⤷ Title: The Website Didn’t Need to Be Hacked. It Exposed Itself. Twice.
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:22 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #information_disclosure #ethical_hacking #portswigger
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:31:22 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #information_disclosure #ethical_hacking #portswigger
Medium
The Website Didn’t Need to Be Hacked. It Exposed Itself. Twice.
Information Disclosure on Debug Page & Source Code Disclosure via Backup Files
⤷ Title: Ligolo-ng Tutorial — Pivoting, Tunneling and Port Forwarding
════════════════════════
𐀪 Author: Ahmed Elmahgob
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:18:07 GMT
════════════════════════
⌗ Tags: #red_teaming #ligolo_ng #oscp #pivoting #penetration_testing
════════════════════════
𐀪 Author: Ahmed Elmahgob
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:18:07 GMT
════════════════════════
⌗ Tags: #red_teaming #ligolo_ng #oscp #pivoting #penetration_testing
Medium
Ligolo-ng Tutorial — Pivoting, Tunneling and Port Forwarding
Intro
⤷ Title: Regular Expressions
════════════════════════
𐀪 Author: Citadel Cybersec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:29:57 GMT
════════════════════════
⌗ Tags: #intrusion_detection #regex #regex_for_security #cybersecurity #tryhackme
════════════════════════
𐀪 Author: Citadel Cybersec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:29:57 GMT
════════════════════════
⌗ Tags: #intrusion_detection #regex #regex_for_security #cybersecurity #tryhackme
Medium
Regular Expressions
A TryHackMe Practical Exercise Writeup
⤷ Title: TryHackMe — OWASP Top 10 2025: Insecure Data Handling (Walkthrough)
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:20:11 GMT
════════════════════════
⌗ Tags: #tryhackme_owasp_top_10 #owasp_top_10 #tryhackme #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 09:20:11 GMT
════════════════════════
⌗ Tags: #tryhackme_owasp_top_10 #owasp_top_10 #tryhackme #tryhackme_walkthrough #tryhackme_writeup
Medium
TryHackMe — OWASP Top 10 2025: Insecure Data Handling (Walkthrough)
In this room, we will learn about the last 3 elements of the OWASP To 10 list (2025), which is the elements relating to application…
⤷ Title: icmp walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:15:13 GMT
════════════════════════
⌗ Tags: #cve #ethical_hacking #information_security #cybersecurity #vulnerability
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 10:15:13 GMT
════════════════════════
⌗ Tags: #cve #ethical_hacking #information_security #cybersecurity #vulnerability
Medium
🔥icmp walkthrough (Educational & Defensive Analysis)
By cyber_public_school | Cyber Security Researcher
⤷ Title: How Exposed Endpoints Increase Risk Across LLM Infrastructure
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:28:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:28:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:50:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:50:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Hackers Use Excel Exploit to Hide XWorm 7.2 in JPEG Files, Hijack PCs
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:54:06 +0000
════════════════════════
⌗ Tags: #Security #Malware #Phishing Scam #Cyber Attack #Cybersecurity #Excel #Invoice #Phishing #RAT #Scam #Windows #XWorm
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:54:06 +0000
════════════════════════
⌗ Tags: #Security #Malware #Phishing Scam #Cyber Attack #Cybersecurity #Excel #Invoice #Phishing #RAT #Scam #Windows #XWorm
Hackread
Hackers Use Excel Exploit to Hide XWorm 7.2 in JPEG Files, Hijack PCs
A new phishing campaign is spreading XWorm 7.2 via malicious Excel files, hiding malware in Windows processes to steal passwords and Wi-Fi keys.
⤷ Title: Bypassing CSP via JSONP Callback Injection: Intigriti Challenge 0226 Write-up
════════════════════════
𐀪 Author: marchenaa
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:09:31 GMT
════════════════════════
⌗ Tags: #ctf_writeup #intigriti #bug_bounty
════════════════════════
𐀪 Author: marchenaa
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:09:31 GMT
════════════════════════
⌗ Tags: #ctf_writeup #intigriti #bug_bounty
Medium
Bypassing CSP via JSONP Callback Injection: Intigriti Challenge 0226 Write-up
Introduction
⤷ Title: SAST vs Claude Code Security: A Deep Dive
════════════════════════
𐀪 Author: Brett Crawley
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:01:41 GMT
════════════════════════
⌗ Tags: #claude_code #sast #application_security
════════════════════════
𐀪 Author: Brett Crawley
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:01:41 GMT
════════════════════════
⌗ Tags: #claude_code #sast #application_security
Medium
SAST vs Claude Code Security: A Deep Dive
In my previous post on Why SAST is Broken!, we explored some of the challenges and limitations of traditional static analysis tools. Now…
⤷ Title: It was just a staging server: Security Lessons I Learned the Hard Way.
════════════════════════
𐀪 Author: Princewill Onyenanu
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:14:21 GMT
════════════════════════
⌗ Tags: #technology #cryptocurrency #cybersecurity #hacking #cloud_computing
════════════════════════
𐀪 Author: Princewill Onyenanu
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:14:21 GMT
════════════════════════
⌗ Tags: #technology #cryptocurrency #cybersecurity #hacking #cloud_computing
Medium
It was just a staging server: Security Lessons I Learned the Hard Way.
