⤷ Title: PCI DSS for APIs: The Compliance Guide Nobody Told You About
════════════════════════
𐀪 Author: Saro Arlene
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:30:29 GMT
════════════════════════
⌗ Tags: #api_security #pci_dss_compliance #pci_dss
════════════════════════
𐀪 Author: Saro Arlene
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:30:29 GMT
════════════════════════
⌗ Tags: #api_security #pci_dss_compliance #pci_dss
Medium
PCI DSS for APIs: The Compliance Guide Nobody Told You About
Why PCI DSS Actually Matters for APIs
⤷ Title: X (former Twitter) Login flow reconstruction. Episode 1 — Headers generation
════════════════════════
𐀪 Author: glizzykingdreko
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:11:50 GMT
════════════════════════
⌗ Tags: #reverse_engineering #xs #wasm #twitter #python_automation
════════════════════════
𐀪 Author: glizzykingdreko
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 14:11:50 GMT
════════════════════════
⌗ Tags: #reverse_engineering #xs #wasm #twitter #python_automation
Medium
X (former Twitter) Login flow reconstruction. Episode 1 — Headers generation
First post of a serie about X / Twitter login automatisation. In this episode I’m going to reverse engeener all the required headers
⤷ Title: OWASP Top Ten #3: Injection (When Input Goes Very Wrong)
════════════════════════
𐀪 Author: Angela
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:26:12 GMT
════════════════════════
⌗ Tags: #injection #owasp #login_bypass #owasp_top_10 #sql_injection
════════════════════════
𐀪 Author: Angela
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 15:26:12 GMT
════════════════════════
⌗ Tags: #injection #owasp #login_bypass #owasp_top_10 #sql_injection
Medium
OWASP Top Ten #3: Injection (When Input Goes Very Wrong)
Hi everyone! Welcome back, so excited to have you! 🎉
⤷ Title: Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 22:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 22:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Flowable 2025.2 Brings Governed Multi-Agent AI Orchestration to Enterprises
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:54:38 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Press Release #Agentic AI #AI #AI Governance #Flowable #Technology
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:54:38 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Press Release #Agentic AI #AI #AI Governance #Flowable #Technology
Hackread
Flowable 2025.2 Brings Governed Multi-Agent AI Orchestration to Enterprises
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: The Day I Realized Cyber Security Isn’t About Technology
════════════════════════
𐀪 Author: Er Dhaval Ramani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:10:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #bug_bounty #self_awareness
════════════════════════
𐀪 Author: Er Dhaval Ramani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:10:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #bug_bounty #self_awareness
Medium
The Day I Realized Cyber Security Isn’t About Technology
I didn’t have this realization in a server room or during a dramatic breach.
⤷ Title: No spidey sense, just my guts: How i accidentally bought a VPS for €0.01
════════════════════════
𐀪 Author: PevinKumar A
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:05:38 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #cybersecurity #security #hacking
════════════════════════
𐀪 Author: PevinKumar A
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:05:38 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #cybersecurity #security #hacking
Medium
No spidey sense🤧, just my guts: How i accidentally bought a VPS for €0.01😱
Have you ever felt like Spider-Man catching something mid air without even trying? I caught something too, but instead of saving the city…
⤷ Title: How a “Temporary Fix” Became a Permanent Security Disaster
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:43:19 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_tips #cybersecurity #infosec #hacking
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:43:19 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_tips #cybersecurity #infosec #hacking
Medium
How a “Temporary Fix” Became a Permanent Security Disaster 🩹🔥
Hey there!😁
⤷ Title: Crypto Heists
════════════════════════
𐀪 Author: So Cleva
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:27 GMT
════════════════════════
⌗ Tags: #exploit #hacking #cryptocurrency #data_breach #vulnerability
════════════════════════
𐀪 Author: So Cleva
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:27 GMT
════════════════════════
⌗ Tags: #exploit #hacking #cryptocurrency #data_breach #vulnerability
Medium
Crypto Heists
what happened in 2025?
⤷ Title: Implementación de un Honeypot con T-Pot para detección y análisis de ataques.
════════════════════════
𐀪 Author: Eric Cabrera Cruz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:06 GMT
════════════════════════
⌗ Tags: #threat_detection #cybersecurity #hacking #network_security #ethical_hacking
════════════════════════
𐀪 Author: Eric Cabrera Cruz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:06 GMT
════════════════════════
⌗ Tags: #threat_detection #cybersecurity #hacking #network_security #ethical_hacking
Medium
Implementación de un Honeypot con T-Pot para detección y análisis de ataques.
Para empezar, tenemos que tener claro que es lo que vamos a construir. Los Honeypot según INCIBE son sistemas hardware o herramientas…
⤷ Title: SOC167 — LS Command Detected in Requested URL
════════════════════════
𐀪 Author: Wrench
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:25 GMT
════════════════════════
⌗ Tags: #security_operation_center #hacking #lets_defend #security #virustotal
════════════════════════
𐀪 Author: Wrench
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:25 GMT
════════════════════════
⌗ Tags: #security_operation_center #hacking #lets_defend #security #virustotal
Medium
SOC167 — LS Command Detected in Requested URL
Alert Overview and Initial Identification of the ls Command in Web Traffic. This section explains how the alert was generated, what…
⤷ Title: Testing PSPDFKit License Validity via Client-Side PoC
════════════════════════
𐀪 Author: WHO AM I ?
