⤷ Title: LetsDefend SOC127 — SQL Injection Detected
════════════════════════
𐀪 Author: Winuka Ambegoda
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:09:03 GMT
════════════════════════
⌗ Tags: #lets_defend #soc #log_analysis #sql_injection
════════════════════════
𐀪 Author: Winuka Ambegoda
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:09:03 GMT
════════════════════════
⌗ Tags: #lets_defend #soc #log_analysis #sql_injection
Medium
LetsDefend SOC127 — SQL Injection Detected
Today we will be analysing the Lets Defend SIEM alert with Event ID 235. Feel free to check out my many other investigations too. We will…
⤷ Title: How I Found a Business Logic Vulnerability in SaaS applicationThat Allowed Unlimited Trial…
════════════════════════
𐀪 Author: Sreejihkn
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 06:20:55 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #information_security #cyber_security_awareness #bug_bounty
════════════════════════
𐀪 Author: Sreejihkn
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 06:20:55 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #information_security #cyber_security_awareness #bug_bounty
Medium
How I Found a Business Logic Vulnerability in SaaS applicationThat Allowed Unlimited Trial…
Hey everyone, I’m Sreejith, a security researcher. In this writeup I’ll walk you through how I discovered a business logic vulnerability in…
⤷ Title: The Hidden Attack Surface: PDF Metadata & Information Leakage
════════════════════════
𐀪 Author: Kiell Tampubolon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 04:56:35 GMT
════════════════════════
⌗ Tags: #data_protection #software_architecture #backend_development #data_security #application_security
════════════════════════
𐀪 Author: Kiell Tampubolon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 04:56:35 GMT
════════════════════════
⌗ Tags: #data_protection #software_architecture #backend_development #data_security #application_security
Medium
The Hidden Attack Surface: PDF Metadata & Information Leakage
What your PDFs reveal about your infrastructure — and how to stop the reconnaissance in C# / .NET
⤷ Title: PDF Injection Attacks: What Developers Don’t Know Can Hurt Them
════════════════════════
𐀪 Author: Kiell Tampubolon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 04:54:58 GMT
════════════════════════
⌗ Tags: #application_security #devsecops #secure_coding #cybersecurity #pdf
════════════════════════
𐀪 Author: Kiell Tampubolon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 04:54:58 GMT
════════════════════════
⌗ Tags: #application_security #devsecops #secure_coding #cybersecurity #pdf
Medium
PDF Injection Attacks: What Developers Don’t Know Can Hurt Them
How malicious content can hide in PDFs through template injection, JavaScript execution, and user input vulnerabilities — and how to…
⤷ Title: BITSCTF
════════════════════════
𐀪 Author: LiGhTZod
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 05:51:58 GMT
════════════════════════
⌗ Tags: #unity #hacking #gamehacking #ctf
════════════════════════
𐀪 Author: LiGhTZod
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 05:51:58 GMT
════════════════════════
⌗ Tags: #unity #hacking #gamehacking #ctf
Medium
BITSCTF
Tuff Game:
⤷ Title: Most People Ignore Data Breach Emails. That’s Exactly What Hackers Want
════════════════════════
𐀪 Author: Arshad
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 05:46:09 GMT
════════════════════════
⌗ Tags: #scam #data #technology #internet #hacking
════════════════════════
𐀪 Author: Arshad
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 05:46:09 GMT
════════════════════════
⌗ Tags: #scam #data #technology #internet #hacking
Medium
Most People Ignore Data Breach Emails. That’s Exactly What Hackers Want
Ignoring that breach notification is a mistake. Here’s what you must do instead.
⤷ Title: CupidBot
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 06:06:44 GMT
════════════════════════
⌗ Tags: #cupid_bot #ctf_writeup #tryhackme #tryhackme_writeup #cupid_bot_ctf
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 06:06:44 GMT
════════════════════════
⌗ Tags: #cupid_bot #ctf_writeup #tryhackme #tryhackme_writeup #cupid_bot_ctf
Medium
CupidBot
This AI bot knows more than just love letters.
