⤷ Title: Segurança em aplicações .NET
════════════════════════
𐀪 Author: João Bosco
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 23:57:26 GMT
════════════════════════
⌗ Tags: #aspnetcore #security #infosec #microsoft
════════════════════════
𐀪 Author: João Bosco
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 23:57:26 GMT
════════════════════════
⌗ Tags: #aspnetcore #security #infosec #microsoft
Medium
🚨 Segurança em aplicações .NET
Muita gente acredita que, ao usar ASP.NET Core + JWT + Entity Framework, a aplicação já está “segura por padrão”. Não está.
⤷ Title: Networking |Cybersecurity 101 TryHackMe
════════════════════════
𐀪 Author: Fabiosrocha
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 23:14:34 GMT
════════════════════════
⌗ Tags: #tryhackme #networking #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: Fabiosrocha
════════════════════════
ⴵ Time: Sun, 22 Feb 2026 23:14:34 GMT
════════════════════════
⌗ Tags: #tryhackme #networking #cybersecurity #tryhackme_writeup
Medium
Networking |Cybersecurity 101 TryHackMe
Welcome to the write-up of the Networking module of TryHackMe Cybersecurity 101. This serves as a repository for the path Cybersecurity…
⤷ Title: Thinking Like an Attacker: How API Pen-Testers Identify Broken Authentication
════════════════════════
𐀪 Author: Bethel
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:05:48 GMT
════════════════════════
⌗ Tags: #api_security_testing #api_gateway #api_security #owasp_api_security_top_10
════════════════════════
𐀪 Author: Bethel
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 00:05:48 GMT
════════════════════════
⌗ Tags: #api_security_testing #api_gateway #api_security #owasp_api_security_top_10
Medium
Thinking Like an Attacker: How API Pen-Testers Identify Broken Authentication
APIs power modern applications. From mobile banking apps to e-commerce platforms, APIs handle authentication, data access, and business…
⤷ Title: The AI Auditor: Anthropic Unveils Claude Code Security to Hunt Flaws Human Eyes Miss
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:49:15 +0000
════════════════════════
⌗ Tags: #Technology
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:49:15 +0000
════════════════════════
⌗ Tags: #Technology
Daily CyberSecurity
The AI Auditor: Anthropic Unveils Claude Code Security to Hunt Flaws Human Eyes Miss
Anthropic's Claude Code Security moves beyond pattern matching to "reason" through code, unearthing 500+ vulnerabilities missed by decades of human review.
⤷ Title: Crimson Comeback: Apple Tests a “Deep Red” iPhone 18 Pro as the iPhone Fold Goes Minimalist
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:44:22 +0000
════════════════════════
⌗ Tags: #Technology #Aluminum Unibody #Apple #Cosmic Orange #Deep Red iPhone #Foldable iPhone #iPhone 18 Pro #iPhone Fold #Mark Gurman #smartphone design #Tech News 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:44:22 +0000
════════════════════════
⌗ Tags: #Technology #Aluminum Unibody #Apple #Cosmic Orange #Deep Red iPhone #Foldable iPhone #iPhone 18 Pro #iPhone Fold #Mark Gurman #smartphone design #Tech News 2026
Daily CyberSecurity
Crimson Comeback: Apple Tests a "Deep Red" iPhone 18 Pro as the iPhone Fold Goes Minimalist
Apple is testing a "Deep Red" finish for the iPhone 18 Pro to follow Cosmic Orange's success. Meanwhile, the iPhone Fold sticks to classic Black and White.
⤷ Title: The Bixby Redemption: Samsung Unveils a “Conversational Agent” to End Menu-Diving Forever
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:16:11 +0000
════════════════════════
⌗ Tags: #Android #Android 16 #Beta program #Bixby #Conversational AI #device control #Galaxy AI #One UI 8.5 #real_time web search #samsung #Samsung Galaxy S26 #Tech News 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:16:11 +0000
════════════════════════
⌗ Tags: #Android #Android 16 #Beta program #Bixby #Conversational AI #device control #Galaxy AI #One UI 8.5 #real_time web search #samsung #Samsung Galaxy S26 #Tech News 2026
Daily CyberSecurity
The Bixby Redemption: Samsung Unveils a "Conversational Agent" to End Menu-Diving Forever
Bixby is back! The One UI 8.5 beta transforms Bixby into a Conversational Agent that understands natural language and controls your phone without menu-diving.
