⤷ Title: OSINT Sock Puppets: Purpose, Risks & Ethics
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:59:01 GMT
════════════════════════
⌗ Tags: #bug_bounty #ctf #hacking #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:59:01 GMT
════════════════════════
⌗ Tags: #bug_bounty #ctf #hacking #cybersecurity #ethical_hacking
Medium
OSINT Sock Puppets: Purpose, Risks & Ethics
A sock puppet is a carefully constructed false online identity used by professionals in fields such as cybersecurity, OSINT investigations…
⤷ Title: Tales from Hobin: The M&S hacks of 2025
════════════════════════
𐀪 Author: Hobin Rood
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:26:01 GMT
════════════════════════
⌗ Tags: #education #cybersecurity #osint #hacking #technology
════════════════════════
𐀪 Author: Hobin Rood
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:26:01 GMT
════════════════════════
⌗ Tags: #education #cybersecurity #osint #hacking #technology
Medium
Tales from Hobin: The M&S hacks of 2025
M&S Hack: Social Engineering Meets Ransomware — Retail’s 2025 Nightmare Exposed
⤷ Title: Issue #3: Meet the Hackers Trying to Ruin Your Day — Cybercriminals & Nation-States
════════════════════════
𐀪 Author: Eric Gallagher
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:15:08 GMT
════════════════════════
⌗ Tags: #ai #hacking #cybercrime #software_development #cybersecurity
════════════════════════
𐀪 Author: Eric Gallagher
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:15:08 GMT
════════════════════════
⌗ Tags: #ai #hacking #cybercrime #software_development #cybersecurity
Medium
Issue #3: Meet the Hackers Trying to Ruin Your Day — Cybercriminals & Nation-States
Originally Published on LinkedIn: February 17, 2025
⤷ Title: Shodan-Cat:Maximizing Shodan Data Extraction Without API Credits
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:13:44 GMT
════════════════════════
⌗ Tags: #hacking #hacker #linux #s_h4ck13
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:13:44 GMT
════════════════════════
⌗ Tags: #hacking #hacker #linux #s_h4ck13
Medium
Shodan-Cat:Maximizing Shodan Data Extraction Without API Credits
If you don’t have a Shodan membership, this tool helps you maximize the number of IP addresses you can retrieve from Shodan.
⤷ Title: CRTA Certification Journey: Stepping Into Red Teaming
════════════════════════
𐀪 Author: Rakesh Elamaran
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:12:47 GMT
════════════════════════
⌗ Tags: #red_teaming #cybersecurity #infosec #technology #certification
════════════════════════
𐀪 Author: Rakesh Elamaran
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:12:47 GMT
════════════════════════
⌗ Tags: #red_teaming #cybersecurity #infosec #technology #certification
⤷ Title: Beyond the Click: Why Your MFA is Failing and the Rise of the Session Hijackers
════════════════════════
𐀪 Author: Ehulse
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:01:07 GMT
════════════════════════
⌗ Tags: #security #infosec #cybersecurity #incident_response
════════════════════════
𐀪 Author: Ehulse
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:01:07 GMT
════════════════════════
⌗ Tags: #security #infosec #cybersecurity #incident_response
Medium
Beyond the Click: Why Your MFA is Failing and the Rise of the Session Hijackers
Introduction: The MFA Security Paradox
⤷ Title: What is an authentication vulnerability?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:22:10 GMT
════════════════════════
⌗ Tags: #authentication #ethical_hacking #binaryshield #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:22:10 GMT
════════════════════════
⌗ Tags: #authentication #ethical_hacking #binaryshield #penetration_testing #cybersecurity
Medium
What is an authentication vulnerability?
1. What it is (very simple definition)
⤷ Title: Introduction of Cryptography
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:48:52 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #cryptography_details #cryptography #penetration_testing
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:48:52 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #cryptography_details #cryptography #penetration_testing
Medium
Introduction of Cryptography
Cryptography in Details Part 1
⤷ Title: What are Access Control Vulnerabilities?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:38:18 GMT
════════════════════════
⌗ Tags: #binaryshield #broken_access_control #cybersecurity #penetration_testing #ethical_hacking
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:38:18 GMT
════════════════════════
⌗ Tags: #binaryshield #broken_access_control #cybersecurity #penetration_testing #ethical_hacking
Medium
What are Access Control Vulnerabilities?
✅ 1) What it is (very simple definition)
⤷ Title: Become a Defender Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:36 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #cybersecurity #blue_team #tryhackme_walkthrough
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:36 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #cybersecurity #blue_team #tryhackme_walkthrough
Medium
Become a Defender Walkthrough Notes | TryHackMe
Simple guide explaining cybersecurity defense basics and protection concepts.
⤷ Title: Become a Hacker Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:11 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:11 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #ethical_hacking #cybersecurity
Medium
Become a Hacker Walkthrough Notes | TryHackMe
Beginner walkthrough showing web hacking basics and password cracking steps.
