⤷ Title: Writeup for picoCTF challenge “dont-use-client-side”
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #picoctf #ctf #cybersecurity
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #picoctf #ctf #cybersecurity
Medium
Writeup for picoCTF challenge “dont-use-client-side”
Reconstruct fragmented flags from client-side validation code and learn why security logic must never run in the browser
⤷ Title: How to Find Information About Anyone
════════════════════════
𐀪 Author: mohandika
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:06 GMT
════════════════════════
⌗ Tags: #personal_data #social_engineering #cybersecurity #unc1069 #hacking
════════════════════════
𐀪 Author: mohandika
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:06 GMT
════════════════════════
⌗ Tags: #personal_data #social_engineering #cybersecurity #unc1069 #hacking
Medium
How to Find Information About Anyone
How Hackers Find and Use Your Personal Data in 2026
⤷ Title: How to Build a Beginner Cybersecurity Lab at Home (2026 Guide)
════════════════════════
𐀪 Author: Men Of Letters
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:38:42 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #hacking #ethical_hacking #kali_linux
════════════════════════
𐀪 Author: Men Of Letters
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:38:42 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #hacking #ethical_hacking #kali_linux
Medium
How to Build a Beginner Cybersecurity Lab at Home (2026 Guide)
If you’re serious about learning cybersecurity in 2026, theory alone won’t get you far.
⤷ Title: Security Controls Explained: How We Actually Defend Systems
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:19 GMT
════════════════════════
⌗ Tags: #technology #data_science #information_security #infosec #cybersecurity
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:19 GMT
════════════════════════
⌗ Tags: #technology #data_science #information_security #infosec #cybersecurity
Medium
Security Controls Explained: How We Actually Defend Systems
Cybersecurity isn’t just about setting up firewalls. It’s a massive, layered defense system. We implement specific rules, devices, and…
⤷ Title: Ensuring Device Security in Windows
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:13 GMT
════════════════════════
⌗ Tags: #microsoft_defender #microsoft_windows_series #penetration_testing #cybersecurity #windows
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:48:13 GMT
════════════════════════
⌗ Tags: #microsoft_defender #microsoft_windows_series #penetration_testing #cybersecurity #windows
Medium
Ensuring Device Security in Windows
Microsoft Windows Complete Guide Part 6
⤷ Title: Attacking Common Services — Part 1
════════════════════════
𐀪 Author: Nouman Ali Khan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:42:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #smb #sql_database #hackthebox_writeup #hackthebox
════════════════════════
𐀪 Author: Nouman Ali Khan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:42:28 GMT
════════════════════════
⌗ Tags: #penetration_testing #smb #sql_database #hackthebox_writeup #hackthebox
Medium
Attacking Common Services — Part 1
FTP, SMB and SQL Databases
⤷ Title: Why Annual VAPT Is No Longer Enough for Modern Organizations
════════════════════════
𐀪 Author: Lakshita Gulliya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:09:48 GMT
════════════════════════
⌗ Tags: #cloud_security #vulnerability_management #cybersecurity #penetration_testing #risk_management
════════════════════════
𐀪 Author: Lakshita Gulliya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:09:48 GMT
════════════════════════
⌗ Tags: #cloud_security #vulnerability_management #cybersecurity #penetration_testing #risk_management
Medium
Why Annual VAPT Is No Longer Enough for Modern Organizations
Cybersecurity programs have traditionally relied on annual Vulnerability Assessment and Penetration Testing (VAPT) to evaluate security…
⤷ Title: Network Security Fundamentals for Cyber Defense
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:06:27 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity_online #ethical_hacking_course #hands_on_cybersecurity
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:06:27 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity_online #ethical_hacking_course #hands_on_cybersecurity
Medium
Network Security Fundamentals for Cyber Defense
Introduction
⤷ Title: My Journey Through TryHackMe’s Pre Security Course
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:51:34 GMT
════════════════════════
⌗ Tags: #security #learing #cybersecurity #tryhackme_pre_security #tryhackme
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 12:51:34 GMT
════════════════════════
⌗ Tags: #security #learing #cybersecurity #tryhackme_pre_security #tryhackme
Medium
My Journey Through TryHackMe’s Pre Security Course
As a cybersecurity enthusiast and a second-year CSIT student specializing in Cyber Security and Digital Forensics, I am always on the…
⤷ Title: TryHackMe — Blue WriteUp with Answers
════════════════════════
𐀪 Author: Ahmedkhaled
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:45:22 GMT
════════════════════════
⌗ Tags: #tryhackme #blues #ethical_hacking #cybersecurity #eternalblue
════════════════════════
𐀪 Author: Ahmedkhaled
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:45:22 GMT
════════════════════════
⌗ Tags: #tryhackme #blues #ethical_hacking #cybersecurity #eternalblue
Medium
TryHackMe — Blue WriteUp with Answers
Hey everyone! In this writeup, I’ll be walking you through the Blue room on TryHackMe. It’s a classic challenge that focuses on exploiting…
⤷ Title: Cybersecurity Roadmap for Beginners in 2026 (Step-by-Step)
════════════════════════
𐀪 Author: Hassansaleemkey
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:09:43 GMT
════════════════════════
⌗ Tags: #career_advice #programming #technology #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Hassansaleemkey
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:09:43 GMT
════════════════════════
⌗ Tags: #career_advice #programming #technology #cybersecurity #ethical_hacking
Medium
Cybersecurity Roadmap for Beginners in 2026 (Step-by-Step)
Cybersecurity is one of the fastest-growing fields in the world. Every company, whether it is a small startup or a multinational…
⤷ Title: API SECURITY CONTROLS-Part3
════════════════════════
𐀪 Author: crązŷrąiɲ
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:18:39 GMT
════════════════════════
⌗ Tags: #api_security
════════════════════════
𐀪 Author: crązŷrąiɲ
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 11:18:39 GMT
════════════════════════
⌗ Tags: #api_security
Medium
API SECURITY CONTROLS-Part3
Mutual TLS (mTLS)
⤷ Title: ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:30:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:30:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Top Technology Stacks for MVP Development in 2026
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 13:53:40 +0000
════════════════════════
⌗ Tags: #Technology #API #Developers #Freshcode #javanoscript #JSON #MVP #React
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 13:53:40 +0000
════════════════════════
⌗ Tags: #Technology #API #Developers #Freshcode #javanoscript #JSON #MVP #React
Hackread
Top Technology Stacks for MVP Development in 2026
Top technology stacks for MVP development in 2026, best tools for fast launch, scalability, cost efficiency, and proven frameworks for startups building products.