⤷ Title: The Face of ChatGPT: Inside Jony Ive’s $300 Smart Speaker that Watches and Advises
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:11:12 +0000
════════════════════════
⌗ Tags: #Technology #AI hardware #Apple design #Consumer Electronics #Face ID #io acquisition #Jony Ive #LoveFrom #OpenAI #Sam Altman #Smart Home #Smart Speaker #Tech News 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:11:12 +0000
════════════════════════
⌗ Tags: #Technology #AI hardware #Apple design #Consumer Electronics #Face ID #io acquisition #Jony Ive #LoveFrom #OpenAI #Sam Altman #Smart Home #Smart Speaker #Tech News 2026
Daily CyberSecurity
The Face of ChatGPT: Inside Jony Ive’s $300 Smart Speaker that Watches and Advises
Jony Ive and OpenAI are building a camera-equipped smart speaker for 2027. Discover the $6.5B design deal bringing "Face ID" and visual AI into your home.
⤷ Title: Interactive Cinema: YouTube Brings Gemini-Powered “Ask” AI to the Biggest Screen in Your House
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:07:53 +0000
════════════════════════
⌗ Tags: #Technology #9to5Google #Conversational AI #Gaming Consoles #Gemini AI #Google Home #Interactive TV #smart tv #Streaming Devices #Tech News 2026 #youtube #YouTube Premium Labs
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:07:53 +0000
════════════════════════
⌗ Tags: #Technology #9to5Google #Conversational AI #Gaming Consoles #Gemini AI #Google Home #Interactive TV #smart tv #Streaming Devices #Tech News 2026 #youtube #YouTube Premium Labs
Daily CyberSecurity
Interactive Cinema: YouTube Brings Gemini-Powered "Ask" AI to the Biggest Screen in Your House
YouTube’s Gemini "Ask" feature hits smart TVs and consoles! Ask voice questions about recipes or lyrics without pausing. The passive TV era is officially over.
⤷ Title: Nurturing the Giants: Inside NVIDIA’s “Inception” Strategy to Capture India’s AI Boom
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:04:11 +0000
════════════════════════
⌗ Tags: #Technology #Aakrit Vaish #Activate Fund #AI startups #CUDA ecosystem #Inception Program #India AI #Jensen Huang #New Delhi AI Summit #nvidia #Tech News 2026 #Venture Capital
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:04:11 +0000
════════════════════════
⌗ Tags: #Technology #Aakrit Vaish #Activate Fund #AI startups #CUDA ecosystem #Inception Program #India AI #Jensen Huang #New Delhi AI Summit #nvidia #Tech News 2026 #Venture Capital
Daily CyberSecurity
Nurturing the Giants: Inside NVIDIA’s "Inception" Strategy to Capture India’s AI Boom
NVIDIA is playing the long game in India. By partnering with the $75M Activate fund, they are locking in the next generation of AI giants before they even exist.
