⤷ Title: North Korea’s Lazarus Group Deploys Medusa Ransomware Against U.S. Healthcare
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:06:52 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cyber_espionage #Healthcare Cybersecurity #infosec #Lazarus Group #Medusa Ransomware #North Korea APT #RaaS #Ransomware_as_a_Service #Stonefly #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:06:52 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cyber_espionage #Healthcare Cybersecurity #infosec #Lazarus Group #Medusa Ransomware #North Korea APT #RaaS #Ransomware_as_a_Service #Stonefly #threat intelligence
Daily CyberSecurity
North Korea’s Lazarus Group Deploys Medusa Ransomware Against U.S. Healthcare
Threat hunters expose North Korean state actors using Medusa ransomware to fund global espionage. U.S. healthcare and non-profits are the primary targets.
⤷ Title: Critical SQL Injection Vulnerability Found in ‘ormar’ Python Library
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:00:54 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AppSec #CVE_2026_26198 #database security #FastAPI #infosec #ormar #Patch Alert #Python Security #sql injection #SQLalchemy #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:00:54 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AppSec #CVE_2026_26198 #database security #FastAPI #infosec #ormar #Patch Alert #Python Security #sql injection #SQLalchemy #Vulnerability
Daily CyberSecurity
Critical SQL Injection Vulnerability Found in 'ormar' Python Library
Critical SQL injection flaw (CVE-2026-26198) in ormar Python ORM allows unauthenticated attackers to leak entire databases. Update to version 0.23.0 immediately!
⤷ Title: From Shodan Recon to Multiple Security Flaws in the Same Program
════════════════════════
𐀪 Author: Marwan Elshamy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:47:58 GMT
════════════════════════
⌗ Tags: #hackerone #bug_bounty #cybersecurity #shodan #ethical_hacking
════════════════════════
𐀪 Author: Marwan Elshamy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:47:58 GMT
════════════════════════
⌗ Tags: #hackerone #bug_bounty #cybersecurity #shodan #ethical_hacking
Medium
From Shodan Recon to Multiple Security Flaws in the Same Program
بِسْمِ اللَّهِ، وَالصَّلَاةُ وَالسَّلَامُ عَلَى رَسُولِ اللَّهِ، وَعَلَى آلِهِ وَصَحْبِهِ وَمَنْ وَالَاهُ، اللَّهُمَّ صَلِّ وَسَلِّمْ…
⤷ Title: Exposing the Hidden Dangers of IoT Bridge Attacks on Smart Home Devices
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:42:13 GMT
════════════════════════
⌗ Tags: #hacking #iot #infosec #cybersecurity #smart_home
════════════════════════
𐀪 Author: Aeon Flex, Elriel Assoc. 2133 [NEON MAXIMA]
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:42:13 GMT
════════════════════════
⌗ Tags: #hacking #iot #infosec #cybersecurity #smart_home
Medium
Exposing the Hidden Dangers of IoT Bridge Attacks on Smart Home Devices
You hear the smart speaker’s voice, you feel the thermostat’s subtle click, you watch the camera’s night vision glow. All of it feels…
⤷ Title: 5 Million-Dollar Gaps in Cybersecurity No One Is Filling
════════════════════════
𐀪 Author: J.C. James
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:22:28 GMT
════════════════════════
⌗ Tags: #investment #cybersecurity #infosec #ai
════════════════════════
𐀪 Author: J.C. James
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:22:28 GMT
════════════════════════
⌗ Tags: #investment #cybersecurity #infosec #ai
Medium
5 Million-Dollar Gaps in Cybersecurity No One Is Filling
Every post, commit, transaction, login, and API call is a strand of digital DNA. If you’re reading this, you have an imprint in that…
⤷ Title: TryHackMe Journey — John the Ripper: The Basics (Task 04)
════════════════════════
𐀪 Author: Kevin Li
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:17:59 GMT
════════════════════════
⌗ Tags: #tryhackme #python #self_improvement #career_change #cybersecurity
════════════════════════
𐀪 Author: Kevin Li
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:17:59 GMT
════════════════════════
⌗ Tags: #tryhackme #python #self_improvement #career_change #cybersecurity
Medium
TryHackMe Journey — John the Ripper: The Basics (Task 04)
This part of TryHackMe is introducing a strong password/hash cracking tool called “John the Ripper.” It seems very easy to use.
