⤷ Title: Operation Olalampo: MuddyWater Unleashes AI-Assisted Rust Malware and Telegram C2 in MENA Espionage Surge
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:37:38 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #AI_Assisted Malware #CHAR Backdoor #GhostBackDoor #GhostFetch #Group_IB #MENA Cyber Espionage #MuddyWater APT #Operation Olalampo #Telegram C2
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:37:38 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #AI_Assisted Malware #CHAR Backdoor #GhostBackDoor #GhostFetch #Group_IB #MENA Cyber Espionage #MuddyWater APT #Operation Olalampo #Telegram C2
Daily CyberSecurity
Operation Olalampo: MuddyWater Unleashes AI-Assisted Rust Malware and Telegram C2 in MENA Espionage Surge
Group-IB exposes Operation Olalampo: MuddyWater's new MENA campaign using AI-assisted Rust malware (CHAR) and Telegram bots for stealthy C2 communication.
⤷ Title: No Patch for the EOL: CISA Warns of Critical 9.8 Severity Flaw in USR-W610 IoT Devices
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:31:11 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Authentication Bypass #CISA advisory #CVE_2026_25715 #Cyber Security #End_of_Life Security #Industrial IoT #infosec #IoT Vulnerability #Jinan USR IOT #USR_W610
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:31:11 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Authentication Bypass #CISA advisory #CVE_2026_25715 #Cyber Security #End_of_Life Security #Industrial IoT #infosec #IoT Vulnerability #Jinan USR IOT #USR_W610
Daily CyberSecurity
No Patch for the EOL: CISA Warns of Critical 9.8 Severity Flaw in USR-W610 IoT Devices
CISA warns of critical flaws in EOL USR-W610 IoT servers. CVE-2026-25715 allows full admin control via blank passwords. No patches planned; isolate now.
⤷ Title: Silver Fox APT Unleashes ‘Winos 4.0’ Malware via BYOVD Attacks
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:26:25 +0000
════════════════════════
⌗ Tags: #Malware #BYOVD Attack #Cyber Security #FortiGuard Labs #infosec #phishing #Silver Fox APT #Taiwan Cyberattack #threat intelligence #ValleyRAT #Winos 4.0
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:26:25 +0000
════════════════════════
⌗ Tags: #Malware #BYOVD Attack #Cyber Security #FortiGuard Labs #infosec #phishing #Silver Fox APT #Taiwan Cyberattack #threat intelligence #ValleyRAT #Winos 4.0
Daily CyberSecurity
Silver Fox APT Unleashes 'Winos 4.0' Malware via BYOVD Attacks
FortiGuard Labs exposes a massive Silver Fox APT campaign targeting Taiwan. Hackers use tax-themed phishing and BYOVD attacks to deploy Winos 4.0 malware.
⤷ Title: Hackers Weaponize Facebook Ads with Fake Windows 11 Updates
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:21:25 +0000
════════════════════════
⌗ Tags: #Malware #Credential Theft #Cyber Security #Facebook Ads #info_stealing malware #infosec #Malwarebytes #phishing #social engineering #threat intelligence #Windows 11 Scam
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:21:25 +0000
════════════════════════
⌗ Tags: #Malware #Credential Theft #Cyber Security #Facebook Ads #info_stealing malware #infosec #Malwarebytes #phishing #social engineering #threat intelligence #Windows 11 Scam
Daily CyberSecurity
Hackers Weaponize Facebook Ads with Fake Windows 11 Updates
Malwarebytes exposes a deceptive campaign using fake Windows 11 Facebook ads to trick users into downloading stealthy info-stealing malware.
⤷ Title: Hired to Hack: North Korean Fake IT Workers Hijack Exec Identities in ‘Contagious Interview’ Scams
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:18:13 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Contagious Interview #Cyber Security #Fake IT Workers #GitLab Threat Intelligence #identity theft #infosec #Insider Threat #North Korean IT workers #Remote Work Security #social engineering
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:18:13 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Contagious Interview #Cyber Security #Fake IT Workers #GitLab Threat Intelligence #identity theft #infosec #Insider Threat #North Korean IT workers #Remote Work Security #social engineering
Daily CyberSecurity
Hired to Hack: North Korean Fake IT Workers Hijack Exec Identities in 'Contagious Interview' Scams
GitLab reveals how North Korean fake IT workers use 'Contagious Interview' scams to bypass hiring, steal data, and hijack executive digital identities.
⤷ Title: CVE-2026-27212: Critical Swiper Prototype Pollution Flaw (CVSS 9.4) Exposes Global Apps
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:12:32 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AppSec #CVE_2026_27212 #Cyber Security #infosec #JavaScript Security #npm Vulnerability #Patch Alert #Prototype Pollution #Remote Code Execution #Swiper
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:12:32 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AppSec #CVE_2026_27212 #Cyber Security #infosec #JavaScript Security #npm Vulnerability #Patch Alert #Prototype Pollution #Remote Code Execution #Swiper
Daily CyberSecurity
CVE-2026-27212: Critical Swiper Prototype Pollution Flaw (CVSS 9.4) Exposes Global Apps
Critical prototype pollution flaw (CVE-2026-27212) in the Swiper npm package allows RCE, DoS, and auth bypass. Update to version 12.1.2 immediately.
