⤷ Title: Vulnhub: Lampião: 1 Walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:38:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:38:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #ctf
Medium
Vulnhub: Lampião: 1 Walkthrough
Machine details
⤷ Title: CAPTCHApocalypse writeup — TryHackMe
════════════════════════
𐀪 Author: 0xH1S
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:17:24 GMT
════════════════════════
⌗ Tags: #ctf #tryhackme #hacking #tryhackme_walkthrough #ctf_writeup
════════════════════════
𐀪 Author: 0xH1S
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:17:24 GMT
════════════════════════
⌗ Tags: #ctf #tryhackme #hacking #tryhackme_walkthrough #ctf_writeup
Medium
CAPTCHApocalypse writeup — TryHackMe
In this walkthrough, I will detail my methodology for compromising the “CAPTCHApocalypse” machine on TryHackMe. The name itself hinted at a…
⤷ Title: Icy “Doodle” Site | ATC CTF 2.0 | Google Dorking| CTFs
════════════════════════
𐀪 Author: Angie
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:40:05 GMT
════════════════════════
⌗ Tags: #ctf #google_dorking #infosec #cybersecurity #ctf_walkthrough
════════════════════════
𐀪 Author: Angie
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:40:05 GMT
════════════════════════
⌗ Tags: #ctf #google_dorking #infosec #cybersecurity #ctf_walkthrough
Medium
Icy “Doodle” Site | ATC CTF 2.0 | Google Dorking| CTFs
⤷ Title: Proving Grounds — Practice — Fantastic
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:35:01 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf #oscp #penetration_testing
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:35:01 GMT
════════════════════════
⌗ Tags: #ethical_hacking #ctf #oscp #penetration_testing
Medium
Proving Grounds — Practice — Fantastic
This Practice box is rated easy by Offsec, but rated hard by the community. I would agree that the box wasn’t the easiest one that I’ve…
⤷ Title: Block | TryHackMe | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:07:12 GMT
════════════════════════
⌗ Tags: #ctf #tryhackme #pcap_analysis #tryhackme_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 00:07:12 GMT
════════════════════════
⌗ Tags: #ctf #tryhackme #pcap_analysis #tryhackme_writeup #tryhackme_walkthrough
Medium
Block | TryHackMe | Walkthrough
For free users using the AttackBox, the challenge is best done using your own environment. Some browsers may detect the file as malicious…
⤷ Title: AoTR2 WRITEUP
════════════════════════
𐀪 Author: Elsandro Rivalito
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:07:19 GMT
════════════════════════
⌗ Tags: #hackthebox #blue_team #cybersecurity #hackthebox_writeup
════════════════════════
𐀪 Author: Elsandro Rivalito
════════════════════════
ⴵ Time: Tue, 24 Feb 2026 23:07:19 GMT
════════════════════════
⌗ Tags: #hackthebox #blue_team #cybersecurity #hackthebox_writeup
Medium
AoTR2 WRITEUP
AoTR2: Operation Winter Blackout
⤷ Title: The AI Evolution of Mobile Malware: SURXRAT V5 Combines Surveillance, Ransomware, and LLMs
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:21:57 +0000
════════════════════════
⌗ Tags: #Malware #AI Malware #Android Malware #Cyble Research #Firebase C2 #infosec #MaaS #Malware_as_a_Service #mobile security #rat #Remote Access Trojan #SURXRAT V5
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:21:57 +0000
════════════════════════
⌗ Tags: #Malware #AI Malware #Android Malware #Cyble Research #Firebase C2 #infosec #MaaS #Malware_as_a_Service #mobile security #rat #Remote Access Trojan #SURXRAT V5
Daily CyberSecurity
The AI Evolution of Mobile Malware: SURXRAT V5 Combines Surveillance, Ransomware, and LLMs
Cyble Research unmasks SURXRAT V5, a professionalized Android RAT experimenting with AI-assisted modules and hybrid monetization via Firebase infrastructure.
⤷ Title: Sanctions and Stolen Secrets: U.S. Cracks Down on ‘Operation Zero’ Exploit Brokerage
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:12:40 +0000
════════════════════════
⌗ Tags: #Cyber Security #cyber_espionage #Exploit Brokers #infosec #national security #OFAC #Operation Zero #Sergey Zelenyuk #TrickBot #US Treasury Sanctions #zero_day vulnerabilities
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:12:40 +0000
════════════════════════
⌗ Tags: #Cyber Security #cyber_espionage #Exploit Brokers #infosec #national security #OFAC #Operation Zero #Sergey Zelenyuk #TrickBot #US Treasury Sanctions #zero_day vulnerabilities
Daily CyberSecurity
Sanctions and Stolen Secrets: U.S. Cracks Down on 'Operation Zero' Exploit Brokerage
US Treasury sanctions Sergey Zelenyuk and Operation Zero for brokering stolen government exploits and selling zero-days to foreign intelligence agencies.
