⤷ Title: How Modern EDRs Detect the “Undetectable” Red Team Tradecraft
════════════════════════
𐀪 Author: Yua Mikanana
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:38:58 GMT
════════════════════════
⌗ Tags: #ethical_hacking #technology #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Yua Mikanana
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:38:58 GMT
════════════════════════
⌗ Tags: #ethical_hacking #technology #hacking #cybersecurity #penetration_testing
Medium
How Modern EDRs Detect the “Undetectable” Red Team Tradecraft
For years, offensive security Twitter and GitHub have repeated the same claim:
⤷ Title: Offline browsing tools — OSINT
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #osint #growth_hacking #osint_investigation #hacking
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #osint #growth_hacking #osint_investigation #hacking
Medium
Offline browsing tools — OSINT
Important tools for OSINT investigators
⤷ Title: Credit Card Information Search Tools-OSINT
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #self_awareness #osint #osint_investigation
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #self_awareness #osint #osint_investigation
Medium
Credit Card Information Search Tools-OSINT
Super important tools for OSINT investigators
⤷ Title: INE-Host & Network Penetration Testing: Exploitation CTF 3 by Singkhon
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:08:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #coding #programming #ctf
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:08:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #coding #programming #ctf
Medium
INE-Host & Network Penetration Testing: Exploitation CTF 3 by Singkhon
Hello, my name is Singkhon. After completing the eJPT course, I would like to share my methods and approaches for solving each CTF problem…
⤷ Title: Command Line Interface (CLI) for Windows
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:07 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #cli_for_windows #windows #operating_systems
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 21:06:07 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #cli_for_windows #windows #operating_systems
Medium
Command Line Interface (CLI) for Windows
Microsoft Windows Complete Guide Part 5
⤷ Title: TryHackMe — Advent of Cyber 2025: Complete Writeup & Walkthrough
════════════════════════
𐀪 Author: Fathy Medhat
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:56:43 GMT
════════════════════════
⌗ Tags: #tryhackme #advent_of_cyber_2025
════════════════════════
𐀪 Author: Fathy Medhat
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:56:43 GMT
════════════════════════
⌗ Tags: #tryhackme #advent_of_cyber_2025
Medium
TryHackMe — Advent of Cyber 2025: Complete Writeup & Walkthrough
From a beginner who survived 25 days of cyber challenges and came out with a certificate — and a whole new mindset.
⤷ Title: Become a Hacker (THM) Tryhackme Walkthrough
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:11:19 GMT
════════════════════════
⌗ Tags: #tryhackme #hacker #tryhackme_walkthrough #red_team #cybersecurity
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 22:11:19 GMT
════════════════════════
⌗ Tags: #tryhackme #hacker #tryhackme_walkthrough #red_team #cybersecurity
Medium
Become a Hacker (THM) Tryhackme Walkthrough
Denoscription : Explore offensive security, the hacker mindset, and hack a web app to improve security.
⤷ Title: Hackers Exploit Critical BeyondTrust Flaw to Deploy VShell and SparkRAT Across Multiple Sectors
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:53:28 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability Report #Active Exploitation #BeyondTrust #CVE_2026_1731 #Cyber Security #infosec #Palo Alto Networks #rce #Remote Code Execution #threat intelligence #Unit 42 #zero_day
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:53:28 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability Report #Active Exploitation #BeyondTrust #CVE_2026_1731 #Cyber Security #infosec #Palo Alto Networks #rce #Remote Code Execution #threat intelligence #Unit 42 #zero_day
Daily CyberSecurity
Hackers Exploit Critical BeyondTrust Flaw to Deploy VShell and SparkRAT Across Multiple Sectors
Unit 42 warns of active attacks on critical BeyondTrust flaw CVE-2026-1731. Hackers bypass auth for RCE and data theft. Patch self-hosted instances now.
⤷ Title: Poisoned Pages: Critical Calibre Path Traversal Flaws Expose Readers to RCE
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:49:41 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Calibre #CVE_2026_26064 #CVE_2026_26065 #Cyber Security #E_book Security #Patch Alert #Path Traversal #rce #Remote Code Execution #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:49:41 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Calibre #CVE_2026_26064 #CVE_2026_26065 #Cyber Security #E_book Security #Patch Alert #Path Traversal #rce #Remote Code Execution #Vulnerability
Daily CyberSecurity
Poisoned Pages: Critical Calibre Path Traversal Flaws Expose Readers to RCE
Critical path traversal flaws (CVE-2026-26065, CVE-2026-26064) in the Calibre e-book manager allow RCE via malicious PDB and ODT files. Update to 9.3.0.
