⤷ Title: Why Encryption Alone Doesn’t Make Systems Secure
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:16:43 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #encryption #cybersecurity #offensive_security
════════════════════════
𐀪 Author: Daniel Isaac E
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:16:43 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #encryption #cybersecurity #offensive_security
Medium
Why Encryption Alone Doesn’t Make Systems Secure
Encryption is often treated like a magic shield.
⤷ Title: What Are Command and Control (C2) Servers and Why Do They Matter?
════════════════════════
𐀪 Author: Bishal Poudel
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:03:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #malware #network_security #infosec
════════════════════════
𐀪 Author: Bishal Poudel
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:03:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #malware #network_security #infosec
Medium
What Are Command and Control (C2) Servers and Why Do They Matter?
A high-level overview of how attackers control compromised systems and how defenders try to break that control.
⤷ Title: “And Then There Were None”: Achieving My PNPT in 2025!
════════════════════════
𐀪 Author: Jinendar Kothari
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:28:40 GMT
════════════════════════
⌗ Tags: #offensive_security #tcm_security #certification #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Jinendar Kothari
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 19:28:40 GMT
════════════════════════
⌗ Tags: #offensive_security #tcm_security #certification #penetration_testing #cybersecurity
Medium
“And Then There Were None”: Achieving My PNPT in 2025!
Hello fellow readers! A very Happy New Year to you and your loved ones.
⤷ Title: Cyber Law in Bangladesh (2026)
════════════════════════
𐀪 Author: Kazi Sabbir
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:23:08 GMT
════════════════════════
⌗ Tags: #cyber_law #cybercrime #cybersecurity #law #ethical_hacking
════════════════════════
𐀪 Author: Kazi Sabbir
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:23:08 GMT
════════════════════════
⌗ Tags: #cyber_law #cybercrime #cybersecurity #law #ethical_hacking
Medium
Cyber Law in Bangladesh (2026)
Bangladesh’s cybersecurity regime has undergone a fundamental reset. As of January 2026, the governing framework is the Cyber Security…
⤷ Title: XSS Payload Crafting and WAF Bypass: A Beginner‑Friendly Guide
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:13:47 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #waf #bug_bounty_writeup #xss_attack
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 18:13:47 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #waf #bug_bounty_writeup #xss_attack
Medium
XSS Payload Crafting and WAF Bypass: A Beginner‑Friendly Guide
Hey,
⤷ Title: Hidden in the Source: Discovering Reflected XSS via Manual Code Review
════════════════════════
𐀪 Author: Samet Yiğit
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:26:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: Samet Yiğit
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:26:14 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #bug_bounty
Medium
Hidden in the Source: Discovering Reflected XSS via Manual Code Review
In bug bounty hunting, when automated scanners fail and the scope is narrow, your best weapon is your own eyes. Today, I’ll share how I…
⤷ Title: The Double Life of Your JPEGs: Privacy Leaks and Hidden Payloads
════════════════════════
𐀪 Author: Xiao Paw
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:25:10 GMT
════════════════════════
⌗ Tags: #infosec #osint #cybersecurity #hacking #privacy
════════════════════════
𐀪 Author: Xiao Paw
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:25:10 GMT
════════════════════════
⌗ Tags: #infosec #osint #cybersecurity #hacking #privacy
Medium
The Double Life of Your JPEGs: Privacy Leaks and Hidden Payloads
We treat images as harmless visuals, but under the hood, they are data containers waiting to be exploited. Here is how the invisible layer…
⤷ Title: SSTI Explained: HTB Hacknet Walkthrough
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:48:20 GMT
════════════════════════
⌗ Tags: #hackthebox #technology #infosec #tech #cybersecurity
