail down your jaw, onto the delicate skin of your neck, his breath warm against your pulse. 
"I finally have as much time with you as I want," he says, each word pressing into you like a brand. "I'm going to take my time. Savor you. Every part of you."
The words hit deep, sinking into the hollow spaces you pretend don’t exist. He wants to savor you. To be with you. To consume you slowly, as if you are something precious, something worth lingering over. But are you? Is this self-destruction or indulgence? Is this a wound or a reward?
"I missed you so much, angel. Your smell, your face, your taste. Always so pretty for me. You know that?" 
Here he goes again, whispering the words he knows will break you apart, dissolving the fragile pieces of your restraint. He knows you too well. Maybe that’s why he chose you. He knew you were empty, a void waiting to be filled, so he poured himself into you—made you whole in the only way he knew how. Physical love, fleeting love, the kind that fades with the morning light. Because there’s no way he could truly love you, right?
Hwa strips away his shirt, then yours, discarding them like the last remnants of reason. His hands are firm yet reverent as he lifts you, carrying you toward your empty, half-packed room. He stumbles over a box, nearly losing balance, and you let out a quiet laugh. 
He silences you with a kiss, deep and claiming, before laying you tenderly onto the mattress. 
Tonight, you are his. 
Tonight, he is yours. 
And when the morning comes, reality will take him back. 
But for now—for now, he lingers.
85 notes · View notes
aventurineswife · 6 months ago
Text
Tumblr media
“In riding a horse, we borrow freedom”
Summary: Ratio is invited by his equestrian significant other to try horseback riding. Initially skeptical, Ratio soon discovers the intellectual and physical challenges of the sport. As he learns about the complex relationship between rider and horse, he gains a deeper appreciation for the pursuit, all while bonding with his significant other in a rare moment of vulnerability.
Tags: Ratio x Reader, Equestrianism, Bonding, Character development, Fluff, Light romance.
Tumblr media
The sun had just begun its descent when Ratio stepped onto the sprawling estate where you had invited him for the day. The air smelled of fresh hay and the earthy scent of horses. You noticed his meticulous gaze scanning the stables, his hair glinting in the golden light, and his eyes narrowing as he assessed the surroundings.
“This environment is… quaint,” he remarked, his tone neutral but not unkind. “I fail to see the practical application of this hobby, but I am open to understanding its merits.”
You laughed softly, leading him to the paddock where your horse, a dappled gray named Astra, waited. “It’s not just a hobby, Ratio. Equestrianism teaches discipline, balance, and a deep connection between human and animal. It’s as much an intellectual pursuit as a physical one.”
He arched an elegant brow, the ring around his pupils catching the light. “An intellectual pursuit, you say? Enlighten me.”
As you prepared Astra for a ride, you explained the intricate theories behind dressage, the biomechanics of a horse in motion, and the communication skills required to guide such a powerful creature. Ratio listened intently, his usual air of superiority tempered by genuine curiosity.
“Fascinating,” he admitted, stepping closer to observe Astra’s movements as you guided her through a series of fluid transitions. “It’s akin to a symphony—every action and reaction in harmony. I can see how this demands both mental acuity and physical precision.”
You smiled, pleased by his acknowledgment. “Care to try?”
His lips curled into a smirk. “I am not one to shy away from a challenge. Though I must warn you, my expertise lies in intellectual pursuits, not equestrian ones.”
You helped him mount Astra, offering gentle guidance as he adjusted to the rhythm of her gait. Ratio’s usual confidence faltered slightly as he found his balance, but he quickly regained composure, his analytical mind processing each movement with remarkable speed.
“You weren’t exaggerating,” he murmured, his voice thoughtful. “This requires an impressive degree of focus. The communication between rider and horse is almost… telepathic.”
As you rode alongside him, the two of you fell into an easy conversation, the topics ranging from equine anatomy to the historical significance of horseback riding in various civilizations. Ratio’s sharp mind and your passion for equestrianism blended seamlessly, creating a unique bond between you.
By the end of the ride, Ratio dismounted with a grace that belied his inexperience, his hair slightly tousled and his usual pristine demeanor softened. “I must admit, I underestimated the complexity of this art form. It has proven to be a far more enriching experience than I anticipated.”
You chuckled, brushing a strand of hair from your face. “So, does this mean you’ll join me more often?”
He tilted his head, a rare smile gracing his lips. “Perhaps. Though I suspect my primary motivation would be your company rather than the horses themselves.”
Your heart swelled at his uncharacteristic display of affection, and as the sun dipped below the horizon, you realized that even someone as brilliant and self-assured as Ratio could be swayed by the simple joys of life—and by the person who shared them with him.
Tumblr media
36 notes · View notes
fictoculus · 2 years ago
Note
as a cyno fan, i really loved your work "they're crying... but why" aaaaaa can i request for another cyno x reader one where cyno cried and theres reader who tried to comfort him? thanks a lot!
౨ৎ crying hcs; reverse comfort...
Tumblr media
send a request!┊masterlist┊taglist applications
FEAT... cyno
A/N... thanks so much for the request, i'm glad you liked my writing! i was slightly confused by your prompt (which isn't your fault dw ^^) so i decided to do heacanons with how you (reader) would comfort him and how he would act when upset rather than reasons why he's crying, i hope that's ok ♡
Tumblr media
♪ it's very rare for cyno to let you see him when he cries, so when he's stood infront of you, shoulders slumped over and shaking, your heart ached.
♪ the two of you would stand for a moment, you being frozen with shock, cyno being too embarrassed to mutter a word. only when he starts to break down more do you snap yourself out of it, holding your arms out for him to lean into your chest; which he did.
♪ he seemed almost timid when he entered your arms, hiding his face in your chest, but not wrapping himself around you. instead, he stood with his arms stiff at his sides, his head buried in your shirt.
♪ you, however, do hold him, squeezing him slightly and rubbing circles on his back, whispering sweet nothings in his ear as he let out choked sobs.
"you're ok, shhh, everything's gonna be ok..." "i love you... so much" "just let it all out, love, cry as much as you need"
♪ eventually, he does calm down, his breathing evening out, his shoulders no longer trembling under your touch. his face is still pressed into your chest though, and you can feel the dampness of his tears against you. you didn't mind, of course, but cyno made sure to apologise once he pulled away, wiping his face with his hands and sighing deeply
"i'm- sorry about that... i think i'm going to head back out, there are some things i need to finish up..." "no, stay"
♪ you'd insist, keeping a firm grip on his wrist as he tried to walk away; there's no way in teyvat that you'd let him keep working when he'd come to you crying.
♪ pulling him back towards you, you rest your hands on his shoulders, scanning his face for any signs of discomfort before kissing his nose. a few stray tears began to roll down his cheeks, but you kissed them away before he had the chance to wipe them away himself.
"you looked so... so broken when you came in, cyno. i can't let you go back out there when you're this upset... so please, stay?"
♪ he sighs, nodding meekly and looking into your eyes, seeing only a look of pure adoration...
"don't- don't look at me like that..." "like what?" "like that" "love, i think you're going to have to be more specific i-" "[name]" "alright, alright, i'm sorry"
♪ you apologise, stiiffling your laugh as you slide your hands down from his shoulders, intertwining your fingers with his. gently, you pull him behind you, taking the two of you to the bedroom where you'd cuddle until the sun sets.
♪ cuddles with cyno are more comforting and more cozy than any rainy evening, or any hot chocolate, or book, or candle; archons, it was better than all of those combined. the way he hugs you is just perfect, and he looks so pretty with his hair all in his face. you love his bedhead, being able to tuck stray hairs behind his ear is the thing you looks forward to every morning.
♪ however, because your poor boyfriend was upset, and probably feeling quite vulnerable, you decided to be the one holding him; wrapping your arms around his waist and pulling him into you, nestling your face in his hair and taking in his scent. he was quite flustered, to say the least, thinking you weren't aware of his flushed pink cheeks, or the way he jolted slightly when he felt your hands snaking around him.
