⤷ Title: Wireshark — The Hacker’s Magnifying Glass
════════════════════════
𐀪 Author: Dinesh V
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:14:33 GMT
════════════════════════
⌗ Tags: #hacking #security #wireshark
════════════════════════
𐀪 Author: Dinesh V
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:14:33 GMT
════════════════════════
⌗ Tags: #hacking #security #wireshark
Medium
Wireshark — The Hacker’s Magnifying Glass 🔍
When I first started diving into cybersecurity, one of the tools that genuinely blew my mind was Wireshark. It felt like suddenly being…
⤷ Title: Pós-Engajamento: 03 — Alinhamento de Expectativas e Aceitação de Entregáveis
════════════════════════
𐀪 Author: sarkis093
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 13:43:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #web_development #programming #pentesting
════════════════════════
𐀪 Author: sarkis093
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 13:43:19 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #web_development #programming #pentesting
Medium
Pós-Engajamento: 03 — Alinhamento de Expectativas e Aceitação de Entregáveis
Dando continuidade à série sobre o ciclo de pós-engajamento, chegamos a uma etapa onde muitos profissionais falham por subestimar o valor…
⤷ Title: What is HTTP Host Header Attacks
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:30:36 GMT
════════════════════════
⌗ Tags: #vulnerability #host_header_injection #cybersecurity #ethical_hacking #penetration_testing
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:30:36 GMT
════════════════════════
⌗ Tags: #vulnerability #host_header_injection #cybersecurity #ethical_hacking #penetration_testing
Medium
What is HTTP Host Header Attacks
🧠 1) What it is
⤷ Title: Boiler CTF Room Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 13:56:38 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #ctf_walkthrough #ctf_writeup
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 13:56:38 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #ctf_walkthrough #ctf_writeup
Medium
Boiler CTF Room Notes | TryHackMe
BoilerCTF walkthrough covering enumeration, exploitation, and privilege escalation basics.
⤷ Title: Why SQL Injection Is Still Relevant in 2026
════════════════════════
𐀪 Author: Cyber Aries
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:25:05 GMT
════════════════════════
⌗ Tags: #web_security #sql_injection #cybersecurity #information_security #software_development
════════════════════════
𐀪 Author: Cyber Aries
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 14:25:05 GMT
════════════════════════
⌗ Tags: #web_security #sql_injection #cybersecurity #information_security #software_development
Medium
Why SQL Injection Is Still Relevant in 2026
⤷ Title: Amazon: Low-Skill Hacker Used AI Tools to Breach FortiGate Devices Globally
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:23:37 +0000
════════════════════════
⌗ Tags: #Security #AI #Amazon #Cyber Attack #Cybersecurity #FortiGate #Russia
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:23:37 +0000
════════════════════════
⌗ Tags: #Security #AI #Amazon #Cyber Attack #Cybersecurity #FortiGate #Russia
Hackread
Amazon: Low-Skill Hacker Used AI Tools to Breach FortiGate Devices Globally
Amazon says a low-skill hacker used AI tools to breach hundreds of FortiGate devices worldwide, showing how AI can scale cyberattacks with basic methods.
⤷ Title: ZinadIT CTF 2026 — Calc&Broken Reversing
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:35:23 GMT
════════════════════════
⌗ Tags: #reverse_engineering #ctf #malware_analysis #cybersecurity #hacking
════════════════════════
𐀪 Author: VampireXRay
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:35:23 GMT
════════════════════════
⌗ Tags: #reverse_engineering #ctf #malware_analysis #cybersecurity #hacking
Medium
ZinadIT CTF 2026 — Calc&Broken Reversing
“Just Easy”
⤷ Title: 10 Persistence Methods Every Red Teamer MUST Master
════════════════════════
𐀪 Author: Candy Wong
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:05:13 GMT
════════════════════════
⌗ Tags: #active_directory #mitre_attack #persistence #red_team #hacking
════════════════════════
𐀪 Author: Candy Wong
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:05:13 GMT
════════════════════════
⌗ Tags: #active_directory #mitre_attack #persistence #red_team #hacking
Medium
10 Persistence Methods Every Red Teamer MUST Master
The definitive guide to callback persistence for red team operators. Covers major Windows persistence technique with full step-by-step…
⤷ Title: Understanding Safe Darkweb Browsing Tips: Privacy, Risk & Reality
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:49:45 GMT
════════════════════════
⌗ Tags: #infosec #darkweb #osint #cybersecurity
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:49:45 GMT
════════════════════════
⌗ Tags: #infosec #darkweb #osint #cybersecurity
Medium
Understanding Safe Darkweb Browsing Tips: Privacy, Risk & Reality
The dark web often gets portrayed as either completely lawless or completely anonymous. In reality, neither assumption is accurate.
⤷ Title: VulnHub: Tr0ll 2 Write-Up
════════════════════════
𐀪 Author: Khaled Waleed (MrWayne)
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:37:49 GMT
════════════════════════
⌗ Tags: #python #ssh #penetration_testing #buffer_overflow #network_security
════════════════════════
𐀪 Author: Khaled Waleed (MrWayne)
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:37:49 GMT
════════════════════════
⌗ Tags: #python #ssh #penetration_testing #buffer_overflow #network_security
Medium
🛡 VulnHub: Tr0ll 2 Write-Up
Boot2Root Walkthrough, Full Exploitation Chain.