⤷ Title: Proving Grounds — Practice — Graph
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:49:54 GMT
════════════════════════
⌗ Tags: #oscp #penetration_testing #ethical_hacking #ctf
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:49:54 GMT
════════════════════════
⌗ Tags: #oscp #penetration_testing #ethical_hacking #ctf
Medium
Proving Grounds — Practice — Graph
Proving Grounds Practice box Graph is rated easy by Offsec and very hard by the community. I would have to agree with the community on this…
⤷ Title: Intigriti Challenge 2026 — Stored XSS to Admin Flag
════════════════════════
𐀪 Author: Pot4to
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:51:18 GMT
════════════════════════
⌗ Tags: #xss_attack #ctf_writeup #xss_vulnerability #ctf #cybersecurity
════════════════════════
𐀪 Author: Pot4to
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:51:18 GMT
════════════════════════
⌗ Tags: #xss_attack #ctf_writeup #xss_vulnerability #ctf #cybersecurity
Medium
Intigriti Challenge 2026 — Stored XSS to Admin Flag
This focused on exploiting a Stored XSS vulnerability in Markdown rendering in order to steal the admin bot’s cookie and retrieve the flag
⤷ Title: Russia Set to Escalate to ‘New Generation Warfare’ Against NATO
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:40:50 +0000
════════════════════════
⌗ Tags: #Cyber Security #Critical Infrastructure #Cyber Operations #geopolitics #Hybrid Warfare #infosec #Insikt Group #NATO #New Generation Warfare #Putin #russia #Sabotage
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:40:50 +0000
════════════════════════
⌗ Tags: #Cyber Security #Critical Infrastructure #Cyber Operations #geopolitics #Hybrid Warfare #infosec #Insikt Group #NATO #New Generation Warfare #Putin #russia #Sabotage
Daily CyberSecurity
Russia Set to Escalate to 'New Generation Warfare' Against NATO
Recorded Future’s Insikt Group warns of a two-year escalation in Russian hybrid warfare. From cyber sabotage to airspace incursions, NATO faces a new doctrine.
⤷ Title: The Three-Year Shadow: Critical CVSS 10 Cisco SD-WAN Zero-Day Exploited by UAT-8616
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:21:47 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Authentication Bypass #Cisco Catalyst #Cisco Talos #Cisco vManage #Cisco vSmart #Critical Infrastructure #CVE_2026_20127 #infosec #network_security #SD_WAN #UAT_8616 #zero_day
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:21:47 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Authentication Bypass #Cisco Catalyst #Cisco Talos #Cisco vManage #Cisco vSmart #Critical Infrastructure #CVE_2026_20127 #infosec #network_security #SD_WAN #UAT_8616 #zero_day
Daily CyberSecurity
The Three-Year Shadow: Critical CVSS 10 Cisco SD-WAN Zero-Day Exploited by UAT-8616
Cisco Talos warns of CVE-2026-20127, a CVSS 10 flaw in Catalyst SD-WAN exploited since 2023. UAT-8616 bypassed authentication to hijack global network fabrics.
⤷ Title: ♂️ Pulling Off the Heist: A Methodical HTB Takedown
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 01:53:30 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #web_security #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 01:53:30 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #web_security #bug_bounty #cybersecurity
Medium
🕵🏽♂️ Pulling Off the Heist: A Methodical HTB Takedown
To start, I launched Burp Suite Community Edition and navigated to the target IP address: 10.129.5.22. Upon visiting the site, I was…
⤷ Title: Day 2 — Getting Started to Become a Master Hacker
════════════════════════
𐀪 Author: Nakul
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 01:05:08 GMT
════════════════════════
⌗ Tags: #for_begineers #introduction_to_hacking #ethical_hacking #bug_bounty #journey
════════════════════════
𐀪 Author: Nakul
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 01:05:08 GMT
════════════════════════
⌗ Tags: #for_begineers #introduction_to_hacking #ethical_hacking #bug_bounty #journey
Medium
Day 2 — Getting Started to Become a Master Hacker
Learning from CISCO — The history Command
⤷ Title: When Being on the Same Coffee Shop Wi-Fi Is All an Attacker Needs
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:32:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #android_pentesting #8ksec #android #penetration_testing
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:32:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #android_pentesting #8ksec #android #penetration_testing
Medium
When Being on the Same Coffee Shop Wi-Fi Is All an Attacker Needs
In this article, I will be solving a lab noscriptd BorderDroid: International Border Protection from 8ksec.
