⤷ Title: I spent $11. In Ai Agent to recon and exploit
════════════════════════
𐀪 Author: Ahmad A Abdulla
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:01:16 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty_tips #information_security #hacker #bugbounty_writeup
════════════════════════
𐀪 Author: Ahmad A Abdulla
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:01:16 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty_tips #information_security #hacker #bugbounty_writeup
Medium
I spent $11. In Ai Agent to recon and exploit
I feel quite apprehensive writing this post. Recently, while browsing the internet and Twitter, I’ve been seeing numerous discussions about…
⤷ Title: Chrome Alert: High-Severity Flaws in Media and Tint Engine Trigger Emergency Update
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:49:58 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Chrome Security Update #CVE_2026_3061 #CVE_2026_3062 #CVE_2026_3063 #Cyber Security #google chrome #infosec #out_of_bounds read #Sandbox Escape #Tint Engine #WebGPU
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:49:58 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Chrome Security Update #CVE_2026_3061 #CVE_2026_3062 #CVE_2026_3063 #Cyber Security #google chrome #infosec #out_of_bounds read #Sandbox Escape #Tint Engine #WebGPU
Daily CyberSecurity
Chrome Alert: High-Severity Flaws in Media and Tint Engine Trigger Emergency Update
Google releases Chrome v145.0.7632.116 to patch high-severity flaws in Media, DevTools, and the Tint graphics engine. Update now to prevent memory leaks.
⤷ Title: Recon? Fuzzing? Exploitation? No just a web sec write-up.
════════════════════════
𐀪 Author: 123456789uwu
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:41:36 GMT
════════════════════════
⌗ Tags: #hackerone #bug_bounty #bug_bounty_writeup #cybersecurity
════════════════════════
𐀪 Author: 123456789uwu
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:41:36 GMT
════════════════════════
⌗ Tags: #hackerone #bug_bounty #bug_bounty_writeup #cybersecurity
Medium
Recon? Fuzzing? Exploitation? No just a web sec write-up.
Hello cybersecurity folks Today I’m gonna explain to you how I gained access to a third-party hosted hosted on the target domain.
⤷ Title: The Ultimate Public Crime Scene: Why Web3 Hackers Don’t Need Server Logs
════════════════════════
𐀪 Author: Tabrez Mukadam
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:31:01 GMT
════════════════════════
⌗ Tags: #web3 #cryptocurrency #cybersecurity #bug_bounty #blockchain
════════════════════════
𐀪 Author: Tabrez Mukadam
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:31:01 GMT
════════════════════════
⌗ Tags: #web3 #cryptocurrency #cybersecurity #bug_bounty #blockchain
Medium
The Ultimate Public Crime Scene: Why Web3 Hackers Don’t Need Server Logs
A bug bounty hunter’s guide to using the blockchain as the ultimate OSINT framework.
⤷ Title: 12 Seconds Is All You Need to Take a Summarized Note!!
════════════════════════
𐀪 Author: Alareqi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:23:07 GMT
════════════════════════
⌗ Tags: #bug_bounty #obsidian #ai #fabric #notes
════════════════════════
𐀪 Author: Alareqi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:23:07 GMT
════════════════════════
⌗ Tags: #bug_bounty #obsidian #ai #fabric #notes
Medium
12 Seconds Is All You Need to Take a Summarized Note!!
Let’s be honest — note-taking in bug bounty hunting can be exhausting.
