⤷ Title: I Analyzed a Malware Sample — Understanding the Attacker’s Decisions, Not Just the Code
════════════════════════
𐀪 Author: Ahmed A. Ibrahim | Offensive Security Researcher
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 11:45:37 GMT
════════════════════════
⌗ Tags: #hacking #infosec #cybersecurity #reverse_engineering #malware
════════════════════════
𐀪 Author: Ahmed A. Ibrahim | Offensive Security Researcher
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 11:45:37 GMT
════════════════════════
⌗ Tags: #hacking #infosec #cybersecurity #reverse_engineering #malware
Medium
I Analyzed a Malware Sample — Understanding the Attacker’s Decisions, Not Just the Code
Malware analysis is often approached as a tool-driven activity. This article presents a decision-centric workflow that focuses on attacker
⤷ Title: Mastering File & Image Forensics in CTF Challenges
════════════════════════
𐀪 Author: Swetha
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:12:23 GMT
════════════════════════
⌗ Tags: #ctf #computer_science #hacking #ethical_hacking
════════════════════════
𐀪 Author: Swetha
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:12:23 GMT
════════════════════════
⌗ Tags: #ctf #computer_science #hacking #ethical_hacking
Medium
Mastering File & Image Forensics in CTF Challenges
Think you can spot a hidden flag in a file or image at first glance? Master the tricks CTF pros use to uncover secrets lurking in any…
⤷ Title: Cybersecurity: My Journey from “Password123” to Professional Certification
════════════════════════
𐀪 Author: Sanya Sachdeva
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 09:49:36 GMT
════════════════════════
⌗ Tags: #google #cybersecurity_awareness #hacking #careers #cybersecurity
════════════════════════
𐀪 Author: Sanya Sachdeva
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 09:49:36 GMT
════════════════════════
⌗ Tags: #google #cybersecurity_awareness #hacking #careers #cybersecurity
Medium
Cybersecurity: My Journey from “Password123” to Professional Certification
Just like everyone in tech, I’m chasing a dream: a career where I excel, build things people truly value, and — honestly — earn a hell of…
⤷ Title: biteme CTF Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 11:33:12 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #ctf_writeup #tryhackme_writeup #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 11:33:12 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #ctf_writeup #tryhackme_writeup #tryhackme #tryhackme_walkthrough
Medium
biteme CTF Notes | TryHackMe
Scan, enum, bypass login, brute MFA, crack key, root.
⤷ Title: Lab: SSRF with whitelist-based input filter (writeups)
════════════════════════
𐀪 Author: Y55F
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:52:27 GMT
════════════════════════
⌗ Tags: #ssrf #info_sec_writeups #portswigger_lab
════════════════════════
𐀪 Author: Y55F
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:52:27 GMT
════════════════════════
⌗ Tags: #ssrf #info_sec_writeups #portswigger_lab
Medium
Lab: SSRF with whitelist-based input filter (writeups)
What is SSRF (server-side request forgery)?
⤷ Title: Your 5-Step Checklist for Rapid Cybersecurity Deployment
════════════════════════
𐀪 Author: Anshul Goyal
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:54:30 GMT
════════════════════════
⌗ Tags: #cyber_security_solutions #cyber_security_firm #cyber_security_services #cyber_consulting_services #ethical_hacking
════════════════════════
𐀪 Author: Anshul Goyal
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:54:30 GMT
════════════════════════
⌗ Tags: #cyber_security_solutions #cyber_security_firm #cyber_security_services #cyber_consulting_services #ethical_hacking
Medium
Your 5-Step Checklist for Rapid Cybersecurity Deployment
A lean plan helps you to protect your company by developing a lean plan for cybersecurity implementation within a limited period of time…
⤷ Title: Twitter (X) Makes Me $34 Daily
════════════════════════
𐀪 Author: Cindy Kane
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 11:42:58 GMT
════════════════════════
⌗ Tags: #twitter #xs #earn_money_online #make_money_twitter #earn_money_x
════════════════════════
𐀪 Author: Cindy Kane
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 11:42:58 GMT
════════════════════════
⌗ Tags: #twitter #xs #earn_money_online #make_money_twitter #earn_money_x
Medium
Twitter (X) Makes Me $34 Daily
A basic look at the tweets, timing, and links that bring in steady daily earnings
⤷ Title: SQL Injection Union Attack: Querying the Database Type and Version (Portswigger Lab)
════════════════════════
𐀪 Author: Rachael Muga
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:40:48 GMT
════════════════════════
⌗ Tags: #sql #web_security #portswigger_lab #sql_injection #portswigger
════════════════════════
𐀪 Author: Rachael Muga
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:40:48 GMT
════════════════════════
⌗ Tags: #sql #web_security #portswigger_lab #sql_injection #portswigger
Medium
SQL Injection Union Attack: Querying the Database Type and Version (Portswigger Lab)
Retrieving the Database Version String
⤷ Title: ⚡ Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 18:47:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 18:47:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: DevOps & SaaS Downtime: The High (and Hidden) Costs for Cloud-First Businesses
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 17:25:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 17:25:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 17:01:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 17:01:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Google Gemini AI Tricked Into Leaking Calendar Data via Meeting Invites
