⤷ Title: Setting Up and Listening for Incoming Connections: A Complete Guide to Testing Backdoors
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 14:32:59 GMT
════════════════════════
⌗ Tags: #man_in_the_middle_attack #mitm_attacks #mitm #hacking #backdoor
════════════════════════
𐀪 Author: Vignesh R
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 14:32:59 GMT
════════════════════════
⌗ Tags: #man_in_the_middle_attack #mitm_attacks #mitm #hacking #backdoor
Medium
Setting Up and Listening for Incoming Connections: A Complete Guide to Testing Backdoors
ARP spoofing & Man In The Middle Attacks Execution & Detection
⤷ Title: MongoBleed Explained in Plain English
════════════════════════
𐀪 Author: Faisal Feroz
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 13:51:27 GMT
════════════════════════
⌗ Tags: #security #vulnerability_management #mongodb #cybersecurity #hacking
════════════════════════
𐀪 Author: Faisal Feroz
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 13:51:27 GMT
════════════════════════
⌗ Tags: #security #vulnerability_management #mongodb #cybersecurity #hacking
Medium
MongoBleed Explained in Plain English
How a one-line bug exposed 87,000+ MongoDB servers
⤷ Title: Security Analysis and Program Hardening on a Flask–SQLite CRUD App
════════════════════════
𐀪 Author: Daifullah Noor Azmi
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:00:21 GMT
════════════════════════
⌗ Tags: #web_security #penetration_testing #flask #owasp #cybersecurity
════════════════════════
𐀪 Author: Daifullah Noor Azmi
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:00:21 GMT
════════════════════════
⌗ Tags: #web_security #penetration_testing #flask #owasp #cybersecurity
Medium
Security Analysis and Program Hardening on a Flask–SQLite CRUD App
Executive Summary
⤷ Title: Website Security Scanning Tools: A Practical Guide to 15 Free and Open-Source Options
════════════════════════
𐀪 Author: Ewan Mak
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 17:44:20 GMT
════════════════════════
⌗ Tags: #zero_trust #security #penetration_testing #cloud_security #vulnerability
════════════════════════
𐀪 Author: Ewan Mak
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 17:44:20 GMT
════════════════════════
⌗ Tags: #zero_trust #security #penetration_testing #cloud_security #vulnerability
Medium
Website Security Scanning Tools: A Practical Guide to 15 Free and Open-Source Options
Security breaches cost more than most business owners anticipate. IBM’s 2024 Cost of a Data Breach Report pegs the global average at USD…
⤷ Title: Try Hack Me- HA Joker CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:49:44 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme_writeup
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:49:44 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme_writeup
Medium
Try Hack Me- HA Joker CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: Why Proper Pentest Scoping Determines Project Success
════════════════════════
𐀪 Author: Sachin Sawant
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:12:23 GMT
════════════════════════
⌗ Tags: #penetration_testing
════════════════════════
𐀪 Author: Sachin Sawant
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:12:23 GMT
════════════════════════
⌗ Tags: #penetration_testing
Medium
Why Proper Pentest Scoping Determines Project Success
Introduction
⤷ Title: CloudGoat AWS SNS Secrets Walkthrough
════════════════════════
𐀪 Author: Spookz
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:02:48 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #aws #cloudgoat #ethical_hacking
════════════════════════
𐀪 Author: Spookz
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:02:48 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #aws #cloudgoat #ethical_hacking
Medium
CloudGoat AWS SNS Secrets Walkthrough
Hallo Freunde!
⤷ Title: Anthem|TryHackMe
════════════════════════
𐀪 Author: Asjamil
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:53:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #web #ctf #tryhackme_writeup
════════════════════════
𐀪 Author: Asjamil
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:53:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #web #ctf #tryhackme_writeup
Medium
Anthem|TryHackMe
This is a free and easy difficulty challenge on try hack me practice room. It’s good to practice because it covers so many topics which…
⤷ Title: Linux Privilege Escalation Tryhackme
════════════════════════
𐀪 Author: theunknownman
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:23:51 GMT
════════════════════════
⌗ Tags: #tryhackme
════════════════════════
𐀪 Author: theunknownman
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:23:51 GMT
════════════════════════
⌗ Tags: #tryhackme
Medium
Linux Privilege Escalation Tryhackme
uname -a
⤷ Title: Firewalls — Writeup
════════════════════════
𐀪 Author: Mahir
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:20:56 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #firewall #tryhackme_writeup
════════════════════════
𐀪 Author: Mahir
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:20:56 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #firewall #tryhackme_writeup
Medium
Firewalls — Writeup
This is a short writeup for the TryHackMe room — Firewalls
⤷ Title: Why Wireshark Finally Made Sense: TryHackMe, College, and the Right Pace
════════════════════════
𐀪 Author: Crystal_cascade14
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:40:01 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ethical_hacking #wowenintech #tech_education
════════════════════════
𐀪 Author: Crystal_cascade14
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:40:01 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ethical_hacking #wowenintech #tech_education
Medium
Why Wireshark Finally Made Sense: TryHackMe, College, and the Right Pace
This article is part of my series Learning Cybersecurity in College: The Honest Version, where I document what it’s like to study…
⤷ Title: Why Thinking Like an Attacker Changes Everything in Cybersecurity
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 17:36:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #offensive_security #internet_security #ethical_hacking #information_security
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 17:36:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #offensive_security #internet_security #ethical_hacking #information_security
Medium
Why Thinking Like an Attacker Changes Everything in Cybersecurity
Cybersecurity is often taught as a checklist.
