⤷ Title: Lab: SQL injection vulnerability allowing login bypass
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:18:50 GMT
════════════════════════
⌗ Tags: #ctf #hacking #portswigger_lab #pentesting #portswigger
════════════════════════
𐀪 Author: Songül Kızılay Özügürler
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:18:50 GMT
════════════════════════
⌗ Tags: #ctf #hacking #portswigger_lab #pentesting #portswigger
Medium
Lab: SQL injection vulnerability allowing login bypass
Bu labda, uygulamanın login fonksiyonunda bulunan bir SQL Injection zafiyetini inceledim. Ama mesele sadece klasik bir SQLi değildi; asıl…
⤷ Title: Identity Shield 2026: Day 1—Where Cybersecurity Meets Innovation (And I’m Already Hooked!)
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:43:13 GMT
════════════════════════
⌗ Tags: #cybersecurity_summit #tech_conference #cybersecurity #infosec #ai_and_security
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:43:13 GMT
════════════════════════
⌗ Tags: #cybersecurity_summit #tech_conference #cybersecurity #infosec #ai_and_security
Medium
Identity Shield 2026: Day 1—Where Cybersecurity Meets Innovation (And I’m Already Hooked!)
When knowledge meets passion, magic happens. Here’s my Day 1 journey.
⤷ Title: “Think Your Password Is Strong?’’ John the Ripper Might Disagree.
════════════════════════
𐀪 Author: Leaving Nadir
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:37:35 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #password_security #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Leaving Nadir
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:37:35 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #password_security #cybersecurity #penetration_testing
Medium
“Think Your Password Is Strong?’’ John the Ripper Might Disagree.
For anyone studying cybersecurity seriously, password security stops being a theoretical concept very quickly. Once you move beyond basics…
⤷ Title: Try Hack Me- Mnemonic CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:22:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_writeup #tryhackme #penetration_testing #tryhackme_walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:22:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_writeup #tryhackme #penetration_testing #tryhackme_walkthrough
Medium
Try Hack Me- Mnemonic CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: TryHackMe Writeup: Archangel
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:55:26 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #cybercrime #tryhackme_walkthrough #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:55:26 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #cybercrime #tryhackme_walkthrough #tryhackme #cybersecurity
Medium
TryHackMe Writeup: Archangel
Yeni bir CTF, yeni bir macera. Hedefimiz Mafialive. Bu makinede, standart keşif süreçlerinin ötesinde, “Gördüğünü Okuma” yeteneğinin ve…
⤷ Title: TryHackMe | SSTI | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cyber_security_awareness
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:46:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cyber_security_awareness
Medium
TryHackMe | SSTI | WriteUp
Learn what Server Side Template Injection is and how to exploit it!
⤷ Title: Why Cybersecurity is Important in Today’s Digital World
════════════════════════
𐀪 Author: Nishubirla
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:01:15 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Nishubirla
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:01:15 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #ethical_hacking
Medium
Why Cybersecurity is Important in Today’s Digital World
Introduction
⤷ Title: API Gateway Security
════════════════════════
𐀪 Author: Prettycybergirl
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:13:34 GMT
════════════════════════
⌗ Tags: #technology #api #api_security #api_gateway #cybersecurity
════════════════════════
𐀪 Author: Prettycybergirl
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 19:13:34 GMT
════════════════════════
⌗ Tags: #technology #api #api_security #api_gateway #cybersecurity
Medium
API Gateway Security
I learned about API gateways, how to hack them and how to secure them. Then I decided, why not write about what I now know, so someone else…
⤷ Title: Understanding SSRF: How Hackers Turn Your Server Into a Secret Proxy
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:36:11 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #understanding #cybersecurity #ssrf #bug_bounty_writeup
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 18:36:11 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #understanding #cybersecurity #ssrf #bug_bounty_writeup
Medium
Understanding SSRF: How Hackers Turn Your Server Into a Secret Proxy
What is SSRF?
⤷ Title: ThugSquad: Mysterious Russian Cybercrime Group
════════════════════════
𐀪 Author: Jasper Chippindall
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:46:04 GMT
════════════════════════
⌗ Tags: #hacking #extortion #doxing #fraud #cybercrime
════════════════════════
𐀪 Author: Jasper Chippindall
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:46:04 GMT
════════════════════════
⌗ Tags: #hacking #extortion #doxing #fraud #cybercrime
Medium
ThugSquad: Mysterious Russian Cybercrime Group
Cybercrime isn’t just about hacking accounts or stealing money online — it’s increasingly a mix of digital fraud, harassment, and even…
⤷ Title: xozyl and AbuseFraud: Inside an Unknown Cybercrime Group
════════════════════════
𐀪 Author: Jasper Chippindall
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:34:03 GMT
════════════════════════
⌗ Tags: #cybercrime #online_security #cryptocurrecy #hacking #digital_frauds
════════════════════════
𐀪 Author: Jasper Chippindall
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:34:03 GMT
════════════════════════
⌗ Tags: #cybercrime #online_security #cryptocurrecy #hacking #digital_frauds
Medium
xozyl and AbuseFraud: Inside an Unknown Cybercrime Group
The online figure known as “xozyl” has drawn attention in cybersecurity circles for a string of sophisticated digital crimes. According to…
⤷ Title: The New Standard of Digital Trust: Why Rankiteo is a Game-Changer
════════════════════════
𐀪 Author: Jeremy C
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:17:05 GMT
════════════════════════
⌗ Tags: #insurance #cyber_rating #hacking #it_security #cybersecurity
════════════════════════
𐀪 Author: Jeremy C
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:17:05 GMT
════════════════════════
⌗ Tags: #insurance #cyber_rating #hacking #it_security #cybersecurity
Medium
The New Standard of Digital Trust: Why Rankiteo is a Game-Changer
For years, understanding a company’s cybersecurity posture felt like trying to solve a puzzle in the dark. If you wanted to know how secure…
⤷ Title: CloudGoat AWS Key Rotation
════════════════════════
𐀪 Author: Spookz
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:38:09 GMT
════════════════════════
⌗ Tags: #aws #ethical_hacking #penetration_testing #cloudgoat #cybersecurity
════════════════════════
𐀪 Author: Spookz
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:38:09 GMT
════════════════════════
⌗ Tags: #aws #ethical_hacking #penetration_testing #cloudgoat #cybersecurity
Medium
CloudGoat AWS Key Rotation
Hallo Freunde!
