⤷ Title: Intermediate Web Application Penetration Testing — Episode 001
by Nolan Stark
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:45:23 GMT
════════════════════════
⌗ Tags: #tryhackme #penetration_testing #web_security #cybersecurity #infosec
by Nolan Stark
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:45:23 GMT
════════════════════════
⌗ Tags: #tryhackme #penetration_testing #web_security #cybersecurity #infosec
Medium
Intermediate Web Application Penetration Testing — Episode 001 by Nolan Stark
I’m Nolan Stark — a learner and ethical hacker. This is the first post in a series where I share what I’ve learned about web application…
⤷ Title: Şirkete Saldırmak İçin Para Alan Adamlar: Red Team Nedir?
════════════════════════
𐀪 Author: Yusuf Ziya Kavuk
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:46:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #pentesting #red_team #penetration_testing
════════════════════════
𐀪 Author: Yusuf Ziya Kavuk
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:46:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #pentesting #red_team #penetration_testing
Medium
Şirkete Saldırmak İçin Para Alan Adamlar: Red Team Nedir?
Staj günlerimde öğrendiğim şeylerden biri, siber güvenliğin sandığımdan çok daha derin bir oyun olduğuydu. Bu yazıyı, “red team” kavramını…
⤷ Title: Week 2 of Learning Linux as an Ethical Hacker: Understanding File Systems, Networks, Software
════════════════════════
𐀪 Author: Nishant kumar
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:00:30 GMT
════════════════════════
⌗ Tags: #linux #kali_linux #ethical_hacking #soc_analyst #cybersecurity
════════════════════════
𐀪 Author: Nishant kumar
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 08:00:30 GMT
════════════════════════
⌗ Tags: #linux #kali_linux #ethical_hacking #soc_analyst #cybersecurity
Medium
Week 2 of Learning Linux as an Ethical Hacker: Understanding File Systems, Networks, Software
Last week, I stepped into the world of Linux as an aspiring ethical hacker. Everything felt new — the terminal, the commands, even the way…
⤷ Title: I’ve Spent 6 Years in Cybersecurity, and Your “AI Strategy” is Making Me Nervous
════════════════════════
𐀪 Author: Mohit
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:32:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #business_strategy #artificial_intelligence #privacy #ethical_hacking
════════════════════════
𐀪 Author: Mohit
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:32:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #business_strategy #artificial_intelligence #privacy #ethical_hacking
Medium
I’ve Spent 6 Years in Cybersecurity, and Your “AI Strategy” is Making Me Nervous
I’m going to be the “killjoy” in the room today.
⤷ Title: I Thought DentiGrid Was Just Another Honeypot. I Was Wrong.
════════════════════════
𐀪 Author: Sam Walker
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:17:05 GMT
════════════════════════
⌗ Tags: #information_security #ethical_hacking #cybersecurity #threat_intelligence #network_security
════════════════════════
𐀪 Author: Sam Walker
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:17:05 GMT
════════════════════════
⌗ Tags: #information_security #ethical_hacking #cybersecurity #threat_intelligence #network_security
Medium
I Thought DentiGrid Was Just Another Honeypot. I Was Wrong.
I’ve tested a lot of deception tools.
Most of them are just glorified honeypots with better dashboards.
Most of them are just glorified honeypots with better dashboards.
