⤷ Title: What is an authentication vulnerability?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:22:10 GMT
════════════════════════
⌗ Tags: #authentication #ethical_hacking #binaryshield #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 16:22:10 GMT
════════════════════════
⌗ Tags: #authentication #ethical_hacking #binaryshield #penetration_testing #cybersecurity
Medium
What is an authentication vulnerability?
1. What it is (very simple definition)
⤷ Title: Introduction of Cryptography
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:48:52 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #cryptography_details #cryptography #penetration_testing
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:48:52 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #cryptography_details #cryptography #penetration_testing
Medium
Introduction of Cryptography
Cryptography in Details Part 1
⤷ Title: What are Access Control Vulnerabilities?
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:38:18 GMT
════════════════════════
⌗ Tags: #binaryshield #broken_access_control #cybersecurity #penetration_testing #ethical_hacking
════════════════════════
𐀪 Author: BinaryShield
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:38:18 GMT
════════════════════════
⌗ Tags: #binaryshield #broken_access_control #cybersecurity #penetration_testing #ethical_hacking
Medium
What are Access Control Vulnerabilities?
✅ 1) What it is (very simple definition)
⤷ Title: Become a Defender Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:36 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #cybersecurity #blue_team #tryhackme_walkthrough
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:36 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #cybersecurity #blue_team #tryhackme_walkthrough
Medium
Become a Defender Walkthrough Notes | TryHackMe
Simple guide explaining cybersecurity defense basics and protection concepts.
⤷ Title: Become a Hacker Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:11 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:11 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #ethical_hacking #cybersecurity
Medium
Become a Hacker Walkthrough Notes | TryHackMe
Beginner walkthrough showing web hacking basics and password cracking steps.
⤷ Title: THM: Net Sec Challenge
════════════════════════
𐀪 Author: Murad Salem
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:04:26 GMT
════════════════════════
⌗ Tags: #nmap #offensive_security #hydra #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Murad Salem
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:04:26 GMT
════════════════════════
⌗ Tags: #nmap #offensive_security #hydra #tryhackme #cybersecurity
Medium
THM: Net Sec Challenge
A write-up for Net Sec Challenge Room
⤷ Title: Cybersecurity Red Teaming: When Assumptions Aren’t Enough
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:33 GMT
════════════════════════
⌗ Tags: #information_security #red_team #cybersecurity #cyber_security_awareness #ethical_hacking
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 15:06:33 GMT
════════════════════════
⌗ Tags: #information_security #red_team #cybersecurity #cyber_security_awareness #ethical_hacking
Medium
Cybersecurity Red Teaming: When Assumptions Aren’t Enough
Modern Fortune 500 software companies operate with millions of servers, tens of thousands of employees, and limitless connectivity. These…
⤷ Title: Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:16:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:16:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 22:30:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 22:30:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: I Built a Recon & Attack Vector Mapper Online Tool for Bug Bounty
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:15:56 GMT
════════════════════════
⌗ Tags: #bug_bounty_tool #bug_bounty #ai #cybersecurity #automation
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:15:56 GMT
════════════════════════
⌗ Tags: #bug_bounty_tool #bug_bounty #ai #cybersecurity #automation
Medium
I Built a Recon & Attack Vector Mapper Online Tool for Bug Bounty
Bug bounty hunting always sounds thrilling at first. But let’s be real: most of your time isn’t spent hacking. It’s the prep work that eats…
⤷ Title: Zero-click account takeover worth 1500€
════════════════════════
𐀪 Author: Sakshi Rathore
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:14:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: Sakshi Rathore
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:14:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity #bug_bounty_tips #bug_bounty
Medium
Zero-click account takeover worth 1500€
Hello Everyone, This is the method and steps I followed to uncover a vulnerability that resulted in getting me a bounty of 1500 Euros.
