⤷ Title: Lab: SSRF with whitelist-based input filter (writeups)
════════════════════════
𐀪 Author: Y55F
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:52:27 GMT
════════════════════════
⌗ Tags: #ssrf #info_sec_writeups #portswigger_lab
════════════════════════
𐀪 Author: Y55F
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:52:27 GMT
════════════════════════
⌗ Tags: #ssrf #info_sec_writeups #portswigger_lab
Medium
Lab: SSRF with whitelist-based input filter (writeups)
What is SSRF (server-side request forgery)?
⤷ Title: Your 5-Step Checklist for Rapid Cybersecurity Deployment
════════════════════════
𐀪 Author: Anshul Goyal
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:54:30 GMT
════════════════════════
⌗ Tags: #cyber_security_solutions #cyber_security_firm #cyber_security_services #cyber_consulting_services #ethical_hacking
════════════════════════
𐀪 Author: Anshul Goyal
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:54:30 GMT
════════════════════════
⌗ Tags: #cyber_security_solutions #cyber_security_firm #cyber_security_services #cyber_consulting_services #ethical_hacking
Medium
Your 5-Step Checklist for Rapid Cybersecurity Deployment
A lean plan helps you to protect your company by developing a lean plan for cybersecurity implementation within a limited period of time…
⤷ Title: Twitter (X) Makes Me $34 Daily
════════════════════════
𐀪 Author: Cindy Kane
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 11:42:58 GMT
════════════════════════
⌗ Tags: #twitter #xs #earn_money_online #make_money_twitter #earn_money_x
════════════════════════
𐀪 Author: Cindy Kane
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 11:42:58 GMT
════════════════════════
⌗ Tags: #twitter #xs #earn_money_online #make_money_twitter #earn_money_x
Medium
Twitter (X) Makes Me $34 Daily
A basic look at the tweets, timing, and links that bring in steady daily earnings
⤷ Title: SQL Injection Union Attack: Querying the Database Type and Version (Portswigger Lab)
════════════════════════
𐀪 Author: Rachael Muga
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:40:48 GMT
════════════════════════
⌗ Tags: #sql #web_security #portswigger_lab #sql_injection #portswigger
════════════════════════
𐀪 Author: Rachael Muga
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 10:40:48 GMT
════════════════════════
⌗ Tags: #sql #web_security #portswigger_lab #sql_injection #portswigger
Medium
SQL Injection Union Attack: Querying the Database Type and Version (Portswigger Lab)
Retrieving the Database Version String
⤷ Title: ⚡ Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 18:47:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 18:47:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: DevOps & SaaS Downtime: The High (and Hidden) Costs for Cloud-First Businesses
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 17:25:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 17:25:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 17:01:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 17:01:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Google Gemini AI Tricked Into Leaking Calendar Data via Meeting Invites
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:35:37 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Security #AI #Cybersecurity #Gemini #Google #Google Calendar #Privacy #Technology #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:35:37 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Security #AI #Cybersecurity #Gemini #Google #Google Calendar #Privacy #Technology #Vulnerability
Hackread
Google Gemini AI Tricked Into Leaking Calendar Data via Meeting Invites
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Hackers Exploiting PDF24 App to Deploy Stealthy PDFSIDER Backdoor
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:17:07 +0000
════════════════════════
⌗ Tags: #Malware #Phishing Scam #Security #backdoor #Cyber Attack #Cybersecurity #LOTUSLITE #Mustang Panda #PDF24 #PDFSIDER #Phishing
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:17:07 +0000
════════════════════════
⌗ Tags: #Malware #Phishing Scam #Security #backdoor #Cyber Attack #Cybersecurity #LOTUSLITE #Mustang Panda #PDF24 #PDFSIDER #Phishing
Hackread
Hackers Exploiting PDF24 App to Deploy Stealthy PDFSIDER Backdoor
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
⤷ Title: Email Splitting Attack
════════════════════════
𐀪 Author: Marc I
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 14:01:32 GMT
════════════════════════
⌗ Tags: #bug_bounty
════════════════════════
𐀪 Author: Marc I
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 14:01:32 GMT
════════════════════════
⌗ Tags: #bug_bounty
Medium
Email Splitting Attack
Authentication Layout
⤷ Title: The World of Cybersecurity
════════════════════════
𐀪 Author: Paukhankhual Hangsing
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:52:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #learning #growth #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Paukhankhual Hangsing
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:52:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #learning #growth #penetration_testing #bug_bounty
Medium
The World of Cybersecurity
As a kid i was always fascinated with hackers and hacking but i never once thought i could do it myself until sometime ago. People or…
⤷ Title: Race Conditions in Web Apps: The Bug Class Nobody Tests For
════════════════════════
𐀪 Author: Nabil Mouzouna نبيل مزونة
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:22:22 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #appsec #web_development #bug_bounty #security
════════════════════════
𐀪 Author: Nabil Mouzouna نبيل مزونة
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:22:22 GMT
════════════════════════
⌗ Tags: #web_penetration_testing #appsec #web_development #bug_bounty #security
Medium
Race Conditions in Web Apps: The Bug Class Nobody Tests For
“We tested everything. Unit tests, integration tests, end-to-end tests. All green. How did this happen?”