"is this ok?" "... yes, just, don't let go, 'kay?" "i won't, i promise... get some sleep, love, you can tell me all about it tomorrow" "goodnight, [name], i love you" "i love you, cyno, sleep well"
♪ and with that, you kiss him goodnight, shuffling around slightly to find the perfect position, pulling the covers up so that they're just below cyno's nose, making sure he was comfortable before you let yourself drift off to sleep...
Tumblr media
thanks for reading ♡ want to read more? my requests are OPEN, so please feel free to let me know what you'd like me to write next!
Tumblr media
© FICTOCULUS 2023; please do not steal, translate, or repost my works as your own
183 notes · View notes
pxnsneverland · 2 months ago
Text
Dark Temptation | Draco Malfoy x Hermione Granger (part 2)
Tumblr media
(gif source: madamebaggio)
plot summary: Despite being on opposite sides of an impending war in the wizarding world, Draco Malfoy, a young Death Eater, and Hermione Granger, fiercely loyal to the Order, cross paths when they are assigned as partners in a academic project. Forced to spend time together, their mutual animosity slowly gives way to an undeniable attraction, leaving both confused and vulnerable.
Part 1 | Part 2 | Part 3 | Part 4 | Part 5
pairings: Draco Malfoy x Hermione Granger
word count: 2,055
warnings/notes: N/A
Chapter 2: Hidden Secrets
The corridor was lined with doors, each bearing the names of a pair. About halfway down, they found their names engraved on a polished oak door: *Granger & Malfoy*. Draco pushed the door open without ceremony, revealing a spacious room with large windows overlooking the lake. A round table occupied the center, surrounded by comfortable chairs. Bookshelves lined one wall, while another featured a potions workstation and various magical instruments.
"Well, isn't this cozy," Draco drawled, dropping his bag onto the table with a thud. "Our own little prison cell."
Hermione rolled her eyes as she stepped inside, immediately drawn to the bookshelves. "It's actually quite nice. Better than I expected."
"Leave it to Granger to find happiness in a bookshelf," he muttered, slouching into one of the chairs.
Hermione ran her fingers along the spines of several ancient tomes, pulling one out to examine it. "These are rare editions. Professor McGonagall clearly wants us to have all the resources we need."
"Or she's trying to compensate for forcing mortal enemies to work together," Draco said, leaning back in his chair, boots propped on the table.
Hermione slammed the book shut. "Get your feet off the table, Malfoy. And we're not mortal enemies. We're just..." she paused, searching for the right word.
"Just what?" His gray eyes locked with hers, challenging.
"Different," she finished lamely, taking a seat across from him. "Look, neither of us wants to be here, but we need this project to graduate. So let's just pick a topic and divide the work."
Draco's jaw tightened. "Fine. What about a potion that makes Mudbloods tolerable?"
The color drained from Hermione's face before flooding back twice as bright. "Eight years, Malfoy. Eight years and you're still the same prejudiced, small-minded prat."
"And you're still the same insufferable know-it-all," he shot back, but something flickered in his eyes.
Hermione pulled out a parchment from her bag, slamming it on the table. "I've already compiled a list of potential topics. Pick one or suggest something that doesn't involve blood prejudice."
Draco snatched the list, scanning it with a sneer. "Memory potions? Protective enchantments? Honestly, Granger, could you be more boring?"
"Fine. What's your brilliant idea then?" She crossed her arms, waiting.
He hesitated. "Something with practical application. Something no one's done before."
"Like what?"
"Like..." he paused, then spoke quietly, "a potion that removes magical scars."
The air in the room seemed to still. Hermione's eyes involuntarily flicked to his left arm, where the Dark Mark lay hidden beneath his sleeve.
"That's... actually not terrible," she admitted reluctantly.
"Don't sound so surprised," he snapped, suddenly defensive.
"It's just..." Hermione bit her lip. "That's quite personal, isn't it?"
Draco's expression hardened. "Forget it. Let's do one of your tedious suggestions instead."
"No," Hermione said quickly. "I think it's a brilliant idea," Hermione said firmly. "If we could develop something like that, it would help so many people after the war."
Draco's eyes widened slightly at her enthusiasm before his usual mask slipped back into place. "Whatever. Let's just get started."
As Hermione began outlining a research plan, she couldn't help but notice the dark shadows beneath Draco's eyes. His skin looked almost translucent in the afternoon light streaming through the windows, and his normally immaculate appearance was slightly disheveled. His fingers drummed restlessly against the table, and occasionally, his gaze would drift toward the door as if expecting someone to burst in.
"Malfoy, are you even listening?" she asked after explaining her third point without any reaction from him.
"What? Yes, of course," he snapped, straightening in his chair. His hand moved instinctively to his left forearm, rubbing it absently.
"You look terrible," she blurted out before she could stop herself.
His eyes flashed. "Thanks for the assessment, Granger. Your opinion on my appearance means the world to me."
"That's not what I meant," she said, softer now. "You look exhausted. Are you sleeping at all?"
"My sleeping habits are none of your business," he said, but the usual bite was missing from his words. Instead, he sounded almost weary.
"If you're going to be useless for this project because you're too tired to function, it becomes my business," she countered.
Draco ran a hand through his hair, messing it up further. "I'm fine. Just... busy."
"With what?" Hermione pressed, leaning forward. "Quidditch doesn't start for another month."
He looked at her then, really looked at her, and for a moment, Hermione thought she saw something like desperation in his eyes. "Drop it, Granger," he said quietly. "Please."
The "please" caught her off guard. Malfoy never said please, especially not to her. "Alright," she conceded, turning back to her notes. "We should start by researching existing scar-removal potions and why they don't work on magical scars."
Relief washed over his face. "The restricted section probably has something useful," he offered, his voice steadier now.
They worked for another hour, with Hermione doing most of the talking while Draco occasionally contributed an insight. Twice, she caught him staring out the window, his mind clearly elsewhere. Once, when a first-year dropped something with a loud crash in the corridor outside, he'd nearly jumped out of his skin, his hand flying to his wand.
"I think that's enough for today," Hermione said finally, gathering her notes. "We can meet again tomorrow after Potions."
Draco nodded absently, still staring out the window at the darkening sky. As Hermione reached for her bag, her sleeve caught on the edge of an inkwell, sending it tumbling across the table. Dark liquid spilled everywhere, flooding her notes and dripping onto the floor.
"No!" she cried, jumping up too late. The damage was done.
"Honestly, Granger," Draco sighed, pulling out his wand.
Before she could reach for her own, he murmured a cleaning spell she'd never heard before. The ink seemed to gather itself up, separating from the parchment and wood, coalescing into a perfect sphere that hovered momentarily before disappearing with a soft pop.
"That's... impressive," Hermione admitted, examining her now-pristine notes. "Where did you learn that?"
A shadow crossed his face. "My mother. She's particular about stains."
Hermione nodded, remembering Narcissa Malfoy's immaculate appearance even in the midst of battle. "Well, thank you."
"Don't mention it," he mumbled, gathering his own things.
As they both reached for the last book on the table, their hands collided. Hermione felt a jolt at the unexpected contact. Draco's hand was surprisingly warm, his fingers long and elegant despite the bitten nails. Neither of them moved for a moment, their hands touching over the leather binding. The air in the room seemed to thicken. Hermione could hear her own heartbeat, suddenly loud in her ears. She glanced up to find Draco staring at her, his grey eyes wide and uncertain.
"Sorry," she whispered.
"It's fine," he replied, his voice rough. His gaze dropped to her lips for the briefest moment. He swallowed visibly, his Adam's apple bobbing.
In a sudden, jerky movement, Draco yanked his hand away as if burned. His chair scraped loudly against the stone floor as he stood, knocking it backward with a clatter.
"I need to go," he said, his voice strained. He gathered his things with frantic energy, shoving parchments and quills haphazardly into his bag.
"Malfoy, what's wrong?" Hermione asked, concern creeping into her voice despite herself.
"Nothing," he snapped, but his hands were trembling slightly as he fastened his bag. "I just remembered something I have to do."