⤷ Title: Cross-Site Request Forgery Leading to Account Takeover
════════════════════════
𐀪 Author: montaser mohsen
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:42:22 GMT
════════════════════════
⌗ Tags: #csrf #account_takeover #bug_bounty #bug_bounty_writeup #bug_bounty_tips
════════════════════════
𐀪 Author: montaser mohsen
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:42:22 GMT
════════════════════════
⌗ Tags: #csrf #account_takeover #bug_bounty #bug_bounty_writeup #bug_bounty_tips
Medium
Cross-Site Request Forgery Leading to Account Takeover
My name is Montaser Mohsen.I am a security researcher focused on web application vulnerabilities and account takeover scenarios.I pay close…
⤷ Title: CVE-2026–2256: From AI Prompt to Full System Compromise
════════════════════════
𐀪 Author: Itamar Yochpaz
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:48:19 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #vulnerability_research #artificial_intelligence #ai_agent
════════════════════════
𐀪 Author: Itamar Yochpaz
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:48:19 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #vulnerability_research #artificial_intelligence #ai_agent
Medium
CVE-2026–2256: From AI Prompt to Full System Compromise
A Case Study of How an Insecure AI Agent Leads to Command Injection on Its Host
⤷ Title: When Your Car Gets Hacked: The Real World of Automotive Cybersecurity
════════════════════════
𐀪 Author: Budhdi Sharma
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:31:12 GMT
════════════════════════
⌗ Tags: #automotive_cybersecurity #cybersecurity #self_driving_cars #automotive #hacking
════════════════════════
𐀪 Author: Budhdi Sharma
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:31:12 GMT
════════════════════════
⌗ Tags: #automotive_cybersecurity #cybersecurity #self_driving_cars #automotive #hacking
Medium
When Your Car Gets Hacked: The Real World of Automotive Cybersecurity
Modern vehicles are rolling computers. And like every computer ever made, they can be broken into. Here’s what that really looks like, and…
⤷ Title: TryHackMe: Web Enumeration Walkthrough
════════════════════════
𐀪 Author: Tega Akperiojire (cyber_with_tega)
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:03:22 GMT
════════════════════════
⌗ Tags: #tryhackme #web_enumeration #cybersecurity #tryhackme_walkthrough #reconnaissance
════════════════════════
𐀪 Author: Tega Akperiojire (cyber_with_tega)
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:03:22 GMT
════════════════════════
⌗ Tags: #tryhackme #web_enumeration #cybersecurity #tryhackme_walkthrough #reconnaissance
Medium
TryHackMe: Web Enumeration Walkthrough
This room is designed to provide a comprehensive and well-rounded understanding of the concepts covered under Web enumeration, while…
⤷ Title: Tryhackme “Tomghost” CTF Writeup
════════════════════════
𐀪 Author: sabR
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:07:22 GMT
════════════════════════
⌗ Tags: #pentesting #cybersecurity #ctf_writeup #tryhackme #ctf
════════════════════════
𐀪 Author: sabR
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:07:22 GMT
════════════════════════
⌗ Tags: #pentesting #cybersecurity #ctf_writeup #tryhackme #ctf
Medium
Tryhackme “Tomghost” CTF Writeup
Step 1: (Reconnaissance)
⤷ Title: Lab: Reflected XSS into Attribute with Angle Brackets HTML-Encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:16:24 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty #cybersecurity #hacking #ctf
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:16:24 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty #cybersecurity #hacking #ctf
Medium
Lab: Reflected XSS into Attribute with Angle Brackets HTML-Encoded
Challenge Overview
⤷ Title: The Old Con, Upgraded
════════════════════════
𐀪 Author: Raphael Savastano
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:19:27 GMT
════════════════════════
⌗ Tags: #cio #infosec #cybersecurity #fraud_prevention #ciso
════════════════════════
𐀪 Author: Raphael Savastano
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:19:27 GMT
════════════════════════
⌗ Tags: #cio #infosec #cybersecurity #fraud_prevention #ciso
Medium
The Old Con, Upgraded
The FBI’s Internet Crime Complaint Center recorded more than $16 billion in cybercrime losses in 2024, a 33% increase from the year prior…
⤷ Title: VulnOSv2
════════════════════════
𐀪 Author: Rohithrrohi
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:45:02 GMT
════════════════════════
⌗ Tags: #vulnos2 #penetration_testing
════════════════════════
𐀪 Author: Rohithrrohi
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:45:02 GMT
════════════════════════
⌗ Tags: #vulnos2 #penetration_testing
Medium
VulnOSv2
1. Target Discovery
⤷ Title: What Is A Subdomain And How To Perform Subdomain Enumaration?
════════════════════════
𐀪 Author: Kutay Söker
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:22:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_penetration_testing #attack_surface_management #subdomains_enumeration #penetration_testing
════════════════════════
𐀪 Author: Kutay Söker
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:22:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_penetration_testing #attack_surface_management #subdomains_enumeration #penetration_testing
Medium
What Is A Subdomain And How To Perform Subdomain Enumaration?
Hi! Today we will talk about domains, subdomains and subdomain enumaration. If want to understand what the subdmains are we have to get to…
⤷ Title: TryHackMe | Defensive Security Intro | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:48:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #cyber_security_awareness #tryhackme_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:48:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #cyber_security_awareness #tryhackme_writeup #tryhackme_walkthrough
Medium
TryHackMe | Defensive Security Intro | WriteUp
Introducing defensive security, where you will protect FakeBank from an ongoing attack.