⤷ Title: Information Gathering’s Assessment
════════════════════════
𐀪 Author: db1M
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:21:22 GMT
════════════════════════
⌗ Tags: #penetration_testing #reconnaissance #web_penetration_testing
════════════════════════
𐀪 Author: db1M
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 18:21:22 GMT
════════════════════════
⌗ Tags: #penetration_testing #reconnaissance #web_penetration_testing
Medium
Information Gathering’s Assessment
Hello everyone I’m Mohanad Edrees (db1M), a self-taught penetration tester and CTF player. In this article, I’ll share my approach to…
⤷ Title: # Stop Wasting Hours Setting Up Your Parrot OS — Here’s an Open Source Tool That Does It in Minutes
════════════════════════
𐀪 Author: Zahradeen Muazu
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:35:40 GMT
════════════════════════
⌗ Tags: #shell_noscript #linux #parrotos #programming #ethical_hacking
════════════════════════
𐀪 Author: Zahradeen Muazu
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 19:35:40 GMT
════════════════════════
⌗ Tags: #shell_noscript #linux #parrotos #programming #ethical_hacking
Medium
# Stop Wasting Hours Setting Up Your Parrot OS — Here’s an Open Source Tool That Does It in Minutes
*A comprehensive toolkit for pentesting professionals tired of manual tool installation*
⤷ Title: This Bug Bounty Recon is much PEAKKK!!!!!!
════════════════════════
𐀪 Author: Alham Rizvi(ExoidSec)
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:07:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #hacking #bug_hunting #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Alham Rizvi(ExoidSec)
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:07:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #hacking #bug_hunting #bug_bounty #cybersecurity
Medium
This Bug Bounty Recon is so much PEAKKK!!!!!!
This Bug Bounty Recon is so much PEAKKK!!!!!! In this blog, I’ll walk you through a practical, real‑world bug bounty reconnaissance workflow used by active hunters. Recon is the foundation of …
⤷ Title: Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure
════════════════════════
𐀪 Author: Red Asgard
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 21:01:33 GMT
════════════════════════
⌗ Tags: #malware_analysis #north_korea #threat_intelligence #hacking #cybersecurity
════════════════════════
𐀪 Author: Red Asgard
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 21:01:33 GMT
════════════════════════
⌗ Tags: #malware_analysis #north_korea #threat_intelligence #hacking #cybersecurity
Medium
Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure
We found North Korean malware in an Upwork project. Then we spent five days mapping their infrastructure.
⤷ Title: Why Telecommunications Companies Are Primary Targets for State-Sponsored Hackers
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:18:26 GMT
════════════════════════
⌗ Tags: #hacking #telecommunication #critical_infrastructure #cybersecurity #cybercrime
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:18:26 GMT
════════════════════════
⌗ Tags: #hacking #telecommunication #critical_infrastructure #cybersecurity #cybercrime
Medium
Why Telecommunications Companies Are Primary Targets for State-Sponsored Hackers
Why Telecommunications Companies Are Primary Targets for State-Sponsored Hackers Telecommunications companies have emerged as the most critical targets for state-sponsored cyber operations, not …
⤷ Title: Your IDE Might Betray You Before You Run Anything
════════════════════════
𐀪 Author: Ryan W
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:52:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #android_app_development #android_developers #software_engineering #infosec
════════════════════════
𐀪 Author: Ryan W
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:52:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #android_app_development #android_developers #software_engineering #infosec
Medium
Your IDE Might Betray You Before You Run Anything
A real-world VS Code security incident, and why Android developers aren’t safe either
⤷ Title: 0day-CTF
════════════════════════
𐀪 Author: guyvolvo
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 21:19:39 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf_writeup #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: guyvolvo
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 21:19:39 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf_writeup #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
Medium
0day-CTF
scope : ip-address- 10.66.136.3 connected via openvpn
⤷ Title: Siber Güvenlikte Teknik Yeterlilik Kadar Önemli Bir Kavram: Etik
════════════════════════
𐀪 Author: Ahmet EVREN
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 21:57:01 GMT
════════════════════════