Hermione took a step toward him. "We still need to schedule our next meeting—"
"Don't!" Draco backed away, nearly stumbling over the fallen chair. The afternoon sunlight caught his pale hair, making it glow almost white against his ashen face.
Outside in the corridor, footsteps paused at the commotion, then continued on.
Draco closed his eyes for a moment, visibly struggling to regain control. When he opened them again, his face had hardened into the familiar Malfoy mask, but his eyes betrayed him—wild, almost frightened.
"We'll continue tomorrow," he said, his voice artificially steady now. "Or whenever. I don't care."
Before Hermione could respond, he was at the door, fumbling with the handle. It swung open with more force than necessary, banging against the wall.
"Malfoy, wait!" Hermione called after him, but he was already gone, his footsteps echoing down the corridor at a pace just short of running.
She rushed to the doorway, catching a glimpse of his black robes whipping around the corner at the end of the hall. The sound of his rapid footfalls faded, leaving only the ambient creaks and whispers of the ancient castle. Hermione stood there for a long moment, staring at the empty corridor. The scent of his expensive cologne lingered in the air, mixed with sweat.
"What was that about?" she whispered to herself, unconsciously rubbing her fingers where they had touched his.
Slowly returning to the study room, Hermione closed the door behind her, trying to make sense of Draco's bizarre behavior. One moment they were working together almost civilly, and the next he was fleeing as if pursued by Dementors.
"Ridiculous," she muttered, gathering her belongings. "Completely unstable."
As she began organizing the books they'd used, her eyes caught something tucked beneath the chair where Draco had been sitting. A leather-bound book, its spine cracked with age and use. It wasn't one of the references they'd pulled from the shelves. Malfoy must have dropped it when putting his stuff away. She bent over to retrieve it. The tome was heavier than it looked, bound in dark green leather that felt oddly warm to the touch. No title adorned its spine or cover, but intricate silver runic patterns were embossed along its edges, shimmering faintly in the dying light from the windows. The corners were reinforced with tarnished silver caps, each one engraved with a different symbol—a tree, a serpent, a chalice, and what looked like a twisted crown.
Hermione ran her fingers over the symbols, feeling a subtle vibration beneath her fingertips. This wasn’t a standard textbook. She placed it on the table and hesitated. Opening someone else's book without permission felt intrusive, but Malfoy had left in such a hurry... and something about the book called to her, like a whispered secret. She carefully opened the cover. The first page was blank except for a handwritten inscription in the top corner: Property of the Malfoy Collection. Removal from the Manor constitutes theft.
She should close it now and return it tomorrow. That would be the proper thing to do. Instead, she turned the pages until she found the only page that was bookmarked. The page was covered in dense, scholarly text, with diagrams sketched in the margins. Hermione's eyes widened as she realized what she was looking at.
The Vanishing Cabinet: Principles of Dimensional Transit
The text described how the cabinet created a temporary fold in space, connecting two distant points without traversing the physical distance between them. Unlike apparition or portkeys, the cabinet required no magical energy from its user—the magic was contained entirely within the paired cabinets themselves. A detailed diagram showed the magical architecture of the cabinets: intricate runes carved into the interior panels, overlapping in patterns that created a complex magical circuit. Notes beside the diagram explained how the cabinets maintained their connection across vast distances.
Why would he be researching this? She shut the book, a chill running down her spine. The only Vanishing Cabinet she knew of was the one Montague had gotten trapped in last year—the one in the Room of Requirement. But why would Malfoy be studying something like this? What possible use could he have for such information? She traced the silver embossing on the cover again, her mind racing. Why would Draco bring something like this to school? And why did he seem so... haunted?
A memory surfaced: Harry's obsessive theories about Malfoy being up to something. Her thought on the train that Draco had become a Death Eater over the summer. She'd dismissed it as paranoia, but now...
"No," she said aloud, shaking her head. "You're jumping to conclusions."
Still, she couldn't ignore the sick feeling in her stomach. She tucked the book into her bag, resolving to return it tomorrow—after she'd had a chance to think about what it meant.
Stay tuned for part 3!! Click HERE to view!
9 notes · View notes
rolandtowen · 3 months ago
Text
Tumblr media
oh - my - god - keep - me from going lunatic: chapter 12
Chapter Summary: Jason & Sam consider a brain injury diagnosis. Bucky discovers YouTube knitting tutorials.
Read on ao3 or under the cut!
Jason was supposed to be retired. He was supposed to be playing with his grandkids right now, watching his youngest on their newest swingset and keeping the older two from accidentally burning the house down. 
But when Sam Wilson called him up and told him that the Bucky Barnes needed a neurologist and deprogramming specialist, how could he say no? In his study, Jason pored over the Winter Soldier files, stopping frequently to remind himself to breathe, dammit. If Barnes had to live through this, he should be able to read it. 
What he saw in the Middle East was nowhere near what was described in these files. He wasn’t kidding when he told Sam a heads-up would’ve been nice. Really, he should have known it was gonna be awful. Makes having your medical convoy blown up by an IED sound like a picnic. 
The longest captivity he’d seen during the Gulf War was only six weeks. Barnes had been held for over sixty years. Some of that was cryostasis, but still, doing the math and adding up time outside of the cryo chamber gives Jason a number of roughly five years. And HYDRA only took him out of cryo freeze when they had to do something to him–five straight years of medical experimentation and programming and training. He probably didn’t see the sun from the time he’d been captured to the time of his first mission. 
The files don’t mention it, but Jason suspects that the abuse Barnes suffered at HYDRA wasn’t constrained to the “necessary” stuff needed to maintain a brainwashed POW. It never is. People who are willing to completely erase a human and leave behind a tool tend to be sadists. Barnes had been completely vulnerable for decades, suggestible and malleable, and–Jesus, Jason doesn’t want to think about it. He’s gonna have to trust Rebecca and her ability to guide Barnes through becoming a human again. His job is to understand the science behind the brainwashing and develop a way to break the trigger sequence. 
Fucking bleak. 
The Avengers had redacted the actual trigger words from the files, but Jason doesn't need them. The important bits are all there. The trigger sequence consists of ten words, which must be uttered in the same order. The trigger sequence often follows a "reset" from the Chair, but Jason notes several times in which handlers used the sequence without the application of electricity. He concludes that the two serve separate functions: the Chair selectively wipes memory and keeps the subject suggestible, while the trigger words induce obedience. 
The recent brain scans sent by Bruce offer some hope. There is evidence of neurogenesis, new cells filling the gaping voids in Barnes' white matter. The behavioral briefings he gets are promising too. Rebecca says Barnes has been able to challenge some of the programming left behind by HYDRA. He’s started expressing preferences, choosing how to spend the free time allotted in his schedule. He’s even begun giving intel to the team so they can wipe out what’s left of HYDRA. But Rebecca also notes that Barnes is still having a tough time with executive functioning and dissociating, nevermind the whole process of regaining his decades of lost memory and personality.  
Contrary to what pop psychology and true crime shows have led the public to believe, there’s no tried and true way to deprogram someone who’s experienced a high control environment, like a cult or captivity. Everyone’s trauma response is different. Some people fight. Some people flee. And it sounds like Barnes’ trauma responses are freezing and fawning. Withdrawing into himself and desperately, desperately trying to please the people around him that he views as superiors. He talked with Natasha a bit, tried to understand what it was like for her coming out of the Red Room and the KGB. There was indoctrination, certainly, but nothing on the same scale as the complete and total dehumanization Barnes suffered at HYDRA. The Widows were never made to doubt whether or not they were human. 
It’s not like there’s a whole lot of peer-reviewed studies Jason can reference about his best course of action here. For obvious reasons, there’s no randomized controlled trials on conditioning and dehumanization. Much of the original research and theorizing about brainwashing and conditioning is tainted by anti-Communist sentiment. What he does have is his education as a neurologist, his field experience with soldiers in Afghanistan, and a few accounts of recovery from prisoners of war in Vietnam. The experiences of American POWs in Vietnam would probably be the closest to Bucky’s experience, but the psychologists and neurologists who worked with those soldiers are long dead. 