⤷ Title: Brute-it
════════════════════════
𐀪 Author: Jadem Yasser
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:02:21 GMT
════════════════════════
⌗ Tags: #linux #apache #penetration_testing #ethical_hacking #web
════════════════════════
𐀪 Author: Jadem Yasser
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:02:21 GMT
════════════════════════
⌗ Tags: #linux #apache #penetration_testing #ethical_hacking #web
Medium
Brute-it
Tryhackme
⤷ Title: Day 18 — Obfuscation: The Egg Shell File
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:46:36 GMT
════════════════════════
⌗ Tags: #tryhackme #advent_of_cyber_2025 #tryhackme_writeup #cybersecurity #tryhackme_walkthrough
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:46:36 GMT
════════════════════════
⌗ Tags: #tryhackme #advent_of_cyber_2025 #tryhackme_writeup #cybersecurity #tryhackme_walkthrough
Medium
Day 18 — Obfuscation: The Egg Shell File
Day 18 — Obfuscation: The Egg Shell File Narrative WareVille hasn’t felt right since the wormhole appeared. Alerts are firing nonstop, dashboards are spiking, and the SOC is running on caffeine …
⤷ Title: Day 17 — CyberChef: Hoperation Save McSkidy
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:43:26 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #tryhackme_writeup #advent_of_cyber_2025 #tryhackme_walkthrough
════════════════════════
𐀪 Author: Samuel Mikeng Mbongo
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 21:43:26 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #tryhackme_writeup #advent_of_cyber_2025 #tryhackme_walkthrough
Medium
Day 17 — CyberChef: Hoperation Save McSkidy
Day 17 — CyberChef: Hoperation Save McSkidy Narrative McSkidy is alive, but barely free. She’s trapped inside King Malhare’s Quantum Warren, locked behind layers of logic, guards, and access …
⤷ Title: HTB Labs — Tier 1 — “Responder” Machine Walkthrough | By: CyberAlp0
════════════════════════
𐀪 Author: Mohamed Maher
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 20:17:13 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #ntlm #web_application_security #hackthebox_writeup #hackthebox_walkthrough
════════════════════════
𐀪 Author: Mohamed Maher
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 20:17:13 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #ntlm #web_application_security #hackthebox_writeup #hackthebox_walkthrough
Medium
HTB Labs — Tier 1 — “Responder” Machine Walkthrough | By: CyberAlp0
Hey Folks, this is CyberAlp0. Welcome to a new walkthrough powered by HTB, Tier 1, named “Responder”. The Responder machine is designed to…
⤷ Title: We’re Moving Too Fast, and AI Barbarians Are at the Gate
════════════════════════
𐀪 Author: Joseph Mann
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 23:13:58 GMT
════════════════════════
⌗ Tags: #startup #cybersecurity #marketing #infosec #brand_strategy
════════════════════════
𐀪 Author: Joseph Mann
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 23:13:58 GMT
════════════════════════
⌗ Tags: #startup #cybersecurity #marketing #infosec #brand_strategy
Medium
We’re Moving Too Fast, and AI Barbarians Are at the Gate
Will Marketing & Cybersecurity Converge or Collide?
⤷ Title: Why Tools Don’t Make You Dangerous in Cybersecurity
════════════════════════
𐀪 Author: Sunera Ranasooriya
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 22:33:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #cyberattack #cyber_security_awareness #information_security
════════════════════════
𐀪 Author: Sunera Ranasooriya
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 22:33:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #cyberattack #cyber_security_awareness #information_security
Medium
Why Tools Don’t Make You Dangerous in Cybersecurity
When people talk about starting in cybersecurity, the first question is almost always about tools.
What should I learn? What should I…
What should I learn? What should I…
⤷ Title: Mastering iOS Pentesting: Part 1 — Jailbreaking Your Devices (Dopamine & palera1n)
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 23:08:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #pentesting #penetration_testing #information_security #security
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 23:08:23 GMT
════════════════════════
⌗ Tags: #cybersecurity #pentesting #penetration_testing #information_security #security
Medium
Mastering iOS Pentesting: Part 1 — Jailbreaking Your Devices (Dopamine & palera1n)
Welcome to the first installment of this practical iOS Pentesting Series on Medium! This hands-on guide focuses on mobile application…
⤷ Title: The API Explosion: 3 Steps to Hardening Your ‘Shadow APIs’ Before Attackers Do
════════════════════════
𐀪 Author: John Muconto
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 22:17:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #security #api_security #api #cyberattack
════════════════════════
𐀪 Author: John Muconto
════════════════════════
ⴵ Time: Fri, 16 Jan 2026 22:17:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #security #api_security #api #cyberattack
Medium
The API Explosion: 3 Steps to Hardening Your ‘Shadow APIs’ Before Attackers Do
According to the State of API Security Report Q1 2023, 94% of companies experienced API security problems in production APIs within the…