⤷ Title: Artificial Intelligence: Complete AI Training for Beginners to Experts
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 10:13:29 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #ethical_hacking #ai #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 10:13:29 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #ethical_hacking #ai #cyber_security_awareness #cybersecurity
Medium
Artificial Intelligence: Complete AI Training for Beginners to Experts
Introduction: Artificial Intelligence: Complete AI Training for Beginners to Experts
⤷ Title: OWASP API Security Top 10 (2023).
════════════════════════
𐀪 Author: Khadijat Suleman
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 10:14:37 GMT
════════════════════════
⌗ Tags: #api_security #api #owasp_api_security_top_10
════════════════════════
𐀪 Author: Khadijat Suleman
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 10:14:37 GMT
════════════════════════
⌗ Tags: #api_security #api #owasp_api_security_top_10
Medium
OWASP API Security Top 10 (2023).
I recently completed the OWASP API Top10 and Beyond Course on APISec University.
⤷ Title: SSRF via Content-Type in Apache — Auditor Challenge (FahemSec)
════════════════════════
𐀪 Author: Abdelrahman Radwan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 11:56:13 GMT
════════════════════════
⌗ Tags: #apache #ctf #ssrf
════════════════════════
𐀪 Author: Abdelrahman Radwan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 11:56:13 GMT
════════════════════════
⌗ Tags: #apache #ctf #ssrf
Medium
SSRF via Content-Type in Apache — Auditor | FahemSec
بِسْمِ اللَّـهِ الرَّحْمَـٰنِ الرَّحِيمِ
⤷ Title: Unmasking Critical RCE Flaws in the World’s Most Popular Orchestrator
════════════════════════
𐀪 Author: Niyati Daftary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 10:42:15 GMT
════════════════════════
⌗ Tags: #cloud_security #rce #cybersecurity #kubernetes_security #kubernetes
════════════════════════
𐀪 Author: Niyati Daftary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 10:42:15 GMT
════════════════════════
⌗ Tags: #cloud_security #rce #cybersecurity #kubernetes_security #kubernetes
Medium
Unmasking Critical RCE Flaws in the World’s Most Popular Orchestrator
Kubernetes dominates modern infrastructure, powering giants like Google, AWS and countless enterprises, yet its very power breeds critical…
⤷ Title: New Advanced Linux VoidLink Malware Targets Cloud and container Environments
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:27:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:27:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Q4 2025 Malware Trends: Telegram Backdoor, Banking Trojans Surge, Joker Returns to Google Play
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:30:52 +0000
════════════════════════
⌗ Tags: #Android #Malware #Security #backdoor #Cybersecurity #Joker #Scam #security #Telegram #Telegram X #TROJAN
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:30:52 +0000
════════════════════════
⌗ Tags: #Android #Malware #Security #backdoor #Cybersecurity #Joker #Scam #security #Telegram #Telegram X #TROJAN
Hackread
Q4 2025 Malware Trends: Telegram Backdoor, Banking Trojans Surge, Joker Returns to Google Play
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Hexaware Partners with AccuKnox for Cloud Security Services
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 10:29:47 +0000
════════════════════════
⌗ Tags: #Press Release
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 10:29:47 +0000
════════════════════════
⌗ Tags: #Press Release
Daily CyberSecurity
Hexaware Partners with AccuKnox for Cloud Security Services
Menlo Park, USA, 13th January 2026, CyberNewsWire
⤷ Title: The Most Dangerous Phishing Tool EVER Created: Spiderman
════════════════════════
𐀪 Author: Aqilnazim
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:51:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking
════════════════════════
𐀪 Author: Aqilnazim
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:51:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking
Medium
The Most Dangerous Phishing Tool EVER Created: Spiderman
In the long history of phishing tools, very few have earned a reputation that still echoes years later. Most frameworks burn bright and…
⤷ Title: Hacking “Time”: When Critical Infrastructure Forgets to Set a Password
════════════════════════
𐀪 Author: hacker_might
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:27:13 GMT
════════════════════════
⌗ Tags: #gnss #vulnerability_disclosure #ethical_hacking #hacking #cybersecurity
════════════════════════
𐀪 Author: hacker_might
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:27:13 GMT
════════════════════════
⌗ Tags: #gnss #vulnerability_disclosure #ethical_hacking #hacking #cybersecurity
Medium
Hacking “Time”: When Critical Infrastructure Forgets to Set a Password
Finding live earthquake detectors exposed on the public internet sounds like a movie plot, but sometimes it is just a normal Tuesday for…
⤷ Title: Camping in the UAE: A Realistic Guide for First-Time and Weekend Campers.
════════════════════════
𐀪 Author: Outdoorlifedubai
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:20:14 GMT
════════════════════════
⌗ Tags: #camping_tips #dubai #camping #hacking #uae
════════════════════════
𐀪 Author: Outdoorlifedubai
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:20:14 GMT
════════════════════════
⌗ Tags: #camping_tips #dubai #camping #hacking #uae
Medium
Camping in the UAE: A Realistic Guide for First-Time and Weekend Campers.