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:24:48 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: WHO AM I ?
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:24:48 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #penetration_testing #cybersecurity
Medium
Testing PSPDFKit License Validity via Client-Side PoC
Testing PSPDFKit License Validity via Client-Side PoC
⤷ Title: PUPPY.HTB — Active Directory
════════════════════════
𐀪 Author: JY00X3
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:04 GMT
════════════════════════
⌗ Tags: #active_directory #cybersecurity #ethical_hacking #penetration_testing #htb
════════════════════════
𐀪 Author: JY00X3
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:04 GMT
════════════════════════
⌗ Tags: #active_directory #cybersecurity #ethical_hacking #penetration_testing #htb
Medium
PUPPY.HTB — Active Directory
Initial Credentials
⤷ Title: Dumping Full db through Apache superset automation
════════════════════════
𐀪 Author: Ahmed Algohary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:37 GMT
════════════════════════
⌗ Tags: #python #pentesting #apache #ethical_hacking #apache_superset
════════════════════════
𐀪 Author: Ahmed Algohary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:37 GMT
════════════════════════
⌗ Tags: #python #pentesting #apache #ethical_hacking #apache_superset
Medium
Dumping Full db through Apache superset automation
So, i was doing a pentest and i came across a subdomain with Apache superset installed, i had admin access to it, after exploring a bit i…
⤷ Title: Hacking Humans: How I Learned That You Are the Vulnerability
════════════════════════
𐀪 Author: HEKKO
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:31:08 GMT
════════════════════════
⌗ Tags: #web3 #cybersecurity #blockchain #student_life #ethical_hacking
════════════════════════
𐀪 Author: HEKKO
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:31:08 GMT
════════════════════════
⌗ Tags: #web3 #cybersecurity #blockchain #student_life #ethical_hacking
Medium
Hacking Humans: How I Learned That You Are the Vulnerability
We all have the same image of a hacker.
⤷ Title: Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Telegram to Add Warning for Proxy Links After IP Leak Concerns
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:40:02 +0000
════════════════════════
⌗ Tags: #Privacy #Security #Cybersecurity #Encryption #IP Address #Messanger #Telegram
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:40:02 +0000
════════════════════════
⌗ Tags: #Privacy #Security #Cybersecurity #Encryption #IP Address #Messanger #Telegram
Hackread
Telegram to Add Warning for Proxy Links After IP Leak Concerns
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: How I Found a Critical Biometric 2FA Bypass… and Lost the Bounty
════════════════════════
𐀪 Author: LETCHU PKT
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:39:00 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #cyber_security_awareness #hacking #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: LETCHU PKT
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:39:00 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #cyber_security_awareness #hacking #bug_bounty_tips #bug_bounty
Medium
How I Found a Critical Biometric 2FA Bypass… and Lost the Bounty
How a Hardcoded Superadmin Key Led to a Biometric 2FA Bypass — and a Painful Duplicate
⤷ Title: Day 3 of Learning AWS: Elastic IP and Elastic Block Storage
════════════════════════
𐀪 Author: Muhammad Kashif
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:38:52 GMT
════════════════════════
⌗ Tags: #learning #cloud_security #cloud_computing #bug_bounty #aws
════════════════════════
𐀪 Author: Muhammad Kashif
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:38:52 GMT
════════════════════════
⌗ Tags: #learning #cloud_security #cloud_computing #bug_bounty #aws
Medium
Day 3 of Learning AWS: Elastic IP and Elastic Block Storage
This is Day 3 of my AWS learning journey. Today I learned about Elastic IPs and storage options in EC2, especially Elastic Block Storage…
⤷ Title: Lab: Bypassing access controls using email address parsing discrepancies
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:42:10 GMT
════════════════════════
⌗ Tags: #portswigger #medium #ctf #hacking #pentesting
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:42:10 GMT
════════════════════════
⌗ Tags: #portswigger #medium #ctf #hacking #pentesting
Medium
Lab: Bypassing access controls using email address parsing discrepancies
Bu labda ilk bakışta oldukça basit görünen bir kontrol var:
“Sadece ginandjuice.shop domain’ine sahip email adresleriyle kayıt…
“Sadece ginandjuice.shop domain’ine sahip email adresleriyle kayıt…
⤷ Title: How Telegram Clicks Can Leak Your Real IP?
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:30 GMT
════════════════════════
⌗ Tags: #hacker #linux #hacking #telegram #s_h4ck13
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:30 GMT
════════════════════════
⌗ Tags: #hacker #linux #hacking #telegram #s_h4ck13
Medium
How Telegram Clicks Can Leak Your Real IP?
I’ll reproduce this scenario from an offensive security perspective.