⤷ Title: First-Ever TPM Sniffing Attack Extracts LUKS Keys from Industrial Linux Devices
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:06:13 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2026_0714 #Cyber Security #Embedded Linux #Hardware Security #industrial cybersecurity #infosec #Linux Encryption #LUKS Decryption #Moxa UC_1222A #TPM Sniffing
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:06:13 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2026_0714 #Cyber Security #Embedded Linux #Hardware Security #industrial cybersecurity #infosec #Linux Encryption #LUKS Decryption #Moxa UC_1222A #TPM Sniffing
Daily CyberSecurity
First-Ever TPM Sniffing Attack Extracts LUKS Keys from Industrial Linux Devices
Researchers extract LUKS decryption keys in plaintext from Moxa UC-1222A devices via a novel TPM bus sniffing attack (CVE-2026-0714). Secure your hardware.
⤷ Title: The ‘Human Verification’ Trap: ClickFix Campaign Hijacks Trusted Sites to Deploy MIMICRAT
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:00:22 +0000
════════════════════════
⌗ Tags: #Vulnerability #ClickFix Campaign #Cyber Security #Elastic Security Labs #Fileless Malware #infosec #MIMICRAT #powershell #Remote Access Trojan #social engineering #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:00:22 +0000
════════════════════════
⌗ Tags: #Vulnerability #ClickFix Campaign #Cyber Security #Elastic Security Labs #Fileless Malware #infosec #MIMICRAT #powershell #Remote Access Trojan #social engineering #threat intelligence
Daily CyberSecurity
The 'Human Verification' Trap: ClickFix Campaign Hijacks Trusted Sites to Deploy MIMICRAT
Elastic Security Labs uncovers a ClickFix campaign turning human helpfulness into a weapon. Fake verifications deploy the fileless MIMICRAT via PowerShell.
⤷ Title: Guía de Hakrawler: Rastreo Web Ultra Rápido para Bug Hunting y Recon
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #bug_bounty #technology #web_scraping #cybersecurity #hacking
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #bug_bounty #technology #web_scraping #cybersecurity #hacking
Medium
Guía de Hakrawler: Rastreo Web Ultra Rápido para Bug Hunting y Recon
Domina Hakrawler: el crawler en Go para descubrir endpoints, archivos JS y rutas ocultas en tus auditorías de ciberseguridad.
⤷ Title: Deleting an Admin Isn’t Enough: A Broken Access Control Case
════════════════════════
𐀪 Author: Zyad Ibrahim
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:46:27 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #bug_hunting #programming #cybersecurity
════════════════════════
𐀪 Author: Zyad Ibrahim
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:46:27 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #bug_hunting #programming #cybersecurity
Medium
Deleting an Admin Isn’t Enough: A Broken Access Control Case
السلام عليكم ورحمة الله وبركاته
⤷ Title: Hacking only with cmd and powershell baby
════════════════════════
𐀪 Author: Nexamos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:35:03 GMT
════════════════════════
⌗ Tags: #hacking
════════════════════════
𐀪 Author: Nexamos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:35:03 GMT
════════════════════════
⌗ Tags: #hacking
Medium
Hacking only with cmd and powershell baby
Enumeration in host:
⤷ Title: I Hacked Google With Just 9 Search Methods
════════════════════════
𐀪 Author: Deep concept
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:45:41 GMT
════════════════════════
⌗ Tags: #productivity #artificial_intelligence #google #tips #hacking
════════════════════════
𐀪 Author: Deep concept
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:45:41 GMT
════════════════════════
⌗ Tags: #productivity #artificial_intelligence #google #tips #hacking
Medium
I Hacked Google With Just 9 Search Methods
And you can do it too.