⌗ Tags: #ransomware #ethical_hacking #infosec #data_privacy
════════════════════════
𐀪 Author: Ahmet EVREN
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 21:57:01 GMT
════════════════════════
⌗ Tags: #ransomware #ethical_hacking #infosec #data_privacy
Medium
Siber Güvenlikte Teknik Yeterlilik Kadar Önemli Bir Kavram: Etik
Dijitalleşme modern hayatı daha verimli ve interaktif hale getirirken, siber sistemlere olan bağımlılığımız dünyayı hiç olmadığı kadar…
⤷ Title: Day 4: Users and Privileges in Linux
════════════════════════
𐀪 Author: Mohammad-AL-Momani
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:33:36 GMT
════════════════════════
⌗ Tags: #self_improvement #cybersecurity #money #ethical_hacking
════════════════════════
𐀪 Author: Mohammad-AL-Momani
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 20:33:36 GMT
════════════════════════
⌗ Tags: #self_improvement #cybersecurity #money #ethical_hacking
Medium
Day 4: Users and Privileges in Linux
Users and Privileges in Linux
⤷ Title: Russian BlueDelta (Fancy Bear) Uses PDFs to Steal Logins in Just 2 Seconds
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 22:14:03 +0000
════════════════════════
⌗ Tags: #Security #BlueDelta #Cyber Attack #Cybersecurity #europe #Fancy Bear #Iran #Israel #Malware #Russia #Turkiye
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 22:14:03 +0000
════════════════════════
⌗ Tags: #Security #BlueDelta #Cyber Attack #Cybersecurity #europe #Fancy Bear #Iran #Israel #Malware #Russia #Turkiye
Hackread
Russian BlueDelta (Fancy Bear) Uses PDFs to Steal Logins in Just 2 Seconds
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Dig Dug TryHackMe Write UP
════════════════════════
𐀪 Author: cat0x01
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 22:17:22 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #pentesting #ctf #tryhackme
════════════════════════
𐀪 Author: cat0x01
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 22:17:22 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #pentesting #ctf #tryhackme
Medium
Dig Dug TryHackMe Write UP
Overview
⤷ Title: Reminder: Your Medium Folder Names Are Visible to Authors
════════════════════════
𐀪 Author: Berend Watchus
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 23:02:53 GMT
════════════════════════
⌗ Tags: #infosec #opsec #cyber_security_awareness #osint #osint_investigation
════════════════════════
𐀪 Author: Berend Watchus
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 23:02:53 GMT
════════════════════════
⌗ Tags: #infosec #opsec #cyber_security_awareness #osint #osint_investigation
Medium
Reminder: Your Medium Folder Names Are Visible to Authors
Author: Berend Watchus [Publication for: OSINT Team, online magazine]
⤷ Title: Tryhackme “Lazy Admin” Writeup
════════════════════════
𐀪 Author: sabR
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 23:56:35 GMT
════════════════════════
⌗ Tags: #penetration_testing #tryhackme #tryhackme_walkthrough #cybersecurity #red_team
════════════════════════
𐀪 Author: sabR
════════════════════════
ⴵ Time: Mon, 12 Jan 2026 23:56:35 GMT
════════════════════════
⌗ Tags: #penetration_testing #tryhackme #tryhackme_walkthrough #cybersecurity #red_team
Medium
Tryhackme “Lazy Admin” Writeup
Step 1 (Recon)
⤷ Title: Angular Security Alert: High-Severity SVG Flaw CVE-2026-22610 Exposes Apps to XSS
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:59:12 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Angular #CVE_2026_22610 #Front_end Development #javanoscript #Patch Alert #SVG Vulnerability #Web Security #XSS (Cross_Site Scripting)
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:59:12 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Angular #CVE_2026_22610 #Front_end Development #javanoscript #Patch Alert #SVG Vulnerability #Web Security #XSS (Cross_Site Scripting)
Daily CyberSecurity
Angular Security Alert: High-Severity SVG Flaw CVE-2026-22610 Exposes Apps to XSS
Angular CVE-2026-22610 (CVSS 8.5) allows XSS via SVG noscript attributes. Update to v21.0.7 or v20.3.16 immediately to secure your apps.
⤷ Title: “TryCloudflare” Abuse: AsyncRAT Exploits Free Tunnels to Build Stealthy WebDAV Network
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:52:42 +0000
════════════════════════
⌗ Tags: #Malware #AsyncRAT #cloudflare #Malware Analysis #phishing #Python Injection #Trend Micro #TryCloudflare #WebDAV
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:52:42 +0000
════════════════════════
⌗ Tags: #Malware #AsyncRAT #cloudflare #Malware Analysis #phishing #Python Injection #Trend Micro #TryCloudflare #WebDAV
Daily CyberSecurity
"TryCloudflare" Abuse: AsyncRAT Exploits Free Tunnels to Build Stealthy WebDAV Network
New AsyncRAT campaign abuses free Cloudflare tunnels for stealthy malware delivery. Learn how phishing emails lead to WebDAV attacks & Python injection.