Jason’s flying blind. And hoping he doesn’t crash and burn. 
He starts with the literature on brain injuries. There’s no doubt that Barnes’ brain is, indeed, injured. Most of the physical symptoms you would expect to see in a brain injury patient–headaches, dizziness, loss of coordination–appear to have been compensated for by the serum. Or, Jason notes, Barnes could just be very good at hiding his symptoms. Dammit. Fawning again. He makes a note to tell Sam and have them ask specifically about physical brain injury symptoms. HYDRA probably had Barnes on that cocktail of drugs to compensate for the physical deterioration that followed each reset. The cognitive symptoms, those are all present. Memory loss, executive dysfunction, difficulty sleeping, all that jazz. 
Barnes’ condition could best be described as an acquired brain injury. Traumatic brain injury, that’s the flashy stuff. The kind of injury that plagues American football players, where an outside force causes the brain to physically collide with the skull. But Barnes? Barnes had been repeatedly subjected to several hundred volts of electricity, aimed strategically at the temporal lobe, causing cell death and hemorrhage and lesions. For years. Until recently, doctors used to think that brain injury was something that was fleeting, temporary – that the brain could stabilize in a few years given the right therapies and support. But for people with severe brain injuries, or even a few successive concussions, brain injury can be a chronic, lifelong recovery. 
Jason’s never encountered cryo freeze before, but he can guess that, given the damage Barnes’ brain has been subjected to, even with serum enhancements, his brain is still pre-recovery. For every. Single. Reset. Healing factor inhibited by the cryofreeze. If they want to break that trigger sequence, they have to be able to address the damage done by the resets, even if it means Barnes looks like he’s regressing a bit. Jason glances at the clock. It’s late in Seattle, which means it’s definitely too early for a phone call. He’ll have to text instead. He dictates a message using voice-to-text. 
J: when you get the chance, can you do a brain injury screening on B? Worried he might be masking physical symptoms. 
S: It’s too early for this shit. 
J: It’s too late for this shit. 
S: But yes. Good catch. I’ll let you know what I find. 
***
Sam’s not entirely sure how he became an ex-assassin’s favorite regular human, but hey, he’ll take it. Maybe it’s his counseling training, or maybe it’s his immaculate vibes, but whatever. He’s just glad that Bucky has at least one friend who’s not also adjusting to the 21st century. Not that Steve has been doing a bad job or anything – quite the opposite – but Sam knows that Steve has his own baggage, enough to fill a damn cargo hold. Point is, Steve can’t do this by himself, though that sure would be a sight to watch him try.
After he returned from destroying the Siberian base, Sam has kept a close eye on Bucky, even beyond his scheduled visits. He just has this gut feeling that there’s something more, like the refeeding syndrome, something they’ve missed. So when Jason texts him in the middle of the night to ask him to do a proper brain injury screening on Bucky, it clicks. Of course, Bucky would be hiding any physical symptoms. But the breadcrumbs are all there. The trouble sleeping, the vomiting after a flashback, the problems with temperature regulation, the anxiety while standing still for the brain scans. True, most of that could be attributed to trauma, but still – Sam can’t really remember anyone asking Bucky outright if he was feeling pain or nausea or any physical symptoms after the refeeding scare. 
He prints out a worksheet. Bucky’s gotta be drowning in worksheets, but this one is important. 
When he goes for one of his afternoon visits, Bucky is watching something on the TV, enraptured. Sam has to do a double take, but it appears that the former Winter Soldier is watching YouTube tutorials on…knitting? 
Bucky looks up as Sam enters the living room, then gestures towards the TV. “I asked JARVIS what knitting was. He has been most helpful.”
Sam chuckles, taking a seat next to Bucky on the large couch. “What got you interested in knitting?”
“The doctor…Helen. She brought something called crochet to the movie night and it – it looked familiar, but not quite right.”
“Bucky asked me about activities similar to crochet and I have demonstrated numerous forms of fiber arts for him,” JARVIS interjects. “We have determined that knitting is likely the activity Bucky recalls.”
“Huh,” Sam ponders. “Do you know, are you remembering someone else knitting, or yourself knitting?” 
Bucky’s silent for several seconds, his lips pursed together, brow furrowed in thought. Sam gives him the time to think it through. “I think…I was knitting. Socks.” 
Now that’s interesting. Sam’s certain the memory is connected to the war effort, or maybe even the Great Depression, which means that Bucky’s recovered memories are reaching back further and further. “Would you like us to get you some knitting supplies?”
Again, Bucky pauses, his eyes trained on the TV where a woman explains how to use something called a ‘magic loop’. Finally, he says in a small voice: “I’d like that.”
Sam flounders for a moment, because while he’s overjoyed that Bucky has actively chosen a hobby to participate in, he doesn’t know the first thing about knitting supplies or where to buy it or – 
“Not to worry, Sergeant Wilson, I can order the items necessary to complete several beginner-friendly projects,” JARVIS announces. Sam breathes a sigh of relief. Thank God. He pulls out the worksheet he’d brought, torn between asking Bucky to walk through it or just letting the man watch knitting tutorials for the rest of the afternoon. Blessedly, Bucky notices the paper and looks up from the TV. 
“I am ready for a task,” he offers. Which sounds a lot better than ‘ready to comply’, but it still makes Sam squirm a little bit. So much of Bucky’s phrasing is still devoid of choice and autonomy. He’s ready for tasks, for work, for whatever, but very rarely does he express his wants still. Sam loses himself in his train of thought before looking up to find Bucky staring at him expectantly. 
“Right,” Sam says, shifting on the couch. “I actually don’t have a task for you today, more of…an assessment.” Bucky eyes him cautiously, and Sam continues. “Nothing physical, I just have some questions to ask, about how your body’s feeling at this moment. I’m asking these questions so that we can develop a more effective treatment plan, does that make sense?”
Bucky nods twice, and positions himself to face Sam. “I can answer.”
Sam looks down at the worksheet, then hesitates. God, it’s never this complicated with his VA clients, not even close. Some of them do offer resistance to being screened for certain diagnoses – the stigma around PTSD and brain injury is still alive and well in the military – but none of their situations are even close to as complicated as Bucky’s. “I want to emphasize that you can answer honestly,” Sam says slowly. “Nothing bad is gonna happen to you based on how you answer, and this isn’t a test. I’m just…gathering data. Do you understand?”
Bucky nods again, then says: “No punishment, I understand.”
Sam breathes a sigh of relief and finally looks down at the worksheet. “I have these statements, and I’d like you to indicate on a scale of 0 to 10 how applicable the statement is to you, okay?” Sam shifts so that Bucky can see the worksheet, with 0 labelled as ‘not at all’, 1-3 as ‘mild’, 4-7 as ‘moderate’, and 8-10 as ‘severe’. “So, right now, are you experiencing any pain in your head?”
Bucky nods, and points to the column marked ‘7’. They continue like that down the rows. 
Neck pain, 3. Bright lights, 8. Loud noises, 9. Dizziness, 5. Nausea, 7. Eyesight, 4. Clumsiness, 4. Once they reach the cognitive statements – it takes me longer to think, I forget things, I get confused easily, I have trouble concentrating – Bucky’s indicating in the ‘severe’ columns across the board. They reach the statement about getting angry or irritated quickly and Bucky hesitates, his finger hovering over the page and his eyes flitting between the paper and Sam. 
“It’s okay,” Sam assures him. “There’s no right or wrong answers.” 
Bucky indicates an 8, quickly qualifying it by saying “irritation. Just irritation.” The last few statements – I feel restless, I feel tired during the day, I find it hard to sleep at night – Bucky all scores as 9s. He watches nervously as Sam does some math in the margins of the page. Sam tries not to react, and it’s what he expected honestly. Bucky’s score strongly indicates brain injury, with a cognitive symptom cluster. He looks up at Bucky, who’s watching him expectantly. “Thank you,” Sam says with sincerity. “This is really helpful, Bucky. Is there anything else you want to share with me while I’m here?” 
