⤷ Title: From Zero to Domain Admin: Building and Attacking an Active Directory Lab
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:33:13 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf #cybersecurity #penetration_testing #active_directory
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:33:13 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf #cybersecurity #penetration_testing #active_directory
Medium
From Zero to Domain Admin: Building and Attacking an Active Directory Lab
Overview
⤷ Title: Become a Defender (THM) Tryhackme Walkthrough
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:54:42 GMT
════════════════════════
⌗ Tags: #blue_team #tryhackme #cybersecurity #cyber_security_awareness #cybercrime
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:54:42 GMT
════════════════════════
⌗ Tags: #blue_team #tryhackme #cybersecurity #cyber_security_awareness #cybercrime
Medium
Become a Defender (THM) Tryhackme Walkthrough
Denoscription : Explore defensive security, cyber infrastructure, and how to protect systems from attacks.
⤷ Title: TryHackMe Writeup: Pyrat
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:44:08 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #tryhackme #tryhackme_writeup #cybercrime
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 21:44:08 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #tryhackme #tryhackme_writeup #cybercrime
Medium
TryHackMe Writeup: Pyrat
Makinenin yazarı bize aslında oyunun tüm kurallarını ve yol haritasını önden vermiş: “Önce bir Python kod çalıştırma zafiyeti bulacaksın…
⤷ Title: Intigriti February 2026 Challenge - CTF Write-up
════════════════════════
𐀪 Author: roguenull
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:57:58 GMT
════════════════════════
⌗ Tags: #bug_bounty #ctf_writeup #ethical_hacking #ctf
════════════════════════
𐀪 Author: roguenull
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 22:57:58 GMT
════════════════════════
⌗ Tags: #bug_bounty #ctf_writeup #ethical_hacking #ctf
Medium
Intigriti February 2026 Challenge - CTF Write-up
Challenge Link : https://x.com/intigriti/status/2023381870008733733
⤷ Title: North Korean Lazarus Group Adopts Medusa Ransomware in Global Attacks
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:40:47 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attacks #Cyber Crime #Cyber Attack #Cybersecurity #Extortion #Lazarus #Medusa #North Korea #Ransomware #Symantec #Vulnerability
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:40:47 +0000
════════════════════════
⌗ Tags: #Security #Cyber Attacks #Cyber Crime #Cyber Attack #Cybersecurity #Extortion #Lazarus #Medusa #North Korea #Ransomware #Symantec #Vulnerability
Hackread
North Korean Lazarus Group Adopts Medusa Ransomware in Global Attacks
Lazarus Group is now using Medusa ransomware in attacks on healthcare and social services, signaling a move toward profit-focused cybercrime.
⤷ Title: Malicious NuGet Packages Weaponize ASP.NET Identity for Production Backdoors
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:13:36 +0000
════════════════════════
⌗ Tags: #Malware #ASP.NET Security #C2 Server #Identity and Access Management #infosec #Malware Dropper #NCryptYo #NuGet Attack #Socket Threat Research #supply chain attack #Typosquatting
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:13:36 +0000
════════════════════════
⌗ Tags: #Malware #ASP.NET Security #C2 Server #Identity and Access Management #infosec #Malware Dropper #NCryptYo #NuGet Attack #Socket Threat Research #supply chain attack #Typosquatting
Daily CyberSecurity
Malicious NuGet Packages Weaponize ASP.NET Identity for Production Backdoors
Socket researchers uncover a NuGet supply chain attack using "NCryptYo" to hijack ASP.NET apps. Attackers inject backdoors into production authorization layers.
⤷ Title: Stealth & Persistence: MuddyWater’s New Rust-Based Payload Mimics Cloudflare and Reddit
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:06:20 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #Genians Report #infosec #Macro_based Attacks #MuddyWater APT #Operation Olalampo #RMM tool abuse #Rust malware #State_Sponsored Espionage #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:06:20 +0000
════════════════════════
⌗ Tags: #Cyber Security #Malware #Genians Report #infosec #Macro_based Attacks #MuddyWater APT #Operation Olalampo #RMM tool abuse #Rust malware #State_Sponsored Espionage #threat intelligence
Daily CyberSecurity
Stealth & Persistence: MuddyWater’s New Rust-Based Payload Mimics Cloudflare and Reddit
Genians report reveals MuddyWater APT's shift to Rust-based malware and RMM tool abuse for long-term espionage across government and critical infrastructure.
