⤷ Title: GTFOBins Explained: How Legitimate Linux Tools Become Powerful Attack Vectors
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:24:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #blue_team #linux_security #incident_response
════════════════════════
𐀪 Author: Sidhantchaurasiya
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:24:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #blue_team #linux_security #incident_response
Medium
GTFOBins Explained: How Legitimate Linux Tools Become Powerful Attack Vectors
Introduction
⤷ Title: Post-Quantum Cybersecurity
════════════════════════
𐀪 Author: Dietmar Marggraff
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:40:43 GMT
════════════════════════
⌗ Tags: #hacking #quantum_computing #encryption #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Dietmar Marggraff
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:40:43 GMT
════════════════════════
⌗ Tags: #hacking #quantum_computing #encryption #cyber_security_awareness #cybersecurity
Medium
Post-Quantum Cryptography
Your no-nonsense guide to PQC
⤷ Title: Cracking DVRIP/Sofia Hashes With Python
════════════════════════
𐀪 Author: Kostas Ereksonas
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:08:18 GMT
════════════════════════
⌗ Tags: #hacking #password_cracking #cameras #python #iot
════════════════════════
𐀪 Author: Kostas Ereksonas
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:08:18 GMT
════════════════════════
⌗ Tags: #hacking #password_cracking #cameras #python #iot
Medium
Cracking DVRIP/Sofia Hashes With Python
Using a simple dictionary attack to crack a DVRIP/Sofia hash found on Xiongmai-based IP cameras. Full code is provided in…
⤷ Title: Ice — TryHackMe
════════════════════════
𐀪 Author: Azzam Mohammed (WHHacker)
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:55:30 GMT
════════════════════════
⌗ Tags: #penetration_testing #privilege_escalation #cybersecurity #web_exploitation #tryhackme
════════════════════════
𐀪 Author: Azzam Mohammed (WHHacker)
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:55:30 GMT
════════════════════════
⌗ Tags: #penetration_testing #privilege_escalation #cybersecurity #web_exploitation #tryhackme
Medium
Ice — TryHackMe
Introduction
⤷ Title: Try Hack Me- Atlas CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:24:23 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 20:24:23 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme_writeup #tryhackme
Medium
Try Hack Me- Atlas CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: TryHackMe | JavaScript: Simple Demo | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:20:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_walkthrough #tryhackme_writeup #javanoscript
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:20:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_walkthrough #tryhackme_writeup #javanoscript
Medium
TryHackMe | JavaScript: Simple Demo | WriteUp
Explore what a basic JavaScript program looks like.
⤷ Title: TryHackMe | Python: Simple Demo | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:19:54 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #tryhackme_writeup #python #cybersecurity
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:19:54 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #tryhackme_writeup #python #cybersecurity
Medium
TryHackMe | Python: Simple Demo | WriteUp
Explore what a basic Python program looks like.
⤷ Title: Why Real API Breaches Happen Through Chains, Not Single Bugs
════════════════════════
𐀪 Author: Boluwatife Dada
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:52:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security
════════════════════════
𐀪 Author: Boluwatife Dada
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:52:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security
Medium
Why Real API Breaches Happen Through Chains, Not Single Bugs
In API security, single bugs within an application can result in a major security breach if discovered by a malicious hacker. What could be…
⤷ Title: API Under the Microscope: Revealing Security Gaps You Can’t See
════════════════════════
𐀪 Author: Titaninfosec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:03:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security #cyberattack #api #vulerability
════════════════════════
𐀪 Author: Titaninfosec
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:03:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security #cyberattack #api #vulerability
Medium
API Under the Microscope: Revealing Security Gaps You Can’t See
In today’s digital world, APIs are the invisible engines powering almost every application we use — from mobile banking to ride-sharing to…
⤷ Title: BugForge io: Cafe Club Walkthrough
════════════════════════
𐀪 Author: Isaiah Avweromre
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:39:15 GMT
════════════════════════
⌗ Tags: #bugforge_io #sql_injection_attack #web_application_security #sql_injection #club_cafe
════════════════════════
𐀪 Author: Isaiah Avweromre
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 19:39:15 GMT
════════════════════════
⌗ Tags: #bugforge_io #sql_injection_attack #web_application_security #sql_injection #club_cafe
Medium
BugForge io: Cafe Club Walkthrough
Hello Folks! I’m back with another write-up where I solved the “Cafe Club” lab on BugForge io and documented the full exploitation process.
⤷ Title: APT28 Targeted European Entities Using Webhook-Based Macro Malware
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:11:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:11:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Data Breaches in 2026: What’s old, what’s new?
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 22:50:29 +0000
════════════════════════
⌗ Tags: #Security #2026 #Cybersecurity #data breach #Data Security #Password #Phishing #VPN
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 22:50:29 +0000
════════════════════════
⌗ Tags: #Security #2026 #Cybersecurity #data breach #Data Security #Password #Phishing #VPN
Hackread
Data Breaches in 2026: What’s old, what’s new?
Data breaches in 2026 explained, new threats, AI driven attacks, common breach causes, and practical security strategies for individuals and businesses
⤷ Title: ColddBox : An Easy CTF Walkthrough [Try Hack Me] :
════════════════════════
𐀪 Author: Amrou bekhedda
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 22:07:38 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #hacking #penetration_testing #hacker #bug_bounty
════════════════════════
𐀪 Author: Amrou bekhedda
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 22:07:38 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #hacking #penetration_testing #hacker #bug_bounty
Medium
ColddBox : An Easy CTF Walkthrough [Try Hack Me] :
a well-detailed guide for beginners on a Try Hack Me room .