Bucky shakes his head, and they sit in silence for several minutes, a knitting tutorial still playing on the TV on mute. After a while, he turns to look at Sam, his mouth opening and closing hesitantly. Sam doesn’t prompt him, lets the words come on their own. “Is…am I always going to feel like this?” Bucky asks quietly. “Am I ever going to get better?”
Sam’s heart breaks for him. How lonely it must be, to have no memory of who you are, to feel trapped inside your brain with programming yelling at you for having wants and needs. “I don’t know,” he says honestly. “But I think that you’re already showing progress, you know?”
Bucky shrugs. “I just – I don’t know what I’m good for.”
A lightbulb goes off in Sam’s brain. The team has been trying their darndest to give Bucky structure in the schedule, but he doesn’t really have structured goals. Just the nebulous idea of ‘get better’ and ‘heal’. But for Bucky, who’s been mission-oriented for several decades – and his entire life, if you believe Steve’s stories – being told to sit around and listen to music and color and try and regain his memories. The man needs a task, not just a one-off thing like learning how to make tea or take a shower. He needs something tangible he can work towards. Some visual progress. Cracking a smile, he turns slowly to look at Bucky and asks, “well, how would you feel about making me some socks?”
Bucky grins. 
11 notes · View notes
orcinusrequiensis · 9 months ago
Text
Kobolds: The First People to Fly
-Dr. Yigski Ot , Kobold Anthropologist
Throughout Terra's history, flight has been an extraordinarily crucial key to success. From the first birds and insects to fly, to the ancient dragon wars, and eventually the worldwide application of flight as primary transportation.
But among individuals, flight, specifically the ability to do so, has been seen in various different perspectives over time. Some saw flight as a source of pride, while others saw it as something that needs to be shunned, all of which have their own nuanced reasons.
Kobolds are known for many things on Terra, and much of it has become a source of pride, but flight in particular has always had a controversial stance. Flight itself has not come from one solid source among kobolds either.
From those born to fly, to those who make it themselves, kobolds have a long and winding history with the wind beneath their wings.
Birth by Flight
The first instance of kobold flight did not actually occur in any of the recognized sapient kobold species.
The first known flying kobolds are only known from the fossil record, where an ancient kobold relative, Dracodactylus iefretti sharing almost identical traits with the modern "common" kobold, aside from the lack of hands, being replaced by winged limbs.
Reconstructions of these fossils depict these ancient kobolds as arboreal creatures that rarely came in contact with the ground, instead sleeping in trees. This evidenced by the seemingly fragile body composition, even compared to kobolds, and the fossils' proximity to large fossilized tree remains.
Despite this adaptation, these kobolds did not survive long enough to make it to the modern day, and this is likely due to many factors. The aforementioned fragility likely made them severely vulnerable to predation. Fossil evidence also supports that these ancient kobolds were a prime target for large, extinct wyvern-class animals, such as Jogra's Foghunter; a large, gliding wyvern distantly related to the extant Highland Wyvern.
The lack of hands also meant reliable tool use was out of the question, and cranial scans suggest that these kobolds were not nearly as intelligent as known kobold ancestors. It is up to debate on whether or not these creatures were even a social species.
Glide of the Kobolds
Modern kobolds vary in flight in several different ways, which is paralleled by the wildlife in the environment around them. The only unmodified flying kobold species is the Jungle kobold, including all of its smaller subspecies, however the definition of flight in regards to these kobolds is loose.
Jungle kobolds are perfectly designed for their arboreal lifestyle in the southern jungles and rainforests of Terra. This flight is utilized to reach from tree to tree in the relatively dense jungle canopies.
They achieve this "flight" using their exaggerated cape of feathers which connects from their arms down to their back and tail. And because of the size of these "capes", it allows for the kobolds to use them as built-in gliding suits. This is, however, not flight, and is usually only considered as gliding. But some kobolds have maximized their usage of their feathers and arms, catching the wind just right, and using their arms to propel themselves up for longer. This takes rigorous training, and is incredibly resource intensive for kobolds, which have been adapted to a resource conservative lifestyle for as far back in the fossil record we can find.
So while this flight is very limited, and only occurs in specialized, trained kobolds, it is still considered flight.
Magicks: the Dragoning
The limitations of the mortal body have been challenged since the incorporation of magic into the lives of everyday people. Kobolds were the first to use magic to improve their harsh lifestyles, but humans were not far behind.
This only led to the competition of who can do what first increasing. Flight was no exception. While using magic to compete against gravity seems trivial by today's standards, for the time, flight magic was only in it's infantile stages.
Humans had a lot more resources, while kobolds had numbers. But what it really came down to was physique. And for once, the diminutive stature of kobolds came to their advantage.
In 2437 BD., an apprenticing kobold sorcerer by the name of Tyral Thornwig was experimenting in the courtyard of St. Gharel's School of Magick when the young kobold began drifting upwards into the sky. This was not the first time an apprentice of St. Gharel's found themselves floating away, but unlike those before her, apprentice Tyral found her way back to the ground by her own will. Through the manipulation of the air around her, the novice mage was able to lift herself off the ground and back down to it for a limited period. Her smaller size required less mana consumption, and a smaller risk of falling to her doom.
As rough and unpolished as it was, magical flight had been invented.
However impressive this was, and important going forward, it was heavily overshadowed by the dawn of the Age of Dragons in 2400 BD. a mere three and a half decades later.
True Dragons were the first sapient species that could definitively fly by their own means. And while it is true that their creation involved magical processes in the first place, their species was born to fly. Their hexapodal structure allowed them the inclusion of great, powerful wings without sacrificing fore or hind limbs.
And because of their original nature, docile and cooperative, True Dragons provided transportation that went unmatched, at least until modern day forms of travel. Most True Dragons were more than willing to provide safe transportation of humans, kobolds and cargo for long distances with little to no struggle, or seemingly any compensation in return.
And while the creation of True Dragons meant a lot for humans and kobolds alike, for kobolds, it meant the beginning of the draconic bloodline.
What's Left of the Dragons
However, as we all know, True Dragons are no longer around, at least in any capacity that they once were. After Dragon Fall, dragons were no longer the primary source of transportation, setting the world back by centuries of development.
What did persist, however, were Urds.
Urds, or urdism, is a magically originated mutation for kobolds, whereas the individual is born with an extra set of limbs that act as fully functional wings. Not only is this abnormal for a tetrapod animal, but these limbs are also the only synapsid limbs, or any sapient tetrapod limb that can be completely regrown after being removed from the body without magical intervention.
As expected, these kobolds were gifted with flight. But after Dragon Fall, Urdism was not seen in such a positive light. To many, it reminded of the horrible misdeeds of dragons, the memories of the destruction wrought upon their families, friends and ancestors. Some Urds were hunted for their mere existence, others for their valuable, abnormal wings, which were often sold in underground markets.
However, this unjustice upon innocent Urds woud not last forever. By 506 AD., discriminations against Urds as outlawed in all major provinces, and most minor. And while this did not make the world safe for Urds immediately, it was the start of greater change.
Today, Urds experience little to no discriminations in modern society, and remain the only people with natural-borne flying abilities.
Hot Oil and Gas
While Urds continued to exist, as well as the return of magical flight as a viable form of transportation, neither could match the results of the dragons.
By 530 AD., mechanical inventions began to take the world by storm, and flight once again became sought after. Kobolds were on the forefront of incredibly chaotic and often unregulated science. Many kobolds deserve to recognized for their contributions to the science of aviation. A few to mention would be:
Firewhyrl Tizto (546-561 AD): A kobold known for the invention of the hot air balloon. The invention came as a bit of an accident, as the original test was that of a parachute, but during one test, the parachute ended above an open flame, to which Tizto observed the rising properties of heat on the balloon. Weeks later, Tizto tested this again but with a basket and a controlled flame. The kobold was successful, but also failed to plan for what could have gone wrong. The weather conditions caused the balloon to veer very far off trajectory, causing the balloon to crash into a nearby mountain, catching fire. Tizto survived the crash, but died weeks later from their injuries.
