⤷ Title: The First Mobile Hacking Conference Is Coming This March
════════════════════════
𐀪 Author: mh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:25 +0000
════════════════════════
⌗ Tags: #NetHunter Hacker #event #Mobile Hacking Conference
════════════════════════
𐀪 Author: mh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:25 +0000
════════════════════════
⌗ Tags: #NetHunter Hacker #event #Mobile Hacking Conference
⤷ Title: Beyond Inspect Element: How I Looted an Application’s Internal Directories Using Only .map Files
════════════════════════
𐀪 Author: Shreejalkc
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:34:15 GMT
════════════════════════
⌗ Tags: #reactjs #web_security #penetration_testing #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Shreejalkc
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:34:15 GMT
════════════════════════
⌗ Tags: #reactjs #web_security #penetration_testing #bug_bounty #cybersecurity
Medium
Beyond Inspect Element: How I Looted an Application’s Internal Directories Using Only .map Files
I recently downloaded an entire enterprise web application’s proprietary source code, complete with hidden backend routing, candid…
⤷ Title: Multi-Step Exploitation Strategies: How Small Bugs Turn Into Critical Bounties
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:11:59 GMT
════════════════════════
⌗ Tags: #security #business #cybersecurity #hacking #bug_bounty
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:11:59 GMT
════════════════════════
⌗ Tags: #security #business #cybersecurity #hacking #bug_bounty
Medium
Multi-Step Exploitation Strategies: How Small Bugs Turn Into Critical Bounties
🔗 Multi-Step Exploitation Strategies
⤷ Title: NFC Payment Test at Olympics Will Inspire Mobile Attackers to Go for the Gold
════════════════════════
𐀪 Author: Jimmy Shah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:29:49 GMT
════════════════════════
⌗ Tags: #fuzzing #olympics #nfc_tags #hacking
════════════════════════
𐀪 Author: Jimmy Shah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:29:49 GMT
════════════════════════
⌗ Tags: #fuzzing #olympics #nfc_tags #hacking
Medium
NFC Payment Test at Olympics Will Inspire Mobile Attackers to Go for the Gold
[Originally posted July 5, 2012 on McAfee Blog]
⤷ Title: How Decentralized Codex Security Recovered Our Bitcoin Investment After the December 13 Trading App…
════════════════════════
𐀪 Author: BLOCKCHAIN
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:23:23 GMT
════════════════════════
⌗ Tags: #hacking #decentralized_finance #decentralized #security #xcode
════════════════════════
𐀪 Author: BLOCKCHAIN
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:23:23 GMT
════════════════════════
⌗ Tags: #hacking #decentralized_finance #decentralized #security #xcode
Medium
How Decentralized Codex Security Recovered Our Bitcoin Investment After the December 13 Trading App…
On December 13, 2024, our trading experience took a devastating turn. The mobile trading application we had trusted for months suddenly…
⤷ Title: How We Made Engineers Love Security
════════════════════════
𐀪 Author: Achraf Ameddah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:32:23 GMT
════════════════════════
⌗ Tags: #security #hacking #software_engineering #ctf #learning
════════════════════════
𐀪 Author: Achraf Ameddah
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:32:23 GMT
════════════════════════
⌗ Tags: #security #hacking #software_engineering #ctf #learning
Medium
How We Made Engineers Love Security 🎉
“Working on innovation topics and encouraging personal growth through learning has always been an integral part of the EGYM engineering…
⤷ Title: Weekly Threat Intelligence Report 9 Feb 2026
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:23:08 GMT
════════════════════════
⌗ Tags: #infosec #hacking #threat_intelligence #cybersecurity #cyberattack
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:23:08 GMT
════════════════════════
⌗ Tags: #infosec #hacking #threat_intelligence #cybersecurity #cyberattack
Medium
Weekly Threat Intelligence Report 9 Feb 2026
Executive Summary
⤷ Title: Analysis of Windows Notepad Remote Code Execution Vulnerability (CVE-2026-20841)
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:16:48 GMT
════════════════════════
⌗ Tags: #threat_intelligence #cyberattack #vulnerability #cybersecurity #hacking
════════════════════════
𐀪 Author: NSHC ThreatRecon Team
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:16:48 GMT
════════════════════════
⌗ Tags: #threat_intelligence #cyberattack #vulnerability #cybersecurity #hacking
Medium
Analysis of Windows Notepad Remote Code Execution Vulnerability (CVE-2026-20841)
Summary
⤷ Title: 3 Ways Attackers Monetize Your Leaked Credentials Within 24 Hours
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:01:01 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #technology #threat_intelligence #infosec
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:01:01 GMT
════════════════════════
⌗ Tags: #data_breach #cybersecurity #technology #threat_intelligence #infosec
Medium
3 Ways Attackers Monetize Your Leaked Credentials Within 24 Hours
A fresh stealer log drops. Your credentials are in it. The clock starts.
⤷ Title: From a Simple Client-Side Mistake to Full Read/Write Access of an Internal Support System.
════════════════════════
𐀪 Author: Yousef Elsheikh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:01:00 GMT
════════════════════════
⌗ Tags: #bug_bounty #bugbounty_writeup #javanoscript #bug_bounty_tips #penetration_testing
════════════════════════
𐀪 Author: Yousef Elsheikh
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:01:00 GMT
════════════════════════
⌗ Tags: #bug_bounty #bugbounty_writeup #javanoscript #bug_bounty_tips #penetration_testing
Medium
From a Simple Client-Side Mistake to Full Read/Write Access of an Internal Support System.
