⤷ Title: Part4: The “Hidden Key” Debate: Is Security Through Obscurity Actually Secure?
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:14 GMT
════════════════════════
⌗ Tags: #infosec #holberton_school #azerbaijantech #cybersecurity
════════════════════════
𐀪 Author: Telman Hajibutayev
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:24:14 GMT
════════════════════════
⌗ Tags: #infosec #holberton_school #azerbaijantech #cybersecurity
Medium
Part4: The “Hidden Key” Debate: Is Security Through Obscurity Actually Secure?
Hello, Holberton Azerbaijan community and fellow tech enthusiasts!
⤷ Title: CVE-2025–15556 分析:Notepad++ 的供應鏈攻擊與防禦策略
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:43:03 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #blue_team #infosec #cve
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:43:03 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #blue_team #infosec #cve
Medium
CVE-2025–15556 分析:Notepad++ 的供應鏈攻擊與防禦策略
漏洞摘要 該漏洞在 2026/2/3 正式釋出,在 Notepad++ 8.8.9 之前的版本中,其內建的更新程式 WinGUp (gup.exe) 存在一個嚴重漏洞,WinGUp在下載更新檔時只負責下載,卻沒有「核對身分」
⤷ Title: I Bypassed an Admin Panel Using One HTTP Header
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:28:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #web_security #owasp_top_10 #vulnerability #ethical_hacking
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:28:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #web_security #owasp_top_10 #vulnerability #ethical_hacking
Medium
I Bypassed an Admin Panel Using One HTTP Header
The server didn’t get hacked. It gave up the secret itself.
⤷ Title: JavaScript: Simple Demo (THM) Tryhackme Walkthrough
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:33:27 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #javanoscript #tryhackme_walkthrough #programming
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:33:27 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #javanoscript #tryhackme_walkthrough #programming
Medium
JavaScript: Simple Demo (THM) Tryhackme Walkthrough
Denoscription : Explore what a basic JavaScript program looks like.
⤷ Title: IEC 62443: The “Gold Standard” for Industrial Security Simplified
════════════════════════
𐀪 Author: Dasmanish
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:05:45 GMT
════════════════════════
⌗ Tags: #ot_vapt #ethical_hacking #pentesting #ics_scada #iec_62443
════════════════════════
𐀪 Author: Dasmanish
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 18:05:45 GMT
════════════════════════
⌗ Tags: #ot_vapt #ethical_hacking #pentesting #ics_scada #iec_62443
Medium
IEC 62443: The “Gold Standard” for Industrial Security Simplified
1. Stakeholders (Roles and Responsibilities)
⤷ Title: GTFOBins Explained: How Legitimate Linux Tools Become Powerful Attack Vectors
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:24:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #blue_team #linux_security #incident_response
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:24:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #blue_team #linux_security #incident_response
Medium
GTFOBins Explained: How Legitimate Linux Tools Become Powerful Attack Vectors
Introduction
⤷ Title: Post-Quantum Cybersecurity
════════════════════════
𐀪 Author: Dietmar Marggraff
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:40:43 GMT
════════════════════════
⌗ Tags: #hacking #quantum_computing #encryption #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Dietmar Marggraff
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:40:43 GMT
════════════════════════
⌗ Tags: #hacking #quantum_computing #encryption #cyber_security_awareness #cybersecurity
Medium
Post-Quantum Cryptography
Your no-nonsense guide to PQC
⤷ Title: Cracking DVRIP/Sofia Hashes With Python
════════════════════════
𐀪 Author: Kostas Ereksonas
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:08:18 GMT
════════════════════════
⌗ Tags: #hacking #password_cracking #cameras #python #iot
════════════════════════
𐀪 Author: Kostas Ereksonas
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:08:18 GMT
════════════════════════
⌗ Tags: #hacking #password_cracking #cameras #python #iot
Medium
Cracking DVRIP/Sofia Hashes With Python
Using a simple dictionary attack to crack a DVRIP/Sofia hash found on Xiongmai-based IP cameras. Full code is provided in…
⤷ Title: Ice — TryHackMe
════════════════════════
𐀪 Author: Azzam Mohammed (WHHacker)
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:55:30 GMT
════════════════════════
⌗ Tags: #penetration_testing #privilege_escalation #cybersecurity #web_exploitation #tryhackme
════════════════════════
𐀪 Author: Azzam Mohammed (WHHacker)
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:55:30 GMT
════════════════════════
⌗ Tags: #penetration_testing #privilege_escalation #cybersecurity #web_exploitation #tryhackme
Medium
Ice — TryHackMe
Introduction
⤷ Title: Try Hack Me- Atlas CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:24:23 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:24:23 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme_writeup #tryhackme
Medium
Try Hack Me- Atlas CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: TryHackMe | JavaScript: Simple Demo | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:20:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_walkthrough #tryhackme_writeup #javanoscript
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:20:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_walkthrough #tryhackme_writeup #javanoscript
Medium
TryHackMe | JavaScript: Simple Demo | WriteUp
Explore what a basic JavaScript program looks like.