"Crazy" Friyo (560-570 AD): A kobold with a short stature, short fuse, and short lifespan. Known by all to be profoundly ignorant and naïve, this kobold found himself in dangerous situations on the regular. However seemingly stupid he may have been, his extremes often broken barriers. His craziest, and final stunt involved him riding off of the edge of a cliff on a cycle with wings attached on both sides. The craziest part is that the cycle got decently far before the kobold plummeted to his demise. What exactly he was trying to prove is still a mystery. And despite how doomed he was from the beginning, he was remembered for his courage and creativity, no matter how foolish it may have been.
Goro & Pigie (572-??? AD): A pair of kobold inventors remembered as the "founders of modern aviation". These two were responsible for the invention of the first successful aircraft. Crafted by Goro (who happened to be an Urd), and piloted by Pigie, the aircraft took flight for the first time in 591 AD, and made several successful flights until 593 AD, when a separate pilot took the aircraft for a spin, causing it to crash. The original aircraft was only fit for a kobold, with the pitch and yaw controlled by the hands and arms of the pilot, and propelled by the legs, which attached to pedals. Said pedals could power propellers on either side of the wings. A later version of this aircraft would be larger, incorporated a half-manual, half-gas powered motor, and could fit multiple kobolds, or one average sized human, kat, or theropian. Goro & Pigie would make one final model, to which they used to fly across the Yandril's Strait. They were never seen again after this flight, and it is unknown if they truly made the flight, but kobolds claiming to be their descendants would share their stories several decades later.
Such inventions would be outclassed by the superior, more well-rounded designs born from the combined effort of humans and kobolds, but nonetheless proved their worth as important stepping stones in Terran's ever evolving aviation history.
The Modern Day
With modern day technology providing new forms of travel that outmatch even the dragons of old, the need for individual flight is far from necessary, and is seen more as a convenient commodity. Those who have it benefit from it, and those that don't, simply live life as is. In summary, flight has been ever evolving, with kobolds on the frontline with every step. As times continue to change, its no doubt that kobolds will continue to push the boundaries and challenge the definition of what it means to fly.
10 notes · View notes
pentesttestingcorp · 1 month ago
Text
Symfony Clickjacking Prevention Guide
Clickjacking is a deceptive technique where attackers trick users into clicking on hidden elements, potentially leading to unauthorized actions. As a Symfony developer, it's crucial to implement measures to prevent such vulnerabilities.
Tumblr media
🔍 Understanding Clickjacking
Clickjacking involves embedding a transparent iframe over a legitimate webpage, deceiving users into interacting with hidden content. This can lead to unauthorized actions, such as changing account settings or initiating transactions.
🛠️ Implementing X-Frame-Options in Symfony
The X-Frame-Options HTTP header is a primary defense against clickjacking. It controls whether a browser should be allowed to render a page in a <frame>, <iframe>, <embed>, or <object> tag.
Method 1: Using an Event Subscriber
Create an event subscriber to add the X-Frame-Options header to all responses:
// src/EventSubscriber/ClickjackingProtectionSubscriber.php namespace App\EventSubscriber; use Symfony\Component\EventDispatcher\EventSubscriberInterface; use Symfony\Component\HttpKernel\Event\ResponseEvent; use Symfony\Component\HttpKernel\KernelEvents; class ClickjackingProtectionSubscriber implements EventSubscriberInterface { public static function getSubscribedEvents() { return [ KernelEvents::RESPONSE => 'onKernelResponse', ]; } public function onKernelResponse(ResponseEvent $event) { $response = $event->getResponse(); $response->headers->set('X-Frame-Options', 'DENY'); } }
This approach ensures that all responses include the X-Frame-Options header, preventing the page from being embedded in frames or iframes.
Method 2: Using NelmioSecurityBundle
The NelmioSecurityBundle provides additional security features for Symfony applications, including clickjacking protection.
Install the bundle:
composer require nelmio/security-bundle
Configure the bundle in config/packages/nelmio_security.yaml:
nelmio_security: clickjacking: paths: '^/.*': DENY
This configuration adds the X-Frame-Options: DENY header to all responses, preventing the site from being embedded in frames or iframes.
🧪 Testing Your Application
To ensure your application is protected against clickjacking, use our Website Vulnerability Scanner. This tool scans your website for common vulnerabilities, including missing or misconfigured X-Frame-Options headers.
Tumblr media
Screenshot of the free tools webpage where you can access security assessment tools.
After scanning for a Website Security check, you'll receive a detailed report highlighting any security issues:
Tumblr media
An Example of a vulnerability assessment report generated with our free tool, providing insights into possible vulnerabilities.
🔒 Enhancing Security with Content Security Policy (CSP)
While X-Frame-Options is effective, modern browsers support the more flexible Content-Security-Policy (CSP) header, which provides granular control over framing.
Add the following header to your responses:
$response->headers->set('Content-Security-Policy', "frame-ancestors 'none';");
This directive prevents any domain from embedding your content, offering robust protection against clickjacking.
🧰 Additional Security Measures
CSRF Protection: Ensure that all forms include CSRF tokens to prevent cross-site request forgery attacks.
Regular Updates: Keep Symfony and all dependencies up to date to patch known vulnerabilities.
Security Audits: Conduct regular security audits to identify and address potential vulnerabilities.
📢 Explore More on Our Blog
For more insights into securing your Symfony applications, visit our Pentest Testing Blog. We cover a range of topics, including:
Preventing clickjacking in Laravel
Securing API endpoints
Mitigating SQL injection attacks
🛡️ Our Web Application Penetration Testing Services
Looking for a comprehensive security assessment? Our Web Application Penetration Testing Services offer:
Manual Testing: In-depth analysis by security experts.
Affordable Pricing: Services starting at $25/hr.
Detailed Reports: Actionable insights with remediation steps.
Contact us today for a free consultation and enhance your application's security posture.
3 notes · View notes
techit-rp · 5 months ago
Text
IoT Security Challenges in India: Protecting Smart Homes & Connected Devices
Tumblr media
IoT is transforming the way people live by making their homes smart with devices such as security cameras, smart locks, and voice assistants. In India, IoT technology is adopted at a pace that cyber threats are rising rapidly. With weak security protocols, outdated software, and unawareness, Indian households are vulnerable to cyberattacks. In this blog, we will explore the major IoT security challenges in India and how individuals can safeguard their smart homes and connected devices. If you are looking to strengthen your understanding of cybersecurity, enrolling in a cyber security course can be a game-changer.
The IoT Boom in India
India is witnessing the highest adoption of IoT across homes and businesses. From smart TVs to intelligent thermostats, IoT is revolutionizing life. This booming technology, however, offers a large target size for hackers too who exploit the vulnerability of devices to gain unauthorized access to data.
Fundamental Drivers of IoT Adoption in India:
Increased internet penetration with low-priced data plans
Government initiatives such as Smart Cities Mission and Digital India
Increasing adoption of smart home devices as they become increasingly affordable
Growing application of industrial IoT in health, agriculture, and manufacturing
Chief IoT Security Challenges in India
Poor Authentication & Default Passwords
Most IoT devices have a factory-set password that the user ignores or fails to change. Hackers exploit these default credentials to take over the devices, entry private networks, and crack sensitive information.
Lack of Security Updates & Patches
Most smart devices have limited or no firmware updates, which makes them vulnerable to cyber threats. Many Indian consumers do not check for security updates, leaving their devices susceptible to known exploits.
Data Privacy Concerns
Smart devices collect vast amounts of personal data, from voice recordings to daily routines. Without stringent data protection policies, this information can be misused or leaked by malicious actors.
Botnet Attacks & DDoS Threats
Cybercriminals hijack unprotected IoT devices to form botnets, which are used to launch massive Distributed Denial of Service (DDoS) attacks. These attacks can cripple networks and cause disruptions to online services.
Unsecured Wi-Fi Networks
Many Indian households rely on poorly secured Wi-Fi connections, providing an easy entry point for hackers. Without encryption or strong passwords, attackers can intercept sensitive information and compromise connected devices.
