⤷ Title: What I Found While Analyzing a Fake Banking App
════════════════════════
𐀪 Author: Adwaith S
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:57:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #android_malware #malware_analysis #cyber_security_awareness
════════════════════════
𐀪 Author: Adwaith S
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:57:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #android_malware #malware_analysis #cyber_security_awareness
Medium
What I Found While Analyzing a Fake Banking App
An awareness-based analysis of a real Android malware incident
⤷ Title: Practical Roadmap for Learning File Upload Vulnerabilities
════════════════════════
𐀪 Author: Daniel Hammoud
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:21:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #web_security #cybersecurity #roadmaps #file_upload_vulnerability
════════════════════════
𐀪 Author: Daniel Hammoud
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 16:21:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #web_security #cybersecurity #roadmaps #file_upload_vulnerability
Medium
Practical Roadmap for Learning File Upload Vulnerabilities
Labs, Rooms, and CTF References (With Short Tactical Notes)
⤷ Title: How my valid critical bug got rejected
════════════════════════
𐀪 Author: TheCyberAryan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:15:56 GMT
════════════════════════
⌗ Tags: #ethical_hacking #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: TheCyberAryan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:15:56 GMT
════════════════════════
⌗ Tags: #ethical_hacking #bug_bounty #cybersecurity
Medium
How my valid critical bug got rejected
A critical vulnerability I found was rejected simply because the affected asset was labeled “third-party / out of scope” — even though it…
⤷ Title: How I Discovered a Dependency Confusion Vulnerability in a Ruby Application Leading to RCE
════════════════════════
𐀪 Author: Ahmed Tarek
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:06:39 GMT
════════════════════════
⌗ Tags: #pentesting #bug_bounty #dependency_confusion #bug_bounty_tips #ruby
════════════════════════
𐀪 Author: Ahmed Tarek
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:06:39 GMT
════════════════════════
⌗ Tags: #pentesting #bug_bounty #dependency_confusion #bug_bounty_tips #ruby
Medium
How I Discovered a Dependency Confusion Vulnerability in a Ruby Application Leading to RCE
hey there,
⤷ Title: ANTHEM TryHackMe Writeup/Walkthrough
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:55:04 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ctf #pentesting #hacking
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:55:04 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #ctf #pentesting #hacking
Medium
ANTHEM TryHackMe Writeup/Walkthrough
ANTHEM Target — THM Writeup
⤷ Title: Agent Sudo THM Writeup/Walkthrough
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:49:47 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #ctf #tryhackme #cybersecurity
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:49:47 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #ctf #tryhackme #cybersecurity
Medium
Agent Sudo THM Writeup/Walkthrough
Machine Name: Agent Sudo
⤷ Title: How I Cracked the eCPPTv3 at 16
════════════════════════
𐀪 Author: Joel Morillas Pagan (Ghxstsec)
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:28:38 GMT
════════════════════════
⌗ Tags: #pentesting #ecppt #cibersecurity #hacking
════════════════════════
𐀪 Author: Joel Morillas Pagan (Ghxstsec)
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:28:38 GMT
════════════════════════
⌗ Tags: #pentesting #ecppt #cibersecurity #hacking
Medium
How I Cracked the eCPPTv3 at 16 🎂
In this article, I’m speaking about the experience of completing the eLearning Professional Penetration Testing exam from INE Security at…
⤷ Title: Why Encryption Alone Doesn’t Make Systems Secure
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:16:43 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #encryption #cybersecurity #offensive_security
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:16:43 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #encryption #cybersecurity #offensive_security
Medium
Why Encryption Alone Doesn’t Make Systems Secure
Encryption is often treated like a magic shield.
⤷ Title: What Are Command and Control (C2) Servers and Why Do They Matter?
════════════════════════
𐀪 Author: Bishal Poudel
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:03:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #malware #network_security #infosec
════════════════════════
𐀪 Author: Bishal Poudel
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:03:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #malware #network_security #infosec
Medium
What Are Command and Control (C2) Servers and Why Do They Matter?
A high-level overview of how attackers control compromised systems and how defenders try to break that control.
⤷ Title: “And Then There Were None”: Achieving My PNPT in 2025!
════════════════════════
𐀪 Author: Jinendar Kothari
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:28:40 GMT
════════════════════════
⌗ Tags: #offensive_security #tcm_security #certification #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Jinendar Kothari
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:28:40 GMT
════════════════════════
⌗ Tags: #offensive_security #tcm_security #certification #penetration_testing #cybersecurity
Medium
“And Then There Were None”: Achieving My PNPT in 2025!
Hello fellow readers! A very Happy New Year to you and your loved ones.