⤷ Title: HackIta: la piattaforma italiana per diventare davvero operativo nel penetration testing
════════════════════════
𐀪 Author: Campamudassir
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:26:16 GMT
════════════════════════
⌗ Tags: #linux #penetration_testing #windows #cybersecurity #hacking
════════════════════════
𐀪 Author: Campamudassir
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:26:16 GMT
════════════════════════
⌗ Tags: #linux #penetration_testing #windows #cybersecurity #hacking
Medium
HackIta: la piattaforma italiana per diventare davvero operativo nel penetration testing
HackIta: la piattaforma italiana per diventare davvero operativo nel penetration testing Se stai studiando ethical hacking, probabilmente ti sei già scontrato con questo problema: le informazioni ci …
⤷ Title: Vulnhub: Book-Shelf: 1 Walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:45:44 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ctf_writeup #ctf
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 01:45:44 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ctf_writeup #ctf
Medium
Vulnhub: Book-Shelf: 1 Walkthrough
Machine details
⤷ Title: Intigriti Challenge 0226 : Stored XSS & CSP Bypass
════════════════════════
𐀪 Author: Achraf (@40rbidd3n)
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:34:29 GMT
════════════════════════
⌗ Tags: #ctf #intigriti #xss_attack #bugbounty_writeup #ctf_writeup
════════════════════════
𐀪 Author: Achraf (@40rbidd3n)
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 02:34:29 GMT
════════════════════════
⌗ Tags: #ctf #intigriti #xss_attack #bugbounty_writeup #ctf_writeup
Medium
Intigriti Challenge 0226 : Stored XSS & CSP Bypass
This write-up walks through finding and exploiting a stored XSS in the challenge application, and bypassing the page’s…
⤷ Title: Machine-Speed Intrusions: How One Hacker Used DeepSeek and Claude to Scale a Global Campaign
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 03:00:36 +0000
════════════════════════
⌗ Tags: #Cybercriminals #@goyaramen #AI Cyberattacks #ARXON #Claude AI #Cyber Security #DeepSeek #Fortinet Vulnerability #HexStrike #infosec #LLM Automation #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 03:00:36 +0000
════════════════════════
⌗ Tags: #Cybercriminals #@goyaramen #AI Cyberattacks #ARXON #Claude AI #Cyber Security #DeepSeek #Fortinet Vulnerability #HexStrike #infosec #LLM Automation #threat intelligence
Daily CyberSecurity
Machine-Speed Intrusions: How One Hacker Used DeepSeek and Claude to Scale a Global Campaign
Researcher @goyaramen exposes "ARXON," an AI-automated pipeline using LLMs to manage simultaneous global attacks on Fortinet devices. The future of scale is here.
⤷ Title: Become a Sponsor on Cyber Kalki Matrix — Permanent Visibility in the Cyber Kalki Intelligence…
════════════════════════
𐀪 Author: ElonMuskTheAntichrist
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 03:32:09 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #coding #cybersecurity
════════════════════════
𐀪 Author: ElonMuskTheAntichrist
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 03:32:09 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #coding #cybersecurity
Medium
💰Become a Sponsor on Cyber Kalki Matrix — Permanent Visibility in the Cyber Kalki Intelligence…
https://kalkikrivadna.com/halloffame.html
⤷ Title: Advent of The Relics 1 — A Call from the Museum
════════════════════════
𐀪 Author: Adindazara
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 04:30:14 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup
════════════════════════
𐀪 Author: Adindazara
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 04:30:14 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup
Medium
Advent of The Relics 1 — A Call from the Museum
Resources: https://app.hackthebox.com/sherlocks/AoTR%25201%253A%2520A%2520Call%2520from%2520the%2520Museum?tab=play_sherlock
⤷ Title: When /phpmyadmin Isn’t Hidden Anymore: An Exposed Database Panel
════════════════════════
𐀪 Author: Manav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:00 GMT
════════════════════════
⌗ Tags: #infosec #penetration_testing #bug_bounty_writeup #bug_bounty
════════════════════════
𐀪 Author: Manav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:00 GMT
════════════════════════
⌗ Tags: #infosec #penetration_testing #bug_bounty_writeup #bug_bounty
Medium
When /phpmyadmin Isn’t Hidden Anymore: An Exposed Database Panel
Hello guys, welcome back! I hope you’re doing well.
⤷ Title: Claude Code Security Found 500 Vulnerabilities. A Smarter Scanner That Still Needs a Human.
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:55:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #claude_code #ai #application_security #careers
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:55:43 GMT
════════════════════════
⌗ Tags: #cybersecurity #claude_code #ai #application_security #careers
Medium
Claude Code Security Found 500 Vulnerabilities. A Smarter Scanner That Still Needs a Human.
