Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Critical 9.2 Severity Path Traversal Flaw Compromises ASUSTOR FTP Backups
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 25 Feb 2026 08:19:26 +0000
════════════════════════
Tags: #Vulnerability Report #ADM #ASUSTOR #CVE_2026_3100 #CVE_2026_3179 #Cyber Security #FTP Backup #infosec #Man in the Middle #NAS security #Patch Alert #Path Traversal
Title: Accidental Overlord: How a PS5 Controller Mod Unlocked a 7,000-Unit Robot Vacuum Army
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 25 Feb 2026 07:11:31 +0000
════════════════════════
Tags: #Vulnerability Report #Claude Code #DJI Romo #IoT security #MQTT exploit #PS5 controller #reverse engineering #robotic vacuum #Sammy Azdoufal #security vulnerability #smart home privacy #Tech News 2026
Title: Apple Shatters Tradition with a Touchscreen OLED MacBook Pro
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Wed, 25 Feb 2026 07:00:47 +0000
════════════════════════
Tags: #Technology #Apple #Dynamic Island #iPad Pro #laptop design #M6 Chip #MacBook Pro 2026 #macOS Tahoe #OLED MacBook #Steve Jobs #Tech News 2026 #touchscreen Mac
Title: How I Found an Exposed Prometheus Metrics Endpoint and Earned ₹5,000 in Bug Bounty
════════════════════════
𐀪 Author: Rahul Masal
════════════════════════
Time: Wed, 25 Feb 2026 07:21:17 GMT
════════════════════════
Tags: #information_security #penetration_testing #ethical_hacking #cybersecurity #bug_bounty
Title: Bug Bounty Hunting Routine: Why It Matters and Why You Need One
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
Time: Wed, 25 Feb 2026 05:40:02 GMT
════════════════════════
Tags: #bug_bounty_hunting #bug_bounty_tips #cybersecurity #bug_bounty #ethical_hacking
Title: Stop Hacking Networks. Start Hacking Models: A Pentester’s Guide to the Top 10 ML Vulnerabilities
════════════════════════
𐀪 Author: Dhanush N
════════════════════════
Time: Wed, 25 Feb 2026 08:12:36 GMT
════════════════════════
Tags: #cyber_security_awareness #cybersecurity #hacking #machine_learning #vulnerability
Title: Stuxnet-First Cyber Weapon
════════════════════════
𐀪 Author: Abolfazl Vaziri
════════════════════════
Time: Wed, 25 Feb 2026 07:12:35 GMT
════════════════════════
Tags: #cybersecurity #hacking #war #cyberattack #stuxnet
Title: When the Universe Delivers Your Payload
════════════════════════
𐀪 Author: Isaac Adebayo
════════════════════════
Time: Wed, 25 Feb 2026 08:31:46 GMT
════════════════════════
Tags: #cybersecurity #mental_health #penetration_testing #medium #technology
Title: How I Found a Company’s Entire Internal Infrastructure in One Search
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
Time: Wed, 25 Feb 2026 09:01:05 GMT
════════════════════════
Tags: #technology #hacking #bug_bounty #cybersecurity #infosec
Title: Panduan Recon & Enumeration Bug Bounty (Chime) untuk Pemula
════════════════════════
𐀪 Author: Adrian Syah Abidin
════════════════════════
Time: Wed, 25 Feb 2026 08:58:31 GMT
════════════════════════
Tags: #reconnaissance #enumeration #bug_bounty
Title: Day 5 — The Image That Executes Code (Attribute Injection XSS)
════════════════════════
𐀪 Author: Issan
════════════════════════
Time: Wed, 25 Feb 2026 08:22:05 GMT
════════════════════════
Tags: #xss_attack #ethical_hacking #web_app_pentesting #cybersecurity #attribute_injection
Title: Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Wed, 25 Feb 2026 14:19:00 +0530
════════════════════════
Tags: No_Tags
Title: $300 a Month Android Malware ‘Oblivion’ Uses Fake Updates to Hijack Phones
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
Time: Wed, 25 Feb 2026 10:34:06 +0000
════════════════════════
Tags: #Security #Android #Malware #Certo #Cyber Attack #Cybersecurity #Google #Oblivion
Title: Mastering Broken Access Control: A Manual Deep Dive into OWASP Top 10
════════════════════════
𐀪 Author: Yashkasbe
════════════════════════
Time: Wed, 25 Feb 2026 10:34:51 GMT
════════════════════════
Tags: #cybersecurity #application_security #owasp #web_security #ethical_hacking
Title: Claude Code Security .A Smarter Scanner That Still Needs a Human.
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
Time: Tue, 24 Feb 2026 05:55:43 GMT
════════════════════════
Tags: #cybersecurity #claude_code #ai #application_security #careers
Title: Evasive — Hacksmarter writeup
════════════════════════
𐀪 Author: GauthamV
════════════════════════
Time: Wed, 25 Feb 2026 10:40:21 GMT
════════════════════════
Tags: #red_team #hacking #offensive_security #active_directory
Title: Zero Trust Architecture: Why “Trust” is a Taboo Word in Security (NIST SP 800–207)
════════════════════════
𐀪 Author: Mahdi
════════════════════════
Time: Wed, 25 Feb 2026 10:03:22 GMT
════════════════════════
Tags: #infosec #security #cybersecurity #programming #hacking
Title: How Hackers Actually Break Into Systems
════════════════════════
𐀪 Author: Hania Khan
════════════════════════
Time: Wed, 25 Feb 2026 10:03:00 GMT
════════════════════════
Tags: #hacking #cybersecurity #cyber_security_awareness #infosec #ethical_hacking
Title: OSINT: How Public Data Can Give You a Strategic Edge
════════════════════════
𐀪 Author: CyberSources
════════════════════════
Time: Wed, 25 Feb 2026 09:27:57 GMT
════════════════════════
Tags: #cybersource #cybersecurity #hacking #generative_ai_tools #osint
Title: Demystifying Asymmetric Cryptography: Keys, Signatures, and Double Encryption
════════════════════════
𐀪 Author: Mahdi
════════════════════════
Time: Wed, 25 Feb 2026 10:02:28 GMT
════════════════════════
Tags: #cybersecurity #infosec #algorithms #programming #information_security
Title: I Found a DRM Bypass While Watching a Course — Here’s What It Taught Me About Real Hacking
════════════════════════
𐀪 Author: Ammar Harris
════════════════════════
Time: Wed, 25 Feb 2026 09:25:11 GMT
════════════════════════
Tags: #web_penetration_testing #infosec #business_logic_flaw #penetration_testing #information_security