⤷ Title: When Your Car Gets Hacked: The Real World of Automotive Cybersecurity
════════════════════════
𐀪 Author: Budhdi Sharma
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:31:12 GMT
════════════════════════
⌗ Tags: #automotive_cybersecurity #cybersecurity #self_driving_cars #automotive #hacking
════════════════════════
𐀪 Author: Budhdi Sharma
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:31:12 GMT
════════════════════════
⌗ Tags: #automotive_cybersecurity #cybersecurity #self_driving_cars #automotive #hacking
Medium
When Your Car Gets Hacked: The Real World of Automotive Cybersecurity
Modern vehicles are rolling computers. And like every computer ever made, they can be broken into. Here’s what that really looks like, and…
⤷ Title: TryHackMe: Web Enumeration Walkthrough
════════════════════════
𐀪 Author: Tega Akperiojire (cyber_with_tega)
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:03:22 GMT
════════════════════════
⌗ Tags: #tryhackme #web_enumeration #cybersecurity #tryhackme_walkthrough #reconnaissance
════════════════════════
𐀪 Author: Tega Akperiojire (cyber_with_tega)
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 18:03:22 GMT
════════════════════════
⌗ Tags: #tryhackme #web_enumeration #cybersecurity #tryhackme_walkthrough #reconnaissance
Medium
TryHackMe: Web Enumeration Walkthrough
This room is designed to provide a comprehensive and well-rounded understanding of the concepts covered under Web enumeration, while…
⤷ Title: Tryhackme “Tomghost” CTF Writeup
════════════════════════
𐀪 Author: sabR
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:07:22 GMT
════════════════════════
⌗ Tags: #pentesting #cybersecurity #ctf_writeup #tryhackme #ctf
════════════════════════
𐀪 Author: sabR
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 17:07:22 GMT
════════════════════════
⌗ Tags: #pentesting #cybersecurity #ctf_writeup #tryhackme #ctf
Medium
Tryhackme “Tomghost” CTF Writeup
Step 1: (Reconnaissance)
⤷ Title: Lab: Reflected XSS into Attribute with Angle Brackets HTML-Encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:16:24 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty #cybersecurity #hacking #ctf
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:16:24 GMT
════════════════════════
⌗ Tags: #xss_attack #bug_bounty #cybersecurity #hacking #ctf
Medium
Lab: Reflected XSS into Attribute with Angle Brackets HTML-Encoded
Challenge Overview
⤷ Title: The Old Con, Upgraded
════════════════════════
𐀪 Author: Raphael Savastano
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:19:27 GMT
════════════════════════
⌗ Tags: #cio #infosec #cybersecurity #fraud_prevention #ciso
════════════════════════
𐀪 Author: Raphael Savastano
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:19:27 GMT
════════════════════════
⌗ Tags: #cio #infosec #cybersecurity #fraud_prevention #ciso
Medium
The Old Con, Upgraded
The FBI’s Internet Crime Complaint Center recorded more than $16 billion in cybercrime losses in 2024, a 33% increase from the year prior…
⤷ Title: VulnOSv2
════════════════════════
𐀪 Author: Rohithrrohi
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:45:02 GMT
════════════════════════
⌗ Tags: #vulnos2 #penetration_testing
════════════════════════
𐀪 Author: Rohithrrohi
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:45:02 GMT
════════════════════════
⌗ Tags: #vulnos2 #penetration_testing
Medium
VulnOSv2
1. Target Discovery
⤷ Title: What Is A Subdomain And How To Perform Subdomain Enumaration?
════════════════════════
𐀪 Author: Kutay Söker
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:22:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_penetration_testing #attack_surface_management #subdomains_enumeration #penetration_testing
════════════════════════
𐀪 Author: Kutay Söker
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:22:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #web_penetration_testing #attack_surface_management #subdomains_enumeration #penetration_testing
Medium
What Is A Subdomain And How To Perform Subdomain Enumaration?
Hi! Today we will talk about domains, subdomains and subdomain enumaration. If want to understand what the subdmains are we have to get to…
⤷ Title: TryHackMe | Defensive Security Intro | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:48:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #cyber_security_awareness #tryhackme_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:48:58 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #cyber_security_awareness #tryhackme_writeup #tryhackme_walkthrough
Medium
TryHackMe | Defensive Security Intro | WriteUp
Introducing defensive security, where you will protect FakeBank from an ongoing attack.
