⤷ Title: One Invite Feature, One Race Condition — 4 Bugs Later
════════════════════════
𐀪 Author: Raslanco
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:03:06 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #infosec_write_ups #bug_bounty_writeup #bugs
════════════════════════
𐀪 Author: Raslanco
════════════════════════
ⴵ Time: Mon, 23 Feb 2026 17:03:06 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #infosec_write_ups #bug_bounty_writeup #bugs
Medium
One Invite Endpoint, One Race Condition — 4 Bugs Later
Sometimes the most interesting vulnerabilities don’t require complex payloads or advanced exploitation chains. Sometimes, all it takes is…
⤷ Title: Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:28:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:28:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:22:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:22:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Romanian Hacker Extradited to US Admits Hacking Oregon State Network
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 12:26:52 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Catalin Dragomir #Cybersecurity #data breach #Oregon #Romania
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 12:26:52 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Catalin Dragomir #Cybersecurity #data breach #Oregon #Romania
Hackread
Romanian Hacker Extradited to US Admits Hacking Oregon State Network
Catalin Dragomir admits to hacking an Oregon government office and selling network access. Read more on the $250k fraud case and his 2026 sentencing.
⤷ Title: New ZeroDayRAT Malware Claims Full Monitoring of Android and iOS Devices
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 11:27:50 +0000
════════════════════════
⌗ Tags: #Security #Android #Malware #Anatsa #Cybersecurity #Cyberthint #iOS #MaaS #Scam #Spyware #Telegram #ZeroDayRAT
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 11:27:50 +0000
════════════════════════
⌗ Tags: #Security #Android #Malware #Anatsa #Cybersecurity #Cyberthint #iOS #MaaS #Scam #Spyware #Telegram #ZeroDayRAT
Hackread
New ZeroDayRAT Malware Claims Full Monitoring of Android and iOS Devices
ZeroDayRAT malware targets Android and iOS devices, offering surveillance, tracking, and crypto theft tools via a Telegram-based MaaS service.
⤷ Title: Bug Bounties Are the New Gold Rush (But Most Hunters Will Go Broke)
════════════════════════
𐀪 Author: Joshua Certain
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 11:08:35 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #bug_bounty_tips #hackerone
════════════════════════
𐀪 Author: Joshua Certain
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 11:08:35 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #bug_bounty_tips #hackerone
Medium
Bug Bounties Are the New Gold Rush (But Most Hunters Will Go Broke)
In 1849, hundreds of thousands of people rushed west chasing gold. Most went home broke. The few that found gold were forgotten by time…
⤷ Title: A Structured Penetration Testing Walkthrough Using Metasploitable 2
════════════════════════
𐀪 Author: Charitymkakina
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 12:46:53 GMT
════════════════════════
⌗ Tags: #metasploitable #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Charitymkakina
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 12:46:53 GMT
════════════════════════
⌗ Tags: #metasploitable #cybersecurity #penetration_testing
Medium
A Structured Penetration Testing Walkthrough Using Metasploitable 2
This article documents a structured penetration testing exercise conducted in a controlled lab environment using Metasploitable 2 as the…
⤷ Title: Tryhackme | Vulnerability Capstone Challenge
════════════════════════
𐀪 Author: jaejun835
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 12:52:32 GMT
════════════════════════
⌗ Tags: #tryhackme #rce #ctf_writeup #vulnerability_capstone #vulnerability_management
════════════════════════
𐀪 Author: jaejun835
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 12:52:32 GMT
════════════════════════
⌗ Tags: #tryhackme #rce #ctf_writeup #vulnerability_capstone #vulnerability_management
Medium
Tryhackme | Vulnerability Capstone Challenge
tryhackme link → https://tryhackme.com/room/vulnerabilitycapstone Today I solved the TryHackMe Vulnerability Capstone room [What is the…
⤷ Title: loly Walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 10:55:08 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #cve #vulnerability #information_security
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 10:55:08 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #cve #vulnerability #information_security
Medium
🔥 loly Walkthrough (Educational & Defensive Analysis)
By cyber_public_school | Cyber Security Researcher
⤷ Title: What’s On the Menu?: Exploiting the Damn Vulnerable RESTaurant.
════════════════════════
𐀪 Author: Khadijat Suleman
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 12:15:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #api #owasp_api_security_top_10 #hawd #api_security
════════════════════════
𐀪 Author: Khadijat Suleman
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 12:15:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #api #owasp_api_security_top_10 #hawd #api_security
Medium
What’s On the Menu?: Exploiting the Damn Vulnerable RESTaurant.
A deep dive into common API flaws and how attackers can exploit them — and what developers can do to secure their systems.
⤷ Title: Sendmarc Releases DMARCbis Fireside Chat Featuring Co-Editor Todd Herr
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:46:58 +0000
════════════════════════
⌗ Tags: #Press Release #CISO #Monitoring
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:46:58 +0000
════════════════════════
⌗ Tags: #Press Release #CISO #Monitoring
Hackread
Sendmarc Releases DMARCbis Fireside Chat Featuring Co-Editor Todd Herr
Wilmington, North America, 24th February 2026, CyberNewswire
⤷ Title: How to Maximize DDoS Readiness with Proactive Protection Strategies
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:29:21 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attack #Cybersecurity #DDOS #DDoS attack #IoT
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:29:21 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attack #Cybersecurity #DDOS #DDoS attack #IoT
Hackread
How to Maximize DDoS Readiness with Proactive Protection Strategies
Strengthen DDoS Readiness with proactive protection strategies, risk assessments, traffic monitoring, scalable defenses, and rapid response planning.