⤷ Title: My Journey Through MITM Attacks — Part 1: ARP Spoofing
════════════════════════
𐀪 Author: ofek789
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:09:15 GMT
════════════════════════
⌗ Tags: #networking #programming #cybersecurity #ethical_hacking #golang
════════════════════════
𐀪 Author: ofek789
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 07:09:15 GMT
════════════════════════
⌗ Tags: #networking #programming #cybersecurity #ethical_hacking #golang
Medium
My Journey Through MITM Attacks — Part 1: ARP Spoofing
Intro
⤷ Title: Lets Defend SOC127 — SQL Injection Detected
════════════════════════
𐀪 Author: Winuka Ambegoda
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:09:03 GMT
════════════════════════
⌗ Tags: #lets_defend #soc #log_analysis #sql_injection
════════════════════════
𐀪 Author: Winuka Ambegoda
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 03:09:03 GMT
════════════════════════
⌗ Tags: #lets_defend #soc #log_analysis #sql_injection
Medium
LetsDefend SOC127 — SQL Injection Detected
Today we will be analysing the Lets Defend SIEM alert with Event ID 235. Feel free to check out my many other investigations too. We will…
⤷ Title: The First Mobile Hacking Conference Is Coming This March
════════════════════════
𐀪 Author: mh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:25 +0000
════════════════════════
⌗ Tags: #NetHunter Hacker #event #Mobile Hacking Conference
════════════════════════
𐀪 Author: mh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:25 +0000
════════════════════════
⌗ Tags: #NetHunter Hacker #event #Mobile Hacking Conference
⤷ Title: Beyond Inspect Element: How I Looted an Application’s Internal Directories Using Only .map Files
════════════════════════
𐀪 Author: Shreejalkc
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:34:15 GMT
════════════════════════
⌗ Tags: #reactjs #web_security #penetration_testing #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Shreejalkc
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:34:15 GMT
════════════════════════
⌗ Tags: #reactjs #web_security #penetration_testing #bug_bounty #cybersecurity
Medium
Beyond Inspect Element: How I Looted an Application’s Internal Directories Using Only .map Files
I recently downloaded an entire enterprise web application’s proprietary source code, complete with hidden backend routing, candid…
⤷ Title: Multi-Step Exploitation Strategies: How Small Bugs Turn Into Critical Bounties
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:11:59 GMT
════════════════════════
⌗ Tags: #security #business #cybersecurity #hacking #bug_bounty
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:11:59 GMT
════════════════════════
⌗ Tags: #security #business #cybersecurity #hacking #bug_bounty
Medium
Multi-Step Exploitation Strategies: How Small Bugs Turn Into Critical Bounties
🔗 Multi-Step Exploitation Strategies
⤷ Title: NFC Payment Test at Olympics Will Inspire Mobile Attackers to Go for the Gold
════════════════════════
𐀪 Author: Jimmy Shah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:29:49 GMT
════════════════════════
⌗ Tags: #fuzzing #olympics #nfc_tags #hacking
════════════════════════
𐀪 Author: Jimmy Shah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:29:49 GMT
════════════════════════
⌗ Tags: #fuzzing #olympics #nfc_tags #hacking
Medium
NFC Payment Test at Olympics Will Inspire Mobile Attackers to Go for the Gold
[Originally posted July 5, 2012 on McAfee Blog]
⤷ Title: How Decentralized Codex Security Recovered Our Bitcoin Investment After the December 13 Trading App…
════════════════════════
𐀪 Author: BLOCKCHAIN
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:23:23 GMT
════════════════════════
⌗ Tags: #hacking #decentralized_finance #decentralized #security #xcode
════════════════════════
𐀪 Author: BLOCKCHAIN
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:23:23 GMT
════════════════════════
⌗ Tags: #hacking #decentralized_finance #decentralized #security #xcode
Medium
How Decentralized Codex Security Recovered Our Bitcoin Investment After the December 13 Trading App…
On December 13, 2024, our trading experience took a devastating turn. The mobile trading application we had trusted for months suddenly…
⤷ Title: How We Made Engineers Love Security
════════════════════════
𐀪 Author: Achraf Ameddah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:32:23 GMT
════════════════════════
⌗ Tags: #security #hacking #software_engineering #ctf #learning
════════════════════════
𐀪 Author: Achraf Ameddah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:32:23 GMT
════════════════════════
⌗ Tags: #security #hacking #software_engineering #ctf #learning
Medium
How We Made Engineers Love Security 🎉
“Working on innovation topics and encouraging personal growth through learning has always been an integral part of the EGYM engineering…
⤷ Title: Weekly Threat Intelligence Report 9 Feb 2026
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:23:08 GMT
════════════════════════
⌗ Tags: #infosec #hacking #threat_intelligence #cybersecurity #cyberattack
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:23:08 GMT
════════════════════════
⌗ Tags: #infosec #hacking #threat_intelligence #cybersecurity #cyberattack
Medium
Weekly Threat Intelligence Report 9 Feb 2026
Executive Summary
⤷ Title: Analysis of Windows Notepad Remote Code Execution Vulnerability (CVE-2026-20841)
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:16:48 GMT
════════════════════════
⌗ Tags: #threat_intelligence #cyberattack #vulnerability #cybersecurity #hacking
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:16:48 GMT
════════════════════════
⌗ Tags: #threat_intelligence #cyberattack #vulnerability #cybersecurity #hacking
Medium
Analysis of Windows Notepad Remote Code Execution Vulnerability (CVE-2026-20841)
Summary
⤷ Title: 3 Ways Attackers Monetize Your Leaked Credentials Within 24 Hours
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:01:01 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #technology #threat_intelligence #infosec
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:01:01 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #technology #threat_intelligence #infosec
Medium
3 Ways Attackers Monetize Your Leaked Credentials Within 24 Hours
A fresh stealer log drops. Your credentials are in it. The clock starts.