Hi Folks, we will discuss today about a small missed up give me a road to internal system flow for the organization
⤷ Title: The Website Didn’t Need to Be Hacked. It Exposed Itself. Twice.
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:22 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #information_disclosure #ethical_hacking #portswigger
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:22 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #information_disclosure #ethical_hacking #portswigger
Medium
The Website Didn’t Need to Be Hacked. It Exposed Itself. Twice.
Information Disclosure on Debug Page & Source Code Disclosure via Backup Files
⤷ Title: Ligolo-ng Tutorial — Pivoting, Tunneling and Port Forwarding
════════════════════════
𐀪 Author: Ahmed Elmahgob
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:18:07 GMT
════════════════════════
⌗ Tags: #red_teaming #ligolo_ng #oscp #pivoting #penetration_testing
════════════════════════
𐀪 Author: Ahmed Elmahgob
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:18:07 GMT
════════════════════════
⌗ Tags: #red_teaming #ligolo_ng #oscp #pivoting #penetration_testing
Medium
Ligolo-ng Tutorial — Pivoting, Tunneling and Port Forwarding
Intro
⤷ Title: Regular Expressions
════════════════════════
𐀪 Author: Citadel Cybersec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:29:57 GMT
════════════════════════
⌗ Tags: #intrusion_detection #regex #regex_for_security #cybersecurity #tryhackme
════════════════════════
𐀪 Author: Citadel Cybersec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:29:57 GMT
════════════════════════
⌗ Tags: #intrusion_detection #regex #regex_for_security #cybersecurity #tryhackme
Medium
Regular Expressions
A TryHackMe Practical Exercise Writeup
⤷ Title: TryHackMe — OWASP Top 10 2025: Insecure Data Handling (Walkthrough)
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:20:11 GMT
════════════════════════
⌗ Tags: #tryhackme_owasp_top_10 #owasp_top_10 #tryhackme #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:20:11 GMT
════════════════════════
⌗ Tags: #tryhackme_owasp_top_10 #owasp_top_10 #tryhackme #tryhackme_walkthrough #tryhackme_writeup
Medium
TryHackMe — OWASP Top 10 2025: Insecure Data Handling (Walkthrough)
In this room, we will learn about the last 3 elements of the OWASP To 10 list (2025), which is the elements relating to application…
⤷ Title: icmp walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:15:13 GMT
════════════════════════
⌗ Tags: #cve #ethical_hacking #information_security #cybersecurity #vulnerability
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:15:13 GMT
════════════════════════
⌗ Tags: #cve #ethical_hacking #information_security #cybersecurity #vulnerability
Medium
🔥icmp walkthrough (Educational & Defensive Analysis)
By cyber_public_school | Cyber Security Researcher
⤷ Title: How Exposed Endpoints Increase Risk Across LLM Infrastructure
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:28:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:28:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:50:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:50:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Hackers Use Excel Exploit to Hide XWorm 7.2 in JPEG Files, Hijack PCs
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:54:06 +0000
════════════════════════
⌗ Tags: #Security #Malware #Phishing Scam #Cyber Attack #Cybersecurity #Excel #Invoice #Phishing #RAT #Scam #Windows #XWorm
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:54:06 +0000
════════════════════════
⌗ Tags: #Security #Malware #Phishing Scam #Cyber Attack #Cybersecurity #Excel #Invoice #Phishing #RAT #Scam #Windows #XWorm
Hackread
Hackers Use Excel Exploit to Hide XWorm 7.2 in JPEG Files, Hijack PCs
A new phishing campaign is spreading XWorm 7.2 via malicious Excel files, hiding malware in Windows processes to steal passwords and Wi-Fi keys.
⤷ Title: Bypassing CSP via JSONP Callback Injection: Intigriti Challenge 0226 Write-up
════════════════════════
𐀪 Author: marchenaa
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:09:31 GMT
════════════════════════
⌗ Tags: #ctf_writeup #intigriti #bug_bounty
════════════════════════
𐀪 Author: marchenaa
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:09:31 GMT
════════════════════════
⌗ Tags: #ctf_writeup #intigriti #bug_bounty
Medium
Bypassing CSP via JSONP Callback Injection: Intigriti Challenge 0226 Write-up
Introduction
⤷ Title: SAST vs Claude Code Security: A Deep Dive
════════════════════════
𐀪 Author: Brett Crawley
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:01:41 GMT
════════════════════════
⌗ Tags: #claude_code #sast #application_security
════════════════════════
𐀪 Author: Brett Crawley
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:01:41 GMT
════════════════════════
⌗ Tags: #claude_code #sast #application_security
Medium
SAST vs Claude Code Security: A Deep Dive
In my previous post on Why SAST is Broken!, we explored some of the challenges and limitations of traditional static analysis tools. Now…
⤷ Title: It was just a staging server: Security Lessons I Learned the Hard Way.
════════════════════════
𐀪 Author: Princewill Onyenanu
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:14:21 GMT
════════════════════════
⌗ Tags: #technology #cryptocurrency #cybersecurity #hacking #cloud_computing
════════════════════════
𐀪 Author: Princewill Onyenanu
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:14:21 GMT
════════════════════════
⌗ Tags: #technology #cryptocurrency #cybersecurity #hacking #cloud_computing
Medium
It was just a staging server: Security Lessons I Learned the Hard Way.
On 21st of February, 2026, I spawned a new Virtual Private Server(VPS) on Linode. This was meant to serve as a staging environment for…