⤷ Title: Advent of The Relics 2 — Operation Winter Blackout — HTB
════════════════════════
𐀪 Author: xiel
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 07:00:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #osint #hackthebox_writeup #hackthebox
════════════════════════
𐀪 Author: xiel
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 07:00:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #osint #hackthebox_writeup #hackthebox
Medium
Advent of The Relics 2 — Operation Winter Blackout — HTB
Lab ini adalah lanjutan dari lab sebelumnya (AoTR 1), setelah menyelesaikan lab pertama, terlihat bahwa rangkaian kejadian tidak berhenti…
⤷ Title: Why Some Hackers Choose the Dark Path When They Could Get Paid Legitimately
════════════════════════
𐀪 Author: Travis Ray Caverhill
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 08:16:42 GMT
════════════════════════
⌗ Tags: #grey_hat_hacker #black_hat_hacker #ethical_hacking #cybersecurity #white_hat_hacker
════════════════════════
𐀪 Author: Travis Ray Caverhill
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 08:16:42 GMT
════════════════════════
⌗ Tags: #grey_hat_hacker #black_hat_hacker #ethical_hacking #cybersecurity #white_hat_hacker
Medium
Why Some Hackers Choose the Dark Path When They Could Get Paid Legitimately
From the outside, it looks like a simple decision. On one side sits a legitimate career with certifications, conference badges, and a…
⤷ Title: How AI-Powered Cyber Attacks Are Driving Demand for Ethical Hacking
════════════════════════
𐀪 Author: Francycthomas
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 07:45:00 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Francycthomas
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 07:45:00 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
How AI-Powered Cyber Attacks Are Driving Demand for Ethical Hacking
The rapid growth of Artificial Intelligence (AI) is transforming industries across the world.The future of AI is the most essential part in…
⤷ Title: $1,500 PII Leak via GraphQL Field-Level Permission Bypass
════════════════════════
𐀪 Author: tinopreter
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 08:59:52 GMT
════════════════════════
⌗ Tags: #graphql #hackerone #hacking #bugbounty_writeup #api
════════════════════════
𐀪 Author: tinopreter
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 08:59:52 GMT
════════════════════════
⌗ Tags: #graphql #hackerone #hacking #bugbounty_writeup #api
Medium
$1,500 PII Leak via GraphQL Field-Level Permission Bypass
Akwaaba! I’ve been having some luck with GraphQL API vulnerabilities lately and this would be the first writeup on an incoming series. I…
⤷ Title: Stealth & Control: Mastering Linux Post-Exploitation with the Eden-RAT GUI
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:29:58 +0000
════════════════════════
⌗ Tags: #Open Source Tool #Command Execution #cybersecurity tools 2026 #Eden_RAT #File manager #interactive shell #Linux RAT #Linux Security #Penetration Testing #red teaming #remote access tool
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:29:58 +0000
════════════════════════
⌗ Tags: #Open Source Tool #Command Execution #cybersecurity tools 2026 #Eden_RAT #File manager #interactive shell #Linux RAT #Linux Security #Penetration Testing #red teaming #remote access tool
Penetration Testing Tools
Stealth & Control: Mastering Linux Post-Exploitation with the Eden-RAT GUI
Eden-RAT is a lightweight Linux remote access tool featuring a GUI, file manager, and a powerful interactive shell for seamless command execution.
⤷ Title: The Rogue Peer Threat: CISA Issues Emergency Directive to Thwart Global Cisco SD-WAN Hijacking
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:18:32 +0000
════════════════════════
⌗ Tags: #Vulnerability #CISA #Cisco Catalyst #CVE_2022_20775 #CVE_2026_20127 #Cyber Espionage #Emergency Directive 26_03 #Five Eyes #NCSC #rogue peer #SD_WAN #Tech News 2026 #UAT_8616
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:18:32 +0000
════════════════════════
⌗ Tags: #Vulnerability #CISA #Cisco Catalyst #CVE_2022_20775 #CVE_2026_20127 #Cyber Espionage #Emergency Directive 26_03 #Five Eyes #NCSC #rogue peer #SD_WAN #Tech News 2026 #UAT_8616
Penetration Testing Tools
The Rogue Peer Threat: CISA Issues Emergency Directive to Thwart Global Cisco SD-WAN Hijacking
The offensives targeting Cisco networking infrastructure have reached such a critical magnitude that United States authorities have invoked
⤷ Title: The Chatbot Saboteur: How Claude Was Coerced into a 150GB Heist of Mexican State Intelligence
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:17:04 +0000
════════════════════════
⌗ Tags: #Data Leak #Anthropic #ChatGPT #Claude Opus 4.6 #Data Exfiltration #Gambit Security #Jalisco #Mexico Cyberattack #National Digital Agency #OpenAI #Prompt Engineering #State_Sponsored Hacking #Tech News 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:17:04 +0000
════════════════════════
⌗ Tags: #Data Leak #Anthropic #ChatGPT #Claude Opus 4.6 #Data Exfiltration #Gambit Security #Jalisco #Mexico Cyberattack #National Digital Agency #OpenAI #Prompt Engineering #State_Sponsored Hacking #Tech News 2026
Penetration Testing Tools
