⤷ Title: Intermediate Web Application Penetration Testing — Episode 002 | Session Management Room Tryhackme
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:32:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #offsec #ethical_hacking #infosec #tryhackme
════════════════════════
𐀪 Author: Nolan Stark
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:32:24 GMT
════════════════════════
⌗ Tags: #cybersecurity #offsec #ethical_hacking #infosec #tryhackme
Medium
Intermediate Web Application Penetration Testing — Episode 002
Session Management Room Tryhackme
⤷ Title: The Truth Machine: How Blockchain Can Fight the AI Deepfake Crisis
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:51:31 GMT
════════════════════════
⌗ Tags: #ai #information_security #cyber_security_awareness #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:51:31 GMT
════════════════════════
⌗ Tags: #ai #information_security #cyber_security_awareness #cybersecurity #ethical_hacking
Medium
The Truth Machine: How Blockchain Can Fight the AI Deepfake Crisis
Remember the photo of Pope Francis wearing that massive white Balenciaga puffer jacket?
⤷ Title: API Security Fundamentals: Architecture, Protocols, and Real-World Risks
════════════════════════
𐀪 Author: Reduan Islam Badhon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:17:40 GMT
════════════════════════
⌗ Tags: #website #api #api_security #owasp_api_security_top_10 #owasp_top_10
════════════════════════
𐀪 Author: Reduan Islam Badhon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:17:40 GMT
════════════════════════
⌗ Tags: #website #api #api_security #owasp_api_security_top_10 #owasp_top_10
Medium
API Security Fundamentals: Architecture, Protocols, and Real-World Risks
If we want to properly understand API security, you need to think in layers:
⤷ Title: Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Multiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacks
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:27:24 +0000
════════════════════════
⌗ Tags: #Security #0day #Apryse #Cybersecurity #Foxit #Novee Security #Vulnerability #XSS
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:27:24 +0000
════════════════════════
⌗ Tags: #Security #0day #Apryse #Cybersecurity #Foxit #Novee Security #Vulnerability #XSS
Hackread
Multiple Zero-Day Flaws in PDF Platforms Enable XSS and One-Click Attacks
16 zero-day security flaws found in Foxit and Apryse PDF platforms could lead to account takeover and RCE. Learn how AI identified these risks.
⤷ Title: Red Team Weapon: RapidDNS CLI + Nuclei/Httpx for Automated Vulnerability Mining Pipeline
════════════════════════
𐀪 Author: rapiddns
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:57:11 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: rapiddns
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:57:11 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity
Medium
Red Team Weapon: RapidDNS CLI + Nuclei/Httpx for Automated Vulnerability Mining Pipeline
Every Red Teamer and Bug Bounty Hunter knows that Reconnaissance (Recon) is the most critical step. In this phase, not only do your tools…
⤷ Title: Beyond Recon: Mastering Authentication Logic in Bug Bounty
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:38:25 GMT
════════════════════════
⌗ Tags: #sso #cybersecurity #security #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:38:25 GMT
════════════════════════
⌗ Tags: #sso #cybersecurity #security #penetration_testing #bug_bounty
Medium
Beyond Recon: Mastering Authentication Logic in Bug Bounty
Why Authentication Logic Is the Next Level in Bug Bounty Hunting
⤷ Title: Cheesy Does it writeup (Business Logic flaw)(Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:05:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf_writeup #bugforge #bug_bounty
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:05:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf_writeup #bugforge #bug_bounty
Medium
Cheesy Does it writeup (Business Logic flaw)(Bugforge)
We’re back at Cheesy Does It! The only pizza restaurant that somehow stays in business despite losing gargantuan amounts of cash!
⤷ Title: One Invite Endpoint, One Race Condition — 4 Bugs Later
════════════════════════
𐀪 Author: Raslanco
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:03:06 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #infosec_write_ups #bug_bounty_writeup #bugs
════════════════════════
𐀪 Author: Raslanco
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:03:06 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #infosec_write_ups #bug_bounty_writeup #bugs
Medium
One Invite Endpoint, One Race Condition — 4 Bugs Later
Sometimes the most interesting vulnerabilities don’t require complex payloads or advanced exploitation chains. Sometimes, all it takes is…
⤷ Title: Unsafe Deserialization in Ruby Background Workers Leading to Deterministic Remote Code Execution
════════════════════════
𐀪 Author: NullSecurityX
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:57:42 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #json #bug_bounty #ruby
════════════════════════
𐀪 Author: NullSecurityX
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:57:42 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #json #bug_bounty #ruby
Medium
Unsafe Deserialization in Ruby Background Workers Leading to Deterministic Remote Code Execution
Object Injection via Oj.load Allows Command Execution in RubitMQ Job Workers
⤷ Title: Lab: Blind SQL injection with conditional responses | PortSwigger
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:20:24 GMT
════════════════════════
⌗ Tags: #hacking #sql_injection #ethical_hacking #portswigger #web_hacking
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:20:24 GMT
════════════════════════
⌗ Tags: #hacking #sql_injection #ethical_hacking #portswigger #web_hacking
Medium
Lab: Blind SQL injection with conditional responses | PortSwigger
Denoscription
⤷ Title: Hack 108: Reviving the Hacker Spirit in the Corporate World
════════════════════════
𐀪 Author: ᴅᴀɴ ᴋᴏʀᴏᴠᴛᴄʜ
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:52:03 GMT
════════════════════════
⌗ Tags: #advisor #hacking #executive_training #company_culture
════════════════════════
𐀪 Author: ᴅᴀɴ ᴋᴏʀᴏᴠᴛᴄʜ
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 16:52:03 GMT
════════════════════════
⌗ Tags: #advisor #hacking #executive_training #company_culture
Medium
Hack 108: Reviving the Hacker Spirit in the Corporate World
When I first thought of the number 108, I didn’t just see a number — I saw a symbol of wholeness, cycles, and alignment, a concept deeply…
⤷ Title: FahmSec CTF 2026 : Func Reversing !