⤷ Title: Furhire writeup (MFA Bypass) (Medium)(Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:00:52 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #bugforge #hacking #ctf_writeup
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:00:52 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #bugforge #hacking #ctf_writeup
Medium
Furhire writeup (MFA Bypass) (Medium)(Bugforge)
Furhire writeup (MFA Bypass) (Medium)(Bugforge) Step 1: Sign up… but wait! When you sign up, be ready to capture traffic. Because the vulnerability (1/2 vulnerabilities) is right here, with a mass …
⤷ Title: Behind the Veil: Analyzing IoT Intrusion Patterns via Smart Home Honeypots
════════════════════════
𐀪 Author: Razored
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:56:46 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #cybersecurity_research #honeypot #iot_security
════════════════════════
𐀪 Author: Razored
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:56:46 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #cybersecurity_research #honeypot #iot_security
Medium
Behind the Veil: Analyzing IoT Intrusion Patterns via Smart Home Honeypots
By: Rushi Patel Cybersecurity Researcher | MS in Cybersecurity & Information Assurance
⤷ Title: INE-Host & Network Penetration Testing: Post-Exploitation CTF 1 by Singkhon
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:37:02 GMT
════════════════════════
⌗ Tags: #programming #ctf #cybersecurity #coding #penetration_testing
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:37:02 GMT
════════════════════════
⌗ Tags: #programming #ctf #cybersecurity #coding #penetration_testing
Medium
INE-Host & Network Penetration Testing: Post-Exploitation CTF 1 by Singkhon
Hello, my name is Singkhon. After completing the eJPT course, I would like to share my methods and approaches for solving each CTF problem…
⤷ Title: HTB Sherlock: Telly
════════════════════════
𐀪 Author: Sherif
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:15:17 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox_writeup
════════════════════════
𐀪 Author: Sherif
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 21:15:17 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox_writeup
Medium
🐧 HTB Sherlock: Telly
So in this Sherlock challenge, “Telly”, we’re playing the role of a Junior DFIR Analyst at an MSSP. A DLP alert went off 🚨 because a…
⤷ Title: Operation Olalampo: MuddyWater Unleashes AI-Assisted Rust Malware and Telegram C2 in MENA Espionage Surge
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:37:38 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #AI_Assisted Malware #CHAR Backdoor #GhostBackDoor #GhostFetch #Group_IB #MENA Cyber Espionage #MuddyWater APT #Operation Olalampo #Telegram C2
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:37:38 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #AI_Assisted Malware #CHAR Backdoor #GhostBackDoor #GhostFetch #Group_IB #MENA Cyber Espionage #MuddyWater APT #Operation Olalampo #Telegram C2
Daily CyberSecurity
Operation Olalampo: MuddyWater Unleashes AI-Assisted Rust Malware and Telegram C2 in MENA Espionage Surge
Group-IB exposes Operation Olalampo: MuddyWater's new MENA campaign using AI-assisted Rust malware (CHAR) and Telegram bots for stealthy C2 communication.
⤷ Title: No Patch for the EOL: CISA Warns of Critical 9.8 Severity Flaw in USR-W610 IoT Devices
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:31:11 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Authentication Bypass #CISA advisory #CVE_2026_25715 #Cyber Security #End_of_Life Security #Industrial IoT #infosec #IoT Vulnerability #Jinan USR IOT #USR_W610
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:31:11 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Authentication Bypass #CISA advisory #CVE_2026_25715 #Cyber Security #End_of_Life Security #Industrial IoT #infosec #IoT Vulnerability #Jinan USR IOT #USR_W610
Daily CyberSecurity
No Patch for the EOL: CISA Warns of Critical 9.8 Severity Flaw in USR-W610 IoT Devices
CISA warns of critical flaws in EOL USR-W610 IoT servers. CVE-2026-25715 allows full admin control via blank passwords. No patches planned; isolate now.
⤷ Title: Silver Fox APT Unleashes ‘Winos 4.0’ Malware via BYOVD Attacks
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:26:25 +0000
════════════════════════
⌗ Tags: #Malware #BYOVD Attack #Cyber Security #FortiGuard Labs #infosec #phishing #Silver Fox APT #Taiwan Cyberattack #threat intelligence #ValleyRAT #Winos 4.0
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:26:25 +0000
════════════════════════
⌗ Tags: #Malware #BYOVD Attack #Cyber Security #FortiGuard Labs #infosec #phishing #Silver Fox APT #Taiwan Cyberattack #threat intelligence #ValleyRAT #Winos 4.0
Daily CyberSecurity
Silver Fox APT Unleashes 'Winos 4.0' Malware via BYOVD Attacks
FortiGuard Labs exposes a massive Silver Fox APT campaign targeting Taiwan. Hackers use tax-themed phishing and BYOVD attacks to deploy Winos 4.0 malware.
⤷ Title: Hackers Weaponize Facebook Ads with Fake Windows 11 Updates
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:21:25 +0000
════════════════════════
⌗ Tags: #Malware #Credential Theft #Cyber Security #Facebook Ads #info_stealing malware #infosec #Malwarebytes #phishing #social engineering #threat intelligence #Windows 11 Scam
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:21:25 +0000
════════════════════════
⌗ Tags: #Malware #Credential Theft #Cyber Security #Facebook Ads #info_stealing malware #infosec #Malwarebytes #phishing #social engineering #threat intelligence #Windows 11 Scam
Daily CyberSecurity
Hackers Weaponize Facebook Ads with Fake Windows 11 Updates
Malwarebytes exposes a deceptive campaign using fake Windows 11 Facebook ads to trick users into downloading stealthy info-stealing malware.