⤷ Title: Unpatched ActiveMQ Flaw Leads to Repeat Breach and LockBit Ransomware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:57:51 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Apache ActiveMQ #CVE_2023_46604 #infosec #Java Spring #LOCKBIT Black #network_security #ransomware #rce #Remote Code Execution #The DFIR Report
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:57:51 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Apache ActiveMQ #CVE_2023_46604 #infosec #Java Spring #LOCKBIT Black #network_security #ransomware #rce #Remote Code Execution #The DFIR Report
Daily CyberSecurity
Unpatched ActiveMQ Flaw Leads to Repeat Breach and LockBit Ransomware
The DFIR Report reveals how a persistent attacker exploited CVE-2023-46604 twice in 18 days to deploy LockBit ransomware. Patch your ActiveMQ servers now!
⤷ Title: The High Cost of Free: Cracked Music Plugins Weaponized to Infect macOS with Odyssey Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:45:25 +0000
════════════════════════
⌗ Tags: #Malware #ClickFix #Cracked Software #info_stealer #infosec #Iru Research #macOS Malware #MacSyncStealer #Music Production Security #Odyssey Malware #Pay_Per_Install
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:45:25 +0000
════════════════════════
⌗ Tags: #Malware #ClickFix #Cracked Software #info_stealer #infosec #Iru Research #macOS Malware #MacSyncStealer #Music Production Security #Odyssey Malware #Pay_Per_Install
Daily CyberSecurity
The High Cost of Free: Cracked Music Plugins Weaponized to Infect macOS with Odyssey Malware
Security researchers uncover a massive macOS malware campaign using "cracked" audio plugins and "ClickFix" tactics to deliver Odyssey and MacSyncStealer.
⤷ Title: Rooting Out Risk: CISA Warns of Critical 9.1 Severity Flaws in Gardyn Smart Gardening Systems
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:36:32 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA advisory #Command Injection #CVE_2025_29628 #CVE_2025_29631 #Gardyn Home Kit #infosec #IoT security #Man in the Middle #Patch Alert #Smart Home Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:36:32 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA advisory #Command Injection #CVE_2025_29628 #CVE_2025_29631 #Gardyn Home Kit #infosec #IoT security #Man in the Middle #Patch Alert #Smart Home Vulnerability
Daily CyberSecurity
Rooting Out Risk: CISA Warns of Critical 9.1 Severity Flaws in Gardyn Smart Gardening Systems
CISA warns of critical flaws (CVE-2025-29631) in Gardyn Home Kits allowing unauthenticated RCE and admin access. Update your app and firmware immediately!
⤷ Title: Responsible Disclosure: SQL Injection in Rutgers ROMS Platform
════════════════════════
𐀪 Author: Abbushad shaikh
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:43:19 GMT
════════════════════════
⌗ Tags: #security_research #responsible_disclosure #bug_bounty #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Abbushad shaikh
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:43:19 GMT
════════════════════════
⌗ Tags: #security_research #responsible_disclosure #bug_bounty #cybersecurity #penetration_testing
Medium
Responsible Disclosure: SQL Injection in Rutgers ROMS Platform
A Case Study in Professional Vulnerability Disclosure
⤷ Title: Snyk and uv, Better Together
════════════════════════
𐀪 Author: Snyk
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:00:22 GMT
════════════════════════
⌗ Tags: #ai #python #code_security #application_security
════════════════════════
𐀪 Author: Snyk
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 02:00:22 GMT
════════════════════════
⌗ Tags: #ai #python #code_security #application_security
Medium
Snyk and uv, Better Together
Python powers today’s AI revolution, from machine learning frameworks to agentic workflows and data science pipelines. But for years, Python’s packaging ecosystem has lagged behind developer …
⤷ Title: Your Red Team Lab Is Lying to You
════════════════════════
𐀪 Author: Yua Mikanana
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:00:45 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #ethical_hacking #information_security
════════════════════════
𐀪 Author: Yua Mikanana
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:00:45 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #ethical_hacking #information_security
Medium
Your Red Team Lab Is Lying to You
You popped a fresh Windows Server. You dumped LSASS. You owned the domain in 45 minutes.
