⤷ Title: Anthropic Claims Chinese AI Firms ‘Distilled’ Claude to Train Their Models
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:13:20 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #AI #Anthropic #China #Claude #Cyber Attack #Cyber Crime #Cybersecurity #DeepSeek #Distillation #MiniMax #Moonshot AI
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:13:20 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #AI #Anthropic #China #Claude #Cyber Attack #Cyber Crime #Cybersecurity #DeepSeek #Distillation #MiniMax #Moonshot AI
Hackread
Anthropic Claims Chinese AI Firms ‘Distilled’ Claude to Train Their Models
Anthropic claims Chinese AI firms distilled Claude to train rival AI models, raising concerns about model extraction, security risks and AI distillation abuse.
⤷ Title: This 1 Prompt Helped Me Master Any Bug I Didn’t Understand
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:59:36 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty #bug_hunting #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:59:36 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty #bug_hunting #ethical_hacking #cybersecurity
Medium
This 1 Prompt Helped Me Master Any Bug I Didn’t Understand
How I turned ChatGPT into a personal bug bounty mentor — and built a system to go from confused beginner to deep vulnerability hunter.
⤷ Title: Breaking Authentication — Part 1
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:55:03 GMT
════════════════════════
⌗ Tags: #authentication #oauth2 #bug_bounty #cybersecurity #security
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:55:03 GMT
════════════════════════
⌗ Tags: #authentication #oauth2 #bug_bounty #cybersecurity #security
Medium
Breaking Authentication — Part 1
Understanding Modern Authentication Architecture
⤷ Title: Lab: DOM XSS in jQuery Selector Sink Using a Hashchange Event
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:26:27 GMT
════════════════════════
⌗ Tags: #xss_attack #cybersecurity #hacking #dom_xss #vulnerability
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:26:27 GMT
════════════════════════
⌗ Tags: #xss_attack #cybersecurity #hacking #dom_xss #vulnerability
⤷ Title: Lab: Blind SQL injection with conditional errors | PortSwigger
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:24:00 GMT
════════════════════════
⌗ Tags: #sql_injection #portswigger #web_hacking #hacking #ethical_hacking
════════════════════════
𐀪 Author: Samiul Quoreshi Sourav
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:24:00 GMT
════════════════════════
⌗ Tags: #sql_injection #portswigger #web_hacking #hacking #ethical_hacking
Medium
Lab: Blind SQL injection with conditional errors | PortSwigger
Denoscription
⤷ Title: Notepad++ Updates: One for You, One for the Ministry of State Security
════════════════════════
𐀪 Author: EternalR00ted
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:30:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #malware_analysis #threat_hunting #incident_response
════════════════════════
𐀪 Author: EternalR00ted
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:30:26 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #malware_analysis #threat_hunting #incident_response
Medium
Notepad++ Updates: One for You, One for the Ministry of State Security
Extremely late to this, but as I’ve said, I want to publish my research to improve my writing skills and get feedback from the community…
⤷ Title: Burp Suite: The Swiss-knife of Modern Security Testing
════════════════════════
𐀪 Author: Julio Arredondo
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:49:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #app_development #penetration_testing
════════════════════════
𐀪 Author: Julio Arredondo
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:49:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #app_development #penetration_testing
Medium
Burp Suite: The Swiss-knife of Modern Security Testing
Julio Arredondo
Certified Advanced Security Professional (CASP+)
M.S. in Cybersecurity Engineering student at University of San Diego
Certified Advanced Security Professional (CASP+)
M.S. in Cybersecurity Engineering student at University of San Diego
⤷ Title: SQL Injection ile Gizli Verileri Elde Etmek — WHERE Clause Exploit (Adim Adim)
════════════════════════
𐀪 Author: Zerioth Cypher Evidence
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:31:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #cybersecurity #sql_injection #web_security
════════════════════════
𐀪 Author: Zerioth Cypher Evidence
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 18:31:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #cybersecurity #sql_injection #web_security
Medium
SQL Injection ile Gizli Verileri Elde Etmek — WHERE Clause Exploit (Adim Adim)
Bu yazida, PortSwigger Web Security Academy platformundaki bir lab uzerinden klasik bir SQL Injection zafiyetini adim adim inceleyecegiz.
⤷ Title: TryHackMe — Pentesting Fundamentals (Walkthrough)
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:14:00 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #penetration_testing #pentesting
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:14:00 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #penetration_testing #pentesting
Medium
TryHackMe — Pentesting Fundamentals (Walkthrough)
In this room, we will understand more about what a penetration tester’s job responsibilities and what processes should be followed prior to…
⤷ Title: VulnHub — The Planets: Earth CTF
════════════════════════
𐀪 Author: Macmillan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:58:51 GMT
════════════════════════
⌗ Tags: #ctf_writeup #planets #earth #vulnhub
════════════════════════
𐀪 Author: Macmillan
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 17:58:51 GMT
════════════════════════
⌗ Tags: #ctf_writeup #planets #earth #vulnhub
Medium
VulnHub — The Planets: Earth CTF
Hello, today we are trying to get the flags from the second machine from The Planets series: Earth!
