Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Silver Fox APT Unleashes ‘Winos 4.0’ Malware via BYOVD Attacks
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 00:26:25 +0000
════════════════════════
Tags: #Malware #BYOVD Attack #Cyber Security #FortiGuard Labs #infosec #phishing #Silver Fox APT #Taiwan Cyberattack #threat intelligence #ValleyRAT #Winos 4.0
Title: Hackers Weaponize Facebook Ads with Fake Windows 11 Updates
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 00:21:25 +0000
════════════════════════
Tags: #Malware #Credential Theft #Cyber Security #Facebook Ads #info_stealing malware #infosec #Malwarebytes #phishing #social engineering #threat intelligence #Windows 11 Scam
Title: Hired to Hack: North Korean Fake IT Workers Hijack Exec Identities in ‘Contagious Interview’ Scams
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 00:18:13 +0000
════════════════════════
Tags: #Cybercriminals #Contagious Interview #Cyber Security #Fake IT Workers #GitLab Threat Intelligence #identity theft #infosec #Insider Threat #North Korean IT workers #Remote Work Security #social engineering
Title: CVE-2026-27212: Critical Swiper Prototype Pollution Flaw (CVSS 9.4) Exposes Global Apps
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 00:12:32 +0000
════════════════════════
Tags: #Vulnerability Report #AppSec #CVE_2026_27212 #Cyber Security #infosec #JavaScript Security #npm Vulnerability #Patch Alert #Prototype Pollution #Remote Code Execution #Swiper
Title: First-Ever TPM Sniffing Attack Extracts LUKS Keys from Industrial Linux Devices
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 00:06:13 +0000
════════════════════════
Tags: #Vulnerability Report #CVE_2026_0714 #Cyber Security #Embedded Linux #Hardware Security #industrial cybersecurity #infosec #Linux Encryption #LUKS Decryption #Moxa UC_1222A #TPM Sniffing
Title: The ‘Human Verification’ Trap: ClickFix Campaign Hijacks Trusted Sites to Deploy MIMICRAT
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 00:00:22 +0000
════════════════════════
Tags: #Vulnerability #ClickFix Campaign #Cyber Security #Elastic Security Labs #Fileless Malware #infosec #MIMICRAT #powershell #Remote Access Trojan #social engineering #threat intelligence
Title: Guía de Hakrawler: Rastreo Web Ultra Rápido para Bug Hunting y Recon
════════════════════════
𐀪 Author: JPablo13
════════════════════════
Time: Tue, 24 Feb 2026 00:01:01 GMT
════════════════════════
Tags: #bug_bounty #technology #web_scraping #cybersecurity #hacking
Title: Deleting an Admin Isn’t Enough: A Broken Access Control Case
════════════════════════
𐀪 Author: Zyad Ibrahim
════════════════════════
Time: Mon, 23 Feb 2026 23:46:27 GMT
════════════════════════
Tags: #hacking #bug_bounty #bug_hunting #programming #cybersecurity
Title: Hacking only with cmd and powershell baby
════════════════════════
𐀪 Author: Nexamos
════════════════════════
Time: Tue, 24 Feb 2026 00:35:03 GMT
════════════════════════
Tags: #hacking
Title: I Hacked Google With Just 9 Search Methods
════════════════════════
𐀪 Author: Deep concept
════════════════════════
Time: Mon, 23 Feb 2026 23:45:41 GMT
════════════════════════
Tags: #productivity #artificial_intelligence #google #tips #hacking
Title: How I Finally Bypass the Banking App Root Detection in Android
════════════════════════
𐀪 Author: Sahil LyfetAstic
════════════════════════
Time: Mon, 23 Feb 2026 23:01:41 GMT
════════════════════════
Tags: #root_android_phone #security #banking #android #hacking
Title: # Approaching Firmware Security Assessments: From Interface Identification to Vulnerability…
════════════════════════
𐀪 Author: Marwan Atia
════════════════════════
Time: Mon, 23 Feb 2026 23:20:20 GMT
════════════════════════
Tags: #infosec #cybersecurity #firmware #penetration_testing #hardware_security
Title: How a Single Exported ContentProvider Can Break an Entire Application’s Security Model
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
Time: Tue, 24 Feb 2026 00:07:08 GMT
════════════════════════
Tags: #cybersecurity #android #android_pentesting #penetration_testing #8ksec
Title: Network Scanning with Scapy: A Beginner’s Guide to ICMP Scanning
════════════════════════
𐀪 Author: Eddie Artis Jr.
════════════════════════
Time: Mon, 23 Feb 2026 23:17:33 GMT
════════════════════════
Tags: #cybersecurity #network_security #computer_networking #penetration_testing #python
Title: Become a Hacker | Tryhackme
════════════════════════
𐀪 Author: Mujahid Hasan
════════════════════════
Time: Mon, 23 Feb 2026 23:48:07 GMT
════════════════════════
Tags: #become_a_hacker #tryhackme
Title: I spent $11. In Ai Agent to recon and exploit
════════════════════════
𐀪 Author: Ahmad A Abdulla
════════════════════════
Time: Tue, 24 Feb 2026 00:01:16 GMT
════════════════════════
Tags: #ai #bug_bounty_tips #information_security #hacker #bugbounty_writeup
Title: Chrome Alert: High-Severity Flaws in Media and Tint Engine Trigger Emergency Update
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 24 Feb 2026 01:49:58 +0000
════════════════════════
Tags: #Vulnerability Report #Chrome Security Update #CVE_2026_3061 #CVE_2026_3062 #CVE_2026_3063 #Cyber Security #google chrome #infosec #out_of_bounds read #Sandbox Escape #Tint Engine #WebGPU
Title: Recon? Fuzzing? Exploitation? No just a web sec write-up.
════════════════════════
𐀪 Author: 123456789uwu
════════════════════════
Time: Tue, 24 Feb 2026 02:41:36 GMT
════════════════════════
Tags: #hackerone #bug_bounty #bug_bounty_writeup #cybersecurity
Title: The Ultimate Public Crime Scene: Why Web3 Hackers Don’t Need Server Logs
════════════════════════
𐀪 Author: Tabrez Mukadam
════════════════════════
Time: Tue, 24 Feb 2026 02:31:01 GMT
════════════════════════
Tags: #web3 #cryptocurrency #cybersecurity #bug_bounty #blockchain
Title: 12 Seconds Is All You Need to Take a Summarized Note!!
════════════════════════
𐀪 Author: Alareqi
════════════════════════
Time: Tue, 24 Feb 2026 02:23:07 GMT
════════════════════════
Tags: #bug_bounty #obsidian #ai #fabric #notes
Title: HackIta: la piattaforma italiana per diventare davvero operativo nel penetration testing
════════════════════════
𐀪 Author: Campamudassir
════════════════════════
Time: Tue, 24 Feb 2026 02:26:16 GMT
════════════════════════
Tags: #linux #penetration_testing #windows #cybersecurity #hacking