⤷ Title: Tens of Thousands of Users Report X Outage Under Elon Musk
════════════════════════
𐀪 Author: nianews24usa
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:57:17 GMT
════════════════════════
⌗ Tags: #xs #x_not_working #x_down #elon_musk #news
════════════════════════
𐀪 Author: nianews24usa
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:57:17 GMT
════════════════════════
⌗ Tags: #xs #x_not_working #x_down #elon_musk #news
Medium
Tens of Thousands of Users Report X Outage Under Elon Musk
In the past, major X disruptions have often been tied to broader internet issues, including a Cloudflare outage last November. This time…
⤷ Title: BAC = $$$
════════════════════════
𐀪 Author: Rajveer
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:59:33 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #broken_access_control #information_disclosure #authentication #bug_bounty
════════════════════════
𐀪 Author: Rajveer
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 17:59:33 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #broken_access_control #information_disclosure #authentication #bug_bounty
Medium
BAC = $$$
It was a popular target hunted by many hackers, and there were many assets in scope — enough to make it confusing to know where to start
⤷ Title: GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: ICE Agent Doxxing Platform was Crippled After Coordinated DDoS Attack
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:17:17 +0000
════════════════════════
⌗ Tags: #Cyber Attacks #Security #Cyber Attack #Cyber Crime #Cybersecurity #DDOS #ICE #ICE List #Netherlands #Privacy #USA
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:17:17 +0000
════════════════════════
⌗ Tags: #Cyber Attacks #Security #Cyber Attack #Cyber Crime #Cybersecurity #DDOS #ICE #ICE List #Netherlands #Privacy #USA
Hackread
ICE Agent Doxxing Platform was Crippled After Coordinated DDoS Attack
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Security 101: The One HTTP Header That Stops Code Injection Attacks
════════════════════════
𐀪 Author: Kunal Sinha
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:22:14 GMT
════════════════════════
⌗ Tags: #application_security #cybersecurity #web_development #javanoscript #web_security
════════════════════════
𐀪 Author: Kunal Sinha
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:22:14 GMT
════════════════════════
⌗ Tags: #application_security #cybersecurity #web_development #javanoscript #web_security
Medium
Security 101: The One HTTP Header That Stops Code Injection Attacks
Content Security Policy (CSP) is a critical security mechanism that helps protect web applications against Cross-Site Scripting (XSS) and…
⤷ Title: From SQL to Root: PostgreSQL (pg_write_server_files in
════════════════════════
𐀪 Author: Oz
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:22:54 GMT
════════════════════════
⌗ Tags: #technology #hacking #postgresql #cybersecurity #software_development
════════════════════════
𐀪 Author: Oz
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:22:54 GMT
════════════════════════
⌗ Tags: #technology #hacking #postgresql #cybersecurity #software_development
Medium
From SQL to Root: PostgreSQL (pg_write_server_files)
PostgreSQL is a powerhouse of data, but in the hands of a misconfigured system, it can become a direct gateway to your operating system…
⤷ Title: Lab: SQL injection vulnerability allowing login bypass
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:18:50 GMT
════════════════════════
⌗ Tags: #ctf #hacking #portswigger_lab #pentesting #portswigger
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:18:50 GMT
════════════════════════
⌗ Tags: #ctf #hacking #portswigger_lab #pentesting #portswigger
Medium
Lab: SQL injection vulnerability allowing login bypass
Bu labda, uygulamanın login fonksiyonunda bulunan bir SQL Injection zafiyetini inceledim. Ama mesele sadece klasik bir SQLi değildi; asıl…
⤷ Title: Identity Shield 2026: Day 1—Where Cybersecurity Meets Innovation (And I’m Already Hooked!)
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:43:13 GMT
════════════════════════
⌗ Tags: #cybersecurity_summit #tech_conference #cybersecurity #infosec #ai_and_security
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:43:13 GMT
════════════════════════
⌗ Tags: #cybersecurity_summit #tech_conference #cybersecurity #infosec #ai_and_security
Medium
Identity Shield 2026: Day 1—Where Cybersecurity Meets Innovation (And I’m Already Hooked!)
When knowledge meets passion, magic happens. Here’s my Day 1 journey.
⤷ Title: “Think Your Password Is Strong?’’ John the Ripper Might Disagree.
════════════════════════
𐀪 Author: Leaving Nadir
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:37:35 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #password_security #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Leaving Nadir
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:37:35 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #password_security #cybersecurity #penetration_testing
Medium
“Think Your Password Is Strong?’’ John the Ripper Might Disagree.
For anyone studying cybersecurity seriously, password security stops being a theoretical concept very quickly. Once you move beyond basics…
⤷ Title: Try Hack Me- Mnemonic CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:22:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_writeup #tryhackme #penetration_testing #tryhackme_walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:22:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_writeup #tryhackme #penetration_testing #tryhackme_walkthrough
Medium
Try Hack Me- Mnemonic CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: TryHackMe Writeup: Archangel
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:55:26 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #cybercrime #tryhackme_walkthrough #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:55:26 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #cybercrime #tryhackme_walkthrough #tryhackme #cybersecurity
Medium
TryHackMe Writeup: Archangel
Yeni bir CTF, yeni bir macera. Hedefimiz Mafialive. Bu makinede, standart keşif süreçlerinin ötesinde, “Gördüğünü Okuma” yeteneğinin ve…
⤷ Title: TryHackMe | SSTI | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cyber_security_awareness
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cyber_security_awareness
Medium
TryHackMe | SSTI | WriteUp
Learn what Server Side Template Injection is and how to exploit it!