⤷ Title: MoneyBox | VulnHub Walkthrough
════════════════════════
𐀪 Author: Arjun c u
════════════════════════
ⴵ Time: Thu, 12 Feb 2026 16:15:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #easy #vulnhub #capture_the_flag #moneybox
════════════════════════
𐀪 Author: Arjun c u
════════════════════════
ⴵ Time: Thu, 12 Feb 2026 16:15:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #easy #vulnhub #capture_the_flag #moneybox
Medium
MoneyBox | VulnHub Walkthrough by Arjun C U
Introduction
⤷ Title: The Browser Security Details I Used to Ignore (Until I Realised They Hold the Keys to Everything)
════════════════════════
𐀪 Author: Vidya Penumarthi
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 06:25:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_development #ethical_hacking #networking #computer_science
════════════════════════
𐀪 Author: Vidya Penumarthi
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 06:25:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_development #ethical_hacking #networking #computer_science
Medium
The Browser Security Details I Used to Ignore (Until I Realised They Hold the Keys to Everything)
When I first started learning web security, I focused on the loud things. -SQL injection. -XSS payloads. -Authentication bypass tricks.
⤷ Title: Stop Data Breaches with Proactive VAPT
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 06:02:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #cloud_security #cyber_security_awareness #information_security
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 06:02:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #cloud_security #cyber_security_awareness #information_security
Medium
Stop Data Breaches with Proactive VAPT
In an era where cybercriminals use AI-driven tools to launch sophisticated attacks every 11 seconds, waiting for a breach to happen is no…
⤷ Title: Cybersecurity for Banks: Understanding Threats and Advanced Security Solutions
════════════════════════
𐀪 Author: C9Lab
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 05:48:35 GMT
════════════════════════
⌗ Tags: #banking_cybersecurity #cyber_threats_in_banking #api_security #digital_banking_security #cyber_defense_strategies
════════════════════════
𐀪 Author: C9Lab
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 05:48:35 GMT
════════════════════════
⌗ Tags: #banking_cybersecurity #cyber_threats_in_banking #api_security #digital_banking_security #cyber_defense_strategies
Medium
Cybersecurity for Banks: Understanding Threats and Advanced Security Solutions
The banking industry has been reinventing itself within the last ten years. Financial services have never been more convenient and faster…
⤷ Title: MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:55:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:55:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Stargate in Shambles: Sam Altman Abandons the $500B SoftBank Dream for an Oracle “Plan B”
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:31:15 +0000
════════════════════════
⌗ Tags: #Technology #AI Infrastructure #Data Center #Elon Musk #energy crisis #GB200 #Masayoshi Son #OpenAI #Oracle #Sam Altman #SoftBank #Stargate Project #Tech News 2026 #xAI
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:31:15 +0000
════════════════════════
⌗ Tags: #Technology #AI Infrastructure #Data Center #Elon Musk #energy crisis #GB200 #Masayoshi Son #OpenAI #Oracle #Sam Altman #SoftBank #Stargate Project #Tech News 2026 #xAI
Daily CyberSecurity
Stargate in Shambles: Sam Altman Abandons the $500B SoftBank Dream for an Oracle "Plan B"
OpenAI’s $500B Stargate venture has stalled. Sam Altman is now pivoting to a $30B Oracle "Plan B" to survive the brutal 2026 battle for energy and silicon.
⤷ Title: “Hey Plex”: Samsung’s Galaxy S26 Challenges Google with a Bold New AI Multi-Agent Universe
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:27:40 +0000
════════════════════════
⌗ Tags: #Technology #Bixby #Galaxy AI #Galaxy S26 #Galaxy Unpacked 2026 #Google Gemini #Hey Plex #Multi_agent AI #One UI 8.5 #Perplexity.ai #samsung #Tech News 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:27:40 +0000
════════════════════════
⌗ Tags: #Technology #Bixby #Galaxy AI #Galaxy S26 #Galaxy Unpacked 2026 #Google Gemini #Hey Plex #Multi_agent AI #One UI 8.5 #Perplexity.ai #samsung #Tech News 2026
Daily CyberSecurity
"Hey Plex": Samsung’s Galaxy S26 Challenges Google with a Bold New AI Multi-Agent Universe
Samsung’s Galaxy S26 debuts a "multi-agent" AI world. Call "Hey Plex" for real-time web search as Samsung Notes and Gallery sync with Perplexity’s brain.
