⤷ Title: Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 22:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 22:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Flowable 2025.2 Brings Governed Multi-Agent AI Orchestration to Enterprises
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:54:38 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Press Release #Agentic AI #AI #AI Governance #Flowable #Technology
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:54:38 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Press Release #Agentic AI #AI #AI Governance #Flowable #Technology
Hackread
Flowable 2025.2 Brings Governed Multi-Agent AI Orchestration to Enterprises
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: The Day I Realized Cyber Security Isn’t About Technology
════════════════════════
𐀪 Author: Er Dhaval Ramani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:10:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #bug_bounty #self_awareness
════════════════════════
𐀪 Author: Er Dhaval Ramani
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:10:55 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #bug_bounty #self_awareness
Medium
The Day I Realized Cyber Security Isn’t About Technology
I didn’t have this realization in a server room or during a dramatic breach.
⤷ Title: No spidey sense, just my guts: How i accidentally bought a VPS for €0.01
════════════════════════
𐀪 Author: PevinKumar A
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:05:38 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #cybersecurity #security #hacking
════════════════════════
𐀪 Author: PevinKumar A
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:05:38 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #cybersecurity #security #hacking
Medium
No spidey sense🤧, just my guts: How i accidentally bought a VPS for €0.01😱
Have you ever felt like Spider-Man catching something mid air without even trying? I caught something too, but instead of saving the city…
⤷ Title: How a “Temporary Fix” Became a Permanent Security Disaster
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:43:19 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_tips #cybersecurity #infosec #hacking
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:43:19 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_tips #cybersecurity #infosec #hacking
Medium
How a “Temporary Fix” Became a Permanent Security Disaster 🩹🔥
Hey there!😁
⤷ Title: Crypto Heists
════════════════════════
𐀪 Author: So Cleva
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:27 GMT
════════════════════════
⌗ Tags: #exploit #hacking #cryptocurrency #data_breach #vulnerability
════════════════════════
𐀪 Author: So Cleva
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:27 GMT
════════════════════════
⌗ Tags: #exploit #hacking #cryptocurrency #data_breach #vulnerability
Medium
Crypto Heists
what happened in 2025?
⤷ Title: Implementación de un Honeypot con T-Pot para detección y análisis de ataques.
════════════════════════
𐀪 Author: Eric Cabrera Cruz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:06 GMT
════════════════════════
⌗ Tags: #threat_detection #cybersecurity #hacking #network_security #ethical_hacking
════════════════════════
𐀪 Author: Eric Cabrera Cruz
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:36:06 GMT
════════════════════════
⌗ Tags: #threat_detection #cybersecurity #hacking #network_security #ethical_hacking
Medium
Implementación de un Honeypot con T-Pot para detección y análisis de ataques.
Para empezar, tenemos que tener claro que es lo que vamos a construir. Los Honeypot según INCIBE son sistemas hardware o herramientas…
⤷ Title: SOC167 — LS Command Detected in Requested URL
════════════════════════
𐀪 Author: Wrench
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:25 GMT
════════════════════════
⌗ Tags: #security_operation_center #hacking #lets_defend #security #virustotal
════════════════════════
𐀪 Author: Wrench
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:25 GMT
════════════════════════
⌗ Tags: #security_operation_center #hacking #lets_defend #security #virustotal
Medium
SOC167 — LS Command Detected in Requested URL
Alert Overview and Initial Identification of the ls Command in Web Traffic. This section explains how the alert was generated, what…
⤷ Title: Testing PSPDFKit License Validity via Client-Side PoC
════════════════════════
𐀪 Author: WHO AM I ?
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:24:48 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: WHO AM I ?
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:24:48 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #penetration_testing #cybersecurity
Medium
Testing PSPDFKit License Validity via Client-Side PoC
Testing PSPDFKit License Validity via Client-Side PoC
⤷ Title: PUPPY.HTB — Active Directory
════════════════════════
𐀪 Author: JY00X3
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:04 GMT
════════════════════════
⌗ Tags: #active_directory #cybersecurity #ethical_hacking #penetration_testing #htb
════════════════════════
𐀪 Author: JY00X3
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:02:04 GMT
════════════════════════
⌗ Tags: #active_directory #cybersecurity #ethical_hacking #penetration_testing #htb
Medium
PUPPY.HTB — Active Directory
Initial Credentials
⤷ Title: Dumping Full db through Apache superset automation
════════════════════════
𐀪 Author: Ahmed Algohary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:37 GMT
════════════════════════
⌗ Tags: #python #pentesting #apache #ethical_hacking #apache_superset
════════════════════════
𐀪 Author: Ahmed Algohary
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 17:59:37 GMT
════════════════════════
⌗ Tags: #python #pentesting #apache #ethical_hacking #apache_superset
Medium
Dumping Full db through Apache superset automation
So, i was doing a pentest and i came across a subdomain with Apache superset installed, i had admin access to it, after exploring a bit i…
⤷ Title: Hacking Humans: How I Learned That You Are the Vulnerability
════════════════════════
𐀪 Author: HEKKO
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:31:08 GMT
════════════════════════
⌗ Tags: #web3 #cybersecurity #blockchain #student_life #ethical_hacking
════════════════════════
𐀪 Author: HEKKO
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 16:31:08 GMT
════════════════════════
⌗ Tags: #web3 #cybersecurity #blockchain #student_life #ethical_hacking
Medium
Hacking Humans: How I Learned That You Are the Vulnerability
We all have the same image of a hacker.
