⤷ Title: Breaking Trust at the Core: Kerberos Authentication Flow and Common Roasting Attacks
════════════════════════
𐀪 Author: Eray Yavuz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:47 GMT
════════════════════════
⌗ Tags: #offensive_security #pentesting #cybersecurity #red_team #infosec
════════════════════════
𐀪 Author: Eray Yavuz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:12:47 GMT
════════════════════════
⌗ Tags: #offensive_security #pentesting #cybersecurity #red_team #infosec
Medium
Breaking Trust at the Core: Kerberos Authentication Flow and Common Roasting Attacks
Introduction
⤷ Title: WSUS over HTTPS? Still Secure? Think Again…
════════════════════════
𐀪 Author: Mohammed ElKhateb
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:20:35 GMT
════════════════════════
⌗ Tags: #penetration_testing #red_team #cybersecurity #windows_security #active_directory
════════════════════════
𐀪 Author: Mohammed ElKhateb
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:20:35 GMT
════════════════════════
⌗ Tags: #penetration_testing #red_team #cybersecurity #windows_security #active_directory
Medium
🔐 WSUS over HTTPS? Still Secure? Think Again…
From Domain User to Full Domain Control via AD CS ESC1 & WSUS MITM Attack (Even Over HTTPS!)
⤷ Title: Atomic Bird Goes Purple #1 notes — TryHackMe
════════════════════════
𐀪 Author: Jose Praveen
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:57 GMT
════════════════════════
⌗ Tags: #tryhackme #powershell #purple_team
════════════════════════
𐀪 Author: Jose Praveen
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 01:36:57 GMT
════════════════════════
⌗ Tags: #tryhackme #powershell #purple_team
Medium
Atomic Bird Goes Purple #1 notes — TryHackMe
Time to simulate hunting and detecting activities to sharpen your purple teaming skills.
⤷ Title: CIRT (Cyber Incident Response Team)
════════════════════════
𐀪 Author: D.Jackson
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:32:17 GMT
════════════════════════
⌗ Tags: #tryhackme #soc_role_in_blue_team
════════════════════════
𐀪 Author: D.Jackson
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:32:17 GMT
════════════════════════
⌗ Tags: #tryhackme #soc_role_in_blue_team
Medium
CIRT (Cyber Incident Response Team)
A Cyber Incident Response Team (CIRT) or Computer Security Incident Response Team (CSIRT) is a group of professionals equipped to handle…
⤷ Title: Anatomy of a Breach: From Public Web Server to Internal Data Exfiltration
════════════════════════
𐀪 Author: 0xPmCr
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:02:43 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #red_teaming #learning #ethical_hacking
════════════════════════
𐀪 Author: 0xPmCr
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:02:43 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #red_teaming #learning #ethical_hacking
Medium
Anatomy of a Breach: From Public Web Server to Internal Data Exfiltration
A Step-by-Step Red Team Operation using the Sliver C2 Framework.
⤷ Title: A03 Injection — OWASP Top 10 Series (with Labs)
════════════════════════
𐀪 Author: CyberQuestor
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:27:24 GMT
════════════════════════
⌗ Tags: #owasp #owasp_api_security_top_10 #owasp_top_10 #sql_injection #injection
════════════════════════
𐀪 Author: CyberQuestor
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 00:27:24 GMT
════════════════════════
⌗ Tags: #owasp #owasp_api_security_top_10 #owasp_top_10 #sql_injection #injection
Medium
A03 Injection — OWASP Top 10 Series (with Labs)
In the previous part of this blog series, we explored A02: Cryptographic Failures, which focused on exposing sensitive data due to weak or…
⤷ Title: The Trojan in the Living Room: 2 Million Android TV Boxes Hijacked by Kimwolf
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:00:26 +0000
════════════════════════
⌗ Tags: #Malware #Android TV #BOTNET #DDoS #Ethereum Name Service #IoT Security #Kimwolf #Malware 2026 #Resi Rack #Residential Proxy #Synthient #XLab
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:00:26 +0000
════════════════════════
⌗ Tags: #Malware #Android TV #BOTNET #DDoS #Ethereum Name Service #IoT Security #Kimwolf #Malware 2026 #Resi Rack #Residential Proxy #Synthient #XLab
Penetration Testing Tools
The Trojan in the Living Room: 2 Million Android TV Boxes Hijacked by Kimwolf
When you procure an inexpensive, unbranded Android TV box, connect it to your television, and relegate it to
⤷ Title: Term Interrupted: Higham Lane School Shuttered by Christmas Cyber Incursion
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:58:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #2026 Tech News #Central England Academy Trust #cyberattack #data breach #Education Sector #Higham Lane School #ICO #Michael Gannon #Nuneaton #ransomware #UK Schools
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:58:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #2026 Tech News #Central England Academy Trust #cyberattack #data breach #Education Sector #Higham Lane School #ICO #Michael Gannon #Nuneaton #ransomware #UK Schools
Penetration Testing Tools
Term Interrupted: Higham Lane School Shuttered by Christmas Cyber Incursion
A comprehensive school nestled in the British town of Nuneaton—a locale of approximately 90,000 residents—has been compelled to
⤷ Title: The Proxy Trap: Single Click on Telegram Can Unmask Your Real IP Address
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:51:36 +0000
════════════════════════
⌗ Tags: #Vulnerability #Android Security #Cybernews #De_anonymization #InfoSec 2026 #iOS Security #IP Leak #Messaging App Security #privacy #Proxy Vulnerability #Telegram
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:51:36 +0000
