⤷ Title: AI-Powered Bug Hunting: 20 Tools to Find Vulnerabilities and Targets Faster
════════════════════════
𐀪 Author: Very Lazy Tech
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:07:53 GMT
════════════════════════
⌗ Tags: #hacking #ai #bug_bounty #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Very Lazy Tech
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:07:53 GMT
════════════════════════
⌗ Tags: #hacking #ai #bug_bounty #penetration_testing #cybersecurity
Medium
AI-Powered Bug Hunting: 20 Tools to Find Vulnerabilities and Targets Faster
Ever spent hours poking at a target, only to realize you missed an obvious vulnerability? Or maybe you’ve watched as bug bounty…
⤷ Title: JWT in Mobile Apps: 5 Mistakes That Lead to Account Takeover
════════════════════════
𐀪 Author: Vaibhav Shakya | Mr Neo
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:38:31 GMT
════════════════════════
⌗ Tags: #design_systems #mobile_security #application_security #jwt
════════════════════════
𐀪 Author: Vaibhav Shakya | Mr Neo
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:38:31 GMT
════════════════════════
⌗ Tags: #design_systems #mobile_security #application_security #jwt
Medium
JWT in Mobile Apps: 5 Mistakes That Lead to Account Takeover
(An architect’s guide to security-critical design failures)
⤷ Title: Forget Phishing: The 5 Silent Ways Hackers Are Weaponizing AI Against Us
════════════════════════
𐀪 Author: Dhanush N
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:42:16 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #ai #llm #hacking
════════════════════════
𐀪 Author: Dhanush N
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:42:16 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_security_awareness #ai #llm #hacking
Medium
Forget Phishing: The 5 Silent Ways Hackers Are Weaponizing AI Against Us
We built artificial intelligence to solve our problems. Now, cybercriminals are turning our smartest tools into their greatest weapons.
⤷ Title: Ce qui arrive vraiment face à une adversité de niveau étatique
════════════════════════
𐀪 Author: Lucas
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:01:00 GMT
════════════════════════
⌗ Tags: #hacking #espionage #droit_à_la_vie_privée
════════════════════════
𐀪 Author: Lucas
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:01:00 GMT
════════════════════════
⌗ Tags: #hacking #espionage #droit_à_la_vie_privée
Medium
Ce qui arrive vraiment face à une adversité de niveau étatique
Je suis bien obligé de le reconnaître : quelque chose d’étrange, de profondément troublant, s’est produit.
⤷ Title: Intermediate Web Application Penetration Testing — Episode 001
by Nolan Stark
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:45:23 GMT
════════════════════════
⌗ Tags: #tryhackme #penetration_testing #web_security #cybersecurity #infosec
by Nolan Stark
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:45:23 GMT
════════════════════════
⌗ Tags: #tryhackme #penetration_testing #web_security #cybersecurity #infosec
Medium
Intermediate Web Application Penetration Testing — Episode 001 by Nolan Stark
I’m Nolan Stark — a learner and ethical hacker. This is the first post in a series where I share what I’ve learned about web application…
⤷ Title: Şirkete Saldırmak İçin Para Alan Adamlar: Red Team Nedir?
════════════════════════
𐀪 Author: Yusuf Ziya Kavuk
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:46:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #pentesting #red_team #penetration_testing
════════════════════════
𐀪 Author: Yusuf Ziya Kavuk
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:46:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #pentesting #red_team #penetration_testing
Medium
Şirkete Saldırmak İçin Para Alan Adamlar: Red Team Nedir?