⤷ Title: Long-Running Web Skimming Campaign Steals Credit Cards From Online Checkout Pages
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 23:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Telegram to Add Warning for Proxy Links After IP Leak Concerns
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:40:02 +0000
════════════════════════
⌗ Tags: #Privacy #Security #Cybersecurity #Encryption #IP Address #Messanger #Telegram
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:40:02 +0000
════════════════════════
⌗ Tags: #Privacy #Security #Cybersecurity #Encryption #IP Address #Messanger #Telegram
Hackread
Telegram to Add Warning for Proxy Links After IP Leak Concerns
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: How I Found a Critical Biometric 2FA Bypass… and Lost the Bounty
════════════════════════
𐀪 Author: LETCHU PKT
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:39:00 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #cyber_security_awareness #hacking #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: LETCHU PKT
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:39:00 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #cyber_security_awareness #hacking #bug_bounty_tips #bug_bounty
Medium
How I Found a Critical Biometric 2FA Bypass… and Lost the Bounty
How a Hardcoded Superadmin Key Led to a Biometric 2FA Bypass — and a Painful Duplicate
⤷ Title: Day 3 of Learning AWS: Elastic IP and Elastic Block Storage
════════════════════════
𐀪 Author: Muhammad Kashif
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:38:52 GMT
════════════════════════
⌗ Tags: #learning #cloud_security #cloud_computing #bug_bounty #aws
════════════════════════
𐀪 Author: Muhammad Kashif
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:38:52 GMT
════════════════════════
⌗ Tags: #learning #cloud_security #cloud_computing #bug_bounty #aws
Medium
Day 3 of Learning AWS: Elastic IP and Elastic Block Storage
This is Day 3 of my AWS learning journey. Today I learned about Elastic IPs and storage options in EC2, especially Elastic Block Storage…
⤷ Title: Lab: Bypassing access controls using email address parsing discrepancies
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:42:10 GMT
════════════════════════
⌗ Tags: #portswigger #medium #ctf #hacking #pentesting
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:42:10 GMT
════════════════════════
⌗ Tags: #portswigger #medium #ctf #hacking #pentesting
Medium
Lab: Bypassing access controls using email address parsing discrepancies
Bu labda ilk bakışta oldukça basit görünen bir kontrol var:
“Sadece ginandjuice.shop domain’ine sahip email adresleriyle kayıt…
“Sadece ginandjuice.shop domain’ine sahip email adresleriyle kayıt…
⤷ Title: How Telegram Clicks Can Leak Your Real IP?
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:30 GMT
════════════════════════
⌗ Tags: #hacker #linux #hacking #telegram #s_h4ck13
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:32:30 GMT
════════════════════════
⌗ Tags: #hacker #linux #hacking #telegram #s_h4ck13
Medium
How Telegram Clicks Can Leak Your Real IP?
I’ll reproduce this scenario from an offensive security perspective.
⤷ Title: I Received My Own Personal Details From a Telegram Stranger — Here’s the Truth
════════════════════════
𐀪 Author: Pradhan's Fintech
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:00:53 GMT
════════════════════════
⌗ Tags: #hacking #safety #telegram #scam #personal_experience
════════════════════════
𐀪 Author: Pradhan's Fintech
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 19:00:53 GMT
════════════════════════
⌗ Tags: #hacking #safety #telegram #scam #personal_experience
Medium
I Received My Own Personal Details From a Telegram Stranger — Here’s the Truth
Right now, we are in 2026. If we look back from 2010 to 2025, ‘‘ we can see that in these 15 years, online scams and frauds have increased…
⤷ Title: Impacket Developer Guide. Part 3. Make your own Lateral Movement
════════════════════════
𐀪 Author: CICADA8
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:16:29 GMT
════════════════════════
⌗ Tags: #red_team #hacking #pentesting #active_directory
════════════════════════
𐀪 Author: CICADA8
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:16:29 GMT
════════════════════════
⌗ Tags: #red_team #hacking #pentesting #active_directory
Medium
Impacket Developer Guide. Part 3. Make your own Lateral Movement
Create your own LM tool using impacket!
⤷ Title: How to Get Scammed (by DPRK Hackers)
════════════════════════
𐀪 Author: OZ
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #blockchain #north_korea #malware #infosec
════════════════════════
𐀪 Author: OZ
════════════════════════
ⴵ Time: Tue, 13 Jan 2026 18:46:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #blockchain #north_korea #malware #infosec
Medium
How to Get Scammed (by DPRK Hackers)
A deep dive into DPRK hackers using fake job interviews and blockchain-based C2 to deploy malware