Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Post-Quantum Cybersecurity
════════════════════════
𐀪 Author: Dietmar Marggraff
════════════════════════
Time: Mon, 23 Feb 2026 19:40:43 GMT
════════════════════════
Tags: #hacking #quantum_computing #encryption #cyber_security_awareness #cybersecurity
Title: Cracking DVRIP/Sofia Hashes With Python
════════════════════════
𐀪 Author: Kostas Ereksonas
════════════════════════
Time: Mon, 23 Feb 2026 19:08:18 GMT
════════════════════════
Tags: #hacking #password_cracking #cameras #python #iot
Title: Ice — TryHackMe
════════════════════════
𐀪 Author: Azzam Mohammed (WHHacker)
════════════════════════
Time: Mon, 23 Feb 2026 20:55:30 GMT
════════════════════════
Tags: #penetration_testing #privilege_escalation #cybersecurity #web_exploitation #tryhackme
Title: Try Hack Me- Atlas CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
Time: Mon, 23 Feb 2026 20:24:23 GMT
════════════════════════
Tags: #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme_writeup #tryhackme
Title: TryHackMe | JavaScript: Simple Demo | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
Time: Mon, 23 Feb 2026 19:20:20 GMT
════════════════════════
Tags: #cybersecurity #tryhackme #tryhackme_walkthrough #tryhackme_writeup #javanoscript
Title: TryHackMe | Python: Simple Demo | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
Time: Mon, 23 Feb 2026 19:19:54 GMT
════════════════════════
Tags: #tryhackme_walkthrough #tryhackme #tryhackme_writeup #python #cybersecurity
Title: Why Real API Breaches Happen Through Chains, Not Single Bugs
════════════════════════
𐀪 Author: Boluwatife Dada
════════════════════════
Time: Mon, 23 Feb 2026 19:52:36 GMT
════════════════════════
Tags: #cybersecurity #api_security
Title: API Under the Microscope: Revealing Security Gaps You Can’t See
════════════════════════
𐀪 Author: Titaninfosec
════════════════════════
Time: Mon, 23 Feb 2026 19:03:47 GMT
════════════════════════
Tags: #cybersecurity #api_security #cyberattack #api #vulerability
Title: BugForge io: Cafe Club Walkthrough
════════════════════════
𐀪 Author: Isaiah Avweromre
════════════════════════
Time: Mon, 23 Feb 2026 19:39:15 GMT
════════════════════════
Tags: #bugforge_io #sql_injection_attack #web_application_security #sql_injection #club_cafe
Title: APT28 Targeted European Entities Using Webhook-Based Macro Malware
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Tue, 24 Feb 2026 01:11:00 +0530
════════════════════════
Tags: No_Tags
Title: Data Breaches in 2026: What’s old, what’s new?
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
Time: Mon, 23 Feb 2026 22:50:29 +0000
════════════════════════
Tags: #Security #2026 #Cybersecurity #data breach #Data Security #Password #Phishing #VPN
Title: ColddBox : An Easy CTF Walkthrough [Try Hack Me] :
════════════════════════
𐀪 Author: Amrou bekhedda
════════════════════════
Time: Mon, 23 Feb 2026 22:07:38 GMT
════════════════════════
Tags: #tryhackme_walkthrough #hacking #penetration_testing #hacker #bug_bounty
Title: Furhire writeup (MFA Bypass) (Medium)(Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
Time: Mon, 23 Feb 2026 21:00:52 GMT
════════════════════════
Tags: #ctf #cybersecurity #bugforge #hacking #ctf_writeup
Title: Behind the Veil: Analyzing IoT Intrusion Patterns via Smart Home Honeypots
════════════════════════
𐀪 Author: Razored
════════════════════════
Time: Mon, 23 Feb 2026 21:56:46 GMT
════════════════════════
Tags: #penetration_testing #cybersecurity #cybersecurity_research #honeypot #iot_security
Title: INE-Host & Network Penetration Testing: Post-Exploitation CTF 1 by Singkhon
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
Time: Mon, 23 Feb 2026 21:37:02 GMT
════════════════════════
Tags: #programming #ctf #cybersecurity #coding #penetration_testing
Title: HTB Sherlock: Telly
════════════════════════
𐀪 Author: Sherif
════════════════════════
Time: Mon, 23 Feb 2026 21:15:17 GMT
════════════════════════
Tags: #hackthebox_walkthrough #hackthebox_writeup
Title: Operation Olalampo: MuddyWater Unleashes AI-Assisted Rust Malware and Telegram C2 in MENA Espionage Surge
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 00:37:38 +0000
════════════════════════
Tags: #Cyber Security #Malware #AI_Assisted Malware #CHAR Backdoor #GhostBackDoor #GhostFetch #Group_IB #MENA Cyber Espionage #MuddyWater APT #Operation Olalampo #Telegram C2
Title: No Patch for the EOL: CISA Warns of Critical 9.8 Severity Flaw in USR-W610 IoT Devices
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 00:31:11 +0000
════════════════════════
Tags: #Vulnerability Report #Authentication Bypass #CISA advisory #CVE_2026_25715 #Cyber Security #End_of_Life Security #Industrial IoT #infosec #IoT Vulnerability #Jinan USR IOT #USR_W610
Title: Silver Fox APT Unleashes ‘Winos 4.0’ Malware via BYOVD Attacks
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 00:26:25 +0000
════════════════════════
Tags: #Malware #BYOVD Attack #Cyber Security #FortiGuard Labs #infosec #phishing #Silver Fox APT #Taiwan Cyberattack #threat intelligence #ValleyRAT #Winos 4.0
Title: Hackers Weaponize Facebook Ads with Fake Windows 11 Updates
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 00:21:25 +0000
════════════════════════
Tags: #Malware #Credential Theft #Cyber Security #Facebook Ads #info_stealing malware #infosec #Malwarebytes #phishing #social engineering #threat intelligence #Windows 11 Scam
Title: Hired to Hack: North Korean Fake IT Workers Hijack Exec Identities in ‘Contagious Interview’ Scams
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 00:18:13 +0000
════════════════════════
Tags: #Cybercriminals #Contagious Interview #Cyber Security #Fake IT Workers #GitLab Threat Intelligence #identity theft #infosec #Insider Threat #North Korean IT workers #Remote Work Security #social engineering