⤷ Title: What is NoSQL Injection?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:05:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #nosql #penetration_testing #binaryshield
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:05:44 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #nosql #penetration_testing #binaryshield
Medium
What is NoSQL Injection?
✅ 1. What it is (very simple definition) NoSQL injection happens when:
⤷ Title: Menyelesaikan Tantangan AoTR 2: Operation Winter Blackout | HTB
════════════════════════
𐀪 Author: Masrul Hadi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:12:15 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #cybersecurity #aotr #digital_forensics
════════════════════════
𐀪 Author: Masrul Hadi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:12:15 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #cybersecurity #aotr #digital_forensics
Medium
Menyelesaikan Tantangan AoTR 2: Operation Winter Blackout | HTB
Menyelesaikan tantangan AoTR 2
⤷ Title: VM Snapshot Disk Recovery
════════════════════════
𐀪 Author: Marduk I Am
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:57:16 GMT
════════════════════════
⌗ Tags: #virtualization #ethical_hacking #linux #cybersecurity #digital_forensics
════════════════════════
𐀪 Author: Marduk I Am
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 16:57:16 GMT
════════════════════════
⌗ Tags: #virtualization #ethical_hacking #linux #cybersecurity #digital_forensics
Medium
🛠 VM Snapshot Disk Recovery
Snapshot Analysis and Password Recovery in a Kali Linux Virtual Machine
⤷ Title: How to Use X Ads to Get Your Business Found in 2026
════════════════════════
𐀪 Author: Gustavo Payano
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:06:54 GMT
════════════════════════
⌗ Tags: #marketing #digital_marketing #xs #xad #twitter
════════════════════════
𐀪 Author: Gustavo Payano
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 15:06:54 GMT
════════════════════════
⌗ Tags: #marketing #digital_marketing #xs #xad #twitter
Medium
How to Use X Ads to Get Your Business Found in 2026
By Gus Digital Solutions | gusdigitalsolutions.com
⤷ Title: UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:51:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:51:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Anthropic Claims Chinese AI Firms ‘Distilled’ Claude to Train Their Models
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:13:20 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #AI #Anthropic #China #Claude #Cyber Attack #Cyber Crime #Cybersecurity #DeepSeek #Distillation #MiniMax #Moonshot AI
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:13:20 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #AI #Anthropic #China #Claude #Cyber Attack #Cyber Crime #Cybersecurity #DeepSeek #Distillation #MiniMax #Moonshot AI
Hackread
Anthropic Claims Chinese AI Firms ‘Distilled’ Claude to Train Their Models
Anthropic claims Chinese AI firms distilled Claude to train rival AI models, raising concerns about model extraction, security risks and AI distillation abuse.
⤷ Title: This 1 Prompt Helped Me Master Any Bug I Didn’t Understand
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:59:36 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty #bug_hunting #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:59:36 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty #bug_hunting #ethical_hacking #cybersecurity
Medium
This 1 Prompt Helped Me Master Any Bug I Didn’t Understand
How I turned ChatGPT into a personal bug bounty mentor — and built a system to go from confused beginner to deep vulnerability hunter.
⤷ Title: Breaking Authentication — Part 1
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:55:03 GMT
════════════════════════
⌗ Tags: #authentication #oauth2 #bug_bounty #cybersecurity #security
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:55:03 GMT
════════════════════════
⌗ Tags: #authentication #oauth2 #bug_bounty #cybersecurity #security
Medium
Breaking Authentication — Part 1
Understanding Modern Authentication Architecture
⤷ Title: Lab: DOM XSS in jQuery Selector Sink Using a Hashchange Event
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:26:27 GMT
════════════════════════
⌗ Tags: #xss_attack #cybersecurity #hacking #dom_xss #vulnerability
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:26:27 GMT
════════════════════════
⌗ Tags: #xss_attack #cybersecurity #hacking #dom_xss #vulnerability
⤷ Title: Lab: Blind SQL injection with conditional errors | PortSwigger
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:24:00 GMT
════════════════════════
⌗ Tags: #sql_injection #portswigger #web_hacking #hacking #ethical_hacking
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:24:00 GMT
════════════════════════
⌗ Tags: #sql_injection #portswigger #web_hacking #hacking #ethical_hacking
Medium
Lab: Blind SQL injection with conditional errors | PortSwigger
Denoscription
⤷ Title: Notepad++ Updates: One for You, One for the Ministry of State Security
════════════════════════
𐀪 Author: EternalR00ted
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:30:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #malware_analysis #threat_hunting #incident_response
════════════════════════
𐀪 Author: EternalR00ted
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:30:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #malware_analysis #threat_hunting #incident_response
Medium
Notepad++ Updates: One for You, One for the Ministry of State Security
Extremely late to this, but as I’ve said, I want to publish my research to improve my writing skills and get feedback from the community…