⤷ Title: Total Takeover: Critical Zyxel Flaw (CVSS 9.8) Exposes Routers to Remote Command Injection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:00:52 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Command Injection #CVE_2025_13942 #Cyber Security #firmware update #infosec #Patch Alert #rce #Remote Code Execution #router security #UPnP Vulnerability #Zyxel
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:00:52 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Command Injection #CVE_2025_13942 #Cyber Security #firmware update #infosec #Patch Alert #rce #Remote Code Execution #router security #UPnP Vulnerability #Zyxel
Daily CyberSecurity
Total Takeover: Critical Zyxel Flaw (CVSS 9.8) Exposes Routers to Remote Command Injection
Zyxel issues urgent patches for a critical 9.8 severity flaw (CVE-2025-13942) in UPnP functions that allows remote attackers to execute OS commands. Patch now!
⤷ Title: Hakrawler Guide: Ultra-Fast Web Crawling for Bug Hunting and Recon
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:01:02 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #web_scraping #bug_bounty #hacking
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:01:02 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #web_scraping #bug_bounty #hacking
Medium
Hakrawler Guide: Ultra-Fast Web Crawling for Bug Hunting and Recon
Master Hakrawler: the crawler in Go for discovering endpoints, JS files, and hidden paths in your cybersecurity audits.
⤷ Title: Vulnhub: Lampião: 1 Walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:38:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:38:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf
Medium
Vulnhub: Lampião: 1 Walkthrough
Machine details
⤷ Title: CAPTCHApocalypse writeup — TryHackMe
════════════════════════
𐀪 Author: 0xH1S
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:17:24 GMT
════════════════════════
⌗ Tags: #ctf #tryhackme #hacking #tryhackme_walkthrough #ctf_writeup
════════════════════════
𐀪 Author: 0xH1S
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:17:24 GMT
════════════════════════
⌗ Tags: #ctf #tryhackme #hacking #tryhackme_walkthrough #ctf_writeup
Medium
CAPTCHApocalypse writeup — TryHackMe
In this walkthrough, I will detail my methodology for compromising the “CAPTCHApocalypse” machine on TryHackMe. The name itself hinted at a…
⤷ Title: Icy “Doodle” Site | ATC CTF 2.0 | Google Dorking| CTFs
════════════════════════
𐀪 Author: Angie
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:40:05 GMT
════════════════════════
⌗ Tags: #ctf #google_dorking #infosec #cybersecurity #ctf_walkthrough
════════════════════════
𐀪 Author: Angie
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:40:05 GMT
════════════════════════
⌗ Tags: #ctf #google_dorking #infosec #cybersecurity #ctf_walkthrough
Medium
Icy “Doodle” Site | ATC CTF 2.0 | Google Dorking| CTFs
⤷ Title: Proving Grounds — Practice — Fantastic
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:35:01 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf #oscp #penetration_testing
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:35:01 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf #oscp #penetration_testing
Medium
Proving Grounds — Practice — Fantastic
This Practice box is rated easy by Offsec, but rated hard by the community. I would agree that the box wasn’t the easiest one that I’ve…
⤷ Title: Block | TryHackMe | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:07:12 GMT
════════════════════════
⌗ Tags: #ctf #tryhackme #pcap_analysis #tryhackme_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:07:12 GMT
════════════════════════
⌗ Tags: #ctf #tryhackme #pcap_analysis #tryhackme_writeup #tryhackme_walkthrough
Medium
Block | TryHackMe | Walkthrough
For free users using the AttackBox, the challenge is best done using your own environment. Some browsers may detect the file as malicious…
⤷ Title: AoTR2 WRITEUP
════════════════════════
𐀪 Author: Elsandro Rivalito
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:07:19 GMT
════════════════════════
⌗ Tags: #hackthebox #blue_team #cybersecurity #hackthebox_writeup
════════════════════════
𐀪 Author: Elsandro Rivalito
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:07:19 GMT
════════════════════════
⌗ Tags: #hackthebox #blue_team #cybersecurity #hackthebox_writeup
Medium
AoTR2 WRITEUP
AoTR2: Operation Winter Blackout
⤷ Title: The AI Evolution of Mobile Malware: SURXRAT V5 Combines Surveillance, Ransomware, and LLMs
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:21:57 +0000
════════════════════════
⌗ Tags: #Malware #AI Malware #Android Malware #Cyble Research #Firebase C2 #infosec #MaaS #Malware_as_a_Service #mobile security #rat #Remote Access Trojan #SURXRAT V5
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:21:57 +0000
════════════════════════
⌗ Tags: #Malware #AI Malware #Android Malware #Cyble Research #Firebase C2 #infosec #MaaS #Malware_as_a_Service #mobile security #rat #Remote Access Trojan #SURXRAT V5
Daily CyberSecurity
The AI Evolution of Mobile Malware: SURXRAT V5 Combines Surveillance, Ransomware, and LLMs
Cyble Research unmasks SURXRAT V5, a professionalized Android RAT experimenting with AI-assisted modules and hybrid monetization via Firebase infrastructure.
