⤷ Title: Proving Grounds — Practice — Graph
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:49:54 GMT
════════════════════════
⌗ Tags: #oscp #penetration_testing #ethical_hacking #ctf
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:49:54 GMT
════════════════════════
⌗ Tags: #oscp #penetration_testing #ethical_hacking #ctf
Medium
Proving Grounds — Practice — Graph
Proving Grounds Practice box Graph is rated easy by Offsec and very hard by the community. I would have to agree with the community on this…
⤷ Title: Intigriti Challenge 2026 — Stored XSS to Admin Flag
════════════════════════
𐀪 Author: Pot4to
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:51:18 GMT
════════════════════════
⌗ Tags: #xss_attack #ctf_writeup #xss_vulnerability #ctf #cybersecurity
════════════════════════
𐀪 Author: Pot4to
════════════════════════
ⴵ Time: Wed, 25 Feb 2026 23:51:18 GMT
════════════════════════
⌗ Tags: #xss_attack #ctf_writeup #xss_vulnerability #ctf #cybersecurity
Medium
Intigriti Challenge 2026 — Stored XSS to Admin Flag
This focused on exploiting a Stored XSS vulnerability in Markdown rendering in order to steal the admin bot’s cookie and retrieve the flag
⤷ Title: Russia Set to Escalate to ‘New Generation Warfare’ Against NATO
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:40:50 +0000
════════════════════════
⌗ Tags: #Cyber Security #Critical Infrastructure #Cyber Operations #geopolitics #Hybrid Warfare #infosec #Insikt Group #NATO #New Generation Warfare #Putin #russia #Sabotage
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:40:50 +0000
════════════════════════
⌗ Tags: #Cyber Security #Critical Infrastructure #Cyber Operations #geopolitics #Hybrid Warfare #infosec #Insikt Group #NATO #New Generation Warfare #Putin #russia #Sabotage
Daily CyberSecurity
Russia Set to Escalate to 'New Generation Warfare' Against NATO
Recorded Future’s Insikt Group warns of a two-year escalation in Russian hybrid warfare. From cyber sabotage to airspace incursions, NATO faces a new doctrine.
⤷ Title: The Three-Year Shadow: Critical CVSS 10 Cisco SD-WAN Zero-Day Exploited by UAT-8616
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:21:47 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Authentication Bypass #Cisco Catalyst #Cisco Talos #Cisco vManage #Cisco vSmart #Critical Infrastructure #CVE_2026_20127 #infosec #network_security #SD_WAN #UAT_8616 #zero_day
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:21:47 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Authentication Bypass #Cisco Catalyst #Cisco Talos #Cisco vManage #Cisco vSmart #Critical Infrastructure #CVE_2026_20127 #infosec #network_security #SD_WAN #UAT_8616 #zero_day
Daily CyberSecurity
The Three-Year Shadow: Critical CVSS 10 Cisco SD-WAN Zero-Day Exploited by UAT-8616
Cisco Talos warns of CVE-2026-20127, a CVSS 10 flaw in Catalyst SD-WAN exploited since 2023. UAT-8616 bypassed authentication to hijack global network fabrics.
⤷ Title: ♂️ Pulling Off the Heist: A Methodical HTB Takedown
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 01:53:30 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #web_security #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 01:53:30 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #web_security #bug_bounty #cybersecurity
Medium
🕵🏽♂️ Pulling Off the Heist: A Methodical HTB Takedown
To start, I launched Burp Suite Community Edition and navigated to the target IP address: 10.129.5.22. Upon visiting the site, I was…
⤷ Title: Day 2 — Getting Started to Become a Master Hacker
════════════════════════
𐀪 Author: Nakul
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 01:05:08 GMT
════════════════════════
⌗ Tags: #for_begineers #introduction_to_hacking #ethical_hacking #bug_bounty #journey
════════════════════════
𐀪 Author: Nakul
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 01:05:08 GMT
════════════════════════
⌗ Tags: #for_begineers #introduction_to_hacking #ethical_hacking #bug_bounty #journey
Medium
Day 2 — Getting Started to Become a Master Hacker
Learning from CISCO — The history Command
⤷ Title: When Being on the Same Coffee Shop Wi-Fi Is All an Attacker Needs
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:32:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #android_pentesting #8ksec #android #penetration_testing
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 02:32:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #android_pentesting #8ksec #android #penetration_testing
Medium
When Being on the Same Coffee Shop Wi-Fi Is All an Attacker Needs
In this article, I will be solving a lab noscriptd BorderDroid: International Border Protection from 8ksec.
