⤷ Title: Email Scam With A Human Touch
════════════════════════
𐀪 Author: Elizabeth Emerald
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 16:32:17 GMT
════════════════════════
⌗ Tags: #this_happened_to_me #scam #hacking #generative_ai_tools #chatgpt
════════════════════════
𐀪 Author: Elizabeth Emerald
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 16:32:17 GMT
════════════════════════
⌗ Tags: #this_happened_to_me #scam #hacking #generative_ai_tools #chatgpt
Medium
Email Scam With A Human Touch
Prankster avails himself of an offer for assistance
⤷ Title: Unpacking Microsoft Defender for Office 365: Day 5 SOC Triage—Email Authentication Deep Dive (SPF…
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:14:21 GMT
════════════════════════
⌗ Tags: #microsoft_defender #infosec #email_authentication #cyber_security_awareness #email_security
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:14:21 GMT
════════════════════════
⌗ Tags: #microsoft_defender #infosec #email_authentication #cyber_security_awareness #email_security
Medium
Unpacking Microsoft Defender for Office 365: Day 5 SOC Triage—Email Authentication Deep Dive (SPF…
Security teams receive 300+ phishing emails daily, with 80% using spoofed sender addresses. Email authentication protocols prevent…
⤷ Title: Security Isn’t Broken — Our Assumptions Are
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:11:31 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #cybersecurity #security_engineering #offensive_security
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:11:31 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #cybersecurity #security_engineering #offensive_security
Medium
Security Isn’t Broken — Our Assumptions Are
Most people think cybersecurity fails because systems are weak.
⤷ Title: How Cursor AI Became My Full-Stack Development Partner: From Arduino Code to Visual Validation
════════════════════════
𐀪 Author: Andrey Pautov
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 16:38:01 GMT
════════════════════════
⌗ Tags: #ai #arduino #penetration_testing #cursor #cybersecurity
════════════════════════
𐀪 Author: Andrey Pautov
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 16:38:01 GMT
════════════════════════
⌗ Tags: #ai #arduino #penetration_testing #cursor #cybersecurity
Medium
Hacker Tool Development Workflow: Android Rubber Ducky Payloads in Cursor AI
From plain-English prompts to reliable HID flows — validated with emulator screenshots and telemetry
⤷ Title: Agentic AI in penetration testing
════════════════════════
𐀪 Author: Andrea Valle
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 16:08:02 GMT
════════════════════════
⌗ Tags: #generative_ai_tools #agentic_applications #ai #penetration_testing #agentic_ai
════════════════════════
𐀪 Author: Andrea Valle
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 16:08:02 GMT
════════════════════════
⌗ Tags: #generative_ai_tools #agentic_applications #ai #penetration_testing #agentic_ai
Medium
Agentic AI in penetration testing
The term agentic AI refers to artificial intelligence systems designed to act as agents rather than passive tools. An agentic AI can…
⤷ Title: SimpleCTF TryHackme Walkthrough
════════════════════════
𐀪 Author: Vishnu P
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:12:16 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: Vishnu P
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:12:16 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough
Medium
SimpleCTF TryHackme Walkthrough
1. Initial Reconnaissance with Nmap
⤷ Title: TryHackMe Mr. Robot Walkthrough
════════════════════════
𐀪 Author: Vishnu P
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:12:06 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: Vishnu P
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:12:06 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme
Medium
TryHackMe Mr. Robot Walkthrough
Mr. Robot CTF Walkthrough: A Detailed Guide
⤷ Title: Linux Basic Commands for Beginners: Essential Commands Every Beginner Should Learn
════════════════════════
𐀪 Author: Shadow Attackers
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 16:01:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #linux_commands #basics_linux #beginner_tutorial #ethical_hacking
════════════════════════
𐀪 Author: Shadow Attackers
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 16:01:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #linux_commands #basics_linux #beginner_tutorial #ethical_hacking
Medium
Linux Basic Commands for Beginners: Essential Commands Every Beginner Should Learn
If you want to learn the Linux operating system or start a career in cyber security, ethical hacking, or programming, then learning Linux…
⤷ Title: Tens of Thousands of Users Report X Outage Under Elon Musk
════════════════════════
𐀪 Author: nianews24usa
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:57:17 GMT
════════════════════════
⌗ Tags: #xs #x_not_working #x_down #elon_musk #news
════════════════════════
𐀪 Author: nianews24usa
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:57:17 GMT
════════════════════════
⌗ Tags: #xs #x_not_working #x_down #elon_musk #news
Medium
Tens of Thousands of Users Report X Outage Under Elon Musk
In the past, major X disruptions have often been tied to broader internet issues, including a Cloudflare outage last November. This time…
⤷ Title: BAC = $$$
════════════════════════
𐀪 Author: Rajveer
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:59:33 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #broken_access_control #information_disclosure #authentication #bug_bounty
════════════════════════
𐀪 Author: Rajveer
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:59:33 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #broken_access_control #information_disclosure #authentication #bug_bounty