⤷ Title: Sanctions and Stolen Secrets: U.S. Cracks Down on ‘Operation Zero’ Exploit Brokerage
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:12:40 +0000
════════════════════════
⌗ Tags: #Cyber Security #cyber_espionage #Exploit Brokers #infosec #national security #OFAC #Operation Zero #Sergey Zelenyuk #TrickBot #US Treasury Sanctions #zero_day vulnerabilities
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:12:40 +0000
════════════════════════
⌗ Tags: #Cyber Security #cyber_espionage #Exploit Brokers #infosec #national security #OFAC #Operation Zero #Sergey Zelenyuk #TrickBot #US Treasury Sanctions #zero_day vulnerabilities
Daily CyberSecurity
Sanctions and Stolen Secrets: U.S. Cracks Down on 'Operation Zero' Exploit Brokerage
US Treasury sanctions Sergey Zelenyuk and Operation Zero for brokering stolen government exploits and selling zero-days to foreign intelligence agencies.
⤷ Title: Unpatched ActiveMQ Flaw Leads to Repeat Breach and LockBit Ransomware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:57:51 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Apache ActiveMQ #CVE_2023_46604 #infosec #Java Spring #LOCKBIT Black #network_security #ransomware #rce #Remote Code Execution #The DFIR Report
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:57:51 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Apache ActiveMQ #CVE_2023_46604 #infosec #Java Spring #LOCKBIT Black #network_security #ransomware #rce #Remote Code Execution #The DFIR Report
Daily CyberSecurity
Unpatched ActiveMQ Flaw Leads to Repeat Breach and LockBit Ransomware
The DFIR Report reveals how a persistent attacker exploited CVE-2023-46604 twice in 18 days to deploy LockBit ransomware. Patch your ActiveMQ servers now!
⤷ Title: The High Cost of Free: Cracked Music Plugins Weaponized to Infect macOS with Odyssey Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:45:25 +0000
════════════════════════
⌗ Tags: #Malware #ClickFix #Cracked Software #info_stealer #infosec #Iru Research #macOS Malware #MacSyncStealer #Music Production Security #Odyssey Malware #Pay_Per_Install
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:45:25 +0000
════════════════════════
⌗ Tags: #Malware #ClickFix #Cracked Software #info_stealer #infosec #Iru Research #macOS Malware #MacSyncStealer #Music Production Security #Odyssey Malware #Pay_Per_Install
Daily CyberSecurity
The High Cost of Free: Cracked Music Plugins Weaponized to Infect macOS with Odyssey Malware
Security researchers uncover a massive macOS malware campaign using "cracked" audio plugins and "ClickFix" tactics to deliver Odyssey and MacSyncStealer.
⤷ Title: Rooting Out Risk: CISA Warns of Critical 9.1 Severity Flaws in Gardyn Smart Gardening Systems
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:36:32 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA advisory #Command Injection #CVE_2025_29628 #CVE_2025_29631 #Gardyn Home Kit #infosec #IoT security #Man in the Middle #Patch Alert #Smart Home Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:36:32 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA advisory #Command Injection #CVE_2025_29628 #CVE_2025_29631 #Gardyn Home Kit #infosec #IoT security #Man in the Middle #Patch Alert #Smart Home Vulnerability
Daily CyberSecurity
Rooting Out Risk: CISA Warns of Critical 9.1 Severity Flaws in Gardyn Smart Gardening Systems
CISA warns of critical flaws (CVE-2025-29631) in Gardyn Home Kits allowing unauthenticated RCE and admin access. Update your app and firmware immediately!
⤷ Title: Responsible Disclosure: SQL Injection in Rutgers ROMS Platform
════════════════════════
𐀪 Author: Abbushad shaikh
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:43:19 GMT
════════════════════════
⌗ Tags: #security_research #responsible_disclosure #bug_bounty #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Abbushad shaikh
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:43:19 GMT
════════════════════════
⌗ Tags: #security_research #responsible_disclosure #bug_bounty #cybersecurity #penetration_testing
Medium
Responsible Disclosure: SQL Injection in Rutgers ROMS Platform
A Case Study in Professional Vulnerability Disclosure