⤷ Title: Buffer Overflow Attack Lab: A Hands-On Journey Through Software Security
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:27:07 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #linux #buffer_overflow #penetration_testing
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 01:27:07 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #linux #buffer_overflow #penetration_testing
Medium
Buffer Overflow Attack Lab: A Hands-On Journey Through Software Security
Comprehensive walkthrough of buffer overflow exploits, reverse shells, and bypassing ASLR & StackGuard mitigations.
⤷ Title: 27-Year-Old Telnet Flaw Resurfaces to Grant Attackers Instant Root Access
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 04:51:20 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_1999_0073 #Environment Sanitization #infosec #Justin Swartz #Legacy Protocol #Linux Security #privilege escalation #rce #root access #Telnetd
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 04:51:20 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_1999_0073 #Environment Sanitization #infosec #Justin Swartz #Legacy Protocol #Linux Security #privilege escalation #rce #root access #Telnetd
Daily CyberSecurity
27-Year-Old Telnet Flaw Resurfaces to Grant Attackers Instant Root Access
Researcher Justin Swartz uncovers a regression of the 1999 telnetd flaw. Remote attackers can bypass authentication and seize root control via environment variables.
⤷ Title: Death of the XSS Bug? Firefox 148 Debuts the Sanitizer API to Neutralize Malicious Scripts
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 04:39:35 +0000
════════════════════════
⌗ Tags: #Technology #AppSec #Cross_Site Scripting #CWE_79 #Firefox 148 #infosec #innerHTML #mozilla #Sanitizer API #setHTML #Web Security #XSS Prevention
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 04:39:35 +0000
════════════════════════
⌗ Tags: #Technology #AppSec #Cross_Site Scripting #CWE_79 #Firefox 148 #infosec #innerHTML #mozilla #Sanitizer API #setHTML #Web Security #XSS Prevention
Daily CyberSecurity
Death of the XSS Bug? Firefox 148 Debuts the Sanitizer API to Neutralize Malicious Scripts
Mozilla Firefox 148 launches the standardized Sanitizer API. Discover how the new setHTML() method systematically strips XSS attacks to protect web users.
⤷ Title: Response Manipulation Leading to Free Plan Limit Bypass
════════════════════════
𐀪 Author: Mahmoud Gamal
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 04:47:49 GMT
════════════════════════
⌗ Tags: #business_logic #writeup #bug_bounty #cybersecurity #response_manipulation
════════════════════════
𐀪 Author: Mahmoud Gamal
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 04:47:49 GMT
════════════════════════
⌗ Tags: #business_logic #writeup #bug_bounty #cybersecurity #response_manipulation
Medium
Response Manipulation Leading to Free Plan Limit Bypass
Introduction
⤷ Title: Understanding Injection Vulnerabilities: A Complete Guide for Beginners and Security Enthusiasts
════════════════════════
𐀪 Author: CHANDRU S
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 04:12:55 GMT
════════════════════════
⌗ Tags: #web_security #bug_bounty #owasp_top_10 #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: CHANDRU S
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 04:12:55 GMT
════════════════════════
⌗ Tags: #web_security #bug_bounty #owasp_top_10 #cybersecurity #penetration_testing
Medium
Understanding Injection Vulnerabilities: A Complete Guide for Beginners and Security Enthusiasts
Introduction
⤷ Title: I tried to log into the website using the Client-Side Access Control bypassing technique.
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 03:12:07 GMT
════════════════════════
⌗ Tags: #web_exploitation #hacking #response_manipulation
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 03:12:07 GMT
════════════════════════
⌗ Tags: #web_exploitation #hacking #response_manipulation
Medium
I tried to log into the website using the Client-Side Access Control bypassing technique.
I tested the website with permission from the website owner.
⤷ Title: I Bought a $1337 Jacket for $2. The Website Let Me.
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 04:23:52 GMT
════════════════════════
⌗ Tags: #ethical_hacking #portswigger_lab #websecurity_testing #vulnerability #business_logic_flaw
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 04:23:52 GMT
════════════════════════
⌗ Tags: #ethical_hacking #portswigger_lab #websecurity_testing #vulnerability #business_logic_flaw
Medium
I Bought a $1337 Jacket for $2. The Website Let Me.
This is what happens when you trust the client too much.