⤷ Title: THM: Net Sec Challenge
════════════════════════
𐀪 Author: Murad Salem
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:04:26 GMT
════════════════════════
⌗ Tags: #nmap #offensive_security #hydra #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Murad Salem
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:04:26 GMT
════════════════════════
⌗ Tags: #nmap #offensive_security #hydra #tryhackme #cybersecurity
Medium
THM: Net Sec Challenge
A write-up for Net Sec Challenge Room
⤷ Title: Cybersecurity Red Teaming: When Assumptions Aren’t Enough
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:33 GMT
════════════════════════
⌗ Tags: #information_security #red_team #cybersecurity #cyber_security_awareness #ethical_hacking
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:33 GMT
════════════════════════
⌗ Tags: #information_security #red_team #cybersecurity #cyber_security_awareness #ethical_hacking
Medium
Cybersecurity Red Teaming: When Assumptions Aren’t Enough
Modern Fortune 500 software companies operate with millions of servers, tens of thousands of employees, and limitless connectivity. These…
⤷ Title: Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:16:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:16:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 22:30:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 22:30:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: I Built a Recon & Attack Vector Mapper Online Tool for Bug Bounty
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:15:56 GMT
════════════════════════
⌗ Tags: #bug_bounty_tool #bug_bounty #ai #cybersecurity #automation
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:15:56 GMT
════════════════════════
⌗ Tags: #bug_bounty_tool #bug_bounty #ai #cybersecurity #automation
Medium
I Built a Recon & Attack Vector Mapper Online Tool for Bug Bounty
Bug bounty hunting always sounds thrilling at first. But let’s be real: most of your time isn’t spent hacking. It’s the prep work that eats…
⤷ Title: Zero-click account takeover worth 1500€
════════════════════════
𐀪 Author: Sakshi Rathore
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:14:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: Sakshi Rathore
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:14:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #bug_bounty_tips #bug_bounty
Medium
Zero-click account takeover worth 1500€
Hello Everyone, This is the method and steps I followed to uncover a vulnerability that resulted in getting me a bounty of 1500 Euros.
⤷ Title: Cross-Site Request Forgery Leading to Account Takeover
════════════════════════
𐀪 Author: montaser mohsen
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:42:22 GMT
════════════════════════
⌗ Tags: #csrf #account_takeover #bug_bounty #bug_bounty_writeup #bug_bounty_tips
════════════════════════
𐀪 Author: montaser mohsen
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:42:22 GMT
════════════════════════
⌗ Tags: #csrf #account_takeover #bug_bounty #bug_bounty_writeup #bug_bounty_tips
Medium
Cross-Site Request Forgery Leading to Account Takeover
My name is Montaser Mohsen.I am a security researcher focused on web application vulnerabilities and account takeover scenarios.I pay close…
⤷ Title: CVE-2026–2256: From AI Prompt to Full System Compromise
════════════════════════
𐀪 Author: Itamar Yochpaz
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:48:19 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #vulnerability_research #artificial_intelligence #ai_agent
════════════════════════
𐀪 Author: Itamar Yochpaz
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:48:19 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #vulnerability_research #artificial_intelligence #ai_agent
Medium
CVE-2026–2256: From AI Prompt to Full System Compromise
A Case Study of How an Insecure AI Agent Leads to Command Injection on Its Host
⤷ Title: When Your Car Gets Hacked: The Real World of Automotive Cybersecurity
════════════════════════
𐀪 Author: Budhdi Sharma
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:31:12 GMT
════════════════════════
⌗ Tags: #automotive_cybersecurity #cybersecurity #self_driving_cars #automotive #hacking
════════════════════════
𐀪 Author: Budhdi Sharma
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:31:12 GMT
════════════════════════
⌗ Tags: #automotive_cybersecurity #cybersecurity #self_driving_cars #automotive #hacking
Medium
When Your Car Gets Hacked: The Real World of Automotive Cybersecurity
Modern vehicles are rolling computers. And like every computer ever made, they can be broken into. Here’s what that really looks like, and…
⤷ Title: TryHackMe: Web Enumeration Walkthrough
════════════════════════
𐀪 Author: Tega Akperiojire (cyber_with_tega)
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:03:22 GMT
════════════════════════
⌗ Tags: #tryhackme #web_enumeration #cybersecurity #tryhackme_walkthrough #reconnaissance
════════════════════════
𐀪 Author: Tega Akperiojire (cyber_with_tega)
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:03:22 GMT
════════════════════════
⌗ Tags: #tryhackme #web_enumeration #cybersecurity #tryhackme_walkthrough #reconnaissance
Medium
TryHackMe: Web Enumeration Walkthrough
This room is designed to provide a comprehensive and well-rounded understanding of the concepts covered under Web enumeration, while…