⤷ Title: Critical Flaw in Juniper PTX Routers: Unauthenticated Root Access Discovered
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:14:47 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Critical Vulnerability #CVE_2026_21902 #infosec #Juniper Networks #Junos OS Evolved #network_security #Patch Alert #PTX Series #rce #Remote Code Execution #root access
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:14:47 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Critical Vulnerability #CVE_2026_21902 #infosec #Juniper Networks #Junos OS Evolved #network_security #Patch Alert #PTX Series #rce #Remote Code Execution #root access
Daily CyberSecurity
Critical Flaw in Juniper PTX Routers: Unauthenticated Root Access Discovered
Juniper Networks warns of a critical 9.8 CVSS root vulnerability (CVE-2026-21902) in PTX Series routers. Unauthenticated attackers can gain complete control.
⤷ Title: Google Supercharges Android Scam Defenses with On-Device Gemini AI
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:03:18 +0000
════════════════════════
⌗ Tags: #Android #AI security #Android security #Cyber Security #Google Gemini #Google Messages #infosec #Mobile Scams #Pig Butchering #Samsung Galaxy S26 #Scam Detection
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:03:18 +0000
════════════════════════
⌗ Tags: #Android #AI security #Android security #Cyber Security #Google Gemini #Google Messages #infosec #Mobile Scams #Pig Butchering #Samsung Galaxy S26 #Scam Detection
Daily CyberSecurity
Google Supercharges Android Scam Defenses with On-Device Gemini AI
Google expands Gemini-powered Scam Detection to the Galaxy S26 and Pixel 10. Stop "pig butchering" and bank spoofing with real-time, on-device AI protection.
⤷ Title: Attacking LSASS: HackTheBox Walkthrough | Peneteration Tester Path
════════════════════════
𐀪 Author: zerodaystudios
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:41:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #lsass #ethical_hacking #windows
════════════════════════
𐀪 Author: zerodaystudios
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 03:41:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #lsass #ethical_hacking #windows
Medium
Attacking LSASS: HackTheBox Walkthrough | Peneteration Tester Path
Step 1: Creating an LSASS Memory Dump (Task Manager Method)
⤷ Title: Breaking Authentication — Part 2
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 05:00:42 GMT
════════════════════════
⌗ Tags: #bug_bounty #security #business #cybersecurity #api
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 05:00:42 GMT
════════════════════════
⌗ Tags: #bug_bounty #security #business #cybersecurity #api
Medium
Breaking Authentication — Part 2
How to Map and Analyze an Authentication Flow Like a Professional
⤷ Title: 【威脅情資】遊戲安裝檔夾帶 RedCap 木馬之逆向分析
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:12:32 GMT
════════════════════════
⌗ Tags: #supply_chain #info_sec_writeups #apt #blue_team #malware_analysis
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:12:32 GMT
════════════════════════
⌗ Tags: #supply_chain #info_sec_writeups #apt #blue_team #malware_analysis
Medium
【威脅情資】遊戲安裝檔夾帶 RedCap 木馬之逆向分析
免責聲明:公開目的在於協助防禦、偵測與應變,不鼓勵亦不協助任何未經授權之入侵、存取或濫用行為
⤷ Title: INSTALASI VIRTUALBOX dan KALI LINUX
════════════════════════
𐀪 Author: Dhiya Rahma
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:36:46 GMT
════════════════════════
⌗ Tags: #teknologi_informasi #virtualbox #ethical_hacking #kali_linux #universitas_tidar
════════════════════════
𐀪 Author: Dhiya Rahma
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:36:46 GMT
════════════════════════
⌗ Tags: #teknologi_informasi #virtualbox #ethical_hacking #kali_linux #universitas_tidar
Medium
INSTALASI VIRTUALBOX dan KALI LINUX
Ethical Hacking
⤷ Title: How Mobile API Rate Limiting Fails in Real Attacks
════════════════════════
𐀪 Author: Vaibhav Shakya | Mr Neo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:47:05 GMT
════════════════════════
⌗ Tags: #system_architecture #mobile_security #backend_engineering #trust_boundaries #api_security
════════════════════════
𐀪 Author: Vaibhav Shakya | Mr Neo
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:47:05 GMT
