⤷ Title: Malware Analysis: .NET Dropper and Encrypted UPX-Packed Infostealer (Salat Stealer)
════════════════════════
𐀪 Author: Hack(IT)Sec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:43:14 GMT
════════════════════════
⌗ Tags: #infosec #infostealer #malware #cybersecurity
════════════════════════
𐀪 Author: Hack(IT)Sec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:43:14 GMT
════════════════════════
⌗ Tags: #infosec #infostealer #malware #cybersecurity
Medium
Malware Analysis: .NET Dropper and Encrypted UPX-Packed Infostealer (Salat Stealer)
Overview
⤷ Title: Understanding the Difference Between the Dark Web and the Deep Web
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:39:30 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #osint #darkweb
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:39:30 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #osint #darkweb
Medium
Understanding the Difference Between the Dark Web and the Deep Web
Many people use the terms dark web and deep web interchangeably. However, they are not the same thing.
⤷ Title: Intermediate Web Application Penetration Testing — Episode 002 | Session Management Room Tryhackme
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:32:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #offsec #ethical_hacking #infosec #tryhackme
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:32:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #offsec #ethical_hacking #infosec #tryhackme
Medium
Intermediate Web Application Penetration Testing — Episode 002
Session Management Room Tryhackme
⤷ Title: The Truth Machine: How Blockchain Can Fight the AI Deepfake Crisis
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:51:31 GMT
════════════════════════
⌗ Tags: #ai #information_security #cyber_security_awareness #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:51:31 GMT
════════════════════════
⌗ Tags: #ai #information_security #cyber_security_awareness #cybersecurity #ethical_hacking
Medium
The Truth Machine: How Blockchain Can Fight the AI Deepfake Crisis
Remember the photo of Pope Francis wearing that massive white Balenciaga puffer jacket?
⤷ Title: API Security Fundamentals: Architecture, Protocols, and Real-World Risks
════════════════════════
𐀪 Author: Reduan Islam Badhon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:17:40 GMT
════════════════════════
⌗ Tags: #website #api #api_security #owasp_api_security_top_10 #owasp_top_10
════════════════════════
𐀪 Author: Reduan Islam Badhon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:17:40 GMT
════════════════════════
⌗ Tags: #website #api #api_security #owasp_api_security_top_10 #owasp_top_10
Medium
API Security Fundamentals: Architecture, Protocols, and Real-World Risks
If we want to properly understand API security, you need to think in layers:
⤷ Title: Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Multiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacks
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:27:24 +0000
════════════════════════
⌗ Tags: #Security #0day #Apryse #Cybersecurity #Foxit #Novee Security #Vulnerability #XSS
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:27:24 +0000
════════════════════════
⌗ Tags: #Security #0day #Apryse #Cybersecurity #Foxit #Novee Security #Vulnerability #XSS
Hackread
Multiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacks
16 zero-day security flaws found in Foxit and Apryse PDF platforms could lead to account takeover and RCE. Learn how AI identified these risks.
⤷ Title: Red Team Weapon: RapidDNS CLI + Nuclei/Httpx for Automated Vulnerability Mining Pipeline
════════════════════════
𐀪 Author: rapiddns
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:57:11 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: rapiddns
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:57:11 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity
Medium
Red Team Weapon: RapidDNS CLI + Nuclei/Httpx for Automated Vulnerability Mining Pipeline
Every Red Teamer and Bug Bounty Hunter knows that Reconnaissance (Recon) is the most critical step. In this phase, not only do your tools…
⤷ Title: Beyond Recon: Mastering Authentication Logic in Bug Bounty
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:38:25 GMT
════════════════════════
⌗ Tags: #sso #cybersecurity #security #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:38:25 GMT
════════════════════════
⌗ Tags: #sso #cybersecurity #security #penetration_testing #bug_bounty
Medium
Beyond Recon: Mastering Authentication Logic in Bug Bounty
Why Authentication Logic Is the Next Level in Bug Bounty Hunting
⤷ Title: Cheesy Does it writeup (Business Logic flaw)(Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:05:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf_writeup #bugforge #bug_bounty
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:05:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf_writeup #bugforge #bug_bounty
Medium
Cheesy Does it writeup (Business Logic flaw)(Bugforge)
We’re back at Cheesy Does It! The only pizza restaurant that somehow stays in business despite losing gargantuan amounts of cash!