⤷ Title: RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:22:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:22:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: The Personality Hire Who Accidentally Found Her People
════════════════════════
𐀪 Author: Demetria Washington
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:25:17 GMT
════════════════════════
⌗ Tags: #information_security #tech_career #cybsersecurity #application_security #women_in_tech
════════════════════════
𐀪 Author: Demetria Washington
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:25:17 GMT
════════════════════════
⌗ Tags: #information_security #tech_career #cybsersecurity #application_security #women_in_tech
Medium
The Personality Hire Who Accidentally Found Her People
Three years ago, I was a claims adjuster at GEICO. Today, I work in Application Security. No, I didn’t take the traditional route. I didn’t…
⤷ Title: Phantom Protocol (Razzify) .
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:44:50 GMT
════════════════════════
⌗ Tags: #razzify #hacking #websocket #ctf #cybersecurity
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:44:50 GMT
════════════════════════
⌗ Tags: #razzify #hacking #websocket #ctf #cybersecurity
Medium
Phantom Protocol (Razzify) .
Challenge Overview
⤷ Title: The Computer in Your Pocket is Your Biggest Vulnerability: A Guide to Mobile Hacking
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:34:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #mobile #ethical_hacking #mobile_hacking
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:34:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #mobile #ethical_hacking #mobile_hacking
Medium
The Computer in Your Pocket is Your Biggest Vulnerability: A Guide to Mobile Hacking
Most apps are a security nightmare. Here is how to start reverse engineering APKs and why mobile security is the new frontier for 2026.
⤷ Title: Pre-Windows 2000 Account Abuse to Domain Admin via ESC1
════════════════════════
𐀪 Author: Hishamrazak
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:50:04 GMT
════════════════════════
⌗ Tags: #learning #labs #penetration_testing #active_directory #information_security
════════════════════════
𐀪 Author: Hishamrazak
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:50:04 GMT
════════════════════════
⌗ Tags: #learning #labs #penetration_testing #active_directory #information_security
Medium
Pre-Windows 2000 Account Abuse to Domain Admin via ESC1
Enumeration
⤷ Title: INE-Host & Network Penetration Testing: Post-Exploitation CTF 2 by Singkhon
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:41:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #coding #ctf #programming
════════════════════════
𐀪 Author: Singkhon K
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:41:57 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #coding #ctf #programming
Medium
INE-Host & Network Penetration Testing: Post-Exploitation CTF 2 by Singkhon
Hello, my name is Singkhon. After completing the eJPT course, I would like to share my methods and approaches for solving each CTF problem…
⤷ Title: Aircrack-ng: A Suite of Tools Every Wireless Pentester Needs
════════════════════════
𐀪 Author: Mark Puckett
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:26:01 GMT
════════════════════════
⌗ Tags: #wireless_security #deauthentication_attack #penetration_testing #aircrack_ng
════════════════════════
𐀪 Author: Mark Puckett
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:26:01 GMT
════════════════════════
⌗ Tags: #wireless_security #deauthentication_attack #penetration_testing #aircrack_ng
Medium
Aircrack-ng: A Suite of Tools Every Wireless Pentester Needs
Discover the tools within the Aircrack-ng suite and get started using them for deauth attacks, grabbing handshakes, and more.
⤷ Title: Try Hack Me- Iron Corp CTF Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:16:01 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:16:01 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme_walkthrough #cybersecurity #penetration_testing #tryhackme
Medium
Try Hack Me- Iron Corp CTF Walkthrough
Hello, stranger — let’s begin.
⤷ Title: How to connect with TryHackMe room using openvpn and remmina — Applicable for kali, debian, ubuntu…
════════════════════════
𐀪 Author: Mahim Avi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:37:42 GMT
════════════════════════
⌗ Tags: #remmina #debian #kali #openvpn #tryhackme
════════════════════════
𐀪 Author: Mahim Avi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:37:42 GMT
════════════════════════
⌗ Tags: #remmina #debian #kali #openvpn #tryhackme
Medium
How to connect with TryHackMe room using openvpn and remmina — Applicable for kali, debian, ubuntu and windows
First of all you need to install OpenVPN in your kali machine (I am using kali here, you can use ubuntu as well). The command is:
⤷ Title: HackTheBox | Fawn | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:34:28 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #htb #hackthebox_walkthrough #ctf
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 19:34:28 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #htb #hackthebox_walkthrough #ctf
Medium
HackTheBox | Fawn | WriteUp
Disclaimer: This writeup is based on a Capture The Flag (CTF) challenge hosted on HackTheBox and it is intended for educational purposes…
⤷ Title: Batman’s Kitchen CTF (BKCTF) 2026: web/TinySQL
════════════════════════
𐀪 Author: Chimdi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:17:35 GMT
════════════════════════
⌗ Tags: #sql_injection #carlthecreator #ctf #cybersecurity #ctf_writeup
════════════════════════
𐀪 Author: Chimdi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 20:17:35 GMT
════════════════════════
⌗ Tags: #sql_injection #carlthecreator #ctf #cybersecurity #ctf_writeup
Medium
Batman’s Kitchen CTF (BKCTF) 2026: web/TinySQL
This challenge relied on exploiting a custom query language, as hinted by the denoscription.