⤷ Title: Phishing Attacks Explained with Real Examples
════════════════════════
𐀪 Author: Tanvi Chauhan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 13:48:36 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #bug_bounty #security #cybersecurity #phishing
════════════════════════
𐀪 Author: Tanvi Chauhan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 13:48:36 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #bug_bounty #security #cybersecurity #phishing
Medium
🎣 Phishing Attacks Explained with Real Examples
In today’s digital world, phishing attacks are one of the most common — and dangerous — cyber threats. From fake emails to cloned websites…
⤷ Title: Ripple Effects in the Silicon Supply Chain — Lessons from the 2026 Advantest Incident
════════════════════════
𐀪 Author: Aayushbhatt
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:44:58 GMT
════════════════════════
⌗ Tags: #advantest #cybersecurity #ransomware #money #hacking
════════════════════════
𐀪 Author: Aayushbhatt
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:44:58 GMT
════════════════════════
⌗ Tags: #advantest #cybersecurity #ransomware #money #hacking
Medium
Ripple Effects in the Silicon Supply Chain — Lessons from the 2026 Advantest Incident
When ransomware hits a critical supplier in the semiconductor ecosystem, the blast radius goes far beyond encrypted files. Test equipment…
⤷ Title: FahmSec CTF 2026 : ReflectiveBait
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:38:43 GMT
════════════════════════
⌗ Tags: #reverse_engineering #malware_analysis #hacking #ctf #cybersecurity
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:38:43 GMT
════════════════════════
⌗ Tags: #reverse_engineering #malware_analysis #hacking #ctf #cybersecurity
Medium
FahmSec CTF 2026 : ReflectiveBait
“What you see is not what runs. Find the truth.”
⤷ Title: A Deeper Dive into NODE: Protocol — The Co-op Hacking Fantasy
════════════════════════
𐀪 Author: Marc
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 13:46:00 GMT
════════════════════════
⌗ Tags: #hacking #simulation #game_development #multiplayer #kali_linux
════════════════════════
𐀪 Author: Marc
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 13:46:00 GMT
════════════════════════
⌗ Tags: #hacking #simulation #game_development #multiplayer #kali_linux
Medium
A Deeper Dive into NODE: Protocol — The Co-op Hacking Fantasy
(This is a follow-up to my recent X post teasing NODE: Protocol. If you haven’t seen it, check it out here. Here, I’ll expand on what makes…
⤷ Title: Recon Is Not Just Tools: Digging Gold
════════════════════════
𐀪 Author: Nitin yadav
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 13:37:29 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #technology #hacking #cybersecurity #coding
════════════════════════
𐀪 Author: Nitin yadav
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 13:37:29 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #technology #hacking #cybersecurity #coding
Medium
Recon Is Not Just Tools: Digging Gold
Introduction
⤷ Title: Basic Pentest
════════════════════════
𐀪 Author: Farid Hajiyev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 13:03:03 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #webmin #ctf #pentesting
════════════════════════
𐀪 Author: Farid Hajiyev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 13:03:03 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #webmin #ctf #pentesting
Medium
Basic Pentest
(report)
⤷ Title: Solving a Bugforge Daily Challenge — Exploiting SQL Injection in Cafe Club
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:22:48 GMT
════════════════════════
⌗ Tags: #bugforge #web_pentesting #cybersecurity #sql_injection #caido
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:22:48 GMT
════════════════════════
⌗ Tags: #bugforge #web_pentesting #cybersecurity #sql_injection #caido
Medium
Solving a Bugforge Daily Challenge — Exploiting SQL Injection in Cafe Club
Today, I solved a daily challenge on Bugforge, targeting a web application called Cafe Club.