⤷ Title: Double Compromise: Unearthing Unauthenticated SSRF and Weaponized XSS on Legacy Oracle…
════════════════════════
𐀪 Author: K4r33m
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:41:34 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #ssrf #cybersecurity #xs
════════════════════════
𐀪 Author: K4r33m
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:41:34 GMT
════════════════════════
⌗ Tags: #penetration_testing #bug_bounty #ssrf #cybersecurity #xs
Medium
Double Compromise: Unearthing Unauthenticated SSRF and Weaponized XSS on Legacy Oracle Infrastructure
When assessing enterprise perimeters, legacy subdomains often hide complex architectural flaws. During a recent engagement targeting a…
⤷ Title: Escalating a Duplicate Finding to a CVSS 10.0: Chaining Logic and Session Flaws for Persistent ATO
════════════════════════
𐀪 Author: K4r33m
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:27:02 GMT
════════════════════════
⌗ Tags: #session_misconfiguration #ato #bug_bounty #account_takeover #rate_limiting
════════════════════════
𐀪 Author: K4r33m
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:27:02 GMT
════════════════════════
⌗ Tags: #session_misconfiguration #ato #bug_bounty #account_takeover #rate_limiting
Medium
Escalating a Duplicate Finding to a CVSS 10.0: Chaining Logic and Session Flaws for Persistent ATO
In bug bounty and penetration testing, a “duplicate” finding is often viewed as a dead end. However, a duplicate bug is essentially a known…
⤷ Title: ️How Anonymous LDAP Enumeration Led to AS-REP Roasting and Domain Compromise
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:02:33 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ethical_hacking #red_team #windows #hacking
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:02:33 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ethical_hacking #red_team #windows #hacking
Medium
🪟 💻🕷️How Anonymous LDAP Enumeration Led to AS-REP Roasting and Domain Compromise
As I continue preparing for the CRTP, I’ve begun incorporating external resources beyond the course material to strengthen my understanding…
⤷ Title: API Vulnerability Analysis in DVWA (Low to Impossible)
════════════════════════
𐀪 Author: Narathama Firmansyah Putra
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 01:00:57 GMT
════════════════════════
⌗ Tags: #dvwa #cybersecurity #api #penetration_testing
════════════════════════
𐀪 Author: Narathama Firmansyah Putra
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 01:00:57 GMT
════════════════════════
⌗ Tags: #dvwa #cybersecurity #api #penetration_testing
Medium
API Vulnerability Analysis in DVWA (Low to Impossible)
Introduction API (Application Programming Interface) adalah penghubung antara dua sistem agar bisa saling berkomunikasi. Secara sederhana…
⤷ Title: Love at First Breach 2026 — TryHackMe CTF Full Walkthrough
════════════════════════
𐀪 Author: Riddhi Sanghvi
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:37:27 GMT
════════════════════════
⌗ Tags: #ctf #web_exploitation #cybersecurity #ethical_hacking #tryhackme
════════════════════════
𐀪 Author: Riddhi Sanghvi
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:37:27 GMT
════════════════════════
⌗ Tags: #ctf #web_exploitation #cybersecurity #ethical_hacking #tryhackme
Medium
Love at First Breach 2026 — TryHackMe CTF Full Walkthrough
A Valentine’s Day CTF packed with 10 real-world vulnerabilities across web exploitation, cryptography, AI security, and more.
⤷ Title: Practical OSINT techniques with Shodan leading to CVE
════════════════════════
𐀪 Author: Abhirup Konwar
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:21:08 GMT
════════════════════════
⌗ Tags: #red_teaming #ethical_hacking #iot_security #shodan #bug_bounty_tips
════════════════════════
𐀪 Author: Abhirup Konwar
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:21:08 GMT
════════════════════════
⌗ Tags: #red_teaming #ethical_hacking #iot_security #shodan #bug_bounty_tips
Medium
Practical OSINT techniques with Shodan leading to CVE
Smart Home IOT devices recon via Shodan Dorking
⤷ Title: Kali Linux
• Designed for professional penetration testing
• 600 plus preinstalled security…
════════════════════════
𐀪 Author: AB Siddiki
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 01:39:33 GMT
════════════════════════
⌗ Tags: #cybersecurity #kali_linux #parrot #ethical_hacking
• Designed for professional penetration testing
• 600 plus preinstalled security…
════════════════════════
𐀪 Author: AB Siddiki
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 01:39:33 GMT
════════════════════════
⌗ Tags: #cybersecurity #kali_linux #parrot #ethical_hacking
Medium
