⤷ Title: Day5: Common Network Commands Explained
════════════════════════
𐀪 Author: Mohammad-AL-Momani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:05:17 GMT
════════════════════════
⌗ Tags: #money #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Mohammad-AL-Momani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:05:17 GMT
════════════════════════
⌗ Tags: #money #ethical_hacking #cybersecurity
Medium
Day5: Common Network Commands Explained
Common Network Commands
⤷ Title: SQL Injection: A Deep Dive into Preventing Database Attacks
════════════════════════
𐀪 Author: Sreelakshmi
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:32:36 GMT
════════════════════════
⌗ Tags: #sql_injection
════════════════════════
𐀪 Author: Sreelakshmi
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 12:32:36 GMT
════════════════════════
⌗ Tags: #sql_injection
Medium
SQL Injection: A Deep Dive into Preventing Database Attacks
SQL injection is a critical security vulnerability that allows attackers to interfere with the queries an application makes to its…
⤷ Title: [Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Widespread Magecart Campaign Targets Users of All Major Credit Cards
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:28:30 +0000
════════════════════════
⌗ Tags: #Malware #Security #Cyber Attack #Cybersecurity #MageCart #Silent Push #Skimmer
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:28:30 +0000
════════════════════════
⌗ Tags: #Malware #Security #Cyber Attack #Cybersecurity #MageCart #Silent Push #Skimmer
Hackread
Widespread Magecart Campaign Targets Users of All Major Credit Cards
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: How I Supercharged Wazuh SIEM with AI Using Claude Desktop (MCP Integration)
════════════════════════
𐀪 Author: MOAMEN REZK
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:19:41 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #security #hacking #cybersecurity
════════════════════════
𐀪 Author: MOAMEN REZK
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:19:41 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #security #hacking #cybersecurity
Medium
How I Supercharged Wazuh SIEM with AI Using Claude Desktop (MCP Integration)
The Game-Changing Combination of SIEM and Conversational AI
⤷ Title: In an era where cyber threats are evolving at the speed of AI, the "digital fence" of yesterday is…
════════════════════════
𐀪 Author: Roshankappala
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:44:22 GMT
════════════════════════
⌗ Tags: #blockchain #cybersecurity #entrepreneurship #information_security #hacking
════════════════════════
𐀪 Author: Roshankappala
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:44:22 GMT
════════════════════════
⌗ Tags: #blockchain #cybersecurity #entrepreneurship #information_security #hacking
Medium
In an era where cyber threats are evolving at the speed of AI, the "digital fence" of yesterday is…
In an era where cyber threats are evolving at the speed of AI, the "digital fence" of yesterday is no longer enough. If a traditional firewall is a bouncer checking IDs at the door, a Next-Generation …
⤷ Title: How to Create an Undetectable Backdoor: A Step-by-Step Guide
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:49 GMT
════════════════════════
⌗ Tags: #mitm_attacks #backdoor #hacking #mitm #man_in_the_middle_attack
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:49 GMT
════════════════════════
⌗ Tags: #mitm_attacks #backdoor #hacking #mitm #man_in_the_middle_attack
Medium
How to Create an Undetectable Backdoor: A Step-by-Step Guide
ARP spoofing & Man In The Middle Attacks Execution & Detection
⤷ Title: Passing the PNPT: A Practical Perspective on Modern Pentesting
════════════════════════
𐀪 Author: Ivaylo Ivanov
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:38:22 GMT
════════════════════════
⌗ Tags: #tcm_security #penetration_testing #pnpt #certification #cybersecurity
════════════════════════
𐀪 Author: Ivaylo Ivanov
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:38:22 GMT
════════════════════════
⌗ Tags: #tcm_security #penetration_testing #pnpt #certification #cybersecurity
Medium
Passing the PNPT: A Practical Perspective on Modern Pentesting
Today, I officially passed the PNPT (Practical Network Penetration Tester) certification by TCM Security. I want to share this experience…
⤷ Title: SimpleCTF
════════════════════════
𐀪 Author: Rue
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:00 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #cybersecurity #pentesting #ctf_writeup
════════════════════════
𐀪 Author: Rue
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:32:00 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #cybersecurity #pentesting #ctf_writeup
Medium
SimpleCTF
This is a very beginner friendly CTF. For non medium subscribsed users please visit…
⤷ Title: Burp Suite: The Basics — THM Walkthrough
════════════════════════
𐀪 Author: t3chw1z4rd
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:20:03 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #burpsuite #tryhackme_walkthrough #tryhackme #xss_bypass
════════════════════════
𐀪 Author: t3chw1z4rd
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:20:03 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #burpsuite #tryhackme_walkthrough #tryhackme #xss_bypass
Medium
Burp Suite: The Basics — THM Walkthrough
Room: TryHackMe | Burp Suite: The Basics
⤷ Title: Bon.. ça c’est pas du hack mais du bon sens (Writeup Preignition — Hack The Box)
════════════════════════
𐀪 Author: RavenBreach
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:26:05 GMT
════════════════════════
⌗ Tags: #cybersécurité #hackthebox #nginx #passwords #hackthebox_writeup
