⤷ Title: Why Proper Pentest Scoping Determines Project Success
════════════════════════
𐀪 Author: Sachin Sawant
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:12:23 GMT
════════════════════════
⌗ Tags: #penetration_testing
════════════════════════
𐀪 Author: Sachin Sawant
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:12:23 GMT
════════════════════════
⌗ Tags: #penetration_testing
Medium
Why Proper Pentest Scoping Determines Project Success
Introduction
⤷ Title: CloudGoat AWS SNS Secrets Walkthrough
════════════════════════
𐀪 Author: Spookz
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:02:48 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #aws #cloudgoat #ethical_hacking
════════════════════════
𐀪 Author: Spookz
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:02:48 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #aws #cloudgoat #ethical_hacking
Medium
CloudGoat AWS SNS Secrets Walkthrough
Hallo Freunde!
⤷ Title: Anthem|TryHackMe
════════════════════════
𐀪 Author: Asjamil
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:53:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #web #ctf #tryhackme_writeup
════════════════════════
𐀪 Author: Asjamil
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:53:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #web #ctf #tryhackme_writeup
Medium
Anthem|TryHackMe
This is a free and easy difficulty challenge on try hack me practice room. It’s good to practice because it covers so many topics which…
⤷ Title: Linux Privilege Escalation Tryhackme
════════════════════════
𐀪 Author: theunknownman
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:23:51 GMT
════════════════════════
⌗ Tags: #tryhackme
════════════════════════
𐀪 Author: theunknownman
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:23:51 GMT
════════════════════════
⌗ Tags: #tryhackme
Medium
Linux Privilege Escalation Tryhackme
uname -a
⤷ Title: Firewalls — Writeup
════════════════════════
𐀪 Author: Mahir
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:20:56 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #firewall #tryhackme_writeup
════════════════════════
𐀪 Author: Mahir
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 16:20:56 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #firewall #tryhackme_writeup
Medium
Firewalls — Writeup
This is a short writeup for the TryHackMe room — Firewalls
⤷ Title: Why Wireshark Finally Made Sense: TryHackMe, College, and the Right Pace
════════════════════════
𐀪 Author: Crystal_cascade14
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:40:01 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ethical_hacking #wowenintech #tech_education
════════════════════════
𐀪 Author: Crystal_cascade14
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:40:01 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ethical_hacking #wowenintech #tech_education
Medium
Why Wireshark Finally Made Sense: TryHackMe, College, and the Right Pace
This article is part of my series Learning Cybersecurity in College: The Honest Version, where I document what it’s like to study…
⤷ Title: Why Thinking Like an Attacker Changes Everything in Cybersecurity
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 17:36:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #offensive_security #internet_security #ethical_hacking #information_security
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 17:36:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #offensive_security #internet_security #ethical_hacking #information_security
Medium
Why Thinking Like an Attacker Changes Everything in Cybersecurity
Cybersecurity is often taught as a checklist.
⤷ Title: Ethical Hacking Course in Trivandrum : A Practical Way Into a High Demand Cyber Security Career
════════════════════════
𐀪 Author: Vazeem Akram
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 17:23:13 GMT
════════════════════════
⌗ Tags: #ethical_hacking_training #cybersecurity_training #cybersecurity #ethical_hacking_course #ethical_hacking
════════════════════════
𐀪 Author: Vazeem Akram
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 17:23:13 GMT
════════════════════════
⌗ Tags: #ethical_hacking_training #cybersecurity_training #cybersecurity #ethical_hacking_course #ethical_hacking
Medium
Ethical Hacking Course in Trivandrum : A Practical Way Into a High Demand Cyber Security Career
⤷ Title: Researchers Null-Route Over 550 Kimwolf and Aisuru Botnet Command Servers
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 00:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 00:33:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: New China Linked VoidLink Linux Malware Targets Major Cloud Providers
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:37:24 +0000
════════════════════════
⌗ Tags: #Malware #Security #Alibaba #AWS #Azure #China #cloud #Cyber Attack #Cyber Crime #Cybersecurity #Google Cloud #Tencent #VoidLink
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:37:24 +0000
════════════════════════
⌗ Tags: #Malware #Security #Alibaba #AWS #Azure #China #cloud #Cyber Attack #Cyber Crime #Cybersecurity #Google Cloud #Tencent #VoidLink
Hackread
New China Linked VoidLink Linux Malware Targets Major Cloud Providers
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Structure and reliability in e-commerce platforms
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:02:33 +0000
════════════════════════
⌗ Tags: #eCommerce #Technology #Business #Online Shopping
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:02:33 +0000
════════════════════════
⌗ Tags: #eCommerce #Technology #Business #Online Shopping
Hackread
Structure and reliability in e-commerce platforms
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: A 5-Day Bug Bounty Hunt on a Telecom Target: From Recon to RXSS and Open Redirect
════════════════════════
𐀪 Author: SpiX-7
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:25:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #bug_bounty_writeup #bug_bounty #web_penetration_testing
════════════════════════
𐀪 Author: SpiX-7
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:25:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #bug_bounty_writeup #bug_bounty #web_penetration_testing
Medium
A 5-Day Bug Bounty Hunt on a Telecom Target: From Recon to RXSS and Open Redirect
This story is not about luck.
It is about patience, process, and thinking like the application.
It is about patience, process, and thinking like the application.