🟢 Kali Linux • Designed for professional penetration testing • 600 plus preinstalled security…
🟢 Parrot OS • Focused on security, privacy, and daily use • Lightweight and fast, works well on low hardware • Built in anonymity and…
⤷ Title: After Feb 2026 Patches: Securing Async Django Apps Against New SQLi and Timing Attacks (Checklist +…
════════════════════════
𐀪 Author: Yogeshkrishnanseeniraj
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:28:28 GMT
════════════════════════
⌗ Tags: #async #sql_injection #cve #security #django
════════════════════════
𐀪 Author: Yogeshkrishnanseeniraj
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 02:28:28 GMT
════════════════════════
⌗ Tags: #async #sql_injection #cve #security #django
Medium
After Feb 2026 Patches: Securing Async Django Apps Against New SQLi and Timing Attacks (Checklist + Benchmarks)
The February 2026 Django security patches closed three high-severity vulnerabilities specific to async codebases. Here's the complete…
⤷ Title: Digital Terrorism in Oklahoma: Lucky Star Casino Chain Shuts Down as Tribes Refuse $700K Ransom
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:31:01 +0000
════════════════════════
⌗ Tags: #Malware #casino cyberattack #Cheyenne and Arapaho Tribes #digital forensics #Governor Reggie Wassana #Lucky Star Casino #Oklahoma gaming #ransom refusal #Rhysida ransomware #Tech News 2026 #tribal gaming security
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:31:01 +0000
════════════════════════
⌗ Tags: #Malware #casino cyberattack #Cheyenne and Arapaho Tribes #digital forensics #Governor Reggie Wassana #Lucky Star Casino #Oklahoma gaming #ransom refusal #Rhysida ransomware #Tech News 2026 #tribal gaming security
Penetration Testing Tools
Digital Terrorism in Oklahoma: Lucky Star Casino Chain Shuts Down as Tribes Refuse $700K Ransom
Operations at one of the preeminent gaming establishments of the Cheyenne and Arapaho Tribes in Oklahoma, USA, have
⤷ Title: The Kill Switch for AI Agents: How Gen’s “Sage” Stops Autonomous Malware in Real-Time
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:29:37 +0000
════════════════════════
⌗ Tags: #Malware #Agentic Security #AI Agents #Claude Code #Command Injection #Cursor #Cybersecurity 2026 #Gen Sage #open source security #OpenClaw #Skill Scanner #supply chain attack #Typosquatting
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:29:37 +0000
════════════════════════
⌗ Tags: #Malware #Agentic Security #AI Agents #Claude Code #Command Injection #Cursor #Cybersecurity 2026 #Gen Sage #open source security #OpenClaw #Skill Scanner #supply chain attack #Typosquatting
Penetration Testing Tools
The Kill Switch for AI Agents: How Gen’s "Sage" Stops Autonomous Malware in Real-Time
AI agents are increasingly usurping tasks that formerly necessitated manual intervention: executing terminal commands, modifying repository files, managing
⤷ Title: The Fracture of Truth: How China’s Secretive Databases Are Outpacing the Ailing CVE System
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:26:54 +0000
════════════════════════
⌗ Tags: #Vulnerability #Bitsight #CNNVD #CNVD #CVE #Cyber Intelligence #National Security #NIST #NVD #RMSV regulations #Tech News 2026 #threat intelligence #Vulnerability Disclosure
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:26:54 +0000
════════════════════════
⌗ Tags: #Vulnerability #Bitsight #CNNVD #CNVD #CVE #Cyber Intelligence #National Security #NIST #NVD #RMSV regulations #Tech News 2026 #threat intelligence #Vulnerability Disclosure
Penetration Testing Tools
The Fracture of Truth: How China’s Secretive Databases Are Outpacing the Ailing CVE System
In the realm of information security, it has long been standard practice to categorize vulnerabilities via the CVE
⤷ Title: The IPTV Trap: How the “Massiv” Trojan Hijacks Government IDs and Empties Bank Accounts
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:25:09 +0000
════════════════════════
⌗ Tags: #Malware #accessibility services abuse #Android banking Trojan #Chave Móvel Digital #credential exfiltration #device hijacking #FuncVNC #gov.pt #IPTV fraud #Massiv malware #Southern Europe #Tech News 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:25:09 +0000
════════════════════════
⌗ Tags: #Malware #accessibility services abuse #Android banking Trojan #Chave Móvel Digital #credential exfiltration #device hijacking #FuncVNC #gov.pt #IPTV fraud #Massiv malware #Southern Europe #Tech News 2026
Penetration Testing Tools
The IPTV Trap: How the "Massiv" Trojan Hijacks Government IDs and Empties Bank Accounts
A nascent Android banking Trojan has resurfaced, meticulously engineered to execute a recurring stratagem: coercing individuals into sideloading