A beginner’s honest take on Claude Code Security and the hype nobody is questioning
⤷ Title: How to Prevent SQL Injection in Modern Applications
════════════════════════
𐀪 Author: Mark L. Hill
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:38:51 GMT
════════════════════════
⌗ Tags: #sql #web_development #sql_injection #hacking
════════════════════════
𐀪 Author: Mark L. Hill
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:38:51 GMT
════════════════════════
⌗ Tags: #sql #web_development #sql_injection #hacking
Medium
How to Prevent SQL Injection in Modern Applications
Security is no longer optional in modern web development. As applications grow more complex and data-driven, protecting user information…
⤷ Title: AoTR2 — Operation Winter Blackout — HackTheBox
════════════════════════
𐀪 Author: Yrddry
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:20:52 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox #hacking #ctf_writeup #hackthebox_writeup
════════════════════════
𐀪 Author: Yrddry
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:20:52 GMT
════════════════════════
⌗ Tags: #cybersecurity #hackthebox #hacking #ctf_writeup #hackthebox_writeup
Medium
AoTR2 — Operation Winter Blackout — HackTheBox
By: Andry Muh Ivan De Reva
⤷ Title: Wide OpenClaw: Abusing Loose Permissions for the Powerful AI Assistant
════════════════════════
𐀪 Author: grepStrength
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:05:27 GMT
════════════════════════
⌗ Tags: #agentic_ai #cybersecurity #generative_ai_tools #cybersecurity_awareness #hacking
════════════════════════
𐀪 Author: grepStrength
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 06:05:27 GMT
════════════════════════
⌗ Tags: #agentic_ai #cybersecurity #generative_ai_tools #cybersecurity_awareness #hacking
Medium
Wide OpenClaw: Abusing Loose Permissions for the Powerful AI Assistant
New Attack Vectors Incoming
⤷ Title: Top 10 Networking Concepts Every Ethical Hacker Must Know
════════════════════════
𐀪 Author: 0xSmit
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:21:13 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cybersecurity #web_development #networking #infosec
════════════════════════
𐀪 Author: 0xSmit
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:21:13 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cybersecurity #web_development #networking #infosec
Medium
Top 10 Networking Concepts Every Ethical Hacker Must Know
Ethical hacking without networking knowledge is like driving blindfolded. Every attack, every defense, every packet — it all depends on how…
⤷ Title: TRYHACKME-
════════════════════════
𐀪 Author: Gargbhumika
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:12 GMT
════════════════════════
⌗ Tags: #tryhackme #networking
════════════════════════
𐀪 Author: Gargbhumika
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:12 GMT
════════════════════════
⌗ Tags: #tryhackme #networking
Medium
TRYHACKME-
INTRODUCTORY TO NETWORKING
⤷ Title: TryHackMe Writeup: Brains
════════════════════════
𐀪 Author: Aashish
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:01:02 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #tryhackme
════════════════════════
𐀪 Author: Aashish
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:01:02 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #tryhackme
Medium
TryHackMe Writeup: Brains
Welcome to my first CTF Writeup.
⤷ Title: Subdomain Enumeration | TryHackMe Write-up | Farros
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:00:23 GMT
════════════════════════
⌗ Tags: #writeup #tryhackme #osint #security #farro
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 00:00:23 GMT
════════════════════════
⌗ Tags: #writeup #tryhackme #osint #security #farro
Medium
Subdomain Enumeration | TryHackMe Write-up | Farros
This is my write-up for the TryHackMe room on Subdomain Enumeration ↗ . Written in 2026, I hope this write-up helps others learn and…
⤷ Title: Advent of The Relics 1 — A Call from the Museum | Cybersecurity Bootcamp
════════════════════════
𐀪 Author: Najafghifari
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:27 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #cybersecurity #hackthebox #bootcamp
════════════════════════
𐀪 Author: Najafghifari
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 05:31:27 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #cybersecurity #hackthebox #bootcamp
Medium
Advent of The Relics 1 — A Call from the Museum | Cybersecurity Bootcamp
Kasus ini menceritakan tentang suatu malam di pertengahan bulan November, ketika seorang karyawan CALE yang sedang kelelahan mendapatkan…