════════════════════════
⌗ Tags: #system_architecture #mobile_security #backend_engineering #trust_boundaries #api_security
Medium
How Mobile API Rate Limiting Fails in Real Attacks
Rate limiting is commonly treated as a protective control: restrict how often an API can be called, and abuse becomes expensive or…
⤷ Title: Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:43:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:43:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Anatomy of a Build Tool Vulnerability: Auditing Nubank’s Vessel
════════════════════════
𐀪 Author: Levp
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 06:23:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #programming #fintech #bug_bounty #clojure
════════════════════════
𐀪 Author: Levp
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 06:23:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #programming #fintech #bug_bounty #clojure
Medium
Anatomy of a Build Tool Vulnerability: Auditing Nubank’s Vessel
Subnoscript: How a simple Clojure wrapper for shell commands can lead to RCE, Data Leaks, and Infrastructure risk. Introduction In modern…
⤷ Title: Hacking agents seems easy, now what…
════════════════════════
𐀪 Author: Owencorstens
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 06:51:00 GMT
════════════════════════
⌗ Tags: #hacking #llm #agents #chatgpt #jailbreak
════════════════════════
𐀪 Author: Owencorstens
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 06:51:00 GMT
════════════════════════
⌗ Tags: #hacking #llm #agents #chatgpt #jailbreak
Medium
Hacking agents seems easy, now what…
Did we get brainwashed??
⤷ Title: Copypasta writeup (BAC) (Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 06:31:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_walkthrough #hacking #ctf_writeup #ctf
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 06:31:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_walkthrough #hacking #ctf_writeup #ctf
Medium
Copypasta writeup (BAC) (Bugforge)
Copypasta writeup (BAC) (Bugforge) Step 1: Register and head to your profile area Your profile can be found by clicking your profile icon in the top right after signing in: Step 2: Account …
⤷ Title: Kerberoasting and BloodHound: Two Attacks That Show Why Active Directory Is Hard to Defend
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 05:20:08 GMT
════════════════════════
⌗ Tags: #kerberoasting #bloodhound #cybersecurity #penetration_testing #active_directory
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 05:20:08 GMT
════════════════════════
⌗ Tags: #kerberoasting #bloodhound #cybersecurity #penetration_testing #active_directory
Medium
Kerberoasting and BloodHound: Two Attacks That Show Why Active Directory Is Hard to Defend
Overview
⤷ Title: Getting Login on Troll (VulnHub) — A Beginner-Friendly Kali Linux Walkthrough
════════════════════════
𐀪 Author: Kola. Yeswanth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 05:30:11 GMT
════════════════════════
⌗ Tags: #ethical_hacking #pentesting #kali_linux #vulnhub #cybersecurity
════════════════════════
𐀪 Author: Kola. Yeswanth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 05:30:11 GMT
════════════════════════
⌗ Tags: #ethical_hacking #pentesting #kali_linux #vulnhub #cybersecurity
Medium
Getting Login on Troll (VulnHub) — A Beginner-Friendly Kali Linux Walkthrough
A simple, step-by-step guide to getting initial access on the Troll VulnHub machine using Kali Linux — perfect for beginners.
⤷ Title: What is VAPT? Guide to the Introductory Vulnerability Assessment and Penetration Testing.
════════════════════════
𐀪 Author: Lorcam Securities
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 06:52:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #vapt #cyber_security_india
════════════════════════
𐀪 Author: Lorcam Securities
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 06:52:00 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #vapt #cyber_security_india
Medium
What is VAPT? Guide to the Introductory Vulnerability Assessment and Penetration Testing.
VAPT stands for Vulnerability Assessment and Penetration Testing, a computer security procedure that exposes the vulnerabilities within…