Medium
BAC = $$$
It was a popular target hunted by many hackers, and there were many assets in scope — enough to make it confusing to know where to start
⤷ Title: GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: ICE Agent Doxxing Platform was Crippled After Coordinated DDoS Attack
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:17:17 +0000
════════════════════════
⌗ Tags: #Cyber Attacks #Security #Cyber Attack #Cyber Crime #Cybersecurity #DDOS #ICE #ICE List #Netherlands #Privacy #USA
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:17:17 +0000
════════════════════════
⌗ Tags: #Cyber Attacks #Security #Cyber Attack #Cyber Crime #Cybersecurity #DDOS #ICE #ICE List #Netherlands #Privacy #USA
Hackread
ICE Agent Doxxing Platform was Crippled After Coordinated DDoS Attack
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Security 101: The One HTTP Header That Stops Code Injection Attacks
════════════════════════
𐀪 Author: Kunal Sinha
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:22:14 GMT
════════════════════════
⌗ Tags: #application_security #cybersecurity #web_development #javanoscript #web_security
════════════════════════
𐀪 Author: Kunal Sinha
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:22:14 GMT
════════════════════════
⌗ Tags: #application_security #cybersecurity #web_development #javanoscript #web_security
Medium
Security 101: The One HTTP Header That Stops Code Injection Attacks
Content Security Policy (CSP) is a critical security mechanism that helps protect web applications against Cross-Site Scripting (XSS) and…
⤷ Title: From SQL to Root: PostgreSQL (pg_write_server_files in
════════════════════════
𐀪 Author: Oz
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:22:54 GMT
════════════════════════
⌗ Tags: #technology #hacking #postgresql #cybersecurity #software_development
════════════════════════
𐀪 Author: Oz
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:22:54 GMT
════════════════════════
⌗ Tags: #technology #hacking #postgresql #cybersecurity #software_development
Medium
From SQL to Root: PostgreSQL (pg_write_server_files)
PostgreSQL is a powerhouse of data, but in the hands of a misconfigured system, it can become a direct gateway to your operating system…
⤷ Title: Lab: SQL injection vulnerability allowing login bypass
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:18:50 GMT
════════════════════════
⌗ Tags: #ctf #hacking #portswigger_lab #pentesting #portswigger
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:18:50 GMT
════════════════════════
⌗ Tags: #ctf #hacking #portswigger_lab #pentesting #portswigger
Medium
Lab: SQL injection vulnerability allowing login bypass
Bu labda, uygulamanın login fonksiyonunda bulunan bir SQL Injection zafiyetini inceledim. Ama mesele sadece klasik bir SQLi değildi; asıl…
⤷ Title: Identity Shield 2026: Day 1—Where Cybersecurity Meets Innovation (And I’m Already Hooked!)
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:43:13 GMT
════════════════════════
⌗ Tags: #cybersecurity_summit #tech_conference #cybersecurity #infosec #ai_and_security
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:43:13 GMT
════════════════════════
⌗ Tags: #cybersecurity_summit #tech_conference #cybersecurity #infosec #ai_and_security
Medium
Identity Shield 2026: Day 1—Where Cybersecurity Meets Innovation (And I’m Already Hooked!)
When knowledge meets passion, magic happens. Here’s my Day 1 journey.
⤷ Title: “Think Your Password Is Strong?’’ John the Ripper Might Disagree.
════════════════════════
𐀪 Author: Leaving Nadir
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:37:35 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #password_security #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Leaving Nadir
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:37:35 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #password_security #cybersecurity #penetration_testing
Medium
“Think Your Password Is Strong?’’ John the Ripper Might Disagree.
For anyone studying cybersecurity seriously, password security stops being a theoretical concept very quickly. Once you move beyond basics…
⤷ Title: Try Hack Me- Mnemonic CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:22:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_writeup #tryhackme #penetration_testing #tryhackme_walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:22:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_writeup #tryhackme #penetration_testing #tryhackme_walkthrough
Medium
Try Hack Me- Mnemonic CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: TryHackMe Writeup: Archangel
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:55:26 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #cybercrime #tryhackme_walkthrough #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:55:26 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #cybercrime #tryhackme_walkthrough #tryhackme #cybersecurity
Medium
TryHackMe Writeup: Archangel
Yeni bir CTF, yeni bir macera. Hedefimiz Mafialive. Bu makinede, standart keşif süreçlerinin ötesinde, “Gördüğünü Okuma” yeteneğinin ve…
⤷ Title: TryHackMe | SSTI | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cyber_security_awareness
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cyber_security_awareness
Medium
TryHackMe | SSTI | WriteUp
Learn what Server Side Template Injection is and how to exploit it!
⤷ Title: Why Cybersecurity is Important in Today’s Digital World
════════════════════════
𐀪 Author: Nishubirla
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:01:15 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Nishubirla
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:01:15 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #ethical_hacking
Medium
Why Cybersecurity is Important in Today’s Digital World
Introduction