⤷ Title: The CAPTCHA Trap: How a Fake “ClickFix” Prompt Unleashed Latrodectus & Supper Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:43:04 +0000
════════════════════════
⌗ Tags: #Malware #CERT Polska #ClickFix #Cyber Security #DLL side_loading #fake CAPTCHA #infosec #Latrodectus #Malware Analysis #phishing #Supper Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:43:04 +0000
════════════════════════
⌗ Tags: #Malware #CERT Polska #ClickFix #Cyber Security #DLL side_loading #fake CAPTCHA #infosec #Latrodectus #Malware Analysis #phishing #Supper Malware
Daily CyberSecurity
The CAPTCHA Trap: How a Fake "ClickFix" Prompt Unleashed Latrodectus & Supper Malware
CERT Polska reveals how a fake "ClickFix" CAPTCHA campaign tricked users into deploying evasive Latrodectus and Supper malware. Protect your network now.
⤷ Title: The Invisible Backdoor: AI Exposes Malicious OAuth Apps Hiding in Microsoft Entra ID
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:38:11 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cloud Security #Cyber Security #Cyrillic Homoglyphs #Identity Perimeter #infosec #Malicious OAuth #Microsoft Entra ID #OAuth Apps Scout #threat intelligence #Wiz Research
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:38:11 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cloud Security #Cyber Security #Cyrillic Homoglyphs #Identity Perimeter #infosec #Malicious OAuth #Microsoft Entra ID #OAuth Apps Scout #threat intelligence #Wiz Research
Daily CyberSecurity
The Invisible Backdoor: AI Exposes Malicious OAuth Apps Hiding in Microsoft Entra ID
Wiz Research exposes a stealthy threat using malicious OAuth apps and Cyrillic homoglyphs to bypass Microsoft Entra ID security. Protect your cloud tenant.
⤷ Title: The Startup Stealer: How AI and Discord Powered the Arkanix MaaS Operation
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:33:57 +0000
════════════════════════
⌗ Tags: #Malware #AI Malware #Arkanix Stealer #Cyber Security #Discord C2 #infosec #Kaspersky Labs #LLM_Assisted Development #MaaS #Malware_as_a_Service #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:33:57 +0000
════════════════════════
⌗ Tags: #Malware #AI Malware #Arkanix Stealer #Cyber Security #Discord C2 #infosec #Kaspersky Labs #LLM_Assisted Development #MaaS #Malware_as_a_Service #threat intelligence
Daily CyberSecurity
The Startup Stealer: How AI and Discord Powered the Arkanix MaaS Operation
Kaspersky exposes Arkanix Stealer, a fast-moving MaaS operation leveraging Discord, tiered subnoscriptions, and AI-assisted development for quick data theft.
⤷ Title: Cash Out: FBI Warns of $20M ATM ‘Jackpotting’ Surge Driven by Ploutus Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:27:48 +0000
════════════════════════
⌗ Tags: #Malware #ATM Jackpotting #banking security #Cyber Security #Cyber Threat #FBI Warning #financial fraud #infosec #Ploutus Malware #threat intelligence #XFS Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:27:48 +0000
════════════════════════
⌗ Tags: #Malware #ATM Jackpotting #banking security #Cyber Security #Cyber Threat #FBI Warning #financial fraud #infosec #Ploutus Malware #threat intelligence #XFS Vulnerability
Daily CyberSecurity
Cash Out: FBI Warns of $20M ATM 'Jackpotting' Surge Driven by Ploutus Malware
The FBI warns of a massive surge in ATM jackpotting attacks. Cybercriminals are using Ploutus malware to bypass the XFS layer and drain cash reserves.
⤷ Title: The ‘ClickFix’ Trap: GrayCharlie Hijacks US Law Firms to Deploy NetSupport RAT
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:22:38 +0000
════════════════════════
⌗ Tags: #Malware #ClickFix #Cyber Security #Fake Browser Update #GrayCharlie #infosec #Insikt Group #NetSupport RAT #StealC #supply chain attack #wordpress security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:22:38 +0000
════════════════════════
⌗ Tags: #Malware #ClickFix #Cyber Security #Fake Browser Update #GrayCharlie #infosec #Insikt Group #NetSupport RAT #StealC #supply chain attack #wordpress security
Daily CyberSecurity
The 'ClickFix' Trap: GrayCharlie Hijacks US Law Firms to Deploy NetSupport RAT
Insikt Group exposes GrayCharlie compromising WordPress sites & US law firms. Attackers use "ClickFix" fake CAPTCHAs to deploy the NetSupport RAT.
⤷ Title: Sandbox Bypassed: jsPDF Flaw Exposes Millions to Object Injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:17:17 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AcroJS Bypass #AppSec #CVE_2026_25755 #Cyber Security #infosec #JavaScript Security #jsPDF #npm Vulnerability #Patch Alert #PDF Object Injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:17:17 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AcroJS Bypass #AppSec #CVE_2026_25755 #Cyber Security #infosec #JavaScript Security #jsPDF #npm Vulnerability #Patch Alert #PDF Object Injection
Daily CyberSecurity
Sandbox Bypassed: jsPDF Flaw Exposes Millions to Object Injection
A critical PDF Object Injection flaw (CVE-2026-25755) in jsPDF allows attackers to bypass AcroJS sandboxes. Update to version 4.2.0 immediately.