════════════════════════
⌗ Tags: #Vulnerability #Android Security #Cybernews #De_anonymization #InfoSec 2026 #iOS Security #IP Leak #Messaging App Security #privacy #Proxy Vulnerability #Telegram
Penetration Testing Tools
The Proxy Trap: Single Click on Telegram Can Unmask Your Real IP Address
A cursory engagement with a hyperlink in Telegram can result in the inadvertent exfiltration of one’s authentic IP
⤷ Title: The Retail Revolution: Google Unveils UCP to Power Your AI Personal Shopper
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:49:51 +0000
════════════════════════
⌗ Tags: #Google #Agentic Commerce #AI Agents #Digital Transformation #E_commerce Trends #Gemini AI #google #NRF 2026 #Retail Tech #Shopify #UCP #Universal Commerce Protocol
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:49:51 +0000
════════════════════════
⌗ Tags: #Google #Agentic Commerce #AI Agents #Digital Transformation #E_commerce Trends #Gemini AI #google #NRF 2026 #Retail Tech #Shopify #UCP #Universal Commerce Protocol
Penetration Testing Tools
The Retail Revolution: Google Unveils UCP to Power Your AI Personal Shopper
Digital commerce is on the precipice of a transformation, poised to mirror an experience where a bespoke personal
⤷ Title: Doomsday for Hackers: 324,000 BreachForums Accounts Exposed in Massive Leak
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:48:11 +0000
════════════════════════
⌗ Tags: #Data Leak #Anonymity #BreachForums #Cybercrime 2026 #Dark Web #data leak #Database Breach #Infosec #Law Enforcement #MyBB #PGP Key #ShinyHunters
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:48:11 +0000
════════════════════════
⌗ Tags: #Data Leak #Anonymity #BreachForums #Cybercrime 2026 #Dark Web #data leak #Database Breach #Infosec #Law Enforcement #MyBB #PGP Key #ShinyHunters
Penetration Testing Tools
Doomsday for Hackers: 324,000 BreachForums Accounts Exposed in Massive Leak
A comprehensive database associated with BreachForums—one of the most notorious clearinghouses for exfiltrated data and illicit network access—has
⤷ Title: Rust in the Water: Iranian Hackers Deploy New “RustyWater” RAT Across Middle East
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:46:21 +0000
════════════════════════
⌗ Tags: #Malware #Archer RAT #CloudSEK #Iranian APT #Mango Sandstorm #Middle East Cyber Attacks #MuddyWater #Operation IconCat #Rust Malware #RUSTRIC #RustyWater #Seqrite Labs
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:46:21 +0000
════════════════════════
⌗ Tags: #Malware #Archer RAT #CloudSEK #Iranian APT #Mango Sandstorm #Middle East Cyber Attacks #MuddyWater #Operation IconCat #Rust Malware #RUSTRIC #RustyWater #Seqrite Labs
Penetration Testing Tools
Rust in the Water: Iranian Hackers Deploy New "RustyWater" RAT Across Middle East
The Iranian threat collective MuddyWater has intensified its offensives against organizations across the Middle East, deploying a sophisticated
⤷ Title: The Discord Trojan: New NodeCordRAT Hijacks Bitcoin-Themed npm Packages
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:45:36 +0000
════════════════════════
⌗ Tags: #Malware #Bitcoin #Crypto Theft #Discord C2 #Malware 2026 #MetaMask #Node.js #NodeCordRAT #npm #Remote Access Trojan #supply chain attack #Zscaler
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:45:36 +0000
════════════════════════
⌗ Tags: #Malware #Bitcoin #Crypto Theft #Discord C2 #Malware 2026 #MetaMask #Node.js #NodeCordRAT #npm #Remote Access Trojan #supply chain attack #Zscaler
Penetration Testing Tools
The Discord Trojan: New NodeCordRAT Hijacks Bitcoin-Themed npm Packages
Security researchers at Zscaler have unearthed a sophisticated campaign exploiting prevalent cryptocurrency themes. Three deleterious libraries were discovered
⤷ Title: $2,000 Bug Bounty: Turning a Peer Discovery Protocol Into a DDoS Weapon
════════════════════════
𐀪 Author: Monika sharma
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 02:34:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #penetration_testing #technology #bug_bounty
════════════════════════
𐀪 Author: Monika sharma
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 02:34:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #penetration_testing #technology #bug_bounty
Medium
$2,000 Bug Bounty: Turning a Peer Discovery Protocol Into a DDoS Weapon
How a small logic gap enabled traffic amplification via UDP spoofing
⤷ Title: Hack Dead Rails
════════════════════════
𐀪 Author: Apkpuredev
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:42:48 GMT
════════════════════════
⌗ Tags: #games #gamehanhdong #dead_rails #apkpure #hacking
════════════════════════
𐀪 Author: Apkpuredev
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 03:42:48 GMT
════════════════════════
⌗ Tags: #games #gamehanhdong #dead_rails #apkpure #hacking
Medium
Hack Dead Rails
Hack Dead Rails là hành trình sinh tồn đầy thử thách trong thế giới hậu tận thế tàn khốc. Game kết hợp yếu tố chiến thuật, hành động và…
⤷ Title: Unlocking the Power of Hydra: Advanced Credential Attacks for Real Pentesters
════════════════════════
𐀪 Author: Cybeague Technologies
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 02:51:13 GMT
════════════════════════
⌗ Tags: #security #information_security #hacking #password_cracking #cybersecurity
════════════════════════
𐀪 Author: Cybeague Technologies
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 02:51:13 GMT
════════════════════════
⌗ Tags: #security #information_security #hacking #password_cracking #cybersecurity
Medium
Unlocking the Power of Hydra: Advanced Credential Attacks for Real Pentesters
Most beginners see Hydra as “that brute-force tool.” But professionals know it’s much more than typing a username and password list.
