⤷ Title: Q4 2025 Malware Trends: Telegram Backdoor, Banking Trojans Surge, Joker Returns to Google Play
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:30:52 +0000
════════════════════════
⌗ Tags: #Android #Malware #Security #backdoor #Cybersecurity #Joker #Scam #security #Telegram #Telegram X #TROJAN
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:30:52 +0000
════════════════════════
⌗ Tags: #Android #Malware #Security #backdoor #Cybersecurity #Joker #Scam #security #Telegram #Telegram X #TROJAN
Hackread
Q4 2025 Malware Trends: Telegram Backdoor, Banking Trojans Surge, Joker Returns to Google Play
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Hexaware Partners with AccuKnox for Cloud Security Services
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 10:29:47 +0000
════════════════════════
⌗ Tags: #Press Release
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 10:29:47 +0000
════════════════════════
⌗ Tags: #Press Release
Daily CyberSecurity
Hexaware Partners with AccuKnox for Cloud Security Services
Menlo Park, USA, 13th January 2026, CyberNewsWire
⤷ Title: The Most Dangerous Phishing Tool EVER Created: Spiderman
════════════════════════
𐀪 Author: Aqilnazim
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:51:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking
════════════════════════
𐀪 Author: Aqilnazim
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:51:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking
Medium
The Most Dangerous Phishing Tool EVER Created: Spiderman
In the long history of phishing tools, very few have earned a reputation that still echoes years later. Most frameworks burn bright and…
⤷ Title: Hacking “Time”: When Critical Infrastructure Forgets to Set a Password
════════════════════════
𐀪 Author: hacker_might
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:27:13 GMT
════════════════════════
⌗ Tags: #gnss #vulnerability_disclosure #ethical_hacking #hacking #cybersecurity
════════════════════════
𐀪 Author: hacker_might
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:27:13 GMT
════════════════════════
⌗ Tags: #gnss #vulnerability_disclosure #ethical_hacking #hacking #cybersecurity
Medium
Hacking “Time”: When Critical Infrastructure Forgets to Set a Password
Finding live earthquake detectors exposed on the public internet sounds like a movie plot, but sometimes it is just a normal Tuesday for…
⤷ Title: Camping in the UAE: A Realistic Guide for First-Time and Weekend Campers.
════════════════════════
𐀪 Author: Outdoorlifedubai
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:20:14 GMT
════════════════════════
⌗ Tags: #camping_tips #dubai #camping #hacking #uae
════════════════════════
𐀪 Author: Outdoorlifedubai
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:20:14 GMT
════════════════════════
⌗ Tags: #camping_tips #dubai #camping #hacking #uae
Medium
Camping in the UAE: A Realistic Guide for First-Time and Weekend Campers.
Camping in the UAE is unlike camping anywhere else in the world. One moment you’re surrounded by modern highways and city lights, and…
⤷ Title: Hardware Hacking A Scrap Hikvision 4‑port PoE Switch (DS-3E0105P-E)
════════════════════════
𐀪 Author: Aaronjjose
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:30:02 GMT
════════════════════════
⌗ Tags: #hardware_hacking #hacking #iot #cybersecurity #embedded_systems
════════════════════════
𐀪 Author: Aaronjjose
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:30:02 GMT
════════════════════════
⌗ Tags: #hardware_hacking #hacking #iot #cybersecurity #embedded_systems
Medium
Hardware Hacking A Scrap Hikvision 4‑port PoE Switch (DS-3E0105P-E)
Recovered from e‑waste. Powered by curiosity.
⤷ Title: Basic Pentesting 1 (lab) Walkthrough: Exploiting FTP, SSH & WordPress
════════════════════════
𐀪 Author: SUSHANT TELRANDHE
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:12:57 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #ethical_hacking #cybersecurity #vulnerability
════════════════════════
𐀪 Author: SUSHANT TELRANDHE
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:12:57 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #ethical_hacking #cybersecurity #vulnerability
Medium
Basic Pentesting 1 (lab) Walkthrough: Exploiting FTP, SSH & WordPress
A hands-on walkthrough of a deliberately vulnerable lab showing how small mistakes lead to total compromise.
⤷ Title: TryHackMe Phishing Unfolding: Detecting Base64 and DNS Exfiltration with Splunk
════════════════════════
𐀪 Author: Elmin Farzaliyev
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:16:06 GMT
════════════════════════
⌗ Tags: #blue_team #tryhackme #red_team #cybersecurity #splunk
════════════════════════
𐀪 Author: Elmin Farzaliyev
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:16:06 GMT
════════════════════════
⌗ Tags: #blue_team #tryhackme #red_team #cybersecurity #splunk
Medium
TryHackMe Phishing Unfolding: Detecting Base64 and DNS Exfiltration with Splunk
By the time I opened Splunk, it was already clear that something had gone very wrong on this workstation. The phishing attempt had worked —…
⤷ Title: Hacking the Hackers
════════════════════════
𐀪 Author: Br0k3n_1337 Aka Sourav Khan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:02:57 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #bug_bounty_writeup #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: Br0k3n_1337 Aka Sourav Khan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:02:57 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #bug_bounty_writeup #bug_bounty_tips #bug_bounty
Medium
Hacking the Hackers
In the name of Allah, the Most Gracious, the Most Merciful.