Staj günlerimde öğrendiğim şeylerden biri, siber güvenliğin sandığımdan çok daha derin bir oyun olduğuydu. Bu yazıyı, “red team” kavramını…
⤷ Title: Week 2 of Learning Linux as an Ethical Hacker: Understanding File Systems, Networks, Software
════════════════════════
𐀪 Author: Nishant kumar
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:00:30 GMT
════════════════════════
⌗ Tags: #linux #kali_linux #ethical_hacking #soc_analyst #cybersecurity
════════════════════════
𐀪 Author: Nishant kumar
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:00:30 GMT
════════════════════════
⌗ Tags: #linux #kali_linux #ethical_hacking #soc_analyst #cybersecurity
Medium
Week 2 of Learning Linux as an Ethical Hacker: Understanding File Systems, Networks, Software
Last week, I stepped into the world of Linux as an aspiring ethical hacker. Everything felt new — the terminal, the commands, even the way…
⤷ Title: I’ve Spent 6 Years in Cybersecurity, and Your “AI Strategy” is Making Me Nervous
════════════════════════
𐀪 Author: Mohit
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:32:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #business_strategy #artificial_intelligence #privacy #ethical_hacking
════════════════════════
𐀪 Author: Mohit
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:32:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #business_strategy #artificial_intelligence #privacy #ethical_hacking
Medium
I’ve Spent 6 Years in Cybersecurity, and Your “AI Strategy” is Making Me Nervous
I’m going to be the “killjoy” in the room today.
⤷ Title: I Thought DentiGrid Was Just Another Honeypot. I Was Wrong.
════════════════════════
𐀪 Author: Sam Walker
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:17:05 GMT
════════════════════════
⌗ Tags: #information_security #ethical_hacking #cybersecurity #threat_intelligence #network_security
════════════════════════
𐀪 Author: Sam Walker
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:17:05 GMT
════════════════════════
⌗ Tags: #information_security #ethical_hacking #cybersecurity #threat_intelligence #network_security
Medium
I Thought DentiGrid Was Just Another Honeypot. I Was Wrong.
I’ve tested a lot of deception tools.
Most of them are just glorified honeypots with better dashboards.
Most of them are just glorified honeypots with better dashboards.
⤷ Title: My Journey Through MITM Attacks — Part 1: ARP Spoofing
════════════════════════
𐀪 Author: ofek789
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:09:15 GMT
════════════════════════
⌗ Tags: #networking #programming #cybersecurity #ethical_hacking #golang
════════════════════════
𐀪 Author: ofek789
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:09:15 GMT
════════════════════════
⌗ Tags: #networking #programming #cybersecurity #ethical_hacking #golang
Medium
My Journey Through MITM Attacks — Part 1: ARP Spoofing
Intro
⤷ Title: Lets Defend SOC127 — SQL Injection Detected
════════════════════════
𐀪 Author: Winuka Ambegoda
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:09:03 GMT
════════════════════════
⌗ Tags: #lets_defend #soc #log_analysis #sql_injection
════════════════════════
𐀪 Author: Winuka Ambegoda
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:09:03 GMT
════════════════════════
⌗ Tags: #lets_defend #soc #log_analysis #sql_injection
Medium
LetsDefend SOC127 — SQL Injection Detected
Today we will be analysing the Lets Defend SIEM alert with Event ID 235. Feel free to check out my many other investigations too. We will…
⤷ Title: The First Mobile Hacking Conference Is Coming This March
════════════════════════
𐀪 Author: mh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:25 +0000
════════════════════════
⌗ Tags: #NetHunter Hacker #event #Mobile Hacking Conference
════════════════════════
𐀪 Author: mh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:25 +0000
════════════════════════
⌗ Tags: #NetHunter Hacker #event #Mobile Hacking Conference
⤷ Title: Beyond Inspect Element: How I Looted an Application’s Internal Directories Using Only .map Files
════════════════════════
𐀪 Author: Shreejalkc
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:34:15 GMT
════════════════════════
⌗ Tags: #reactjs #web_security #penetration_testing #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Shreejalkc
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:34:15 GMT
════════════════════════
⌗ Tags: #reactjs #web_security #penetration_testing #bug_bounty #cybersecurity
Medium
Beyond Inspect Element: How I Looted an Application’s Internal Directories Using Only .map Files
I recently downloaded an entire enterprise web application’s proprietary source code, complete with hidden backend routing, candid…