Camping in the UAE is unlike camping anywhere else in the world. One moment you’re surrounded by modern highways and city lights, and…
⤷ Title: Hardware Hacking A Scrap Hikvision 4‑port PoE Switch (DS-3E0105P-E)
════════════════════════
𐀪 Author: Aaronjjose
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:30:02 GMT
════════════════════════
⌗ Tags: #hardware_hacking #hacking #iot #cybersecurity #embedded_systems
════════════════════════
𐀪 Author: Aaronjjose
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:30:02 GMT
════════════════════════
⌗ Tags: #hardware_hacking #hacking #iot #cybersecurity #embedded_systems
Medium
Hardware Hacking A Scrap Hikvision 4‑port PoE Switch (DS-3E0105P-E)
Recovered from e‑waste. Powered by curiosity.
⤷ Title: Basic Pentesting 1 (lab) Walkthrough: Exploiting FTP, SSH & WordPress
════════════════════════
𐀪 Author: SUSHANT TELRANDHE
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:12:57 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #ethical_hacking #cybersecurity #vulnerability
════════════════════════
𐀪 Author: SUSHANT TELRANDHE
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:12:57 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #ethical_hacking #cybersecurity #vulnerability
Medium
Basic Pentesting 1 (lab) Walkthrough: Exploiting FTP, SSH & WordPress
A hands-on walkthrough of a deliberately vulnerable lab showing how small mistakes lead to total compromise.
⤷ Title: TryHackMe Phishing Unfolding: Detecting Base64 and DNS Exfiltration with Splunk
════════════════════════
𐀪 Author: Elmin Farzaliyev
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:16:06 GMT
════════════════════════
⌗ Tags: #blue_team #tryhackme #red_team #cybersecurity #splunk
════════════════════════
𐀪 Author: Elmin Farzaliyev
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:16:06 GMT
════════════════════════
⌗ Tags: #blue_team #tryhackme #red_team #cybersecurity #splunk
Medium
TryHackMe Phishing Unfolding: Detecting Base64 and DNS Exfiltration with Splunk
By the time I opened Splunk, it was already clear that something had gone very wrong on this workstation. The phishing attempt had worked —…
⤷ Title: Hacking the Hackers
════════════════════════
𐀪 Author: Br0k3n_1337 Aka Sourav Khan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:02:57 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #bug_bounty_writeup #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: Br0k3n_1337 Aka Sourav Khan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:02:57 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #bug_bounty_writeup #bug_bounty_tips #bug_bounty
Medium
Hacking the Hackers
In the name of Allah, the Most Gracious, the Most Merciful.
⤷ Title: HTB Whisper Walkthrough
════════════════════════
𐀪 Author: Cray Cray
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:20:37 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup
════════════════════════
𐀪 Author: Cray Cray
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:20:37 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup
Medium
HTB Whisper Walkthrough
This is whisper sherlock walkthrough on hackthebox
⤷ Title: Catch Me If You Can: Building an “Offensive” Anti-Theft System for Windows
════════════════════════
𐀪 Author: Utkarsh Srivastava
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:11:30 GMT
════════════════════════
⌗ Tags: #life_hacking #ethical_hacking
════════════════════════
𐀪 Author: Utkarsh Srivastava
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:11:30 GMT
════════════════════════
⌗ Tags: #life_hacking #ethical_hacking
Medium
Catch Me If You Can: Building an “Offensive” Anti-Theft System for Windows
Usually, when a laptop is stolen, it’s game over. You rely on “Find My Device” (which the thief instantly disables) or file a police report…
⤷ Title: Ethical Proxy Use in 2026
════════════════════════
𐀪 Author: Teodoradehanyns
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:09:45 GMT
════════════════════════
⌗ Tags: #ethical_ai #robotstxt #2026 #ethical_hacking #proxy
════════════════════════
𐀪 Author: Teodoradehanyns
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:09:45 GMT
════════════════════════
⌗ Tags: #ethical_ai #robotstxt #2026 #ethical_hacking #proxy
Medium
Ethical Proxy Use in 2026
A sustainable, ethical proxy strategy emphasizes respecting site boundaries and focusing on legitimate data collection and testing needs.
⤷ Title: Day5: Common Network Commands Explained
════════════════════════
𐀪 Author: Mohammad-AL-Momani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:05:17 GMT
════════════════════════
⌗ Tags: #money #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Mohammad-AL-Momani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:05:17 GMT
════════════════════════
⌗ Tags: #money #ethical_hacking #cybersecurity
Medium
Day5: Common Network Commands Explained
Common Network Commands
⤷ Title: SQL Injection: A Deep Dive into Preventing Database Attacks
════════════════════════
𐀪 Author: Sreelakshmi
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:32:36 GMT
════════════════════════
⌗ Tags: #sql_injection
════════════════════════
𐀪 Author: Sreelakshmi
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:32:36 GMT
════════════════════════
⌗ Tags: #sql_injection
Medium
SQL Injection: A Deep Dive into Preventing Database Attacks
SQL injection is a critical security vulnerability that allows attackers to interfere with the queries an application makes to its…
⤷ Title: [Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Widespread Magecart Campaign Targets Users of All Major Credit Cards
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:28:30 +0000
════════════════════════
⌗ Tags: #Malware #Security #Cyber Attack #Cybersecurity #MageCart #Silent Push #Skimmer
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:28:30 +0000
════════════════════════
⌗ Tags: #Malware #Security #Cyber Attack #Cybersecurity #MageCart #Silent Push #Skimmer
Hackread
Widespread Magecart Campaign Targets Users of All Major Credit Cards
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread