Daily Writeups – Telegram
Daily Writeups
3.2K subscribers
106K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: From 403 Forbidden to $$$$ How a Simple Extension Bypass Led to Unauthenticated Access to Private…
════════════════════════
𐀪 Author: KiRaaDx
════════════════════════
Time: Tue, 13 Jan 2026 22:09:30 GMT
════════════════════════
Tags: #cybersecurity #bug_bounty_tips #bug_bounty
Title: Can you Realistcally Hack a Wifi Network In 2026 — I Tried.
════════════════════════
𐀪 Author: Alex Grande
════════════════════════
Time: Tue, 13 Jan 2026 23:32:49 GMT
════════════════════════
Tags: #security #ethical_hacking #hacking #technology #cybersecurity
Title: Cybersecurity Ethical Hacking — Discover the Top 3 Career Strategies for Career Advancement
════════════════════════
𐀪 Author: Franklin Rhodes
════════════════════════
Time: Tue, 13 Jan 2026 23:32:07 GMT
════════════════════════
Tags: #hacking #cybersecurity #kali_linux #careers #infosec
Title: How IDS, IPS, and Load Balancing Detection Tools Work in Penetration Testing
════════════════════════
𐀪 Author: mohandika
════════════════════════
Time: Tue, 13 Jan 2026 23:28:00 GMT
════════════════════════
Tags: #security #penetration_testing #cybersecurity #load_balancing #ids_ips
Title: IPC via Message Queue
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
Time: Tue, 13 Jan 2026 23:05:13 GMT
════════════════════════
Tags: #cybersecurity #hackthebox #reverse_engineering #tryhackme #malware
Title: Advent of Cyber — Day 16 — Forensics: Registry Furensics
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
Time: Tue, 13 Jan 2026 23:03:16 GMT
════════════════════════
Tags: #cybersecurity #tryhackme_walkthrough #advent_of_cyber_2025 #tryhackme_writeup #tryhackme
Title: Advent of Cyber — Day 15 — Web Attack Forensics: Drone Alone
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
Time: Tue, 13 Jan 2026 22:53:37 GMT
════════════════════════
Tags: #cybersecurity #advent_of_cyber_2025 #tryhackme_walkthrough #tryhackme_writeup #tryhackme
Title: Siemens Issues Critical Alert for Maximum 10.0 Vulnerability in Industrial Systems
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 01:44:10 +0000
════════════════════════
Tags: #Vulnerability #Critical Vulnerability #CVSS 10 #Factory Automation #ICS security #Industrial Edge #Industrial IoT #SCADA #Siemens #SIMATIC
Title: Critical SAP Alert: S/4HANA SQL Injection & Wily RCE Threaten Financial Data
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 01:29:08 +0000
════════════════════════
Tags: #Vulnerability Report #ABAP Security #CVE_2026_0500 #CVE_2026_0501 #ERP Security #Patch Day #Remote Code Execution #SAP S/4HANA #SAP Security #sql injection #Wily Introscope
Title: Fortinet Critical Alert: CVE-2025-64155 RCE & Config Leaks Exposed
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 00:29:27 +0000
════════════════════════
Tags: #Vulnerability Report
Title: VoidLink: The “Cloud-First” Malware Hunting Your Linux Servers
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 00:21:17 +0000
════════════════════════
Tags: #Malware #Check Point Research #Chinese Threat Actor #Cloud Security #Cobalt Strike #container security #DevOps Security #eBPF #Kubernetes Security #Linux Malware #supply chain attack #VoidLink #Zig Programming Language
Title: Chrome 144 Released: 10 Security Fixes Patch Dangerous V8 Engine Flaws
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 00:16:25 +0000
════════════════════════
Tags: #Vulnerability Report #Blink Engine #browser security #Chrome 144 #CVE_2026_0899 #google chrome #infosec #Patch Alert #V8 JavaScript engine #Web Security
Title: Critical OpenCode Flaws Let Websites Hijack Your PC
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 00:16:21 +0000
════════════════════════
Tags: #Vulnerability Report #AI security #Cross_Site Scripting #CVE_2026_22812 #CVE_2026_22813 #Developer Tools #Drive_by Attack #OpenCode #rce #Remote Code Execution #XSS
Title: Patch Tuesday Jan 2026: Microsoft Fixes 114 Flaws & 3 Zero-Days
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 00:11:47 +0000
════════════════════════
Tags: #Vulnerability Report #Agere Soft Modem #CISA #CVE_2026_20805 #LSASS #Microsoft #Office Vulnerability #Patch Tuesday #Secure Boot #Windows Security #zero_day
Title: Spy, Steal, Lock: deVixor Android Trojan Hits Banking & Crypto Users
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 00:11:08 +0000
════════════════════════
Tags: #Malware #Android Malware #Banking Trojan #Cyble Research #deVixor #Iran Cyber Threat #mobile security #phishing #ransomware #Remote Access Trojan (RAT) #SMS Stealer
Title: Critical Appsmith Flaw CVE-2026-22794 Allows Account Takeover
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 00:06:38 +0000
════════════════════════
Tags: #Vulnerability Report #Account Takeover #API security #Appsmith #CVE_2026_22794 #host header injection #Low Code Platform #Open Source Security #Password Reset Vulnerability
Title: Elastic Stack Under Fire: 7 New Flaws Expose Files & Crash Servers
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 00:04:13 +0000
════════════════════════
Tags: #Vulnerability Report #Cloud Security #CVE_2026_0532 #Denial of Service #Elastic Stack #Elasticsearch #Kibana #LZ4 Vulnerability #Metricbeat #Packetbeat #Patch Alert #ssrf
Title: Malicious Chrome Extension Drains Crypto via Secret API Keys
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 14 Jan 2026 00:01:12 +0000
════════════════════════
Tags: #Malware #API Key Theft #Chrome Extension Malware #crypto security #Cryptocurrency Scam #MEXC Exchange #Russian cybercrime #Socket Threat Research #Wallet drainer
Title: Masscan vs. Nmap: Port Scanning Guide for Bug Bounty
════════════════════════
𐀪 Author: JPablo13
════════════════════════
Time: Wed, 14 Jan 2026 00:02:50 GMT
════════════════════════
Tags: #bug_bounty #cybersecurity #reconnaissance #hacking #technology
Title: SBOMs vs Asset Inventories: Bridging the Visibility Gap in Software Security
════════════════════════
𐀪 Author: Praveen Malhan
════════════════════════
Time: Wed, 14 Jan 2026 00:48:21 GMT
════════════════════════
Tags: #sbom #open_source_security #asset_inventory #supply_chain_security #application_security
Title: Malware Development with NIM — Malicious Self-Replication
════════════════════════
𐀪 Author: Edgar Huemac Sanchez Hernandez
════════════════════════
Time: Wed, 14 Jan 2026 00:47:18 GMT
════════════════════════
Tags: #infosec #programming #cybersecurity #nim #malware