⤷ Title: HTB Whisper Walkthrough
════════════════════════
𐀪 Author: Cray Cray
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:20:37 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup
════════════════════════
𐀪 Author: Cray Cray
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:20:37 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup
Medium
HTB Whisper Walkthrough
This is whisper sherlock walkthrough on hackthebox
⤷ Title: Catch Me If You Can: Building an “Offensive” Anti-Theft System for Windows
════════════════════════
𐀪 Author: Utkarsh Srivastava
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:11:30 GMT
════════════════════════
⌗ Tags: #life_hacking #ethical_hacking
════════════════════════
𐀪 Author: Utkarsh Srivastava
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:11:30 GMT
════════════════════════
⌗ Tags: #life_hacking #ethical_hacking
Medium
Catch Me If You Can: Building an “Offensive” Anti-Theft System for Windows
Usually, when a laptop is stolen, it’s game over. You rely on “Find My Device” (which the thief instantly disables) or file a police report…
⤷ Title: Ethical Proxy Use in 2026
════════════════════════
𐀪 Author: Teodoradehanyns
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:09:45 GMT
════════════════════════
⌗ Tags: #ethical_ai #robotstxt #2026 #ethical_hacking #proxy
════════════════════════
𐀪 Author: Teodoradehanyns
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:09:45 GMT
════════════════════════
⌗ Tags: #ethical_ai #robotstxt #2026 #ethical_hacking #proxy
Medium
Ethical Proxy Use in 2026
A sustainable, ethical proxy strategy emphasizes respecting site boundaries and focusing on legitimate data collection and testing needs.
⤷ Title: Day5: Common Network Commands Explained
════════════════════════
𐀪 Author: Mohammad-AL-Momani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:05:17 GMT
════════════════════════
⌗ Tags: #money #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Mohammad-AL-Momani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:05:17 GMT
════════════════════════
⌗ Tags: #money #ethical_hacking #cybersecurity
Medium
Day5: Common Network Commands Explained
Common Network Commands
⤷ Title: SQL Injection: A Deep Dive into Preventing Database Attacks
════════════════════════
𐀪 Author: Sreelakshmi
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:32:36 GMT
════════════════════════
⌗ Tags: #sql_injection
════════════════════════
𐀪 Author: Sreelakshmi
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:32:36 GMT
════════════════════════
⌗ Tags: #sql_injection
Medium
SQL Injection: A Deep Dive into Preventing Database Attacks
SQL injection is a critical security vulnerability that allows attackers to interfere with the queries an application makes to its…
⤷ Title: [Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Widespread Magecart Campaign Targets Users of All Major Credit Cards
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:28:30 +0000
════════════════════════
⌗ Tags: #Malware #Security #Cyber Attack #Cybersecurity #MageCart #Silent Push #Skimmer
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:28:30 +0000
════════════════════════
⌗ Tags: #Malware #Security #Cyber Attack #Cybersecurity #MageCart #Silent Push #Skimmer
Hackread
Widespread Magecart Campaign Targets Users of All Major Credit Cards
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: How I Supercharged Wazuh SIEM with AI Using Claude Desktop (MCP Integration)
════════════════════════
𐀪 Author: MOAMEN REZK
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:19:41 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #security #hacking #cybersecurity
════════════════════════
𐀪 Author: MOAMEN REZK
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:19:41 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #security #hacking #cybersecurity
Medium
How I Supercharged Wazuh SIEM with AI Using Claude Desktop (MCP Integration)
The Game-Changing Combination of SIEM and Conversational AI
⤷ Title: In an era where cyber threats are evolving at the speed of AI, the "digital fence" of yesterday is…
════════════════════════
𐀪 Author: Roshankappala
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:44:22 GMT
════════════════════════
⌗ Tags: #blockchain #cybersecurity #entrepreneurship #information_security #hacking
════════════════════════
𐀪 Author: Roshankappala
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:44:22 GMT
════════════════════════
⌗ Tags: #blockchain #cybersecurity #entrepreneurship #information_security #hacking
Medium
In an era where cyber threats are evolving at the speed of AI, the "digital fence" of yesterday is…
In an era where cyber threats are evolving at the speed of AI, the "digital fence" of yesterday is no longer enough. If a traditional firewall is a bouncer checking IDs at the door, a Next-Generation …
⤷ Title: How to Create an Undetectable Backdoor: A Step-by-Step Guide
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:49 GMT
════════════════════════
⌗ Tags: #mitm_attacks #backdoor #hacking #mitm #man_in_the_middle_attack
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:49 GMT
════════════════════════
⌗ Tags: #mitm_attacks #backdoor #hacking #mitm #man_in_the_middle_attack
Medium
How to Create an Undetectable Backdoor: A Step-by-Step Guide
ARP spoofing & Man In The Middle Attacks Execution & Detection
⤷ Title: Passing the PNPT: A Practical Perspective on Modern Pentesting
════════════════════════
𐀪 Author: Ivaylo Ivanov
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:38:22 GMT
════════════════════════
⌗ Tags: #tcm_security #penetration_testing #pnpt #certification #cybersecurity
════════════════════════
𐀪 Author: Ivaylo Ivanov
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:38:22 GMT
════════════════════════
⌗ Tags: #tcm_security #penetration_testing #pnpt #certification #cybersecurity
Medium
Passing the PNPT: A Practical Perspective on Modern Pentesting
Today, I officially passed the PNPT (Practical Network Penetration Tester) certification by TCM Security. I want to share this experience…
⤷ Title: SimpleCTF
════════════════════════
𐀪 Author: Rue
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:00 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #cybersecurity #pentesting #ctf_writeup
════════════════════════
𐀪 Author: Rue
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:00 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #cybersecurity #pentesting #ctf_writeup
Medium
SimpleCTF
This is a very beginner friendly CTF. For non medium subscribsed users please visit…