⤷ Title: Cyber Sherlock Weekly Update: 19 January 2026
════════════════════════
𐀪 Author: Sujon Al Mamun
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:46:58 GMT
════════════════════════
⌗ Tags: #news #security #hacking #cybersecurity
════════════════════════
𐀪 Author: Sujon Al Mamun
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:46:58 GMT
════════════════════════
⌗ Tags: #news #security #hacking #cybersecurity
Medium
Cyber Sherlock Weekly Update: 19 January 2026
Welcome to the latest edition of the Cyber Sherlock Dispatch — your weekly guide to becoming the sharpest, most effective cybersecurity…
⤷ Title: Workaround to : version `GLIBC_X.X` not found
════════════════════════
𐀪 Author: x02sec
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:19:31 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #linux #docker
════════════════════════
𐀪 Author: x02sec
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:19:31 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #linux #docker
Medium
Workaround to : version `GLIBC_X.X` not found
I’m a cybersecurity student passionate about technology and computer science. I’m eager to continue learning and hope to one day become a…
⤷ Title: Brooklyn Nine-Nine — THM Writeup/Walkthrough
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:14:13 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #ctf #cybersecurity #tryhackme
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:14:13 GMT
════════════════════════
⌗ Tags: #hacking #pentesting #ctf #cybersecurity #tryhackme
Medium
Brooklyn Nine-Nine — THM Writeup/Walkthrough
Brooklyn Nine-Nine — THM Writeup
⤷ Title: Bounty Hacker — THM Writeup / Walkthrough
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:13:10 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #hacking #pentesting #cybersecurity
════════════════════════
𐀪 Author: sudo_0xksh
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:13:10 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #hacking #pentesting #cybersecurity
Medium
Bounty Hacker — THM Writeup / Walkthrough
Bounty Hacker — THM Writeup
⤷ Title: The AI Revolution in Cybersecurity
════════════════════════
𐀪 Author: Andrey Pautov
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:09:46 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #hacking #automation #ai
════════════════════════
𐀪 Author: Andrey Pautov
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 13:09:46 GMT
════════════════════════
⌗ Tags: #red_team #cybersecurity #hacking #automation #ai
Medium
The AI Revolution in Cybersecurity
Practical Hands-On Guide to AI-Accelerated Offensive Security: Burp Suite, Nmap, OSINT, Exploitation, and End-to-End Automation (LLMs +…
⤷ Title: What do we know about the hack of Iranian state television broadcaster IRIB
════════════════════════
𐀪 Author: Costin Raiu
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:57:32 GMT
════════════════════════
⌗ Tags: #cyberattack #iran_protest #iran #hacking #cybersecurity
════════════════════════
𐀪 Author: Costin Raiu
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:57:32 GMT
════════════════════════
⌗ Tags: #cyberattack #iran_protest #iran #hacking #cybersecurity
Medium
What do we know about the hack of Iranian state television broadcaster IRIB
The recent hack of Iran’s state television broadcaster, the Islamic Republic of Iran Broadcasting (IRIB), occurred on Sunday evening…
⤷ Title: Basic Kali -Linux Commands for Ethical Hacking (Part-6)
════════════════════════
𐀪 Author: Akhil Thakur
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:38:08 GMT
════════════════════════
⌗ Tags: #basics #coding #hacking #ethical_hacking #beginner
════════════════════════
𐀪 Author: Akhil Thakur
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:38:08 GMT
════════════════════════
⌗ Tags: #basics #coding #hacking #ethical_hacking #beginner
Medium
Basic Kali -Linux Commands for Ethical Hacking (Part-6)
Basic Kali- Linux Commands
⤷ Title: Understanding CWE-472: External Control of Assumed-Immutable Web Parameter
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:02:01 GMT
════════════════════════
⌗ Tags: #infosec #cwe #hacking #software_development #cybersecurity
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:02:01 GMT
════════════════════════
⌗ Tags: #infosec #cwe #hacking #software_development #cybersecurity
Medium
Understanding CWE-472: External Control of Assumed-Immutable Web Parameter
Web applications rely on various mechanisms to maintain state and transfer data between the client and server. Hidden form fields, URL…
⤷ Title: Part 3 — Intercepting HTTPS Traffic, Bypassing Certificate Pinning & Flutter Protections (Testing…
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:40:49 GMT
════════════════════════
⌗ Tags: #pentesting #information_security #infosec #cybersecurity #security
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
ⴵ Time: Mon, 19 Jan 2026 12:40:49 GMT
════════════════════════
⌗ Tags: #pentesting #information_security #infosec #cybersecurity #security
Medium
Mastering iOS Pentesting: Part 3 — Intercepting HTTPS Traffic, Bypassing Certificate Pinning & Flutter Protections (Testing Network…
Welcome to Part 3 of the Mastering iOS Pentesting series!