⤷ Title: Google Ignites Developer Fury with Mass OpenClaw Ban Wave
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:17:10 +0000
════════════════════════
⌗ Tags: #Technology #@Steipete #Account Suspension #developer news 2026 #Google AI Ultra #Google Antigravity #OAuth exploitation #OpenClaw AI #reverse proxy #tech controversy #terms of service breach
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:17:10 +0000
════════════════════════
⌗ Tags: #Technology #@Steipete #Account Suspension #developer news 2026 #Google AI Ultra #Google Antigravity #OAuth exploitation #OpenClaw AI #reverse proxy #tech controversy #terms of service breach
Daily CyberSecurity
Google Ignites Developer Fury with Mass OpenClaw Ban Wave
Google has suspended thousands of Antigravity accounts linked to OpenClaw. Paid developers are hitting 403 errors with zero warning. Is your AI workflow safe?
⤷ Title: Hidden in Plainsight — Steganography Done Right
════════════════════════
𐀪 Author: vulnhunter
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:05:39 GMT
════════════════════════
⌗ Tags: #tryhackme #bug_bounty #ctf #ctf_writeup #bug_bounty_tips
════════════════════════
𐀪 Author: vulnhunter
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:05:39 GMT
════════════════════════
⌗ Tags: #tryhackme #bug_bounty #ctf #ctf_writeup #bug_bounty_tips
Medium
Hidden in Plainsight — Steganography Done Right
In CTF forensics challenges, the flag is often right in front of you, yet completely invisible. This challenge is a classic example of…
⤷ Title: AI-Powered Bug Hunting: 20 Tools to Find Vulnerabilities and Targets Faster
════════════════════════
𐀪 Author: Very Lazy Tech
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:07:53 GMT
════════════════════════
⌗ Tags: #hacking #ai #bug_bounty #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Very Lazy Tech
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:07:53 GMT
════════════════════════
⌗ Tags: #hacking #ai #bug_bounty #penetration_testing #cybersecurity
Medium
AI-Powered Bug Hunting: 20 Tools to Find Vulnerabilities and Targets Faster
Ever spent hours poking at a target, only to realize you missed an obvious vulnerability? Or maybe you’ve watched as bug bounty…
⤷ Title: JWT in Mobile Apps: 5 Mistakes That Lead to Account Takeover
════════════════════════
𐀪 Author: Vaibhav Shakya | Mr Neo
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:38:31 GMT
════════════════════════
⌗ Tags: #design_systems #mobile_security #application_security #jwt
════════════════════════
𐀪 Author: Vaibhav Shakya | Mr Neo
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:38:31 GMT
════════════════════════
⌗ Tags: #design_systems #mobile_security #application_security #jwt
Medium
JWT in Mobile Apps: 5 Mistakes That Lead to Account Takeover
(An architect’s guide to security-critical design failures)
⤷ Title: Forget Phishing: The 5 Silent Ways Hackers Are Weaponizing AI Against Us
════════════════════════
𐀪 Author: Dhanush N
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:42:16 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #ai #llm #hacking
════════════════════════
𐀪 Author: Dhanush N
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:42:16 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #ai #llm #hacking
Medium
Forget Phishing: The 5 Silent Ways Hackers Are Weaponizing AI Against Us
We built artificial intelligence to solve our problems. Now, cybercriminals are turning our smartest tools into their greatest weapons.
⤷ Title: Ce qui arrive vraiment face à une adversité de niveau étatique
════════════════════════
𐀪 Author: Lucas
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:01:00 GMT
════════════════════════
⌗ Tags: #hacking #espionage #droit_à_la_vie_privée
════════════════════════
𐀪 Author: Lucas
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:01:00 GMT
════════════════════════
⌗ Tags: #hacking #espionage #droit_à_la_vie_privée
Medium
Ce qui arrive vraiment face à une adversité de niveau étatique
Je suis bien obligé de le reconnaître : quelque chose d’étrange, de profondément troublant, s’est produit.
⤷ Title: Intermediate Web Application Penetration Testing — Episode 001
by Nolan Stark
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:45:23 GMT
════════════════════════
⌗ Tags: #tryhackme #penetration_testing #web_security #cybersecurity #infosec
by Nolan Stark
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:45:23 GMT
════════════════════════
⌗ Tags: #tryhackme #penetration_testing #web_security #cybersecurity #infosec
Medium
Intermediate Web Application Penetration Testing — Episode 001 by Nolan Stark
I’m Nolan Stark — a learner and ethical hacker. This is the first post in a series where I share what I’ve learned about web application…