⤷ Title: How to Strengthen App Performance Without Slowing Innovation
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:06:27 +0000
════════════════════════
⌗ Tags: #Technology #app #Application Development #Fintech
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:06:27 +0000
════════════════════════
⌗ Tags: #Technology #app #Application Development #Fintech
Hackread
How to Strengthen App Performance Without Slowing Innovation
Learn how to strengthen app performance without slowing innovation using metrics, observability, scalability planning, and disciplined release strategies.
⤷ Title: Sendmarc Releases DMARCbis Fireside Chat Featuring Co-Editor Todd Herr
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:47:41 +0000
════════════════════════
⌗ Tags: #Press Release
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:47:41 +0000
════════════════════════
⌗ Tags: #Press Release
Daily CyberSecurity
Sendmarc Releases DMARCbis Fireside Chat Featuring Co-Editor Todd Herr
Wilmington, North America, 24th February 2026, CyberNewswire
⤷ Title: Why Your Bug Bounty Hunting Will Earn Nothing (And Technical Skills Aren’t the Problem
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:45:16 GMT
════════════════════════
⌗ Tags: #business #earnings #bug_bounty #saas #earn_money_online
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:45:16 GMT
════════════════════════
⌗ Tags: #business #earnings #bug_bounty #saas #earn_money_online
Medium
Why Your Bug Bounty Hunting Will Earn Nothing (And Technical Skills Aren’t the Problem
A security researcher I know spent six months learning advanced exploitation techniques. They mastered SQL injection, XSS, authentication…
⤷ Title: Hacker101 CTF — Postbook
════════════════════════
𐀪 Author: Cyber-Rat
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 13:47:58 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #hacker101 #cybersecurity #web_penetration_testing
════════════════════════
𐀪 Author: Cyber-Rat
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 13:47:58 GMT
════════════════════════
⌗ Tags: #bug_bounty #ethical_hacking #hacker101 #cybersecurity #web_penetration_testing
Medium
Hacker101 CTF — Postbook
Interactive walkthrough of the Postbook challenge from Hacker101 CTF to capture all 7 flags I will guide you step-by-step through the…
⤷ Title: Custom Tooling using Burp | THM
════════════════════════
𐀪 Author: Ali Essam
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 13:09:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #tryhackme #penetration_testing #ctf
════════════════════════
𐀪 Author: Ali Essam
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 13:09:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #tryhackme #penetration_testing #ctf
Medium
Custom Tooling using Burp | THM
Creating custom tooling for application testing using Burp Plugins. The ability to create your own custom tooling is critically important…
⤷ Title: Write-up Máquina LFI.elf de DockerLabs
════════════════════════
𐀪 Author: Joel Morillas Pagan (Ghxstsec)
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:46:00 GMT
════════════════════════
⌗ Tags: #hacking #ctf #web_development #dcokerlabs #cybersecurity
════════════════════════
𐀪 Author: Joel Morillas Pagan (Ghxstsec)
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:46:00 GMT
════════════════════════
⌗ Tags: #hacking #ctf #web_development #dcokerlabs #cybersecurity
Medium
Write-up Máquina LFI.elf de DockerLabs
Por aquí tenéis mi write-up para la máquina lfi.elf de la plataforma dockerlabs.es
⤷ Title: Hackviser Riverly
════════════════════════
𐀪 Author: AMH4CK3R
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:30:04 GMT
════════════════════════
⌗ Tags: #hacking #ctf_writeup #ctflearn #hackviser #ctf_walkthrough
════════════════════════
𐀪 Author: AMH4CK3R
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:30:04 GMT
════════════════════════
⌗ Tags: #hacking #ctf_writeup #ctflearn #hackviser #ctf_walkthrough
Medium
Hackviser Riverly
CTF Writeup: Create Edge Secret Marketing Tool
⤷ Title: Wireshark — The Hacker’s Magnifying Glass
════════════════════════
𐀪 Author: Dinesh V
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:14:33 GMT
════════════════════════
⌗ Tags: #hacking #security #wireshark
════════════════════════
𐀪 Author: Dinesh V
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:14:33 GMT
════════════════════════
⌗ Tags: #hacking #security #wireshark
Medium
Wireshark — The Hacker’s Magnifying Glass 🔍
When I first started diving into cybersecurity, one of the tools that genuinely blew my mind was Wireshark. It felt like suddenly being…
⤷ Title: Pós-Engajamento: 03 — Alinhamento de Expectativas e Aceitação de Entregáveis
════════════════════════
𐀪 Author: sarkis093
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 13:43:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #web_development #programming #pentesting
════════════════════════
𐀪 Author: sarkis093
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 13:43:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #web_development #programming #pentesting
Medium
Pós-Engajamento: 03 — Alinhamento de Expectativas e Aceitação de Entregáveis
Dando continuidade à série sobre o ciclo de pós-engajamento, chegamos a uma etapa onde muitos profissionais falham por subestimar o valor…