⤷ Title: Critical Flaw in Juniper PTX Routers: Unauthenticated Root Access Discovered
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:14:47 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Critical Vulnerability #CVE_2026_21902 #infosec #Juniper Networks #Junos OS Evolved #network_security #Patch Alert #PTX Series #rce #Remote Code Execution #root access
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:14:47 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Critical Vulnerability #CVE_2026_21902 #infosec #Juniper Networks #Junos OS Evolved #network_security #Patch Alert #PTX Series #rce #Remote Code Execution #root access
Daily CyberSecurity
Critical Flaw in Juniper PTX Routers: Unauthenticated Root Access Discovered
Juniper Networks warns of a critical 9.8 CVSS root vulnerability (CVE-2026-21902) in PTX Series routers. Unauthenticated attackers can gain complete control.
⤷ Title: Google Supercharges Android Scam Defenses with On-Device Gemini AI
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:03:18 +0000
════════════════════════
⌗ Tags: #Android #AI security #Android security #Cyber Security #Google Gemini #Google Messages #infosec #Mobile Scams #Pig Butchering #Samsung Galaxy S26 #Scam Detection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:03:18 +0000
════════════════════════
⌗ Tags: #Android #AI security #Android security #Cyber Security #Google Gemini #Google Messages #infosec #Mobile Scams #Pig Butchering #Samsung Galaxy S26 #Scam Detection
Daily CyberSecurity
Google Supercharges Android Scam Defenses with On-Device Gemini AI
Google expands Gemini-powered Scam Detection to the Galaxy S26 and Pixel 10. Stop "pig butchering" and bank spoofing with real-time, on-device AI protection.
⤷ Title: Attacking LSASS: HackTheBox Walkthrough | Peneteration Tester Path
════════════════════════
𐀪 Author: zerodaystudios
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:41:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #lsass #ethical_hacking #windows
════════════════════════
𐀪 Author: zerodaystudios
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:41:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #lsass #ethical_hacking #windows
Medium
Attacking LSASS: HackTheBox Walkthrough | Peneteration Tester Path
Step 1: Creating an LSASS Memory Dump (Task Manager Method)
⤷ Title: Breaking Authentication — Part 2
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 05:00:42 GMT
════════════════════════
⌗ Tags: #bug_bounty #security #business #cybersecurity #api
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 05:00:42 GMT
════════════════════════
⌗ Tags: #bug_bounty #security #business #cybersecurity #api
Medium
Breaking Authentication — Part 2
How to Map and Analyze an Authentication Flow Like a Professional
⤷ Title: 【威脅情資】遊戲安裝檔夾帶 RedCap 木馬之逆向分析
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:12:32 GMT
════════════════════════
⌗ Tags: #supply_chain #info_sec_writeups #apt #blue_team #malware_analysis
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:12:32 GMT
════════════════════════
⌗ Tags: #supply_chain #info_sec_writeups #apt #blue_team #malware_analysis
Medium
【威脅情資】遊戲安裝檔夾帶 RedCap 木馬之逆向分析
免責聲明:公開目的在於協助防禦、偵測與應變,不鼓勵亦不協助任何未經授權之入侵、存取或濫用行為
⤷ Title: INSTALASI VIRTUALBOX dan KALI LINUX
════════════════════════
𐀪 Author: Dhiya Rahma
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:36:46 GMT
════════════════════════
⌗ Tags: #teknologi_informasi #virtualbox #ethical_hacking #kali_linux #universitas_tidar
════════════════════════
𐀪 Author: Dhiya Rahma
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:36:46 GMT
════════════════════════
⌗ Tags: #teknologi_informasi #virtualbox #ethical_hacking #kali_linux #universitas_tidar
Medium
INSTALASI VIRTUALBOX dan KALI LINUX
Ethical Hacking
⤷ Title: How Mobile API Rate Limiting Fails in Real Attacks
════════════════════════
𐀪 Author: Vaibhav Shakya | Mr Neo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:47:05 GMT
════════════════════════
⌗ Tags: #system_architecture #mobile_security #backend_engineering #trust_boundaries #api_security
════════════════════════
𐀪 Author: Vaibhav Shakya | Mr Neo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:47:05 GMT
════════════════════════
⌗ Tags: #system_architecture #mobile_security #backend_engineering #trust_boundaries #api_security
Medium
How Mobile API Rate Limiting Fails in Real Attacks
Rate limiting is commonly treated as a protective control: restrict how often an API can be called, and abuse becomes expensive or…
⤷ Title: Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:43:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:43:00 +0530
════════════════════════
⌗ Tags: No_Tags