⤷ Title: The Fake IT Threat: “TrustConnect” Malware-as-a-Service Masquerades as Legitimate RMM Software
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:11:21 +0000
════════════════════════
⌗ Tags: #Cybercriminals #AI Malware #Cyber Security #DocConnect #infosec #MaaS #Malware_as_a_Service #Proofpoint #Redline stealer #RMM Abuse #TrustConnect
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:11:21 +0000
════════════════════════
⌗ Tags: #Cybercriminals #AI Malware #Cyber Security #DocConnect #infosec #MaaS #Malware_as_a_Service #Proofpoint #Redline stealer #RMM Abuse #TrustConnect
Daily CyberSecurity
The Fake IT Threat: "TrustConnect" Malware-as-a-Service Masquerades as Legitimate RMM Software
Proofpoint exposes TrustConnect, a new Malware-as-a-Service masquerading as an IT tool. The AI-assisted fake RMM software replaces dismantled threats.
⤷ Title: Weaponizing Windows Errors: PoC Dropped for Critical Privilege Escalation Flaw in WER Service
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:09:36 +0000
════════════════════════
⌗ Tags: #Vulnerability #Cyber Security #infosec #LPE #Patch Alert #PoC Disclosed #privilege escalation #Windows Error Reporting #Windows Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:09:36 +0000
════════════════════════
⌗ Tags: #Vulnerability #Cyber Security #infosec #LPE #Patch Alert #PoC Disclosed #privilege escalation #Windows Error Reporting #Windows Security
Daily CyberSecurity
Weaponizing Windows Errors: PoC Dropped for Critical Privilege Escalation Flaw in WER Service
A critical Windows Error Reporting flaw (CVE-2026-20817) allows local privilege escalation to SYSTEM. With the PoC publicly disclosed, update immediately.
⤷ Title: Industrialized Theft: GoldFactory Malware Hijacks Tax Season via Fake ‘Coretax’ Apps
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:06:26 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Coretax Fraud #Gigabud.RAT #GoldFactory #Group_IB #MaaS #Malware_as_a_Service #MMRat #Mobile Banking Fraud #social engineering #Vishing
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:06:26 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Coretax Fraud #Gigabud.RAT #GoldFactory #Group_IB #MaaS #Malware_as_a_Service #MMRat #Mobile Banking Fraud #social engineering #Vishing
Daily CyberSecurity
Industrialized Theft: GoldFactory Malware Hijacks Tax Season via Fake 'Coretax' Apps
Group-IB exposes an industrialized mobile banking fraud campaign in Indonesia. GoldFactory hackers use fake Coretax apps and Gigabud.RAT to drain accounts.
⤷ Title: Streaming Fraud: “Massiv” Android Trojan Uses Fake IPTV Apps for Complete Device Takeover
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:01:47 +0000
════════════════════════
⌗ Tags: #Malware #Android trojan #Cyber Security #Device Takeover #infosec #IPTV Scam #Malware Analysis #Massiv Malware #Mobile Banking Fraud #Side_Loading #ThreatFabric
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:01:47 +0000
════════════════════════
⌗ Tags: #Malware #Android trojan #Cyber Security #Device Takeover #infosec #IPTV Scam #Malware Analysis #Massiv Malware #Mobile Banking Fraud #Side_Loading #ThreatFabric
Daily CyberSecurity
Streaming Fraud: "Massiv" Android Trojan Uses Fake IPTV Apps for Complete Device Takeover
ThreatFabric exposes Massiv, a new Android banking Trojan hiding in fake IPTV apps. The malware uses accessibility permissions for full device takeover.
⤷ Title: How a Small Validation Bypass Enabled Invisible Identities
════════════════════════
𐀪 Author: Mahmoud Farag
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 23:09:12 GMT
════════════════════════
⌗ Tags: #bug_bounty #unicode #web_security #input_validation #cybersecurity
════════════════════════
𐀪 Author: Mahmoud Farag
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 23:09:12 GMT
════════════════════════
⌗ Tags: #bug_bounty #unicode #web_security #input_validation #cybersecurity
Medium
How a Small Validation Bypass Enabled Invisible Identities
الحمد لله والصلاة والسلام على رسول الله وعلى آله وصحبه أما بعد
⤷ Title: Segurança em aplicações .NET
════════════════════════
𐀪 Author: João Bosco
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 23:57:26 GMT
════════════════════════
⌗ Tags: #aspnetcore #security #infosec #microsoft
════════════════════════
𐀪 Author: João Bosco
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 23:57:26 GMT
════════════════════════
⌗ Tags: #aspnetcore #security #infosec #microsoft
Medium
🚨 Segurança em aplicações .NET
Muita gente acredita que, ao usar ASP.NET Core + JWT + Entity Framework, a aplicação já está “segura por padrão”. Não está.