════════════════════════
𐀪 Author: RavenBreach
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:26:05 GMT
════════════════════════
⌗ Tags: #cybersécurité #hackthebox #nginx #passwords #hackthebox_writeup
Medium
Bon.. ça c’est pas du hack mais du bon sens (Writeup Preignition — Hack The Box)
Introduction
⤷ Title: CVE Hunting via Github Dorking
════════════════════════
𐀪 Author: Abhirup Konwar
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:55:42 GMT
════════════════════════
⌗ Tags: #cve #ethical_hacking #php_security #secure_code_review #programming
════════════════════════
𐀪 Author: Abhirup Konwar
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 13:55:42 GMT
════════════════════════
⌗ Tags: #cve #ethical_hacking #php_security #secure_code_review #programming
Medium
CVE Hunting via Github Dorking
Finding 0 days in PHP Open Source Code
⤷ Title: The Client-side Is Not a Boundary
════════════════════════
𐀪 Author: Adebayo
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:24:58 GMT
════════════════════════
⌗ Tags: #api_security #security #software_engineering #web_security
════════════════════════
𐀪 Author: Adebayo
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:24:58 GMT
════════════════════════
⌗ Tags: #api_security #security #software_engineering #web_security
Medium
The Client-side Is Not a Boundary
A quiet lesson from fintech and subnoscription based systems
⤷ Title: PCI DSS for APIs: The Compliance Guide Nobody Told You About
════════════════════════
𐀪 Author: Saro Arlene
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:30:29 GMT
════════════════════════
⌗ Tags: #api_security #pci_dss_compliance #pci_dss
════════════════════════
𐀪 Author: Saro Arlene
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:30:29 GMT
════════════════════════
⌗ Tags: #api_security #pci_dss_compliance #pci_dss
Medium
PCI DSS for APIs: The Compliance Guide Nobody Told You About
Why PCI DSS Actually Matters for APIs
⤷ Title: X (former Twitter) Login flow reconstruction. Episode 1 — Headers generation
════════════════════════
𐀪 Author: glizzykingdreko
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:11:50 GMT
════════════════════════
⌗ Tags: #reverse_engineering #xs #wasm #twitter #python_automation
════════════════════════
𐀪 Author: glizzykingdreko
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:11:50 GMT
════════════════════════
⌗ Tags: #reverse_engineering #xs #wasm #twitter #python_automation
Medium
X (former Twitter) Login flow reconstruction. Episode 1 — Headers generation
First post of a serie about X / Twitter login automatisation. In this episode I’m going to reverse engeener all the required headers
⤷ Title: OWASP Top Ten #3: Injection (When Input Goes Very Wrong)
════════════════════════
𐀪 Author: Angela
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:26:12 GMT
════════════════════════
⌗ Tags: #injection #owasp #login_bypass #owasp_top_10 #sql_injection
════════════════════════
𐀪 Author: Angela
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:26:12 GMT
════════════════════════
⌗ Tags: #injection #owasp #login_bypass #owasp_top_10 #sql_injection
Medium
OWASP Top Ten #3: Injection (When Input Goes Very Wrong)
Hi everyone! Welcome back, so excited to have you! 🎉
⤷ Title: Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 22:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 22:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Flowable 2025.2 Brings Governed Multi-Agent AI Orchestration to Enterprises
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:54:38 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Press Release #Agentic AI #AI #AI Governance #Flowable #Technology
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:54:38 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Press Release #Agentic AI #AI #AI Governance #Flowable #Technology
Hackread
Flowable 2025.2 Brings Governed Multi-Agent AI Orchestration to Enterprises
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: The Day I Realized Cyber Security Isn’t About Technology
════════════════════════
𐀪 Author: Er Dhaval Ramani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:10:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #bug_bounty #self_awareness
════════════════════════
𐀪 Author: Er Dhaval Ramani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:10:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #bug_bounty #self_awareness
Medium
The Day I Realized Cyber Security Isn’t About Technology
I didn’t have this realization in a server room or during a dramatic breach.
⤷ Title: No spidey sense, just my guts: How i accidentally bought a VPS for €0.01
════════════════════════
𐀪 Author: PevinKumar A
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:05:38 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #cybersecurity #security #hacking
════════════════════════
𐀪 Author: PevinKumar A
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:05:38 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #cybersecurity #security #hacking
Medium
No spidey sense🤧, just my guts: How i accidentally bought a VPS for €0.01😱
Have you ever felt like Spider-Man catching something mid air without even trying? I caught something too, but instead of saving the city…
⤷ Title: How a “Temporary Fix” Became a Permanent Security Disaster
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:43:19 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_tips #cybersecurity #infosec #hacking
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:43:19 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_tips #cybersecurity #infosec #hacking
Medium
How a “Temporary Fix” Became a Permanent Security Disaster 🩹🔥
Hey there!😁