⤷ Title: Why I Wiped the Crack and Went Back to “Community” by Choice (The Full Story)
════════════════════════
𐀪 Author: Mohamed Hwedy
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:33:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #web_security #ethical_hacking
════════════════════════
𐀪 Author: Mohamed Hwedy
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:33:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #web_security #ethical_hacking
Medium
Why I Wiped the Crack and Went Back to “Community” by Choice (The Full Story)
بِسْمِ اللَّهِ الرَّحْمَنِ الرَّحِيمِ، وَالصَّلَاةُ وَالسَّلَامُ عَلَى أَشْرَفِ الْمُرْسَلِينَ سَيِّدِنَا مُحَمَّدٍ، وَعَلَى آلِهِ…
⤷ Title: Secure file upload validation in .NET: A layered approach
════════════════════════
𐀪 Author: Christian Haase
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 19:11:51 GMT
════════════════════════
⌗ Tags: #application_security #secure_coding #aspnetcore #file_validation #dotnet
════════════════════════
𐀪 Author: Christian Haase
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 19:11:51 GMT
════════════════════════
⌗ Tags: #application_security #secure_coding #aspnetcore #file_validation #dotnet
Medium
Secure file upload validation in .NET: A layered approach
I thought file uploads were simple… until I saw how often they aren’t. This article shows a practical .NET baseline that covers common…
⤷ Title: AI vs. AI: The Autonomous Arms Race of 2026
════════════════════════
𐀪 Author: M.A.G | Cybersecurity | F. Policy | Music | Tech |
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:49:58 GMT
════════════════════════
⌗ Tags: #hacking #ai #malware #google #cybersecurity
════════════════════════
𐀪 Author: M.A.G | Cybersecurity | F. Policy | Music | Tech |
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:49:58 GMT
════════════════════════
⌗ Tags: #hacking #ai #malware #google #cybersecurity
Medium
AI vs. AI: The Autonomous Arms Race of 2026
What we need to know
⤷ Title: The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night
════════════════════════
𐀪 Author: Tarek CHEIKH
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:44:48 GMT
════════════════════════
⌗ Tags: #security #aws_s3 #aws #infosec #data
════════════════════════
𐀪 Author: Tarek CHEIKH
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 18:44:48 GMT
════════════════════════
⌗ Tags: #security #aws_s3 #aws #infosec #data
Medium
The Hidden Backbone of the Internet: Why S3 Security Should Keep You Up at Night
Part 1 of 4 in the S3 Security Series
⤷ Title: Attacktive Directory TryHackMe Walkthrough | Active Directory Kerberos Exploitation
════════════════════════
𐀪 Author: Mohamed Rashith S
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 19:41:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #kerberos #active_directory #tryhackme #penetration_testing
════════════════════════
𐀪 Author: Mohamed Rashith S
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 19:41:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #kerberos #active_directory #tryhackme #penetration_testing
Medium
Attacktive Directory TryHackMe Walkthrough | Active Directory Kerberos Exploitation
Category: Active Directory | Kerberos | Windows Domain Attacks Difficulty: Medium Platform: TryHackMe
⤷ Title: OWASP Juice Shop: Docker Üzerinde Kurulum (Windows)
════════════════════════
𐀪 Author: Volkan Yılmaz
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:52:30 GMT
════════════════════════
⌗ Tags: #owasp #juice_shop #siber_güvenlik #penetration_testing #owasp_juice_shop
════════════════════════
𐀪 Author: Volkan Yılmaz
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 17:52:30 GMT
════════════════════════
⌗ Tags: #owasp #juice_shop #siber_güvenlik #penetration_testing #owasp_juice_shop
Medium
OWASP Juice Shop: Docker Üzerinde Kurulum (Windows)
Bu rehberde sizlere OWASP Juice Shop’un ne olduğuna ve Kali ya da Node.js’e gerekmeden Windows Server’da nasıl kurabileceğinize…
⤷ Title: XOR’un Labirenti
════════════════════════
𐀪 Author: Onurgorur
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:00:58 GMT
════════════════════════
⌗ Tags: #siber_guvenlik #ctf #ctf_writeup #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Onurgorur
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:00:58 GMT
════════════════════════
⌗ Tags: #siber_guvenlik #ctf #ctf_writeup #tryhackme #cybersecurity
Medium
XOR’un Labirenti
Siber güvenlik yolculuğumda bazen en basit görünen algoritmalar, en öğretici anlara dönüşebiliyor. Geçenlerde karşılaştığım bir XOR tabanlı…
⤷ Title: AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 01:01:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 01:01:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: New PayPal Scam Sends Verified Invoices With Fake Support Numbers
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:52:49 +0000
════════════════════════
⌗ Tags: #Phishing Scam #Security #Callback #Cybersecurity #Fraud #Paypal #Phishing #Privacy #Scam
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:52:49 +0000
════════════════════════
⌗ Tags: #Phishing Scam #Security #Callback #Cybersecurity #Fraud #Paypal #Phishing #Privacy #Scam
Hackread
New PayPal Scam Sends Verified Invoices With Fake Support Numbers
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: How do I feel about finding bugs as my meal?
