Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Mythic C2 Framework
════════════════════════
𐀪 Author: Allen Ace
════════════════════════
Time: Wed, 25 Feb 2026 22:22:20 GMT
════════════════════════
Tags: #ethical_hacking #cybersecurity #command_and_control #threat_detection #red_team
Title: North Korea’s Lazarus Group Deploys Medusa Ransomware Against U.S. Healthcare
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 00:06:52 +0000
════════════════════════
Tags: #Cybercriminals #cyber_espionage #Healthcare Cybersecurity #infosec #Lazarus Group #Medusa Ransomware #North Korea APT #RaaS #Ransomware_as_a_Service #Stonefly #threat intelligence
Title: Critical SQL Injection Vulnerability Found in ‘ormar’ Python Library
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 00:00:54 +0000
════════════════════════
Tags: #Vulnerability Report #AppSec #CVE_2026_26198 #database security #FastAPI #infosec #ormar #Patch Alert #Python Security #sql injection #SQLalchemy #Vulnerability
Title: From Shodan Recon to Multiple Security Flaws in the Same Program
════════════════════════
𐀪 Author: Marwan Elshamy
════════════════════════
Time: Thu, 26 Feb 2026 00:47:58 GMT
════════════════════════
Tags: #hackerone #bug_bounty #cybersecurity #shodan #ethical_hacking
Title: Exposing the Hidden Dangers of IoT Bridge Attacks on Smart Home Devices
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
Time: Wed, 25 Feb 2026 23:42:13 GMT
════════════════════════
Tags: #hacking #iot #infosec #cybersecurity #smart_home
Title: 5 Million-Dollar Gaps in Cybersecurity No One Is Filling
════════════════════════
𐀪 Author: J.C. James
════════════════════════
Time: Thu, 26 Feb 2026 00:22:28 GMT
════════════════════════
Tags: #investment #cybersecurity #infosec #ai
Title: TryHackMe Journey — John the Ripper: The Basics (Task 04)
════════════════════════
𐀪 Author: Kevin Li
════════════════════════
Time: Thu, 26 Feb 2026 00:17:59 GMT
════════════════════════
Tags: #tryhackme #python #self_improvement #career_change #cybersecurity
Title: Proving Grounds — Practice — Graph
════════════════════════
𐀪 Author: Makoyi
════════════════════════
Time: Thu, 26 Feb 2026 00:49:54 GMT
════════════════════════
Tags: #oscp #penetration_testing #ethical_hacking #ctf
Title: Intigriti Challenge 2026 — Stored XSS to Admin Flag
════════════════════════
𐀪 Author: Pot4to
════════════════════════
Time: Wed, 25 Feb 2026 23:51:18 GMT
════════════════════════
Tags: #xss_attack #ctf_writeup #xss_vulnerability #ctf #cybersecurity
Title: Russia Set to Escalate to ‘New Generation Warfare’ Against NATO
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 02:40:50 +0000
════════════════════════
Tags: #Cyber Security #Critical Infrastructure #Cyber Operations #geopolitics #Hybrid Warfare #infosec #Insikt Group #NATO #New Generation Warfare #Putin #russia #Sabotage
Title: The Three-Year Shadow: Critical CVSS 10 Cisco SD-WAN Zero-Day Exploited by UAT-8616
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 02:21:47 +0000
════════════════════════
Tags: #Vulnerability Report #Authentication Bypass #Cisco Catalyst #Cisco Talos #Cisco vManage #Cisco vSmart #Critical Infrastructure #CVE_2026_20127 #infosec #network_security #SD_WAN #UAT_8616 #zero_day
Title: ‍♂️ Pulling Off the Heist: A Methodical HTB Takedown
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
Time: Thu, 26 Feb 2026 01:53:30 GMT
════════════════════════
Tags: #ctf_writeup #hacking #web_security #bug_bounty #cybersecurity
Title: Day 2 — Getting Started to Become a Master Hacker
════════════════════════
𐀪 Author: Nakul
════════════════════════
Time: Thu, 26 Feb 2026 01:05:08 GMT
════════════════════════
Tags: #for_begineers #introduction_to_hacking #ethical_hacking #bug_bounty #journey
Title: When Being on the Same Coffee Shop Wi-Fi Is All an Attacker Needs
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
Time: Thu, 26 Feb 2026 02:32:54 GMT
════════════════════════
Tags: #cybersecurity #android_pentesting #8ksec #android #penetration_testing
Title: Critical Flaw in Juniper PTX Routers: Unauthenticated Root Access Discovered
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 03:14:47 +0000
════════════════════════
Tags: #Vulnerability Report #Critical Vulnerability #CVE_2026_21902 #infosec #Juniper Networks #Junos OS Evolved #network_security #Patch Alert #PTX Series #rce #Remote Code Execution #root access
Title: Google Supercharges Android Scam Defenses with On-Device Gemini AI
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 03:03:18 +0000
════════════════════════
Tags: #Android #AI security #Android security #Cyber Security #Google Gemini #Google Messages #infosec #Mobile Scams #Pig Butchering #Samsung Galaxy S26 #Scam Detection
Title: Attacking LSASS: HackTheBox Walkthrough | Peneteration Tester Path
════════════════════════
𐀪 Author: zerodaystudios
════════════════════════
Time: Thu, 26 Feb 2026 03:41:00 GMT
════════════════════════
Tags: #penetration_testing #hacking #lsass #ethical_hacking #windows
Title: Breaking Authentication — Part 2
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
Time: Thu, 26 Feb 2026 05:00:42 GMT
════════════════════════
Tags: #bug_bounty #security #business #cybersecurity #api
Title: 【威脅情資】遊戲安裝檔夾帶 RedCap 木馬之逆向分析
════════════════════════
𐀪 Author: segalee
════════════════════════
Time: Thu, 26 Feb 2026 04:12:32 GMT
════════════════════════
Tags: #supply_chain #info_sec_writeups #apt #blue_team #malware_analysis
Title: INSTALASI VIRTUALBOX dan KALI LINUX
════════════════════════
𐀪 Author: Dhiya Rahma
════════════════════════
Time: Thu, 26 Feb 2026 04:36:46 GMT
════════════════════════
Tags: #teknologi_informasi #virtualbox #ethical_hacking #kali_linux #universitas_tidar
Title: How Mobile API Rate Limiting Fails in Real Attacks
════════════════════════
𐀪 Author: Vaibhav Shakya | Mr Neo
════════════════════════
Time: Thu, 26 Feb 2026 04:47:05 GMT
════════════════════════
Tags: #system_architecture #mobile_security #backend_engineering #trust_boundaries #api_security