⤷ Title: THM: Vulnerability Capstone
════════════════════════
𐀪 Author: Murad Salem
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:32:14 GMT
════════════════════════
⌗ Tags: #tryhackme #vulnerability #cybersecurity #exploit #python
════════════════════════
𐀪 Author: Murad Salem
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:32:14 GMT
════════════════════════
⌗ Tags: #tryhackme #vulnerability #cybersecurity #exploit #python
Medium
THM: Vulnerability Capstone
A write-up for Vulnerability Capstone room
⤷ Title: HackTheBox | Dancing | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:49:26 GMT
════════════════════════
⌗ Tags: #htb #hackthebox #hackthebox_walkthrough #hackthebox_writeup #ctf
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:49:26 GMT
════════════════════════
⌗ Tags: #htb #hackthebox #hackthebox_walkthrough #hackthebox_writeup #ctf
Medium
HackTheBox | Dancing | WriteUp
Disclaimer: This writeup is based on a Capture The Flag (CTF) challenge hosted on HackTheBox and it is intended for educational purposes…
⤷ Title: Why Intelligent Contract Solutions Are Replacing Traditional CLM Systems
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:11:57 +0000
════════════════════════
⌗ Tags: #Technology #Fintech #CLM #Contract Lifecycle Management #Intelligent Contract Solutions
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:11:57 +0000
════════════════════════
⌗ Tags: #Technology #Fintech #CLM #Contract Lifecycle Management #Intelligent Contract Solutions
Hackread
Why Intelligent Contract Solutions Are Replacing Traditional CLM Systems
Intelligent contract solutions replace CLM with AI analysis and benchmarking to speed reviews, cut risk, and improve contract decisions.
⤷ Title: US Sanctions Russian Exploit Broker Over Stolen US Cyber Tools
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:29:40 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Laws & Legalities #Security #Cybersecurity #Operation Zero #US Treasury #USA
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 19:29:40 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Laws & Legalities #Security #Cybersecurity #Operation Zero #US Treasury #USA
Hackread
US Sanctions Russian Exploit Broker Over Stolen US Cyber Tools
The US Treasury targets Sergey Zelenyuk and his firm Operation Zero for the illegal trade of stolen government cyber tools following the sentencing of Peter Williams.
⤷ Title: Buy A Help Desk, Bundle A Remote Access Solution? (SolarWinds Web Help Desk Pre-Auth RCE Chain(s))
════════════════════════
𐀪 Author: Piotr Bazydlo (@chudyPB)
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:06:32 GMT
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Piotr Bazydlo (@chudyPB)
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 20:06:32 GMT
════════════════════════
⌗ Tags: No_Tags
watchTowr Labs
Buy A Help Desk, Bundle A Remote Access Solution? (SolarWinds Web Help Desk Pre-Auth RCE Chain(s))
It’s been a while, but we’re back - in time for story time.
Gather round, strap in, and prepare for another depressing journey of “all we wanted to do was reproduce an N-day, and here we are with 0-days”.
Today, friends, we’re looking at SolarWinds Web…
Gather round, strap in, and prepare for another depressing journey of “all we wanted to do was reproduce an N-day, and here we are with 0-days”.
Today, friends, we’re looking at SolarWinds Web…
⤷ Title: Don’t Switch Targets, Here’s How Sticking to One Company Makes You a Better Bug Hunter
════════════════════════
𐀪 Author: Sirat Sami (analyz3r)
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 21:49:59 GMT
════════════════════════
⌗ Tags: #hackerone #bug_bounty
════════════════════════
𐀪 Author: Sirat Sami (analyz3r)
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 21:49:59 GMT
════════════════════════
⌗ Tags: #hackerone #bug_bounty
Medium
Don’t Switch Targets, Here’s How Sticking to One Company Makes You a Better Bug Hunter
Hi everyone,
⤷ Title: Mythic C2 Framework
════════════════════════
𐀪 Author: Allen Ace
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 22:22:20 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #command_and_control #threat_detection #red_team
════════════════════════
𐀪 Author: Allen Ace
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 22:22:20 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #command_and_control #threat_detection #red_team
Medium
Mythic C2 Framework
Mythic is an open source Command and Control framework built for red team exercises and adversary simulation. It enables operators to…
⤷ Title: North Korea’s Lazarus Group Deploys Medusa Ransomware Against U.S. Healthcare
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:06:52 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cyber_espionage #Healthcare Cybersecurity #infosec #Lazarus Group #Medusa Ransomware #North Korea APT #RaaS #Ransomware_as_a_Service #Stonefly #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:06:52 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cyber_espionage #Healthcare Cybersecurity #infosec #Lazarus Group #Medusa Ransomware #North Korea APT #RaaS #Ransomware_as_a_Service #Stonefly #threat intelligence
Daily CyberSecurity
North Korea’s Lazarus Group Deploys Medusa Ransomware Against U.S. Healthcare
Threat hunters expose North Korean state actors using Medusa ransomware to fund global espionage. U.S. healthcare and non-profits are the primary targets.