⤷ Title: Getting Started With Hydra: The Fast Track to Password Cracking Basics
════════════════════════
𐀪 Author: Cybeague Technologies
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 02:50:18 GMT
════════════════════════
⌗ Tags: #password_cracking #security #information_security #cybersecurity #hacking
════════════════════════
𐀪 Author: Cybeague Technologies
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 02:50:18 GMT
════════════════════════
⌗ Tags: #password_cracking #security #information_security #cybersecurity #hacking
Medium
Getting Started With Hydra: The Fast Track to Password Cracking Basics
If you’re just stepping into the world of ethical hacking and password security testing, you might feel overwhelmed by the number of tools…
⤷ Title: Emerging Operator “0-P” Announces c0bra-ransomware
════════════════════════
𐀪 Author: Cybersec News
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 02:42:02 GMT
════════════════════════
⌗ Tags: #threat_intelligence #hacking #frontpage #cybersecurity
════════════════════════
𐀪 Author: Cybersec News
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 02:42:02 GMT
════════════════════════
⌗ Tags: #threat_intelligence #hacking #frontpage #cybersecurity
Medium
Emerging Operator “0-P” Announces c0bra-ransomware
No Known Attacks Yet — But Defenders Should Treat the Claim Seriously
⤷ Title: Lightning Strike: Testing Salesforce Security with the Auraditor Extension
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:12:16 +0000
════════════════════════
⌗ Tags: #Open Source Tool #Apex #API Testing #AppSec #Aura Framework #Auraditor #Burp Suite #IDOR #LWC #Penetration Testing #Salesforce Lightning #Salesforce Security #Security Audit
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:12:16 +0000
════════════════════════
⌗ Tags: #Open Source Tool #Apex #API Testing #AppSec #Aura Framework #Auraditor #Burp Suite #IDOR #LWC #Penetration Testing #Salesforce Lightning #Salesforce Security #Security Audit
Penetration Testing Tools
Lightning Strike: Testing Salesforce Security with the Auraditor Extension
Auraditor for Burp Suite is the ultimate tool for Salesforce Lightning security audits, featuring Aura action editing and LWC endpoint discovery.
⤷ Title: The AI Alliance: Apple Taps Google Gemini to Power the New Siri
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:08:09 +0000
════════════════════════
⌗ Tags: #Apple #Google #Apple Intelligence #Gemini #Generative AI #google #iOS 26 #Private Cloud Compute #Siri #Sundar Pichai #Tim Cook #WWDC 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:08:09 +0000
════════════════════════
⌗ Tags: #Apple #Google #Apple Intelligence #Gemini #Generative AI #google #iOS 26 #Private Cloud Compute #Siri #Sundar Pichai #Tim Cook #WWDC 2026
Penetration Testing Tools
The AI Alliance: Apple Taps Google Gemini to Power the New Siri
Apple has resolved to fortify its artificial intelligence capabilities through the most direct avenue possible: by leveraging the
⤷ Title: The Great VM Escape: MAESTRO Toolkit Breaks VMware Isolation
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:07:16 +0000
════════════════════════
⌗ Tags: #Vulnerability #BYOVD #CVE_2025_22224 #Cyber Security 2026 #ESXi #Huntress #hypervisor #MAESTRO #SonicWall #VM Escape #vmware #VSOCKpuppet #zero_day
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 04:07:16 +0000
════════════════════════
⌗ Tags: #Vulnerability #BYOVD #CVE_2025_22224 #Cyber Security 2026 #ESXi #Huntress #hypervisor #MAESTRO #SonicWall #VM Escape #vmware #VSOCKpuppet #zero_day
Penetration Testing Tools
The Great VM Escape: MAESTRO Toolkit Breaks VMware Isolation
Virtual machines are often perceived as impenetrable bastions for risk assessment, operating under the assumption that the host