⤷ Title: How I Finally Bypass the Banking App Root Detection in Android
════════════════════════
𐀪 Author: Sahil LyfetAstic
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:01:41 GMT
════════════════════════
⌗ Tags: #root_android_phone #security #banking #android #hacking
════════════════════════
𐀪 Author: Sahil LyfetAstic
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:01:41 GMT
════════════════════════
⌗ Tags: #root_android_phone #security #banking #android #hacking
Medium
How I Finally Bypass the Banking App Root Detection in Android
How I Finally Bypass the Banking App Root Detectin in Android https://github.com/aistra0528/Hail --- # Your Banking App Hates Your Root. Here's How to Fix That. *No complicated commands. No risky …
⤷ Title: # Approaching Firmware Security Assessments: From Interface Identification to Vulnerability…
════════════════════════
𐀪 Author: Marwan Atia
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:20:20 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #firmware #penetration_testing #hardware_security
════════════════════════
𐀪 Author: Marwan Atia
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:20:20 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #firmware #penetration_testing #hardware_security
Medium
# Approaching Firmware Security Assessments: From Interface Identification to Vulnerability…
Firmware security is one of the most overlooked attack surfaces in modern product security. While organizations invest heavily in web…
⤷ Title: How a Single Exported ContentProvider Can Break an Entire Application’s Security Model
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:07:08 GMT
════════════════════════
⌗ Tags: #cybersecurity #android #android_pentesting #penetration_testing #8ksec
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:07:08 GMT
════════════════════════
⌗ Tags: #cybersecurity #android #android_pentesting #penetration_testing #8ksec
Medium
How a Single Exported ContentProvider Can Break an Entire Application’s Security Model
In this write-up, I will explain the solution to the lab DroidCave: Secure Password Management from 8ksec, which is based on the concept of…
⤷ Title: Network Scanning with Scapy: A Beginner’s Guide to ICMP Scanning
════════════════════════
𐀪 Author: Eddie Artis Jr.
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:17:33 GMT
════════════════════════
⌗ Tags: #cybersecurity #network_security #computer_networking #penetration_testing #python
════════════════════════
𐀪 Author: Eddie Artis Jr.
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:17:33 GMT
════════════════════════
⌗ Tags: #cybersecurity #network_security #computer_networking #penetration_testing #python
Medium
Network Scanning with Scapy: A Beginner’s Guide to ICMP Scanning
Network scanning is one of the foundational skills in cybersecurity. Before getting into vulnerability scanning, intrusion detection, or…
⤷ Title: Become a Hacker | Tryhackme
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:48:07 GMT
════════════════════════
⌗ Tags: #become_a_hacker #tryhackme
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 23:48:07 GMT
════════════════════════
⌗ Tags: #become_a_hacker #tryhackme
Medium
Become a Hacker | Tryhackme
“Become a Hacker | Tryhackme” is published by Mujahid Hasan.
⤷ Title: I spent $11. In Ai Agent to recon and exploit
════════════════════════
𐀪 Author: Ahmad A Abdulla
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:01:16 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty_tips #information_security #hacker #bugbounty_writeup
════════════════════════
𐀪 Author: Ahmad A Abdulla
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:01:16 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty_tips #information_security #hacker #bugbounty_writeup
Medium
I spent $11. In Ai Agent to recon and exploit
I feel quite apprehensive writing this post. Recently, while browsing the internet and Twitter, I’ve been seeing numerous discussions about…
⤷ Title: Chrome Alert: High-Severity Flaws in Media and Tint Engine Trigger Emergency Update
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:49:58 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Chrome Security Update #CVE_2026_3061 #CVE_2026_3062 #CVE_2026_3063 #Cyber Security #google chrome #infosec #out_of_bounds read #Sandbox Escape #Tint Engine #WebGPU
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:49:58 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Chrome Security Update #CVE_2026_3061 #CVE_2026_3062 #CVE_2026_3063 #Cyber Security #google chrome #infosec #out_of_bounds read #Sandbox Escape #Tint Engine #WebGPU
Daily CyberSecurity
Chrome Alert: High-Severity Flaws in Media and Tint Engine Trigger Emergency Update
Google releases Chrome v145.0.7632.116 to patch high-severity flaws in Media, DevTools, and the Tint graphics engine. Update now to prevent memory leaks.
⤷ Title: Recon? Fuzzing? Exploitation? No just a web sec write-up.
════════════════════════
𐀪 Author: 123456789uwu
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:41:36 GMT
════════════════════════
⌗ Tags: #hackerone #bug_bounty #bug_bounty_writeup #cybersecurity
════════════════════════
𐀪 Author: 123456789uwu
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:41:36 GMT
════════════════════════
⌗ Tags: #hackerone #bug_bounty #bug_bounty_writeup #cybersecurity
Medium
Recon? Fuzzing? Exploitation? No just a web sec write-up.
Hello cybersecurity folks Today I’m gonna explain to you how I gained access to a third-party hosted hosted on the target domain.
⤷ Title: The Ultimate Public Crime Scene: Why Web3 Hackers Don’t Need Server Logs
════════════════════════
𐀪 Author: Tabrez Mukadam
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:31:01 GMT
════════════════════════
⌗ Tags: #web3 #cryptocurrency #cybersecurity #bug_bounty #blockchain
════════════════════════
𐀪 Author: Tabrez Mukadam
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:31:01 GMT
════════════════════════
⌗ Tags: #web3 #cryptocurrency #cybersecurity #bug_bounty #blockchain
Medium
The Ultimate Public Crime Scene: Why Web3 Hackers Don’t Need Server Logs
A bug bounty hunter’s guide to using the blockchain as the ultimate OSINT framework.