⤷ Title: The AI Alliance: Apple Taps Google Gemini to Power the New Siri
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:43:13 +0000
════════════════════════
⌗ Tags: #Technology #Apple #Apple Intelligence #Gemini #Generative AI #google #iOS 26 #Private Cloud Compute #Siri #Sundar Pichai #Tim Cook #WWDC 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:43:13 +0000
════════════════════════
⌗ Tags: #Technology #Apple #Apple Intelligence #Gemini #Generative AI #google #iOS 26 #Private Cloud Compute #Siri #Sundar Pichai #Tim Cook #WWDC 2026
Daily CyberSecurity
The AI Alliance: Apple Taps Google Gemini to Power the New Siri
It’s official: Apple will use Google Gemini to power its next-gen Siri and AI features in 2026, combining Google's models with Apple's privacy.
⤷ Title: India’s Source Code Demand Sparks Tech Revolt
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:40:28 +0000
════════════════════════
⌗ Tags: #Technology #android #Apple #Cybersecurity 2026 #India #ios #MAIT #Make in India #MeitY #Narendra Modi #samsung #Smartphone Security #source code #Tech Policy
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:40:28 +0000
════════════════════════
⌗ Tags: #Technology #android #Apple #Cybersecurity 2026 #India #ios #MAIT #Make in India #MeitY #Narendra Modi #samsung #Smartphone Security #source code #Tech Policy
Daily CyberSecurity
India’s Source Code Demand Sparks Tech Revolt
India faces a revolt from Apple and Samsung over a 2026 proposal to mandate source code disclosure for security audits, sparking a major IP standoff.
⤷ Title: Cutting the Cord: QEMU 11.0 to Expunge 32-Bit Host Support in Cloud Variant
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:10 +0000
════════════════════════
⌗ Tags: #Linux #32_bit Deprecation #Cloud Computing #open_source #QEMU #QEMU 11.0 #Server Management #TCG #Tech News 2026 #virtualization
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:10 +0000
════════════════════════
⌗ Tags: #Linux #32_bit Deprecation #Cloud Computing #open_source #QEMU #QEMU 11.0 #Server Management #TCG #Tech News 2026 #virtualization
Daily CyberSecurity
Cutting the Cord: QEMU 11.0 to Expunge 32-Bit Host Support in Cloud Variant
QEMU 11.0 Cloud is set to drop 32-bit host support, removing 7,000+ lines of legacy code to boost efficiency and security in cloud environments.
⤷ Title: Double Critical: Hardcoded Secrets Expose Ruckus IoT Controllers to Root RCE
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:16:03 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2025_69425 #CVE_2025_69426 #Docker escape #hardcoded credentials #IoT security #Root Privilege Escalation #Ruckus Networks #vRIoT Controller
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:16:03 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2025_69425 #CVE_2025_69426 #Docker escape #hardcoded credentials #IoT security #Root Privilege Escalation #Ruckus Networks #vRIoT Controller
Daily CyberSecurity
Double Critical: Hardcoded Secrets Expose Ruckus IoT Controllers to Root RCE
Two CVSS 10 flaws (CVE-2025-69425 & CVE-2025-69426) hit Ruckus vRIoT. Hardcoded secrets allow attackers to seize root access. Update to v3.0.0.0 now.
⤷ Title: CVE-2025-52694 (CVSS 10): Critical Advantech SQL Injection Exposes IoT Devices
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Advantech #Critical Vulnerability #CSA Singapore #CVE_2025_52694 #Industrial IoT #IoTSuite #SCADA Security #sql injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Advantech #Critical Vulnerability #CSA Singapore #CVE_2025_52694 #Industrial IoT #IoTSuite #SCADA Security #sql injection
Daily CyberSecurity
CVE-2025-52694 (CVSS 10): Critical Advantech SQL Injection Exposes IoT Devices
Critical Advantech flaw CVE-2025-52694 (CVSS 10.0) allows remote SQL injection. Unauthenticated attackers can seize control. Update IoTSuite now.
⤷ Title: Critical Alert: Moxa Switches Exposed to OpenSSH Remote Code Execution (CVSS 9.8)
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:07:14 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2023_38408 #ICS security #Industrial Ethernet Switches #Moxa #Network Infrastructure #OpenSSH #Remote Code Execution #SCADA Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:07:14 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2023_38408 #ICS security #Industrial Ethernet Switches #Moxa #Network Infrastructure #OpenSSH #Remote Code Execution #SCADA Security
Daily CyberSecurity
Critical Alert: Moxa Switches Exposed to OpenSSH Remote Code Execution (CVSS 9.8)
Critical OpenSSH flaw (CVE-2023-38408) hits Moxa EDS & RKS switches. CVSS 9.8. Remote attackers can execute code. Contact support for patches now.