Absence of Specific Cybersecurity Legislation for IoT
India has advanced in data protection with the Digital Personal Data Protection Act, but there is no dedicated IoT security framework. The absence of it leaves the manufacturer to choose cost over security and sell devices which are not so well protected in the market.
How to Secure Smart Homes & Connected Devices
Change Default Credentials
Always change the default usernames and passwords of the IoT after installation. Use strong, unique passwords and implement multi-factor authentication wherever possible.
Update Firmware Periodically
Scan for software and security updates on all smart devices, and install them as soon as they are available. In case your device can no longer get any updates, consider replacing it with a newer version that is at least as secure.
Secure Your Wi-Fi Network
Use a robust Wi-Fi password, and make sure WPA3 encryption is turned on. Limit remote access to your router, and make an IoT-specific network so that those devices can't contaminate your primary network.
Firewall & Security Solutions The use of firewalls and network security solutions monitors traffic and can block malicious activity on IoT networks. 5. Limit Data Sharing & Permissions
Assess permission for smart appliances and reduce or limit the devices from accessing unsecured personal information. De-activate unused add-ons, remote access in devices.
Cyber Security Courses
IoT-based cyber-attacks are minimized if awareness against the threat builds. To boost that awareness further, take time out to become a certified graduate of cyber security by signing for courses in areas like best security practices, principles of ethical hacking, and defending digital systems.
Road Ahead to Improving Indian IoT Security:
The Indian government, device manufacturers, and consumers must take proactive steps to mitigate IoT security risks. Stronger security standards, public awareness, and robust cybersecurity laws are the need of the hour to secure the future of IoT in India.
Conclusion
IoT devices offer incredible convenience but also introduce significant security risks. Protecting smart homes and connected devices requires a combination of best practices, awareness, and robust cybersecurity measures. By staying informed and adopting the right security strategies, individuals can ensure a safer IoT experience.
If you’re passionate about cybersecurity and want to build expertise in protecting digital systems, consider taking a cyber security course to gain hands-on knowledge and skills in ethical hacking, network security, and data protection.
3 notes · View notes
blacklocksecuritynz · 8 months ago
Text
Application Vulnerability Scanning
Blacklock Security offers comprehensive application vulnerability scanning services designed to safeguard your digital assets. Their advanced scanning technology meticulously examines web applications, infrastructure, and API endpoints, identifying potential vulnerabilities that could be exploited by malicious actors. By leveraging a multi-tool approach, Blacklock ensures thorough coverage of your security landscape.Whether you require on-demand, scheduled, or integrated vulnerability assessments, Blacklock's flexible solutions cater to your specific needs. In addition to vulnerability scanning, they provide expert penetration testing and static code analysis services to fortify your overall security posture.
0 notes
cloaksandcapes · 1 year ago
Text
Tumblr media
We take inspiration, and requests for just about any item. Would you like to take a guess at what inspired this one?
Essence Analyzer
Wondrous Item, rare
“This scouter helps to identify the strengths, weaknesses, and location of its targets. Worn over the eye, it has a band over one ear with a glass lens in front. Can confirm whether power levels are over 9000.”
While wearing this magic item you have advantage on Wisdom (Insight) checks when determining if a creature is being truthful. You also have advantage on Wisdom (Perception) that rely on sight for locating creatures.
You can use a bonus action to scan a creature with this magic item to reveal details on their combat prowess. When you scan a creature they must make a DC 15 Charisma saving throw. On a failed save you ascertain one of the following details: the challenge rating or level of a creature when applicable, its immunities, vulnerabilities or resistances. If you have successfully scanned a target, you can freely cast the locate creature spell on them for the next 24 hours.
Join us on Twitch every Mon\Wed\Fri to create new Homebrews and check out our Patreon for 500+ magic items, tokens, maps, and more.
14 notes · View notes
raytaylorpro · 6 months ago
Text
5 Ways to Improve Your Network Security
In today’s digital age, network security is more critical than ever. With cyberattacks becoming more sophisticated and frequent, businesses and individuals alike must take proactive steps to protect their networks. Whether you’re a small business owner or a tech-savvy professional, improving your network security can help safeguard sensitive data, prevent downtime, and maintain trust. Here are five actionable tips to enhance your network’s defenses.
1. Use Strong, Unique Passwords
Weak or reused passwords are among the most common vulnerabilities in network security. To protect your network:
Create strong passwords that include a mix of uppercase and lowercase letters, numbers, and special characters.
Avoid using easily guessed information, such as birthdays or common words like "password123."
Use a password manager to generate and securely store complex passwords for all your accounts.
Implement multi-factor authentication (MFA) for an extra layer of security. MFA requires users to verify their identity through a second method, such as a text message code or biometric scan.
2. Keep Your Software Up-to-Date
Outdated software is a goldmine for hackers who exploit known vulnerabilities. Regular updates ensure you’re protected with the latest security patches.
Update your operating system, applications, and firmware regularly.
Enable automatic updates to ensure critical patches are installed promptly.
Replace unsupported or obsolete hardware and software with newer, more secure alternatives.
3. Secure Your Wi-Fi Network
Your Wi-Fi network is a primary gateway for potential attacks. Securing it is essential:
Change the default administrator username and password for your router.
Use WPA3 encryption (or at least WPA2) to secure your wireless connection.
Hide your network's SSID (Service Set Identifier) so it’s not visible to unauthorized users.
Set up a guest network for visitors, keeping them isolated from your primary network.
4. Install and Update Security Software
Comprehensive security software is your first line of defense against malicious activity.
Use antivirus and anti-malware programs to detect and remove threats.
Install a firewall to monitor and block unauthorized access to your network.
Invest in a Unified Threat Management (UTM) system, which combines multiple security features like intrusion detection, content filtering, and VPN support.
Keep all security software updated to stay protected from the latest threats.
5. Educate and Train Users
Even the most robust security measures can fail if users are unaware of best practices.
Train your team to recognize phishing emails, suspicious links, and social engineering tactics.
Encourage employees to report unusual activity immediately.
Establish a network security policy that outlines acceptable use, password protocols, and steps for reporting incidents.
Conduct regular cybersecurity awareness sessions to keep users informed about emerging threats.
Bonus Tip: Monitor Your Network Activity
Proactively monitoring your network can help you detect potential issues before they become critical. Use tools to track unusual traffic, failed login attempts, and other red flags.
Conclusion
Improving your network security doesn’t have to be overwhelming. By implementing these five steps, you can significantly reduce your risk of cyberattacks and create a safer environment for your business or personal network. Remember, cybersecurity is an ongoing process—stay vigilant, keep learning, and adapt to new threats as they arise.
Have questions or need help securing your network? Contact us today for expert IT solutions tailored to your needs!
4 notes · View notes
shalu620 · 3 months ago
Text
Why Python Will Thrive: Future Trends and Applications
Python has already made a significant impact in the tech world, and its trajectory for the future is even more promising. From its simplicity and versatility to its widespread use in cutting-edge technologies, Python is expected to continue thriving in the coming years. Considering the kind support of Python Course in Chennai Whatever your level of experience or reason for switching from another programming language, learning Python gets much more fun.
Tumblr media
Let's explore why Python will remain at the forefront of software development and what trends and applications will contribute to its ongoing dominance.
1. Artificial Intelligence and Machine Learning
Python is already the go-to language for AI and machine learning, and its role in these fields is set to expand further. With powerful libraries such as TensorFlow, PyTorch, and Scikit-learn, Python simplifies the development of machine learning models and artificial intelligence applications. As more industries integrate AI for automation, personalization, and predictive analytics, Python will remain a core language for developing intelligent systems.
2. Data Science and Big Data
Data science is one of the most significant areas where Python has excelled. Libraries like Pandas, NumPy, and Matplotlib make data manipulation and visualization simple and efficient. As companies and organizations continue to generate and analyze vast amounts of data, Python’s ability to process, clean, and visualize big data will only become more critical. Additionally, Python’s compatibility with big data platforms like Hadoop and Apache Spark ensures that it will remain a major player in data-driven decision-making.