════════════════════════
𐀪 Author: Imran Niaz
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:36:42 GMT
════════════════════════
⌗ Tags: #api #bug_bounty #pentesting #facebook #hacking
════════════════════════
𐀪 Author: Imran Niaz
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:36:42 GMT
════════════════════════
⌗ Tags: #api #bug_bounty #pentesting #facebook #hacking
Medium
How do I feel about finding bugs as my meal?
In real life, my fascination with cybersecurity began when I volunteered to help a local business secure its network after it experienced…
⤷ Title: Getting Started with CAI Framework: Building Multi-Agent Systems in Minutes
════════════════════════
𐀪 Author: MrGood
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:07:51 GMT
════════════════════════
⌗ Tags: #pentesting #infosec #framework #automation_testing #ai
════════════════════════
𐀪 Author: MrGood
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:07:51 GMT
════════════════════════
⌗ Tags: #pentesting #infosec #framework #automation_testing #ai
Medium
Getting Started with CAI Framework: Building Multi-Agent Systems in Minutes
In the rapidly evolving landscape of AI, the ability to orchestrate multiple agents to work in parallel is becoming a game-changer. Whether…
⤷ Title: Escaping the Corridor — TryHackMe: A Guide to IDOR and MD5 Obfuscation
════════════════════════
𐀪 Author: Hemantha Krishna Challa
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:21:44 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #tryhackme #cyberattack #tryhackme_writeup
════════════════════════
𐀪 Author: Hemantha Krishna Challa
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:21:44 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #tryhackme #cyberattack #tryhackme_writeup
Medium
Escaping the Corridor — TryHackMe: A Guide to IDOR and MD5 Obfuscation
Can you escape the Corridor?
⤷ Title: Hackthebox Module: Password Attacks | Windows Credential Manager Exploitation
════════════════════════
𐀪 Author: Sunain
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:52:47 GMT
════════════════════════
⌗ Tags: #hackthebox #hackthebox_writeup #htb #hackthebox_walkthrough #cybersecurity
════════════════════════
𐀪 Author: Sunain
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:52:47 GMT
════════════════════════
⌗ Tags: #hackthebox #hackthebox_writeup #htb #hackthebox_walkthrough #cybersecurity
Medium
Hackthebox Module: Password Attacks | Windows Credential Manager Exploitation
Introduction
Windows Credential Manager is a native Windows feature used to store encrypted credentials for users and applications. In this…
Windows Credential Manager is a native Windows feature used to store encrypted credentials for users and applications. In this…
⤷ Title: A Hands-On Ethical Hacking Capstone: SQL Injection, Web Misconfigurations, SMB Exploits, and PCAP…
════════════════════════
𐀪 Author: Edwin Atali
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:42:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #netacad #cisco #parocyber #cybersecurity
════════════════════════
𐀪 Author: Edwin Atali
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 20:42:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #netacad #cisco #parocyber #cybersecurity
Medium
A Hands-On Ethical Hacking Capstone: SQL Injection, Web Misconfigurations, SMB Exploits, and PCAP…
As part of the Parocyber × Cisco NetAcad Ethical Hacking Program, I completed a capstone penetration testing assignment designed to…
⤷ Title: APRENDA AUTOPSY: Domine Análise Forense Digital, Recuperação de Evidências e Investigação de…
════════════════════════
𐀪 Author: Diego Rodrigues
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 23:47:08 GMT
════════════════════════
⌗ Tags: #hacking #kali_linux #autopsy
════════════════════════
𐀪 Author: Diego Rodrigues
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 23:47:08 GMT
════════════════════════
⌗ Tags: #hacking #kali_linux #autopsy
Medium
APRENDA AUTOPSY: Domine Análise Forense Digital, Recuperação de Evidências e Investigação de…
#BestSeller Duplo #Amazon #Top01 em Livros de Hacking em Computação
⤷ Title: KALI LINUX FORENSE DIGITAL 2025: Domine Técnicas, Ferramentas e Protocolos para Investigações em…