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:34:20 GMT
════════════════════════
⌗ Tags: #hacking #malware #cybersecurity #reverse_engineering #ctf
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 15:34:20 GMT
════════════════════════
⌗ Tags: #hacking #malware #cybersecurity #reverse_engineering #ctf
Medium
FahmSec CTF 2026 : Func Reversing !
وما توفيقي إلا بالله :)
⤷ Title: FahmSec CTF 2026 : ReflectiveBait Reversing
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:38:43 GMT
════════════════════════
⌗ Tags: #reverse_engineering #malware_analysis #hacking #ctf #cybersecurity
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 14:38:43 GMT
════════════════════════
⌗ Tags: #reverse_engineering #malware_analysis #hacking #ctf #cybersecurity
Medium
FahmSec CTF 2026 : ReflectiveBait
“What you see is not what runs. Find the truth.”
⤷ Title: Part 5: The Grand Finale — Building a Master Shield for the Digital Age
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:29 GMT
════════════════════════
⌗ Tags: #cybersecurity #azerbaijantech #infosec #holberton_school
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:29 GMT
════════════════════════
⌗ Tags: #cybersecurity #azerbaijantech #infosec #holberton_school
Medium
Part 5: The Grand Finale — Building a Master Shield for the Digital Age
Hello everyone! It has been an incredible journey sharing my cybersecurity studies at Holberton School Azerbaijan with you.
⤷ Title: Part4: The “Hidden Key” Debate: Is Security Through Obscurity Actually Secure?
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:14 GMT
════════════════════════
⌗ Tags: #infosec #holberton_school #azerbaijantech #cybersecurity
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:14 GMT
════════════════════════
⌗ Tags: #infosec #holberton_school #azerbaijantech #cybersecurity
Medium
Part4: The “Hidden Key” Debate: Is Security Through Obscurity Actually Secure?
Hello, Holberton Azerbaijan community and fellow tech enthusiasts!
⤷ Title: CVE-2025–15556 分析:Notepad++ 的供應鏈攻擊與防禦策略
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:43:03 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #blue_team #infosec #cve
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:43:03 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #blue_team #infosec #cve
Medium
CVE-2025–15556 分析:Notepad++ 的供應鏈攻擊與防禦策略
漏洞摘要 該漏洞在 2026/2/3 正式釋出,在 Notepad++ 8.8.9 之前的版本中,其內建的更新程式 WinGUp (gup.exe) 存在一個嚴重漏洞,WinGUp在下載更新檔時只負責下載,卻沒有「核對身分」
⤷ Title: I Bypassed an Admin Panel Using One HTTP Header
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:28:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #web_security #owasp_top_10 #vulnerability #ethical_hacking
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:28:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #web_security #owasp_top_10 #vulnerability #ethical_hacking
Medium
I Bypassed an Admin Panel Using One HTTP Header
The server didn’t get hacked. It gave up the secret itself.
⤷ Title: JavaScript: Simple Demo (THM) Tryhackme Walkthrough
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:33:27 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #javanoscript #tryhackme_walkthrough #programming
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:33:27 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #javanoscript #tryhackme_walkthrough #programming
Medium
JavaScript: Simple Demo (THM) Tryhackme Walkthrough
Denoscription : Explore what a basic JavaScript program looks like.
⤷ Title: IEC 62443: The “Gold Standard” for Industrial Security Simplified
════════════════════════
𐀪 Author: Dasmanish
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:05:45 GMT
════════════════════════
⌗ Tags: #ot_vapt #ethical_hacking #pentesting #ics_scada #iec_62443
════════════════════════
𐀪 Author: Dasmanish
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:05:45 GMT
════════════════════════
⌗ Tags: #ot_vapt #ethical_hacking #pentesting #ics_scada #iec_62443
Medium
IEC 62443: The “Gold Standard” for Industrial Security Simplified
1. Stakeholders (Roles and Responsibilities)
⤷ Title: GTFOBins Explained: How Legitimate Linux Tools Become Powerful Attack Vectors
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:24:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #blue_team #linux_security #incident_response
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:24:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #blue_team #linux_security #incident_response
Medium
GTFOBins Explained: How Legitimate Linux Tools Become Powerful Attack Vectors
Introduction