⤷ Title: How to Make a Phone Call from a Device You’ve Never Touched
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 19:40:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #android #penetration_testing #android_pentesting #8ksec
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 19:40:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #android #penetration_testing #android_pentesting #8ksec
Medium
How to Make a Phone Call from a Device You’ve Never Touched
In this article, we will solve a lab called AndroDialer: The Ultimate Phone Experience from 8ksec— a seemingly normal dialer application…
⤷ Title: TryHackMe | Windows CLI Basics | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 19:07:48 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #tryhackme_walkthrough #tryhackme_writeup #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 19:07:48 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #tryhackme_walkthrough #tryhackme_writeup #tryhackme #cybersecurity
Medium
TryHackMe | Windows CLI Basics | WriteUp
Explore what Windows CLI is, how to navigate, and interact with the system using Windows CLI.
⤷ Title: TryHackMe | Linux CLI Basics | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 19:07:18 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cybersecurity
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 19:07:18 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cybersecurity
Medium
TryHackMe | Linux CLI Basics | WriteUp
Get comfortable navigating through the Linux CLI.
⤷ Title: PortSwigger SQL Injection Labs — Part 4: Blind SQL Injection
════════════════════════
𐀪 Author: Emirkilicer
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 19:57:29 GMT
════════════════════════
⌗ Tags: #web_security #pentesting #cybersecurity #sql_injection #portswigger
════════════════════════
𐀪 Author: Emirkilicer
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 19:57:29 GMT
════════════════════════
⌗ Tags: #web_security #pentesting #cybersecurity #sql_injection #portswigger
Medium
PortSwigger SQL Injection Labs — Part 4: Blind SQL Injection
Subnoscript: A concise, concept-driven guide to inference-based SQL Injection using behavioral and error side channels.
⤷ Title: Escaping the Sandbox: How a Simple Python Path Flaw Led to Host RCE
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:26:12 GMT
════════════════════════
⌗ Tags: #cloud_security #cybersecurity #infosec #bug_bounty #vulnerability
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:26:12 GMT
════════════════════════
⌗ Tags: #cloud_security #cybersecurity #infosec #bug_bounty #vulnerability
Medium
Escaping the Sandbox: How a Simple Python Path Flaw Led to Host RCE
The culprit? A classic logic flaw in Python’s os.path.join() function.
⤷ Title: The Art of Finding Bugs No Scanner Will Detect
════════════════════════
𐀪 Author: Hania Khan
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:05:36 GMT
════════════════════════
⌗ Tags: #penetration_testing #infosec #ethical_hacking #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Hania Khan
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:05:36 GMT
════════════════════════
⌗ Tags: #penetration_testing #infosec #ethical_hacking #bug_bounty #cybersecurity
Medium
The Art of Finding Bugs No Scanner Will Detect
What your Burp Suite report is not telling you.
⤷ Title: React2Shell — CVE-2025–55182: Practical Exploitation of the Vulnerability
════════════════════════
𐀪 Author: Sneh Bavarva
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 20:54:40 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #react #bug_bounty #vulnerability
════════════════════════
𐀪 Author: Sneh Bavarva
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 20:54:40 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #react #bug_bounty #vulnerability
Medium
React2Shell — CVE-2025–55182: Practical Exploitation of the Vulnerability
Exploiting Northport Ledger application with RSC component
⤷ Title: If I Had to Restart in Cybersecurity Today — Here’s What I’d Do for 6 Months
════════════════════════
𐀪 Author: Hamood Naseer Al-Marhoubi
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:52:51 GMT
════════════════════════
⌗ Tags: #learning #personal_development #hacking #computer_science #cybersecurity
════════════════════════
𐀪 Author: Hamood Naseer Al-Marhoubi
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:52:51 GMT
════════════════════════
⌗ Tags: #learning #personal_development #hacking #computer_science #cybersecurity
Medium