⤷ Title: Host Header Injection: A Practical Methodology for Security Testing
════════════════════════
𐀪 Author: Israel Aráoz Severiche
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:09:55 GMT
════════════════════════
⌗ Tags: #pentesting #bug_bounty #web_security #hacking #ethical_hacking
════════════════════════
𐀪 Author: Israel Aráoz Severiche
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 18:09:55 GMT
════════════════════════
⌗ Tags: #pentesting #bug_bounty #web_security #hacking #ethical_hacking
Medium
Host Header Injection: A Practical Methodology for Security Testing
Host Header Injection is a critical vulnerability that affects web applications relying on the HTTP Host header for various operations…
⤷ Title: Como o Instagram teve dados de usuários expostos em janeiro de 2026: a falha de redefinição de…
════════════════════════
𐀪 Author: Henrique Ribeiro
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 19:36:53 GMT
════════════════════════
⌗ Tags: #api_security #instagram #data_security #infosec #cybersecurity
════════════════════════
𐀪 Author: Henrique Ribeiro
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 19:36:53 GMT
════════════════════════
⌗ Tags: #api_security #instagram #data_security #infosec #cybersecurity
Medium
Como o Instagram teve dados de usuários expostos em janeiro de 2026: a falha de redefinição de senha e a reaparição de um dataset…
Incidente de Exposição de Dados — Fatos Confirmados e Lições de Segurança
⤷ Title: SUID Permission — The Silent Door to Privilege Escalation
════════════════════════
𐀪 Author: PriOFF
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 19:12:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #linux_security #ethical_hacking #privilege_escalation #penetration_testing
════════════════════════
𐀪 Author: PriOFF
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 19:12:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #linux_security #ethical_hacking #privilege_escalation #penetration_testing
Medium
SUID Permission — The Silent Door to Privilege Escalation 🔐
One of my mentors once told me:
⤷ Title: An SSRF Sink You’re Probably Skipping (It Earned Me $700 in Bounties)
════════════════════════
𐀪 Author: Thomas A.
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 20:42:29 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #penetration_testing #bug_bounty_writeup #technology
════════════════════════
𐀪 Author: Thomas A.
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 20:42:29 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #penetration_testing #bug_bounty_writeup #technology
Medium
An SSRF Sink You’re Probably Skipping (It Earned Me $700 in Bounties)
Let me share with you a SSRF sink that many hunters are still missing. Not because it’s hard to find or complicated to exploit. I think it…
⤷ Title: Hacked Despite 2FA: My LinkedIn Hack Lessons
════════════════════════
𐀪 Author: Ebube Nwankwo
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 21:34:48 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #2fa_bypass #tech #linkedin
════════════════════════
𐀪 Author: Ebube Nwankwo
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 21:34:48 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #2fa_bypass #tech #linkedin
Medium
Hacked Despite 2FA: My LinkedIn Hack Lessons
I used to wonder how people's accounts get hacked, even with 2FA turned on.
⤷ Title: TryHackMe : Blue Machine Writeup
════════════════════════
𐀪 Author: Azzam Mohammed (WHHacker)
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 20:38:08 GMT
════════════════════════
⌗ Tags: #windows_security #ethical_hacking #penetration_testing #tryhackme #cyebrsecurity
════════════════════════
𐀪 Author: Azzam Mohammed (WHHacker)
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 20:38:08 GMT
════════════════════════
⌗ Tags: #windows_security #ethical_hacking #penetration_testing #tryhackme #cyebrsecurity
Medium
TryHackMe : Blue Machine Writeup
Introduction
⤷ Title: What College Gave Me That Online Platforms Didn’t
════════════════════════
𐀪 Author: Crystal_cascade14
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:40:01 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ethical_hacking #wowenintech #tech_education
════════════════════════
𐀪 Author: Crystal_cascade14
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 15:40:01 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ethical_hacking #wowenintech #tech_education
Medium
Why Wireshark Finally Made Sense: TryHackMe, College, and the Right Pace
This article is part of my series Learning Cybersecurity in College: The Honest Version, where I document what it’s like to study…
⤷ Title: Building a Secure, Enterprise-Grade API with AWS: A Deep Dive into API Gateway, Custom Domains, and…
════════════════════════
𐀪 Author: Sasmitha Dasanayaka
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 21:43:41 GMT
════════════════════════
⌗ Tags: #aws_cdk #aws_route53 #lambda_authorizer #api_security #aws_private_api_gateway
════════════════════════
𐀪 Author: Sasmitha Dasanayaka
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 21:43:41 GMT
════════════════════════
⌗ Tags: #aws_cdk #aws_route53 #lambda_authorizer #api_security #aws_private_api_gateway
Medium
Building a Secure, Enterprise-Grade API with AWS: A Deep Dive into API Gateway, Custom Domains, and…
Introduction
⤷ Title: What Will Matter for API Security 2026: The Patterns Behind 2025’s Breaches and the Risks Teams Are…
════════════════════════
𐀪 Author: Akansha Shukla
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 21:28:20 GMT
════════════════════════
⌗ Tags: #owasp_api_security_top_10 #secure_coding #api_development #api_security #secure_api
════════════════════════
𐀪 Author: Akansha Shukla
════════════════════════
ⴵ Time: Wed, 14 Jan 2026 21:28:20 GMT
════════════════════════
⌗ Tags: #owasp_api_security_top_10 #secure_coding #api_development #api_security #secure_api
Medium
What Will Matter for API Security 2026: The Patterns Behind 2025’s Breaches and the Risks Teams Are…
APIs quietly run modern software. From payments and hiring platforms to internal tools and AI workflows, they sit behind nearly every…