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:48:20 GMT
════════════════════════
⌗ Tags: #hackthebox #technology #infosec #tech #cybersecurity
Medium
SSTI Explained: HTB Hacknet Walkthrough
Welcome to HTB Hacknet, a Hard-difficulty machine on Hack The Box that tests your ability to read the developer’s mind. This is a…
⤷ Title: HackTheBox Module: Password Attacks | Credentials Hunting in Network Traffic
════════════════════════
𐀪 Author: Sunain
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:08:01 GMT
════════════════════════
⌗ Tags: #hackthebox #packet_capture #wireshark #hackthebox_writeup #networking
════════════════════════
𐀪 Author: Sunain
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:08:01 GMT
════════════════════════
⌗ Tags: #hackthebox #packet_capture #wireshark #hackthebox_writeup #networking
Medium
HackTheBox Module: Password Attacks | Credentials Hunting in Network Traffic
Introduction
Despite widespread adoption of encrypted protocols, misconfigurations and legacy services can still expose sensitive data in…
Despite widespread adoption of encrypted protocols, misconfigurations and legacy services can still expose sensitive data in…
⤷ Title: SQL Injection Lab(THM)
════════════════════════
𐀪 Author: Tarek Monoar
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:54:30 GMT
════════════════════════
⌗ Tags: #sqli #sqlite3 #sqlite #database #sql
════════════════════════
𐀪 Author: Tarek Monoar
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 20:54:30 GMT
════════════════════════
⌗ Tags: #sqli #sqlite3 #sqlite #database #sql
Medium
SQL Injection Lab(THM):Task 03
Understand how SQL injection attacks work and how to exploit this vulnerability.
⤷ Title: Nested Comment Bypass file upload
════════════════════════
𐀪 Author: Muhammad Syahrul Haniawan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:03:18 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Muhammad Syahrul Haniawan
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:03:18 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #cybersecurity
Medium
Nested Comment Bypass file upload
Long time no see~ Halo semua, sudah hampir 3 tahun saya tidak menulis write up tentang finding saya di dunia bug hunting dan CyberSecurity karena saya sendiri beberapa tahun kebelakang tidak terlalu …
⤷ Title: Why the #1 Vulnerability Isn’t About Hacking, It’s About Walking Through Open Doors
════════════════════════
𐀪 Author: Wnellygrace
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:05:30 GMT
════════════════════════
⌗ Tags: #web_security #cybersecurity #application_security #broken_access_control #owasp
════════════════════════
𐀪 Author: Wnellygrace
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:05:30 GMT
════════════════════════
⌗ Tags: #web_security #cybersecurity #application_security #broken_access_control #owasp
Medium
Why the #1 Vulnerability Isn’t About Hacking, It’s About Walking Through Open Doors
In the ever-evolving landscape of cybersecurity, few vulnerabilities pose as pervasive and dangerous a threat as Broken Access Control…
⤷ Title: Why IoT Security Research Lives at the Intersection of RF and Cybersecurity
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:26:32 GMT
════════════════════════
⌗ Tags: #wifi #hacking #cybersecurity #pentesting #iot
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:26:32 GMT
════════════════════════
⌗ Tags: #wifi #hacking #cybersecurity #pentesting #iot
Medium
Why IoT Security Research Lives at the Intersection of RF and Cybersecurity
Insights from testing real-world Bluetooth, Wi-Fi, and proprietary wireless protocols
⤷ Title: Hackear la Física, no la Matemática: Cómo construí un simulador de Ataque de Canal Lateral (SCA) en…
════════════════════════
𐀪 Author: Methodwhite
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 00:46:33 GMT
════════════════════════
⌗ Tags: #python #hacking #cryptography #cybersecurity #reverse_engineering
════════════════════════
𐀪 Author: Methodwhite
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 00:46:33 GMT
════════════════════════
⌗ Tags: #python #hacking #cryptography #cybersecurity #reverse_engineering
Medium
Hackear la Física, no la Matemática: Cómo construí un simulador de Ataque de Canal Lateral (SCA) en Python
De la fuerza bruta al Análisis de Segundo Orden. La historia del Proyecto 3t y cómo rompimos AES explotando el ruido y el tiempo.
