Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Saldırganın Gözüyle Savunmak: Penetration Testi
════════════════════════
𐀪 Author: Buğra Melih Yenice
════════════════════════
Time: Thu, 26 Feb 2026 07:03:30 GMT
════════════════════════
Tags: #penetration_testing
Title: TryHackMe — Principles of Security (Walkthrough)
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
Time: Thu, 26 Feb 2026 08:37:02 GMT
════════════════════════
Tags: #threat_modeling #tryhackme #tryhackme_writeup #principles_of_security #tryhackme_walkthrough
Title: Advent of The Relics 2 — Operation Winter Blackout — HTB
════════════════════════
𐀪 Author: xiel
════════════════════════
Time: Thu, 26 Feb 2026 07:00:01 GMT
════════════════════════
Tags: #cybersecurity #osint #hackthebox_writeup #hackthebox
Title: Why Some Hackers Choose the Dark Path When They Could Get Paid Legitimately
════════════════════════
𐀪 Author: Travis Ray Caverhill
════════════════════════
Time: Thu, 26 Feb 2026 08:16:42 GMT
════════════════════════
Tags: #grey_hat_hacker #black_hat_hacker #ethical_hacking #cybersecurity #white_hat_hacker
Title: How AI-Powered Cyber Attacks Are Driving Demand for Ethical Hacking
════════════════════════
𐀪 Author: Francycthomas
════════════════════════
Time: Thu, 26 Feb 2026 07:45:00 GMT
════════════════════════
Tags: #ethical_hacking
Title: $1,500 PII Leak via GraphQL Field-Level Permission Bypass
════════════════════════
𐀪 Author: tinopreter
════════════════════════
Time: Thu, 26 Feb 2026 08:59:52 GMT
════════════════════════
Tags: #graphql #hackerone #hacking #bugbounty_writeup #api
Title: Stealth & Control: Mastering Linux Post-Exploitation with the Eden-RAT GUI
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Thu, 26 Feb 2026 09:29:58 +0000
════════════════════════
Tags: #Open Source Tool #Command Execution #cybersecurity tools 2026 #Eden_RAT #File manager #interactive shell #Linux RAT #Linux Security #Penetration Testing #red teaming #remote access tool
Title: The Rogue Peer Threat: CISA Issues Emergency Directive to Thwart Global Cisco SD-WAN Hijacking
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Thu, 26 Feb 2026 09:18:32 +0000
════════════════════════
Tags: #Vulnerability #CISA #Cisco Catalyst #CVE_2022_20775 #CVE_2026_20127 #Cyber Espionage #Emergency Directive 26_03 #Five Eyes #NCSC #rogue peer #SD_WAN #Tech News 2026 #UAT_8616
Title: The Chatbot Saboteur: How Claude Was Coerced into a 150GB Heist of Mexican State Intelligence
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Thu, 26 Feb 2026 09:17:04 +0000
════════════════════════
Tags: #Data Leak #Anthropic #ChatGPT #Claude Opus 4.6 #Data Exfiltration #Gambit Security #Jalisco #Mexico Cyberattack #National Digital Agency #OpenAI #Prompt Engineering #State_Sponsored Hacking #Tech News 2026
Title: The Spreadsheet Spy: How a Decadelong Chinese Espionage Campaign Hijacked Google Sheets to Bypass Global Defenses
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Thu, 26 Feb 2026 09:15:26 +0000
════════════════════════
Tags: #Cybercriminals #China_linked APT #Cyber Espionage 2026 #Google Sheets C2 #Google Threat Intelligence #GRIDTIDE #Mandiant #Salt Typhoon #SoftEther VPN #telecommunications espionage #UNC2814 #xapt malware
Title: Ghost in the Hull: How Ransomware is Paralyzing Global Fleets via Satellite and Shipboard Systems
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Thu, 26 Feb 2026 09:13:56 +0000
════════════════════════
Tags: #Malware #autonomous ships #CYTUR #CYTUR_TI #maritime cybersecurity #ransomware #satellite security #shipboard control systems #supply chain attack #Tech News 2026 #UR E26 #UR E27
Title: Mozilla Crushes 50+ Vulnerabilities in Massive Firefox 148 Security Overhaul
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Thu, 26 Feb 2026 09:12:46 +0000
════════════════════════
Tags: #Vulnerability #Firefox 148 #JavaScript Engine #JIT Compiler #memory corruption #Mozilla #Sandbox Escape #security update #Tech News 2026 #Thunderbird 148 #WebAssembly #zero_day
Title: CrowdStrike’s 2026 Report Warns of the Rise of the “Invisible Adversary”
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Thu, 26 Feb 2026 09:10:57 +0000
════════════════════════
Tags: #Cybercriminals #AI_augmented phishing #breakout time #cloud security #CrowdStrike #Cyber Espionage #Global Threat Report 2026 #malware_free attacks #supply chain attacks #Tech News 2026 #zero_day vulnerabilities
Title: Critical 9.9 Severity Flaws Expose Centreon Servers to Remote Takeover
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 09:57:16 +0000
════════════════════════
Tags: #Vulnerability #Centreon #CLAPI #infosec #IT monitoring #network_security #Patch Alert #Path Traversal #rce #Remote Code Execution
Title: The $200 Monthly Employee: Perplexity Computer Unites GPT-5, Opus 4.6, and Gemini into One Autonomous Powerhouse
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 09:04:32 +0000
════════════════════════
Tags: #Technology #Agentic AI #AI orchestration #ChatGPT_5.2 #Digital Employee #enterprise AI #Gemini #Nano Banana #Opus 4.6 #Perplexity Computer #Perplexity Max #Tech News 2026 #Veo 3.1
Title: From curiosity to critical bugs: Interview with Marc-Oliver Munz (c1phy)
════════════════════════
𐀪 Author: Eleanor Barlow
════════════════════════
Time: Thu, 26 Feb 2026 00:00:00 GMT
════════════════════════
Tags: #Business Insights
Title: Lab: Stored XSS into anchor href attribute with double quotes HTML-encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
Time: Thu, 26 Feb 2026 09:58:12 GMT
════════════════════════
Tags: #bug_bounty #ctf #xss_attack #cybersecurity #hacking
Title: How I Exploited a Race Condition to Bypass Subnoscription Limits
════════════════════════
𐀪 Author: 0xGh4zy
════════════════════════
Time: Thu, 26 Feb 2026 09:55:44 GMT
════════════════════════
Tags: #race_condition #vulnerability #cybersecurity #bug_bounty #hacking
Title: Improper Session Invalidations: When Admin Privileges Linger
════════════════════════
𐀪 Author: Mantosh Sah
════════════════════════
Time: Thu, 26 Feb 2026 09:23:37 GMT
════════════════════════
Tags: #software_developer #bug_bounty #cybersecurity #broken_access_control #privilege_escalation
Title: Understanding Static vs Dynamic Analysis in Mobile Application Penetration Testing
════════════════════════
𐀪 Author: Penetolabspentest
════════════════════════
Time: Thu, 26 Feb 2026 10:19:25 GMT
════════════════════════
Tags: #mobile_security #cybersecurity #certin_empanelled #application_security
Title: Digital Deception and Disruption: Let's Trap some Hackers with Honeypots and Honeynets (MITRE…
════════════════════════
𐀪 Author: Mahdi
════════════════════════
Time: Thu, 26 Feb 2026 10:33:41 GMT
════════════════════════
Tags: #technology #cybersecurity #hacking #infosec #programming