⤷ Title: Ethical Hacking Course in Trivandrum : A Practical Way Into a High Demand Cyber Security Career
════════════════════════
𐀪 Author: Vazeem Akram
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 17:23:13 GMT
════════════════════════
⌗ Tags: #ethical_hacking_training #cybersecurity_training #cybersecurity #ethical_hacking_course #ethical_hacking
════════════════════════
𐀪 Author: Vazeem Akram
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 17:23:13 GMT
════════════════════════
⌗ Tags: #ethical_hacking_training #cybersecurity_training #cybersecurity #ethical_hacking_course #ethical_hacking
Medium
Ethical Hacking Course in Trivandrum : A Practical Way Into a High Demand Cyber Security Career
⤷ Title: Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 00:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 00:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: New China Linked VoidLink Linux Malware Targets Major Cloud Providers
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:37:24 +0000
════════════════════════
⌗ Tags: #Malware #Security #Alibaba #AWS #Azure #China #cloud #Cyber Attack #Cyber Crime #Cybersecurity #Google Cloud #Tencent #VoidLink
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:37:24 +0000
════════════════════════
⌗ Tags: #Malware #Security #Alibaba #AWS #Azure #China #cloud #Cyber Attack #Cyber Crime #Cybersecurity #Google Cloud #Tencent #VoidLink
Hackread
New China Linked VoidLink Linux Malware Targets Major Cloud Providers
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Structure and reliability in e-commerce platforms
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:02:33 +0000
════════════════════════
⌗ Tags: #eCommerce #Technology #Business #Online Shopping
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:02:33 +0000
════════════════════════
⌗ Tags: #eCommerce #Technology #Business #Online Shopping
Hackread
Structure and reliability in e-commerce platforms
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: A 5-Day Bug Bounty Hunt on a Telecom Target: From Recon to RXSS and Open Redirect
════════════════════════
𐀪 Author: SpiX-7
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:25:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #bug_bounty_writeup #bug_bounty #web_penetration_testing
════════════════════════
𐀪 Author: SpiX-7
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:25:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #bug_bounty_writeup #bug_bounty #web_penetration_testing
Medium
A 5-Day Bug Bounty Hunt on a Telecom Target: From Recon to RXSS and Open Redirect
This story is not about luck.
It is about patience, process, and thinking like the application.
It is about patience, process, and thinking like the application.
⤷ Title: Host Header Injection: A Practical Methodology for Security Testing
════════════════════════
𐀪 Author: Israel Aráoz Severiche
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:09:55 GMT
════════════════════════
⌗ Tags: #pentesting #bug_bounty #web_security #hacking #ethical_hacking
════════════════════════
𐀪 Author: Israel Aráoz Severiche
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:09:55 GMT
════════════════════════
⌗ Tags: #pentesting #bug_bounty #web_security #hacking #ethical_hacking
Medium
Host Header Injection: A Practical Methodology for Security Testing
Host Header Injection is a critical vulnerability that affects web applications relying on the HTTP Host header for various operations…
⤷ Title: Como o Instagram teve dados de usuários expostos em janeiro de 2026: a falha de redefinição de…
════════════════════════
𐀪 Author: Henrique Ribeiro
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 19:36:53 GMT
════════════════════════
⌗ Tags: #api_security #instagram #data_security #infosec #cybersecurity
════════════════════════
𐀪 Author: Henrique Ribeiro
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 19:36:53 GMT
════════════════════════
⌗ Tags: #api_security #instagram #data_security #infosec #cybersecurity
Medium
Como o Instagram teve dados de usuários expostos em janeiro de 2026: a falha de redefinição de senha e a reaparição de um dataset…
Incidente de Exposição de Dados — Fatos Confirmados e Lições de Segurança
⤷ Title: SUID Permission — The Silent Door to Privilege Escalation
════════════════════════
𐀪 Author: PriOFF
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 19:12:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #linux_security #ethical_hacking #privilege_escalation #penetration_testing
════════════════════════
𐀪 Author: PriOFF
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 19:12:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #linux_security #ethical_hacking #privilege_escalation #penetration_testing
Medium
SUID Permission — The Silent Door to Privilege Escalation 🔐
One of my mentors once told me:
⤷ Title: An SSRF Sink You’re Probably Skipping (It Earned Me $700 in Bounties)
════════════════════════
𐀪 Author: Thomas A.
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 20:42:29 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #penetration_testing #bug_bounty_writeup #technology
════════════════════════
𐀪 Author: Thomas A.
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 20:42:29 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #penetration_testing #bug_bounty_writeup #technology
Medium
An SSRF Sink You’re Probably Skipping (It Earned Me $700 in Bounties)
Let me share with you a SSRF sink that many hunters are still missing. Not because it’s hard to find or complicated to exploit. I think it…