⤷ Title: One Invite Endpoint, One Race Condition — 4 Bugs Later
════════════════════════
𐀪 Author: Raslanco
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:03:06 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #infosec_write_ups #bug_bounty_writeup #bugs
════════════════════════
𐀪 Author: Raslanco
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:03:06 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #infosec_write_ups #bug_bounty_writeup #bugs
Medium
One Invite Endpoint, One Race Condition — 4 Bugs Later
Sometimes the most interesting vulnerabilities don’t require complex payloads or advanced exploitation chains. Sometimes, all it takes is…
⤷ Title: Unsafe Deserialization in Ruby Background Workers Leading to Deterministic Remote Code Execution
════════════════════════
𐀪 Author: NullSecurityX
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:57:42 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #json #bug_bounty #ruby
════════════════════════
𐀪 Author: NullSecurityX
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:57:42 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #json #bug_bounty #ruby
Medium
Unsafe Deserialization in Ruby Background Workers Leading to Deterministic Remote Code Execution
Object Injection via Oj.load Allows Command Execution in RubitMQ Job Workers
⤷ Title: Lab: Blind SQL injection with conditional responses | PortSwigger
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:20:24 GMT
════════════════════════
⌗ Tags: #hacking #sql_injection #ethical_hacking #portswigger #web_hacking
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:20:24 GMT
════════════════════════
⌗ Tags: #hacking #sql_injection #ethical_hacking #portswigger #web_hacking
Medium
Lab: Blind SQL injection with conditional responses | PortSwigger
Denoscription
⤷ Title: Hack 108: Reviving the Hacker Spirit in the Corporate World
════════════════════════
𐀪 Author: ᴅᴀɴ ᴋᴏʀᴏᴠᴛᴄʜ
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:52:03 GMT
════════════════════════
⌗ Tags: #advisor #hacking #executive_training #company_culture
════════════════════════
𐀪 Author: ᴅᴀɴ ᴋᴏʀᴏᴠᴛᴄʜ
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:52:03 GMT
════════════════════════
⌗ Tags: #advisor #hacking #executive_training #company_culture
Medium
Hack 108: Reviving the Hacker Spirit in the Corporate World
When I first thought of the number 108, I didn’t just see a number — I saw a symbol of wholeness, cycles, and alignment, a concept deeply…
⤷ Title: FahmSec CTF 2026 : Func Reversing !
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:34:20 GMT
════════════════════════
⌗ Tags: #hacking #malware #cybersecurity #reverse_engineering #ctf
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:34:20 GMT
════════════════════════
⌗ Tags: #hacking #malware #cybersecurity #reverse_engineering #ctf
Medium
FahmSec CTF 2026 : Func Reversing !
وما توفيقي إلا بالله :)
⤷ Title: FahmSec CTF 2026 : ReflectiveBait Reversing
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:38:43 GMT
════════════════════════
⌗ Tags: #reverse_engineering #malware_analysis #hacking #ctf #cybersecurity
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:38:43 GMT
════════════════════════
⌗ Tags: #reverse_engineering #malware_analysis #hacking #ctf #cybersecurity
Medium
FahmSec CTF 2026 : ReflectiveBait
“What you see is not what runs. Find the truth.”
⤷ Title: Part 5: The Grand Finale — Building a Master Shield for the Digital Age
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:29 GMT
════════════════════════
⌗ Tags: #cybersecurity #azerbaijantech #infosec #holberton_school
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:29 GMT
════════════════════════
⌗ Tags: #cybersecurity #azerbaijantech #infosec #holberton_school
Medium
Part 5: The Grand Finale — Building a Master Shield for the Digital Age
Hello everyone! It has been an incredible journey sharing my cybersecurity studies at Holberton School Azerbaijan with you.
⤷ Title: Part4: The “Hidden Key” Debate: Is Security Through Obscurity Actually Secure?
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:14 GMT
════════════════════════
⌗ Tags: #infosec #holberton_school #azerbaijantech #cybersecurity
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:14 GMT
════════════════════════
⌗ Tags: #infosec #holberton_school #azerbaijantech #cybersecurity
Medium
Part4: The “Hidden Key” Debate: Is Security Through Obscurity Actually Secure?
Hello, Holberton Azerbaijan community and fellow tech enthusiasts!
⤷ Title: CVE-2025–15556 分析:Notepad++ 的供應鏈攻擊與防禦策略
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:43:03 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #blue_team #infosec #cve
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:43:03 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #blue_team #infosec #cve
Medium
CVE-2025–15556 分析:Notepad++ 的供應鏈攻擊與防禦策略
漏洞摘要 該漏洞在 2026/2/3 正式釋出,在 Notepad++ 8.8.9 之前的版本中,其內建的更新程式 WinGUp (gup.exe) 存在一個嚴重漏洞,WinGUp在下載更新檔時只負責下載,卻沒有「核對身分」
⤷ Title: I Bypassed an Admin Panel Using One HTTP Header
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:28:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #web_security #owasp_top_10 #vulnerability #ethical_hacking
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:28:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #web_security #owasp_top_10 #vulnerability #ethical_hacking
Medium
I Bypassed an Admin Panel Using One HTTP Header
The server didn’t get hacked. It gave up the secret itself.
⤷ Title: JavaScript: Simple Demo (THM) Tryhackme Walkthrough
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:33:27 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #javanoscript #tryhackme_walkthrough #programming
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:33:27 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #javanoscript #tryhackme_walkthrough #programming
Medium
JavaScript: Simple Demo (THM) Tryhackme Walkthrough
Denoscription : Explore what a basic JavaScript program looks like.