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:35:37 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Security #AI #Cybersecurity #Gemini #Google #Google Calendar #Privacy #Technology #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:35:37 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Security #AI #Cybersecurity #Gemini #Google #Google Calendar #Privacy #Technology #Vulnerability
Hackread
Google Gemini AI Tricked Into Leaking Calendar Data via Meeting Invites
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Hackers Exploiting PDF24 App to Deploy Stealthy PDFSIDER Backdoor
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:17:07 +0000
════════════════════════
⌗ Tags: #Malware #Phishing Scam #Security #backdoor #Cyber Attack #Cybersecurity #LOTUSLITE #Mustang Panda #PDF24 #PDFSIDER #Phishing
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:17:07 +0000
════════════════════════
⌗ Tags: #Malware #Phishing Scam #Security #backdoor #Cyber Attack #Cybersecurity #LOTUSLITE #Mustang Panda #PDF24 #PDFSIDER #Phishing
Hackread
Hackers Exploiting PDF24 App to Deploy Stealthy PDFSIDER Backdoor
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Email Splitting Attack
════════════════════════
𐀪 Author: Marc I
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 14:01:32 GMT
════════════════════════
⌗ Tags: #bug_bounty
════════════════════════
𐀪 Author: Marc I
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 14:01:32 GMT
════════════════════════
⌗ Tags: #bug_bounty
Medium
Email Splitting Attack
Authentication Layout
⤷ Title: The World of Cybersecurity
════════════════════════
𐀪 Author: Paukhankhual Hangsing
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:52:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #learning #growth #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Paukhankhual Hangsing
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:52:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #learning #growth #penetration_testing #bug_bounty
Medium
The World of Cybersecurity
As a kid i was always fascinated with hackers and hacking but i never once thought i could do it myself until sometime ago. People or…
⤷ Title: Race Conditions in Web Apps: The Bug Class Nobody Tests For
════════════════════════
𐀪 Author: Nabil Mouzouna نبيل مزونة
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:22:22 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #appsec #web_development #bug_bounty #security
════════════════════════
𐀪 Author: Nabil Mouzouna نبيل مزونة
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:22:22 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #appsec #web_development #bug_bounty #security
Medium
Race Conditions in Web Apps: The Bug Class Nobody Tests For
“We tested everything. Unit tests, integration tests, end-to-end tests. All green. How did this happen?”
⤷ Title: Cyber Sherlock Weekly Update: 19 January 2026
════════════════════════
𐀪 Author: Sujon Al Mamun
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:46:58 GMT
════════════════════════
⌗ Tags: #news #security #hacking #cybersecurity
════════════════════════
𐀪 Author: Sujon Al Mamun
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:46:58 GMT
════════════════════════
⌗ Tags: #news #security #hacking #cybersecurity
Medium
Cyber Sherlock Weekly Update: 19 January 2026
Welcome to the latest edition of the Cyber Sherlock Dispatch — your weekly guide to becoming the sharpest, most effective cybersecurity…
⤷ Title: Workaround to : version `GLIBC_X.X` not found
════════════════════════
𐀪 Author: x02sec
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:19:31 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #linux #docker
════════════════════════
𐀪 Author: x02sec
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:19:31 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #linux #docker
Medium
Workaround to : version `GLIBC_X.X` not found
I’m a cybersecurity student passionate about technology and computer science. I’m eager to continue learning and hope to one day become a…
⤷ Title: Brooklyn Nine-Nine — THM Writeup/Walkthrough
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:14:13 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #ctf #cybersecurity #tryhackme
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:14:13 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #ctf #cybersecurity #tryhackme
Medium
Brooklyn Nine-Nine — THM Writeup/Walkthrough
Brooklyn Nine-Nine — THM Writeup
⤷ Title: Bounty Hacker — THM Writeup / Walkthrough
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:13:10 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #hacking #pentesting #cybersecurity
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:13:10 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #hacking #pentesting #cybersecurity
Medium
Bounty Hacker — THM Writeup / Walkthrough
Bounty Hacker — THM Writeup
⤷ Title: The AI Revolution in Cybersecurity
════════════════════════
𐀪 Author: Andrey Pautov
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:09:46 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #hacking #automation #ai
════════════════════════
𐀪 Author: Andrey Pautov
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:09:46 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #hacking #automation #ai
Medium
The AI Revolution in Cybersecurity
Practical Hands-On Guide to AI-Accelerated Offensive Security: Burp Suite, Nmap, OSINT, Exploitation, and End-to-End Automation (LLMs +…