════════════════════════
𐀪 Author: Diego Rodrigues
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 23:43:40 GMT
════════════════════════
⌗ Tags: #hacking #kali_linux #forense_digital
════════════════════════
𐀪 Author: Diego Rodrigues
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 23:43:40 GMT
════════════════════════
⌗ Tags: #hacking #kali_linux #forense_digital
Medium
KALI LINUX FORENSE DIGITAL 2025: Domine Técnicas, Ferramentas e Protocolos para Investigações em…
#BestSeller Duplo #Amazon #Top02 em Livros de Hacking em Computação
⤷ Title: Eurail Investigates Security Incident Involving Potential Exfiltration of Customer Data
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 22:41:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #news #data_breach #infosec
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 22:41:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #news #data_breach #infosec
Medium
Eurail Investigates Security Incident Involving Potential Exfiltration of Customer Data
Eurail B.V., the operator behind the Eurail and Interrail rail pass programs, has confirmed a data security incident that resulted in…
⤷ Title: From File Upload to Remote Code Execution (byp4ss3d)
════════════════════════
𐀪 Author: Gregory Kovalchuk
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:58:49 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #ctf #php #puzzle
════════════════════════
𐀪 Author: Gregory Kovalchuk
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:58:49 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #ctf #php #puzzle
Medium
From File Upload to Remote Code Execution (byp4ss3d)
In the world of Capture The Flag (CTF) competitions, few moments are as satisfying as turning a simple file upload button into a fully…
⤷ Title: BreachForum is New victim of hackers.
════════════════════════
𐀪 Author: KiLo "HaCK3r " Cantrell
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:53:31 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #life #data_science #information_technology
════════════════════════
𐀪 Author: KiLo "HaCK3r " Cantrell
════════════════════════
ⴵ Time: Thu, 15 Jan 2026 21:53:31 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #life #data_science #information_technology
Medium
BreachForum is New victim of hackers.
The information breach, which was made public on a site associated with the hacking group ShinyHunters, contains data for approximately…
⤷ Title: OpenStack Admin Forgery: CVE-2026-22797 Lets Users ‘Ask’ for Root
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 01:54:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Authentication Bypass #Cloud Security #CVE_2026_22797 #Identity Security #Keystonemiddleware #OAuth2 #OpenStack #Patch Alert #privilege escalation #red hat
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 01:54:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Authentication Bypass #Cloud Security #CVE_2026_22797 #Identity Security #Keystonemiddleware #OAuth2 #OpenStack #Patch Alert #privilege escalation #red hat
Daily CyberSecurity
OpenStack Admin Forgery: CVE-2026-22797 Lets Users 'Ask' for Root
OpenStack patches CVE-2026-22797 (Privilege Escalation). Flaw in OAuth2 middleware allows header forgery for admin access. Update keystonemiddleware now.
⤷ Title: Trusted Tool Turned Traitor: Signed ‘ahost.exe’ Weaponized to Sideload Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 00:12:59 +0000
════════════════════════
⌗ Tags: #Vulnerability #AgentTesla #ahost.exe #c_ares #DLL Sideloading #GitKraken #infosec #living_off_the_land #Malware Analysis #Remcos #supply chain attack #Trellix
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 00:12:59 +0000
════════════════════════
⌗ Tags: #Vulnerability #AgentTesla #ahost.exe #c_ares #DLL Sideloading #GitKraken #infosec #living_off_the_land #Malware Analysis #Remcos #supply chain attack #Trellix
Daily CyberSecurity
Trusted Tool Turned Traitor: Signed 'ahost.exe' Weaponized to Sideload Malware
Attackers exploit legitimate ahost.exe via DLL sideloading to deploy RATs & stealers. Trusted dev utility bypasses security scanners. Watch out.