⤷ Title: 10 Must-Know Malware Analysis Interview Questions (with Scenario-Based Answers)
════════════════════════
𐀪 Author: Vikas Singh Panwar
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:54:43 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #malware #cybersecurity #interview
════════════════════════
𐀪 Author: Vikas Singh Panwar
════════════════════════
ⴵ Time: Sat, 17 Jan 2026 23:54:43 GMT
════════════════════════
⌗ Tags: #ransomware #hacking #malware #cybersecurity #interview
Medium
10 Must-Know Malware Analysis Interview Questions (with Scenario-Based Answers)
Get ready for your malware analyst interview with 10 must-know malware analysis questions and clear, practical answers covering IOCs…
⤷ Title: Mastering iOS Pentesting: Part 2 — Shell Access, File Transfers, IPA-App Signing, TrollStore & IPA…
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 00:46:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #mobile_security #information_security #cybercrime
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 00:46:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #mobile_security #information_security #cybercrime
Medium
Mastering iOS Pentesting: Part 2 — Shell Access, File Transfers, IPA-App Signing, TrollStore & IPA Dumping & Decrypting
Welcome back to the Mastering iOS Pentesting series! In Part 1, we successfully jailbroke our test devices (Dopamine on iPhone 7 iOS…
⤷ Title: Speaking in Binary — Packet Crafting & Manipulation with Scapy
════════════════════════
𐀪 Author: KOJO
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:49:54 GMT
════════════════════════
⌗ Tags: #scapy #ethical_hacking #hacking #cybersecurity
════════════════════════
𐀪 Author: KOJO
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:49:54 GMT
════════════════════════
⌗ Tags: #scapy #ethical_hacking #hacking #cybersecurity
Medium
Speaking in Binary — Packet Crafting & Manipulation with Scapy
Beyond the Tool: Why I Learned to Build My Own Packets
⤷ Title: Digital Cartography — Mapping the Attack Surface with Nmap
════════════════════════
𐀪 Author: KOJO
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:47:40 GMT
════════════════════════
⌗ Tags: #nmap #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: KOJO
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:47:40 GMT
════════════════════════
⌗ Tags: #nmap #cybersecurity #ethical_hacking
Medium
Digital Cartography — Mapping the Attack Surface with Nmap
The First Rule of Cybersecurity: You Can’t Protect What You Don’t See
⤷ Title: WAFs Made Simple: Why They Can’t Block Everything (And How They Really Work)
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:49:25 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #waf
════════════════════════
𐀪 Author: Muhammed Asfan | Cybersecurity Analyst
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 03:49:25 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #waf
Medium
WAFs Made Simple: Why They Can’t Block Everything (And How They Really Work)
“Why not just block everything?”
⤷ Title: Jangan Asal Klik Link! Kenapa “Phishing” Adalah Musuh Nomor 1 Akun Digital Kita.
════════════════════════
𐀪 Author: Arsal Naufal
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 04:52:27 GMT
════════════════════════
⌗ Tags: #phising #hacking #scammer #social_media #scam_warning
════════════════════════
𐀪 Author: Arsal Naufal
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 04:52:27 GMT
════════════════════════
⌗ Tags: #phising #hacking #scammer #social_media #scam_warning
Medium
Jangan Asal Klik Link! Kenapa “Phishing” Adalah Musuh Nomor 1 Akun Digital Kita.
Pernahkah kamu dapat DM atau email seperti ini? “Selamat! Akun Anda telah melanggar komunitas dan akan dihapus dalam 24 jam. Klik link di…
⤷ Title: Hello World
════════════════════════
𐀪 Author: Brad
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 04:31:02 GMT
════════════════════════
⌗ Tags: #penetration_testing #information_security #hello_world
════════════════════════
𐀪 Author: Brad
════════════════════════
ⴵ Time: Sun, 18 Jan 2026 04:31:02 GMT
════════════════════════
⌗ Tags: #penetration_testing #information_security #hello_world
Medium
Hello World
Recently, I was watching an interview with John Hammond and Rob Fuller. I have been interviewing for jobs lately and something that Rob…