⤷ Title: TryHackMe | Python: Simple Demo | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:19:54 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #tryhackme_writeup #python #cybersecurity
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:19:54 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #tryhackme_writeup #python #cybersecurity
Medium
TryHackMe | Python: Simple Demo | WriteUp
Explore what a basic Python program looks like.
⤷ Title: Why Real API Breaches Happen Through Chains, Not Single Bugs
════════════════════════
𐀪 Author: Boluwatife Dada
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:52:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security
════════════════════════
𐀪 Author: Boluwatife Dada
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:52:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security
Medium
Why Real API Breaches Happen Through Chains, Not Single Bugs
In API security, single bugs within an application can result in a major security breach if discovered by a malicious hacker. What could be…
⤷ Title: API Under the Microscope: Revealing Security Gaps You Can’t See
════════════════════════
𐀪 Author: Titaninfosec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:03:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security #cyberattack #api #vulerability
════════════════════════
𐀪 Author: Titaninfosec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:03:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security #cyberattack #api #vulerability
Medium
API Under the Microscope: Revealing Security Gaps You Can’t See
In today’s digital world, APIs are the invisible engines powering almost every application we use — from mobile banking to ride-sharing to…
⤷ Title: BugForge io: Cafe Club Walkthrough
════════════════════════
𐀪 Author: Isaiah Avweromre
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:39:15 GMT
════════════════════════
⌗ Tags: #bugforge_io #sql_injection_attack #web_application_security #sql_injection #club_cafe
════════════════════════
𐀪 Author: Isaiah Avweromre
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:39:15 GMT
════════════════════════
⌗ Tags: #bugforge_io #sql_injection_attack #web_application_security #sql_injection #club_cafe
Medium
BugForge io: Cafe Club Walkthrough
Hello Folks! I’m back with another write-up where I solved the “Cafe Club” lab on BugForge io and documented the full exploitation process.
⤷ Title: APT28 Targeted European Entities Using Webhook-Based Macro Malware
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:11:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:11:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Data Breaches in 2026: What’s old, what’s new?
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 22:50:29 +0000
════════════════════════
⌗ Tags: #Security #2026 #Cybersecurity #data breach #Data Security #Password #Phishing #VPN
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 22:50:29 +0000
════════════════════════
⌗ Tags: #Security #2026 #Cybersecurity #data breach #Data Security #Password #Phishing #VPN
Hackread
Data Breaches in 2026: What’s old, what’s new?
Data breaches in 2026 explained, new threats, AI driven attacks, common breach causes, and practical security strategies for individuals and businesses
⤷ Title: ColddBox : An Easy CTF Walkthrough [Try Hack Me] :
════════════════════════
𐀪 Author: Amrou bekhedda
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 22:07:38 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #hacking #penetration_testing #hacker #bug_bounty
════════════════════════
𐀪 Author: Amrou bekhedda
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 22:07:38 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #hacking #penetration_testing #hacker #bug_bounty
Medium
ColddBox : An Easy CTF Walkthrough [Try Hack Me] :
a well-detailed guide for beginners on a Try Hack Me room .
⤷ Title: Furhire writeup (MFA Bypass) (Medium)(Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:00:52 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #bugforge #hacking #ctf_writeup
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:00:52 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #bugforge #hacking #ctf_writeup
Medium
Furhire writeup (MFA Bypass) (Medium)(Bugforge)
Furhire writeup (MFA Bypass) (Medium)(Bugforge) Step 1: Sign up… but wait! When you sign up, be ready to capture traffic. Because the vulnerability (1/2 vulnerabilities) is right here, with a mass …
⤷ Title: Behind the Veil: Analyzing IoT Intrusion Patterns via Smart Home Honeypots
════════════════════════
𐀪 Author: Razored
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:56:46 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #cybersecurity_research #honeypot #iot_security
════════════════════════
𐀪 Author: Razored
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:56:46 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #cybersecurity_research #honeypot #iot_security
Medium
Behind the Veil: Analyzing IoT Intrusion Patterns via Smart Home Honeypots
By: Rushi Patel Cybersecurity Researcher | MS in Cybersecurity & Information Assurance
⤷ Title: INE-Host & Network Penetration Testing: Post-Exploitation CTF 1 by Singkhon
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:37:02 GMT
════════════════════════
⌗ Tags: #programming #ctf #cybersecurity #coding #penetration_testing
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:37:02 GMT
════════════════════════
⌗ Tags: #programming #ctf #cybersecurity #coding #penetration_testing
Medium
INE-Host & Network Penetration Testing: Post-Exploitation CTF 1 by Singkhon
Hello, my name is Singkhon. After completing the eJPT course, I would like to share my methods and approaches for solving each CTF problem…