If I Had to Restart in Cybersecurity Today — Here’s What I’d Do for 6 Months
بِسْمِ اللَّـهِ الرَّحْمَـٰنِ الرَّحِيمِ
⤷ Title: How Modern EDRs Detect the “Undetectable” Red Team Tradecraft
════════════════════════
𐀪 Author: Yua Mikanana
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:38:58 GMT
════════════════════════
⌗ Tags: #ethical_hacking #technology #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Yua Mikanana
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:38:58 GMT
════════════════════════
⌗ Tags: #ethical_hacking #technology #hacking #cybersecurity #penetration_testing
Medium
How Modern EDRs Detect the “Undetectable” Red Team Tradecraft
For years, offensive security Twitter and GitHub have repeated the same claim:
⤷ Title: Offline browsing tools — OSINT
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #osint #growth_hacking #osint_investigation #hacking
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #osint #growth_hacking #osint_investigation #hacking
Medium
Offline browsing tools — OSINT
Important tools for OSINT investigators
⤷ Title: Credit Card Information Search Tools-OSINT
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #self_awareness #osint #osint_investigation
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #self_awareness #osint #osint_investigation
Medium
Credit Card Information Search Tools-OSINT
Super important tools for OSINT investigators
⤷ Title: INE-Host & Network Penetration Testing: Exploitation CTF 3 by Singkhon
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:08:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #coding #programming #ctf
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:08:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #coding #programming #ctf
Medium
INE-Host & Network Penetration Testing: Exploitation CTF 3 by Singkhon
Hello, my name is Singkhon. After completing the eJPT course, I would like to share my methods and approaches for solving each CTF problem…
⤷ Title: Command Line Interface (CLI) for Windows
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:07 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #cli_for_windows #windows #operating_systems
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:07 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #cli_for_windows #windows #operating_systems
Medium
Command Line Interface (CLI) for Windows
Microsoft Windows Complete Guide Part 5
⤷ Title: TryHackMe — Advent of Cyber 2025: Complete Writeup & Walkthrough
════════════════════════
𐀪 Author: Fathy Medhat
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:56:43 GMT
════════════════════════
⌗ Tags: #tryhackme #advent_of_cyber_2025
════════════════════════
𐀪 Author: Fathy Medhat
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:56:43 GMT
════════════════════════
⌗ Tags: #tryhackme #advent_of_cyber_2025
Medium
TryHackMe — Advent of Cyber 2025: Complete Writeup & Walkthrough
From a beginner who survived 25 days of cyber challenges and came out with a certificate — and a whole new mindset.
⤷ Title: Become a Hacker (THM) Tryhackme Walkthrough
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:11:19 GMT
════════════════════════
⌗ Tags: #tryhackme #hacker #tryhackme_walkthrough #red_team #cybersecurity
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:11:19 GMT
════════════════════════
⌗ Tags: #tryhackme #hacker #tryhackme_walkthrough #red_team #cybersecurity
Medium
Become a Hacker (THM) Tryhackme Walkthrough
Denoscription : Explore offensive security, the hacker mindset, and hack a web app to improve security.
⤷ Title: Hackers Exploit Critical BeyondTrust Flaw to Deploy VShell and SparkRAT Across Multiple Sectors
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:53:28 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability Report #Active Exploitation #BeyondTrust #CVE_2026_1731 #Cyber Security #infosec #Palo Alto Networks #rce #Remote Code Execution #threat intelligence #Unit 42 #zero_day
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:53:28 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability Report #Active Exploitation #BeyondTrust #CVE_2026_1731 #Cyber Security #infosec #Palo Alto Networks #rce #Remote Code Execution #threat intelligence #Unit 42 #zero_day
Daily CyberSecurity
Hackers Exploit Critical BeyondTrust Flaw to Deploy VShell and SparkRAT Across Multiple Sectors
Unit 42 warns of active attacks on critical BeyondTrust flaw CVE-2026-1731. Hackers bypass auth for RCE and data theft. Patch self-hosted instances now.