⤷ Title: Cyber Law in Bangladesh (2026)
════════════════════════
𐀪 Author: Kazi Sabbir
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:23:08 GMT
════════════════════════
⌗ Tags: #cyber_law #cybercrime #cybersecurity #law #ethical_hacking
════════════════════════
𐀪 Author: Kazi Sabbir
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:23:08 GMT
════════════════════════
⌗ Tags: #cyber_law #cybercrime #cybersecurity #law #ethical_hacking
Medium
Cyber Law in Bangladesh (2026)
Bangladesh’s cybersecurity regime has undergone a fundamental reset. As of January 2026, the governing framework is the Cyber Security…
⤷ Title: XSS Payload Crafting and WAF Bypass: A Beginner‑Friendly Guide
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:13:47 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #waf #bug_bounty_writeup #xss_attack
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:13:47 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #waf #bug_bounty_writeup #xss_attack
Medium
XSS Payload Crafting and WAF Bypass: A Beginner‑Friendly Guide
Hey,
⤷ Title: Hidden in the Source: Discovering Reflected XSS via Manual Code Review
════════════════════════
𐀪 Author: Samet Yiğit
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:26:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: Samet Yiğit
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:26:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #bug_bounty
Medium
Hidden in the Source: Discovering Reflected XSS via Manual Code Review
In bug bounty hunting, when automated scanners fail and the scope is narrow, your best weapon is your own eyes. Today, I’ll share how I…
⤷ Title: The Double Life of Your JPEGs: Privacy Leaks and Hidden Payloads
════════════════════════
𐀪 Author: Xiao Paw
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:25:10 GMT
════════════════════════
⌗ Tags: #infosec #osint #cybersecurity #hacking #privacy
════════════════════════
𐀪 Author: Xiao Paw
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:25:10 GMT
════════════════════════
⌗ Tags: #infosec #osint #cybersecurity #hacking #privacy
Medium
The Double Life of Your JPEGs: Privacy Leaks and Hidden Payloads
We treat images as harmless visuals, but under the hood, they are data containers waiting to be exploited. Here is how the invisible layer…
⤷ Title: SSTI Explained: HTB Hacknet Walkthrough
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:48:20 GMT
════════════════════════
⌗ Tags: #hackthebox #technology #infosec #tech #cybersecurity
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:48:20 GMT
════════════════════════
⌗ Tags: #hackthebox #technology #infosec #tech #cybersecurity
Medium
SSTI Explained: HTB Hacknet Walkthrough
Welcome to HTB Hacknet, a Hard-difficulty machine on Hack The Box that tests your ability to read the developer’s mind. This is a…
⤷ Title: HackTheBox Module: Password Attacks | Credentials Hunting in Network Traffic
════════════════════════
𐀪 Author: Sunain
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:08:01 GMT
════════════════════════
⌗ Tags: #hackthebox #packet_capture #wireshark #hackthebox_writeup #networking
════════════════════════
𐀪 Author: Sunain
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:08:01 GMT
════════════════════════
⌗ Tags: #hackthebox #packet_capture #wireshark #hackthebox_writeup #networking
Medium
HackTheBox Module: Password Attacks | Credentials Hunting in Network Traffic
Introduction
Despite widespread adoption of encrypted protocols, misconfigurations and legacy services can still expose sensitive data in…
Despite widespread adoption of encrypted protocols, misconfigurations and legacy services can still expose sensitive data in…
⤷ Title: SQL Injection Lab(THM)
════════════════════════
𐀪 Author: Tarek Monoar
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:54:30 GMT
════════════════════════
⌗ Tags: #sqli #sqlite3 #sqlite #database #sql
════════════════════════
𐀪 Author: Tarek Monoar
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:54:30 GMT
════════════════════════
⌗ Tags: #sqli #sqlite3 #sqlite #database #sql
Medium
SQL Injection Lab(THM):Task 03
Understand how SQL injection attacks work and how to exploit this vulnerability.
⤷ Title: Nested Comment Bypass file upload
════════════════════════
𐀪 Author: Muhammad Syahrul Haniawan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:03:18 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Muhammad Syahrul Haniawan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:03:18 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #cybersecurity
Medium
Nested Comment Bypass file upload
Long time no see~ Halo semua, sudah hampir 3 tahun saya tidak menulis write up tentang finding saya di dunia bug hunting dan CyberSecurity karena saya sendiri beberapa tahun kebelakang tidak terlalu …
⤷ Title: Why the #1 Vulnerability Isn’t About Hacking, It’s About Walking Through Open Doors
════════════════════════
𐀪 Author: Wnellygrace
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:05:30 GMT
════════════════════════
⌗ Tags: #web_security #cybersecurity #application_security #broken_access_control #owasp
════════════════════════
𐀪 Author: Wnellygrace
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:05:30 GMT
════════════════════════
⌗ Tags: #web_security #cybersecurity #application_security #broken_access_control #owasp
Medium
Why the #1 Vulnerability Isn’t About Hacking, It’s About Walking Through Open Doors
In the ever-evolving landscape of cybersecurity, few vulnerabilities pose as pervasive and dangerous a threat as Broken Access Control…
⤷ Title: Why IoT Security Research Lives at the Intersection of RF and Cybersecurity
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:26:32 GMT
════════════════════════
⌗ Tags: #wifi #hacking #cybersecurity #pentesting #iot
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:26:32 GMT
════════════════════════
⌗ Tags: #wifi #hacking #cybersecurity #pentesting #iot
Medium
Why IoT Security Research Lives at the Intersection of RF and Cybersecurity
Insights from testing real-world Bluetooth, Wi-Fi, and proprietary wireless protocols
⤷ Title: Hackear la Física, no la Matemática: Cómo construí un simulador de Ataque de Canal Lateral (SCA) en…
════════════════════════
𐀪 Author: Methodwhite
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 00:46:33 GMT
════════════════════════
⌗ Tags: #python #hacking #cryptography #cybersecurity #reverse_engineering
════════════════════════
𐀪 Author: Methodwhite
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 00:46:33 GMT
════════════════════════
⌗ Tags: #python #hacking #cryptography #cybersecurity #reverse_engineering
Medium
Hackear la Física, no la Matemática: Cómo construí un simulador de Ataque de Canal Lateral (SCA) en Python
De la fuerza bruta al Análisis de Segundo Orden. La historia del Proyecto 3t y cómo rompimos AES explotando el ruido y el tiempo.