On 21st of February, 2026, I spawned a new Virtual Private Server(VPS) on Linode. This was meant to serve as a staging environment for…
⤷ Title: Writeup for picoCTF challenge “dont-use-client-side”
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #picoctf #ctf #cybersecurity
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #picoctf #ctf #cybersecurity
Medium
Writeup for picoCTF challenge “dont-use-client-side”
Reconstruct fragmented flags from client-side validation code and learn why security logic must never run in the browser
⤷ Title: How to Find Information About Anyone
════════════════════════
𐀪 Author: mohandika
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:06 GMT
════════════════════════
⌗ Tags: #personal_data #social_engineering #cybersecurity #unc1069 #hacking
════════════════════════
𐀪 Author: mohandika
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:06 GMT
════════════════════════
⌗ Tags: #personal_data #social_engineering #cybersecurity #unc1069 #hacking
Medium
How to Find Information About Anyone
How Hackers Find and Use Your Personal Data in 2026
⤷ Title: How to Build a Beginner Cybersecurity Lab at Home (2026 Guide)
════════════════════════
𐀪 Author: Men Of Letters
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:38:42 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #hacking #ethical_hacking #kali_linux
════════════════════════
𐀪 Author: Men Of Letters
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:38:42 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #hacking #ethical_hacking #kali_linux
Medium
How to Build a Beginner Cybersecurity Lab at Home (2026 Guide)
If you’re serious about learning cybersecurity in 2026, theory alone won’t get you far.
⤷ Title: Security Controls Explained: How We Actually Defend Systems
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:19 GMT
════════════════════════
⌗ Tags: #technology #data_science #information_security #infosec #cybersecurity
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:19 GMT
════════════════════════
⌗ Tags: #technology #data_science #information_security #infosec #cybersecurity
Medium
Security Controls Explained: How We Actually Defend Systems
Cybersecurity isn’t just about setting up firewalls. It’s a massive, layered defense system. We implement specific rules, devices, and…
⤷ Title: Ensuring Device Security in Windows
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:13 GMT
════════════════════════
⌗ Tags: #microsoft_defender #microsoft_windows_series #penetration_testing #cybersecurity #windows
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:13 GMT
════════════════════════
⌗ Tags: #microsoft_defender #microsoft_windows_series #penetration_testing #cybersecurity #windows
Medium
Ensuring Device Security in Windows
Microsoft Windows Complete Guide Part 6
⤷ Title: Attacking Common Services — Part 1
════════════════════════
𐀪 Author: Nouman Ali Khan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:42:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #smb #sql_database #hackthebox_writeup #hackthebox
════════════════════════
𐀪 Author: Nouman Ali Khan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:42:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #smb #sql_database #hackthebox_writeup #hackthebox
Medium
Attacking Common Services — Part 1
FTP, SMB and SQL Databases
⤷ Title: Why Annual VAPT Is No Longer Enough for Modern Organizations
════════════════════════
𐀪 Author: Lakshita Gulliya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:09:48 GMT
════════════════════════
⌗ Tags: #cloud_security #vulnerability_management #cybersecurity #penetration_testing #risk_management
════════════════════════
𐀪 Author: Lakshita Gulliya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:09:48 GMT
════════════════════════
⌗ Tags: #cloud_security #vulnerability_management #cybersecurity #penetration_testing #risk_management
Medium
Why Annual VAPT Is No Longer Enough for Modern Organizations
Cybersecurity programs have traditionally relied on annual Vulnerability Assessment and Penetration Testing (VAPT) to evaluate security…
⤷ Title: Network Security Fundamentals for Cyber Defense
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:06:27 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity_online #ethical_hacking_course #hands_on_cybersecurity
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:06:27 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity_online #ethical_hacking_course #hands_on_cybersecurity
Medium
Network Security Fundamentals for Cyber Defense
Introduction
⤷ Title: My Journey Through TryHackMe’s Pre Security Course
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:51:34 GMT
════════════════════════
⌗ Tags: #security #learing #cybersecurity #tryhackme_pre_security #tryhackme
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:51:34 GMT
════════════════════════
⌗ Tags: #security #learing #cybersecurity #tryhackme_pre_security #tryhackme
Medium
My Journey Through TryHackMe’s Pre Security Course
As a cybersecurity enthusiast and a second-year CSIT student specializing in Cyber Security and Digital Forensics, I am always on the…
⤷ Title: TryHackMe — Blue WriteUp with Answers
════════════════════════
𐀪 Author: Ahmedkhaled
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:45:22 GMT
════════════════════════
⌗ Tags: #tryhackme #blues #ethical_hacking #cybersecurity #eternalblue
════════════════════════
𐀪 Author: Ahmedkhaled
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:45:22 GMT
════════════════════════
⌗ Tags: #tryhackme #blues #ethical_hacking #cybersecurity #eternalblue
Medium
TryHackMe — Blue WriteUp with Answers
Hey everyone! In this writeup, I’ll be walking you through the Blue room on TryHackMe. It’s a classic challenge that focuses on exploiting…