⤷ Title: Poisoned Pages: Critical Calibre Path Traversal Flaws Expose Readers to RCE
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:49:41 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Calibre #CVE_2026_26064 #CVE_2026_26065 #Cyber Security #E_book Security #Patch Alert #Path Traversal #rce #Remote Code Execution #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:49:41 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Calibre #CVE_2026_26064 #CVE_2026_26065 #Cyber Security #E_book Security #Patch Alert #Path Traversal #rce #Remote Code Execution #Vulnerability
Daily CyberSecurity
Poisoned Pages: Critical Calibre Path Traversal Flaws Expose Readers to RCE
Critical path traversal flaws (CVE-2026-26065, CVE-2026-26064) in the Calibre e-book manager allow RCE via malicious PDB and ODT files. Update to 9.3.0.
⤷ Title: The CAPTCHA Trap: How a Fake “ClickFix” Prompt Unleashed Latrodectus & Supper Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:43:04 +0000
════════════════════════
⌗ Tags: #Malware #CERT Polska #ClickFix #Cyber Security #DLL side_loading #fake CAPTCHA #infosec #Latrodectus #Malware Analysis #phishing #Supper Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:43:04 +0000
════════════════════════
⌗ Tags: #Malware #CERT Polska #ClickFix #Cyber Security #DLL side_loading #fake CAPTCHA #infosec #Latrodectus #Malware Analysis #phishing #Supper Malware
Daily CyberSecurity
The CAPTCHA Trap: How a Fake "ClickFix" Prompt Unleashed Latrodectus & Supper Malware
CERT Polska reveals how a fake "ClickFix" CAPTCHA campaign tricked users into deploying evasive Latrodectus and Supper malware. Protect your network now.
⤷ Title: The Invisible Backdoor: AI Exposes Malicious OAuth Apps Hiding in Microsoft Entra ID
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:38:11 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cloud Security #Cyber Security #Cyrillic Homoglyphs #Identity Perimeter #infosec #Malicious OAuth #Microsoft Entra ID #OAuth Apps Scout #threat intelligence #Wiz Research
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:38:11 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cloud Security #Cyber Security #Cyrillic Homoglyphs #Identity Perimeter #infosec #Malicious OAuth #Microsoft Entra ID #OAuth Apps Scout #threat intelligence #Wiz Research
Daily CyberSecurity
The Invisible Backdoor: AI Exposes Malicious OAuth Apps Hiding in Microsoft Entra ID
Wiz Research exposes a stealthy threat using malicious OAuth apps and Cyrillic homoglyphs to bypass Microsoft Entra ID security. Protect your cloud tenant.
⤷ Title: The Startup Stealer: How AI and Discord Powered the Arkanix MaaS Operation
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:33:57 +0000
════════════════════════
⌗ Tags: #Malware #AI Malware #Arkanix Stealer #Cyber Security #Discord C2 #infosec #Kaspersky Labs #LLM_Assisted Development #MaaS #Malware_as_a_Service #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:33:57 +0000
════════════════════════
⌗ Tags: #Malware #AI Malware #Arkanix Stealer #Cyber Security #Discord C2 #infosec #Kaspersky Labs #LLM_Assisted Development #MaaS #Malware_as_a_Service #threat intelligence
Daily CyberSecurity
The Startup Stealer: How AI and Discord Powered the Arkanix MaaS Operation
Kaspersky exposes Arkanix Stealer, a fast-moving MaaS operation leveraging Discord, tiered subnoscriptions, and AI-assisted development for quick data theft.
⤷ Title: Cash Out: FBI Warns of $20M ATM ‘Jackpotting’ Surge Driven by Ploutus Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:27:48 +0000
════════════════════════
⌗ Tags: #Malware #ATM Jackpotting #banking security #Cyber Security #Cyber Threat #FBI Warning #financial fraud #infosec #Ploutus Malware #threat intelligence #XFS Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:27:48 +0000
════════════════════════
⌗ Tags: #Malware #ATM Jackpotting #banking security #Cyber Security #Cyber Threat #FBI Warning #financial fraud #infosec #Ploutus Malware #threat intelligence #XFS Vulnerability
Daily CyberSecurity
Cash Out: FBI Warns of $20M ATM 'Jackpotting' Surge Driven by Ploutus Malware
The FBI warns of a massive surge in ATM jackpotting attacks. Cybercriminals are using Ploutus malware to bypass the XFS layer and drain cash reserves.