⤷ Title: From a Simple Client-Side Mistake to Full Read/Write Access of an Internal Support System.
════════════════════════
𐀪 Author: Yousef Elsheikh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:01:00 GMT
════════════════════════
⌗ Tags: #bug_bounty #bugbounty_writeup #javanoscript #bug_bounty_tips #penetration_testing
════════════════════════
𐀪 Author: Yousef Elsheikh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:01:00 GMT
════════════════════════
⌗ Tags: #bug_bounty #bugbounty_writeup #javanoscript #bug_bounty_tips #penetration_testing
Medium
From a Simple Client-Side Mistake to Full Read/Write Access of an Internal Support System.
Hi Folks, we will discuss today about a small missed up give me a road to internal system flow for the organization
⤷ Title: The Website Didn’t Need to Be Hacked. It Exposed Itself. Twice.
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:22 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #information_disclosure #ethical_hacking #portswigger
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:22 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #information_disclosure #ethical_hacking #portswigger
Medium
The Website Didn’t Need to Be Hacked. It Exposed Itself. Twice.
Information Disclosure on Debug Page & Source Code Disclosure via Backup Files
⤷ Title: Ligolo-ng Tutorial — Pivoting, Tunneling and Port Forwarding
════════════════════════
𐀪 Author: Ahmed Elmahgob
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:18:07 GMT
════════════════════════
⌗ Tags: #red_teaming #ligolo_ng #oscp #pivoting #penetration_testing
════════════════════════
𐀪 Author: Ahmed Elmahgob
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:18:07 GMT
════════════════════════
⌗ Tags: #red_teaming #ligolo_ng #oscp #pivoting #penetration_testing
Medium
Ligolo-ng Tutorial — Pivoting, Tunneling and Port Forwarding
Intro
⤷ Title: Regular Expressions
════════════════════════
𐀪 Author: Citadel Cybersec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:29:57 GMT
════════════════════════
⌗ Tags: #intrusion_detection #regex #regex_for_security #cybersecurity #tryhackme
════════════════════════
𐀪 Author: Citadel Cybersec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:29:57 GMT
════════════════════════
⌗ Tags: #intrusion_detection #regex #regex_for_security #cybersecurity #tryhackme
Medium
Regular Expressions
A TryHackMe Practical Exercise Writeup
⤷ Title: TryHackMe — OWASP Top 10 2025: Insecure Data Handling (Walkthrough)
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:20:11 GMT
════════════════════════
⌗ Tags: #tryhackme_owasp_top_10 #owasp_top_10 #tryhackme #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:20:11 GMT
════════════════════════
⌗ Tags: #tryhackme_owasp_top_10 #owasp_top_10 #tryhackme #tryhackme_walkthrough #tryhackme_writeup
Medium
TryHackMe — OWASP Top 10 2025: Insecure Data Handling (Walkthrough)
In this room, we will learn about the last 3 elements of the OWASP To 10 list (2025), which is the elements relating to application…