⤷ Title: Multi-Step Exploitation Strategies: How Small Bugs Turn Into Critical Bounties
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:11:59 GMT
════════════════════════
⌗ Tags: #security #business #cybersecurity #hacking #bug_bounty
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:11:59 GMT
════════════════════════
⌗ Tags: #security #business #cybersecurity #hacking #bug_bounty
Medium
Multi-Step Exploitation Strategies: How Small Bugs Turn Into Critical Bounties
🔗 Multi-Step Exploitation Strategies
⤷ Title: NFC Payment Test at Olympics Will Inspire Mobile Attackers to Go for the Gold
════════════════════════
𐀪 Author: Jimmy Shah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:29:49 GMT
════════════════════════
⌗ Tags: #fuzzing #olympics #nfc_tags #hacking
════════════════════════
𐀪 Author: Jimmy Shah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:29:49 GMT
════════════════════════
⌗ Tags: #fuzzing #olympics #nfc_tags #hacking
Medium
NFC Payment Test at Olympics Will Inspire Mobile Attackers to Go for the Gold
[Originally posted July 5, 2012 on McAfee Blog]
⤷ Title: How Decentralized Codex Security Recovered Our Bitcoin Investment After the December 13 Trading App…
════════════════════════
𐀪 Author: BLOCKCHAIN
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:23:23 GMT
════════════════════════
⌗ Tags: #hacking #decentralized_finance #decentralized #security #xcode
════════════════════════
𐀪 Author: BLOCKCHAIN
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:23:23 GMT
════════════════════════
⌗ Tags: #hacking #decentralized_finance #decentralized #security #xcode
Medium
How Decentralized Codex Security Recovered Our Bitcoin Investment After the December 13 Trading App…
On December 13, 2024, our trading experience took a devastating turn. The mobile trading application we had trusted for months suddenly…
⤷ Title: How We Made Engineers Love Security
════════════════════════
𐀪 Author: Achraf Ameddah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:32:23 GMT
════════════════════════
⌗ Tags: #security #hacking #software_engineering #ctf #learning
════════════════════════
𐀪 Author: Achraf Ameddah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:32:23 GMT
════════════════════════
⌗ Tags: #security #hacking #software_engineering #ctf #learning
Medium
How We Made Engineers Love Security 🎉
“Working on innovation topics and encouraging personal growth through learning has always been an integral part of the EGYM engineering…
⤷ Title: Weekly Threat Intelligence Report 9 Feb 2026
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:23:08 GMT
════════════════════════
⌗ Tags: #infosec #hacking #threat_intelligence #cybersecurity #cyberattack
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:23:08 GMT
════════════════════════
⌗ Tags: #infosec #hacking #threat_intelligence #cybersecurity #cyberattack
Medium
Weekly Threat Intelligence Report 9 Feb 2026
Executive Summary
⤷ Title: Analysis of Windows Notepad Remote Code Execution Vulnerability (CVE-2026-20841)
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:16:48 GMT
════════════════════════
⌗ Tags: #threat_intelligence #cyberattack #vulnerability #cybersecurity #hacking
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:16:48 GMT
════════════════════════
⌗ Tags: #threat_intelligence #cyberattack #vulnerability #cybersecurity #hacking
Medium
Analysis of Windows Notepad Remote Code Execution Vulnerability (CVE-2026-20841)
Summary
⤷ Title: 3 Ways Attackers Monetize Your Leaked Credentials Within 24 Hours
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:01:01 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #technology #threat_intelligence #infosec
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:01:01 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #technology #threat_intelligence #infosec
Medium
3 Ways Attackers Monetize Your Leaked Credentials Within 24 Hours
A fresh stealer log drops. Your credentials are in it. The clock starts.
⤷ Title: From a Simple Client-Side Mistake to Full Read/Write Access of an Internal Support System.
════════════════════════
𐀪 Author: Yousef Elsheikh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:01:00 GMT
════════════════════════
⌗ Tags: #bug_bounty #bugbounty_writeup #javanoscript #bug_bounty_tips #penetration_testing
════════════════════════
𐀪 Author: Yousef Elsheikh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:01:00 GMT
════════════════════════
⌗ Tags: #bug_bounty #bugbounty_writeup #javanoscript #bug_bounty_tips #penetration_testing
Medium
From a Simple Client-Side Mistake to Full Read/Write Access of an Internal Support System.
Hi Folks, we will discuss today about a small missed up give me a road to internal system flow for the organization