3. Web Development
Python’s role in web development is growing thanks to frameworks like Django and Flask, which provide robust, scalable, and secure solutions for building web applications. With the increasing demand for interactive websites and APIs, Python is well-positioned to continue serving as a top language for backend development. Its integration with cloud computing platforms will also fuel its growth in building modern web applications that scale efficiently.
4. Automation and Scripting
Automation is another area where Python excels. Developers use Python to automate tasks ranging from system administration to testing and deployment. With the rise of DevOps practices and the growing demand for workflow automation, Python’s role in streamlining repetitive processes will continue to grow. Businesses across industries will rely on Python to boost productivity, reduce errors, and optimize performance. With the aid of Best Online Training & Placement Programs, which offer comprehensive training and job placement support to anyone looking to develop their talents, it’s easier to learn this tool and advance your career.
Tumblr media
5. Cybersecurity and Ethical Hacking
With cyber threats becoming increasingly sophisticated, cybersecurity is a critical concern for businesses worldwide. Python is widely used for penetration testing, vulnerability scanning, and threat detection due to its simplicity and effectiveness. Libraries like Scapy and PyCrypto make Python an excellent choice for ethical hacking and security professionals. As the need for robust cybersecurity measures increases, Python’s role in safeguarding digital assets will continue to thrive.
6. Internet of Things (IoT)
Python’s compatibility with microcontrollers and embedded systems makes it a strong contender in the growing field of IoT. Frameworks like MicroPython and CircuitPython enable developers to build IoT applications efficiently, whether for home automation, smart cities, or industrial systems. As the number of connected devices continues to rise, Python will remain a dominant language for creating scalable and reliable IoT solutions.
7. Cloud Computing and Serverless Architectures
The rise of cloud computing and serverless architectures has created new opportunities for Python. Cloud platforms like AWS, Google Cloud, and Microsoft Azure all support Python, allowing developers to build scalable and cost-efficient applications. With its flexibility and integration capabilities, Python is perfectly suited for developing cloud-based applications, serverless functions, and microservices.
8. Gaming and Virtual Reality
Python has long been used in game development, with libraries such as Pygame offering simple tools to create 2D games. However, as gaming and virtual reality (VR) technologies evolve, Python’s role in developing immersive experiences will grow. The language’s ease of use and integration with game engines will make it a popular choice for building gaming platforms, VR applications, and simulations.
9. Expanding Job Market
As Python’s applications continue to grow, so does the demand for Python developers. From startups to tech giants like Google, Facebook, and Amazon, companies across industries are seeking professionals who are proficient in Python. The increasing adoption of Python in various fields, including data science, AI, cybersecurity, and cloud computing, ensures a thriving job market for Python developers in the future.
10. Constant Evolution and Community Support
Python’s open-source nature means that it’s constantly evolving with new libraries, frameworks, and features. Its vibrant community of developers contributes to its growth and ensures that Python stays relevant to emerging trends and technologies. Whether it’s a new tool for AI or a breakthrough in web development, Python’s community is always working to improve the language and make it more efficient for developers.
Conclusion
Python’s future is bright, with its presence continuing to grow in AI, data science, automation, web development, and beyond. As industries become increasingly data-driven, automated, and connected, Python’s simplicity, versatility, and strong community support make it an ideal choice for developers. Whether you are a beginner looking to start your coding journey or a seasoned professional exploring new career opportunities, learning Python offers long-term benefits in a rapidly evolving tech landscape.
2 notes · View notes
oss-security · 6 months ago
Text
 OSS Security, Myth, or Major Concern?
Open Source Software (OSS) is inside some of the most essential companies and applications for society worldwide. However, a persistent stigma around OSS security continues to hinder both innovation and widespread adoption. When it came to asking people what their main concern about OSS is, 53% said security.
Many people become worried when they see that the code base is open to anyone or that it could be unmaintained or written by people with bad coding habits. There is also concern that companies may neglect to track updates to the source code, leaving them with outdated versions that pose security risks. But are these concerns truly valid? And if so, does that necessarily make proprietary software safer than OSS? Let's look a little deeper into some of the main security concerns in OSS and then look at why OSS may be a lot safer than people think.
One of the main reasons people feel that OSS is unsafe is because the code base is not proprietary, meaning that anyone can look at all of the code that makes up the application. This worries people because if attackers can look at the code of an application, they believe that it would be very easy to find its vulnerabilities. Another reason people are often worried about the security of OSS is whether or not the code is maintained. Although rare, people fear that the contributors to the software they are using will either stop maintaining certain parts of their software or leave the project entirely. Another worry is that even if the code is being maintained, the company using the software might not update to the latest versions that are being put out. 
Outdated software, whether it is from the contributors not maintaining their software, or the company not acquiring the new updates, can lead to significant security risks. When a new update of software comes out companies will often publicly post the bugs and issues they fixed, which is informing all attackers what was wrong with the older versions. Some people also believe that those contributing to OSS are often immature and have bad developer practices. If the contributors were to have bad coding habits they could cause a lot of vulnerabilities such as hardcoding credentials or improper error handling. 
While these concerns hold some validity, discussions around OSS security often overlook that many of these risks also apply to proprietary software. Let's start with some security risks that don’t apply to proprietary software. An open code base is something unique to OSS, however, I believe that this aspect of OSS benefits its level of security more than it compromises it. 
There is a law called Linus’s Law named after Linus Torvalds (The creator of Linux) that says “Many eyes make any bug shallow”. This law refers to the thought that with enough contributors and coding enthusiasts looking at your code, a small amount of them might try and exploit the vulnerabilities they find, but the majority will alert the developers or fix it themselves. I believe in this law and that with many eyes looking at a codebase, vulnerabilities are more likely to be found but also addressed and remediated quickly. 
Another concern of those who feel that OSS is unsafe fear that companies may not keep up to date with the source code updates. Although this is a valid concern, it is not an issue with OSS, it is a problem with a company's internal processes. This should not be listed as a security concern of OSS because it is up to the individual to regularly update the newest software that is available.
All of these reasons for OSS being unsafe or safe can be debated and argued about, but physical data is much harder to ignore. The Coverity Scan Open Source Report is an annual report that analyzes the quality and security of OSS. This report states that the average OSS is of a higher quality than proprietary software. This data not only proves that contributors to OSS do not have bad coding habits, but it also proves that OSS, even though not perfect, is of a higher standard when it comes to security than proprietary software.
I believe the stigma that OSS is unsafe has limited the level of innovation and progress society has made in all realms of software. Who knows how many beneficial pieces of software could’ve been created if it weren't for this stigma, and how that software would affect the world?
The misconception that OSS is inherently unsafe has discouraged its adoption in many sectors, which limits opportunities for societal progress. This hesitancy has most likely curbed the development of groundbreaking solutions in areas like healthcare, education, and environmental sustainability, where open-source innovation could provide affordable and scalable tools for global challenges.
Addressing these misconceptions opens the door to greater innovation, allowing open-source communities to create secure, high-quality software that meets society's evolving needs.
3 notes · View notes
60seccyberbrief · 7 months ago
Text
Burp Suite
This week I wanted to cover a powerful tool that assists in web application security. Burp Suite is a well-known tool developed by PortSwigger. Burp Suite is an integrated platform used to test web application security by using a variety of different features it provides.  One of these features Burp Suite has is an intercepting proxy that allows you to inspect and modify traffic between the browser and the server at each step. Scanner allows you to automatically detect certain vulnerabilities like SQL injection and cross-site scripting. Intruder automates custom attacks to test certain security parameters, generally passwords. Repeater allows for manual modification and replaying of edited requests for more in-depth testing.
All in all Burp Suite provides a simplified way and process for identifying and discovering vulnerabilities. It has a very user-friendly interface that assists in applying all the different features and makes it easy to learn. It also allows for user consummation that allows users to create custom rules and integrate third-party extensions. It is one of the most renowned tools in cyber security and brings an active and engaging community along with it. Burp Suite I is something I highly recommend to those striving to develop their cyber security skills to get their hands on. Not only will you become more proficient in the tool itself, but it will also teach you about how web applications and servers work.
Source:
2 notes · View notes