⤷ Title: Why Cybersecurity is Important in Today’s Digital World
════════════════════════
𐀪 Author: Nishubirla
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:01:15 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Nishubirla
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:01:15 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #ethical_hacking
Medium
Why Cybersecurity is Important in Today’s Digital World
Introduction
⤷ Title: API Gateway Security
════════════════════════
𐀪 Author: Prettycybergirl
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:13:34 GMT
════════════════════════
⌗ Tags: #technology #api #api_security #api_gateway #cybersecurity
════════════════════════
𐀪 Author: Prettycybergirl
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:13:34 GMT
════════════════════════
⌗ Tags: #technology #api #api_security #api_gateway #cybersecurity
Medium
API Gateway Security
I learned about API gateways, how to hack them and how to secure them. Then I decided, why not write about what I now know, so someone else…
⤷ Title: Understanding SSRF: How Hackers Turn Your Server Into a Secret Proxy
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:36:11 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #understanding #cybersecurity #ssrf #bug_bounty_writeup
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:36:11 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #understanding #cybersecurity #ssrf #bug_bounty_writeup
Medium
Understanding SSRF: How Hackers Turn Your Server Into a Secret Proxy
What is SSRF?
⤷ Title: ThugSquad: Mysterious Russian Cybercrime Group
════════════════════════
𐀪 Author: Jasper Chippindall
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:46:04 GMT
════════════════════════
⌗ Tags: #hacking #extortion #doxing #fraud #cybercrime
════════════════════════
𐀪 Author: Jasper Chippindall
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:46:04 GMT
════════════════════════
⌗ Tags: #hacking #extortion #doxing #fraud #cybercrime
Medium
ThugSquad: Mysterious Russian Cybercrime Group
Cybercrime isn’t just about hacking accounts or stealing money online — it’s increasingly a mix of digital fraud, harassment, and even…
⤷ Title: xozyl and AbuseFraud: Inside an Unknown Cybercrime Group
════════════════════════
𐀪 Author: Jasper Chippindall
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:34:03 GMT
════════════════════════
⌗ Tags: #cybercrime #online_security #cryptocurrecy #hacking #digital_frauds
════════════════════════
𐀪 Author: Jasper Chippindall
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:34:03 GMT
════════════════════════
⌗ Tags: #cybercrime #online_security #cryptocurrecy #hacking #digital_frauds
Medium
xozyl and AbuseFraud: Inside an Unknown Cybercrime Group
The online figure known as “xozyl” has drawn attention in cybersecurity circles for a string of sophisticated digital crimes. According to…
⤷ Title: The New Standard of Digital Trust: Why Rankiteo is a Game-Changer
════════════════════════
𐀪 Author: Jeremy C
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:17:05 GMT
════════════════════════
⌗ Tags: #insurance #cyber_rating #hacking #it_security #cybersecurity
════════════════════════
𐀪 Author: Jeremy C
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:17:05 GMT
════════════════════════
⌗ Tags: #insurance #cyber_rating #hacking #it_security #cybersecurity
Medium
The New Standard of Digital Trust: Why Rankiteo is a Game-Changer
For years, understanding a company’s cybersecurity posture felt like trying to solve a puzzle in the dark. If you wanted to know how secure…
⤷ Title: CloudGoat AWS Key Rotation
════════════════════════
𐀪 Author: Spookz
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:38:09 GMT
════════════════════════
⌗ Tags: #aws #ethical_hacking #penetration_testing #cloudgoat #cybersecurity
════════════════════════
𐀪 Author: Spookz
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:38:09 GMT
════════════════════════
⌗ Tags: #aws #ethical_hacking #penetration_testing #cloudgoat #cybersecurity
Medium
CloudGoat AWS Key Rotation
Hallo Freunde!
⤷ Title: Brute-it
════════════════════════
𐀪 Author: Jadem Yasser
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:02:21 GMT
════════════════════════
⌗ Tags: #linux #apache #penetration_testing #ethical_hacking #web
════════════════════════
𐀪 Author: Jadem Yasser
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:02:21 GMT
════════════════════════
⌗ Tags: #linux #apache #penetration_testing #ethical_hacking #web
Medium
Brute-it
Tryhackme
⤷ Title: Day 18 — Obfuscation: The Egg Shell File
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:46:36 GMT
════════════════════════
⌗ Tags: #tryhackme #advent_of_cyber_2025 #tryhackme_writeup #cybersecurity #tryhackme_walkthrough
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:46:36 GMT
════════════════════════
⌗ Tags: #tryhackme #advent_of_cyber_2025 #tryhackme_writeup #cybersecurity #tryhackme_walkthrough
Medium
Day 18 — Obfuscation: The Egg Shell File
Day 18 — Obfuscation: The Egg Shell File Narrative WareVille hasn’t felt right since the wormhole appeared. Alerts are firing nonstop, dashboards are spiking, and the SOC is running on caffeine …