⤷ Title: Critical SQL Injection Vulnerability Found in ‘ormar’ Python Library
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:00:54 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AppSec #CVE_2026_26198 #database security #FastAPI #infosec #ormar #Patch Alert #Python Security #sql injection #SQLalchemy #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:00:54 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AppSec #CVE_2026_26198 #database security #FastAPI #infosec #ormar #Patch Alert #Python Security #sql injection #SQLalchemy #Vulnerability
Daily CyberSecurity
Critical SQL Injection Vulnerability Found in 'ormar' Python Library
Critical SQL injection flaw (CVE-2026-26198) in ormar Python ORM allows unauthenticated attackers to leak entire databases. Update to version 0.23.0 immediately!
⤷ Title: From Shodan Recon to Multiple Security Flaws in the Same Program
════════════════════════
𐀪 Author: Marwan Elshamy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:47:58 GMT
════════════════════════
⌗ Tags: #hackerone #bug_bounty #cybersecurity #shodan #ethical_hacking
════════════════════════
𐀪 Author: Marwan Elshamy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:47:58 GMT
════════════════════════
⌗ Tags: #hackerone #bug_bounty #cybersecurity #shodan #ethical_hacking
Medium
From Shodan Recon to Multiple Security Flaws in the Same Program
بِسْمِ اللَّهِ، وَالصَّلَاةُ وَالسَّلَامُ عَلَى رَسُولِ اللَّهِ، وَعَلَى آلِهِ وَصَحْبِهِ وَمَنْ وَالَاهُ، اللَّهُمَّ صَلِّ وَسَلِّمْ…
⤷ Title: Exposing the Hidden Dangers of IoT Bridge Attacks on Smart Home Devices
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:42:13 GMT
════════════════════════
⌗ Tags: #hacking #iot #infosec #cybersecurity #smart_home
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:42:13 GMT
════════════════════════
⌗ Tags: #hacking #iot #infosec #cybersecurity #smart_home
Medium
Exposing the Hidden Dangers of IoT Bridge Attacks on Smart Home Devices
You hear the smart speaker’s voice, you feel the thermostat’s subtle click, you watch the camera’s night vision glow. All of it feels…
⤷ Title: 5 Million-Dollar Gaps in Cybersecurity No One Is Filling
════════════════════════
𐀪 Author: J.C. James
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:22:28 GMT
════════════════════════
⌗ Tags: #investment #cybersecurity #infosec #ai
════════════════════════
𐀪 Author: J.C. James
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:22:28 GMT
════════════════════════
⌗ Tags: #investment #cybersecurity #infosec #ai
Medium
5 Million-Dollar Gaps in Cybersecurity No One Is Filling
Every post, commit, transaction, login, and API call is a strand of digital DNA. If you’re reading this, you have an imprint in that…
⤷ Title: TryHackMe Journey — John the Ripper: The Basics (Task 04)
════════════════════════
𐀪 Author: Kevin Li
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:17:59 GMT
════════════════════════
⌗ Tags: #tryhackme #python #self_improvement #career_change #cybersecurity
════════════════════════
𐀪 Author: Kevin Li
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:17:59 GMT
════════════════════════
⌗ Tags: #tryhackme #python #self_improvement #career_change #cybersecurity
Medium
TryHackMe Journey — John the Ripper: The Basics (Task 04)
This part of TryHackMe is introducing a strong password/hash cracking tool called “John the Ripper.” It seems very easy to use.