The Chatbot Saboteur: How Claude Was Coerced into a 150GB Heist of Mexican State Intelligence
An unidentified adversary manipulated the Claude chatbot, developed by Anthropic, to orchestrate a series of surgical strikes against
⤷ Title: The Spreadsheet Spy: How a Decadelong Chinese Espionage Campaign Hijacked Google Sheets to Bypass Global Defenses
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:15:26 +0000
════════════════════════
⌗ Tags: #Cybercriminals #China_linked APT #Cyber Espionage 2026 #Google Sheets C2 #Google Threat Intelligence #GRIDTIDE #Mandiant #Salt Typhoon #SoftEther VPN #telecommunications espionage #UNC2814 #xapt malware
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:15:26 +0000
════════════════════════
⌗ Tags: #Cybercriminals #China_linked APT #Cyber Espionage 2026 #Google Sheets C2 #Google Threat Intelligence #GRIDTIDE #Mandiant #Salt Typhoon #SoftEther VPN #telecommunications espionage #UNC2814 #xapt malware
Penetration Testing Tools
The Spreadsheet Spy: How a Decadelong Chinese Espionage Campaign Hijacked Google Sheets to Bypass Global Defenses
An international cyber-espionage campaign that languished in the shadows for a decade has abruptly surfaced across dozens of
⤷ Title: Ghost in the Hull: How Ransomware is Paralyzing Global Fleets via Satellite and Shipboard Systems
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:13:56 +0000
════════════════════════
⌗ Tags: #Malware #autonomous ships #CYTUR #CYTUR_TI #maritime cybersecurity #ransomware #satellite security #shipboard control systems #supply chain attack #Tech News 2026 #UR E26 #UR E27
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:13:56 +0000
════════════════════════
⌗ Tags: #Malware #autonomous ships #CYTUR #CYTUR_TI #maritime cybersecurity #ransomware #satellite security #shipboard control systems #supply chain attack #Tech News 2026 #UR E26 #UR E27
Penetration Testing Tools
Ghost in the Hull: How Ransomware is Paralyzing Global Fleets via Satellite and Shipboard Systems
Cyber offensives targeting maritime vessels have transcended the realm of rarity, increasingly precipitating tangible disruptions within global fleet
⤷ Title: Mozilla Crushes 50+ Vulnerabilities in Massive Firefox 148 Security Overhaul
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:12:46 +0000
════════════════════════
⌗ Tags: #Vulnerability #Firefox 148 #JavaScript Engine #JIT Compiler #memory corruption #Mozilla #Sandbox Escape #security update #Tech News 2026 #Thunderbird 148 #WebAssembly #zero_day
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:12:46 +0000
════════════════════════
⌗ Tags: #Vulnerability #Firefox 148 #JavaScript Engine #JIT Compiler #memory corruption #Mozilla #Sandbox Escape #security update #Tech News 2026 #Thunderbird 148 #WebAssembly #zero_day
Penetration Testing Tools
Mozilla Crushes 50+ Vulnerabilities in Massive Firefox 148 Security Overhaul
In the latest iteration of the Firefox browser, developers have mitigated dozens of critical vulnerabilities, many of which
⤷ Title: CrowdStrike’s 2026 Report Warns of the Rise of the “Invisible Adversary”
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:10:57 +0000
════════════════════════
⌗ Tags: #Cybercriminals #AI_augmented phishing #breakout time #cloud security #CrowdStrike #Cyber Espionage #Global Threat Report 2026 #malware_free attacks #supply chain attacks #Tech News 2026 #zero_day vulnerabilities
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:10:57 +0000
════════════════════════
⌗ Tags: #Cybercriminals #AI_augmented phishing #breakout time #cloud security #CrowdStrike #Cyber Espionage #Global Threat Report 2026 #malware_free attacks #supply chain attacks #Tech News 2026 #zero_day vulnerabilities
Penetration Testing Tools
CrowdStrike’s 2026 Report Warns of the Rise of the "Invisible Adversary"
In 2025, cyber adversaries exhibited a meteoric surge in operational velocity, increasingly eschewing traditional malware in favor of
⤷ Title: Critical 9.9 Severity Flaws Expose Centreon Servers to Remote Takeover
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:57:16 +0000
════════════════════════
⌗ Tags: #Vulnerability #Centreon #CLAPI #infosec #IT monitoring #network_security #Patch Alert #Path Traversal #rce #Remote Code Execution
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:57:16 +0000
════════════════════════
⌗ Tags: #Vulnerability #Centreon #CLAPI #infosec #IT monitoring #network_security #Patch Alert #Path Traversal #rce #Remote Code Execution
Daily CyberSecurity
Critical 9.9 Severity Flaws Expose Centreon Servers to Remote Takeover
Centreon issues urgent patches for a 9.9 CVSS path traversal and a 9.1 RCE vulnerability in CLAPI. Secure your monitoring infrastructure—update now!
⤷ Title: The $200 Monthly Employee: Perplexity Computer Unites GPT-5, Opus 4.6, and Gemini into One Autonomous Powerhouse
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:04:32 +0000
════════════════════════
⌗ Tags: #Technology #Agentic AI #AI orchestration #ChatGPT_5.2 #Digital Employee #enterprise AI #Gemini #Nano Banana #Opus 4.6 #Perplexity Computer #Perplexity Max #Tech News 2026 #Veo 3.1
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:04:32 +0000
════════════════════════
⌗ Tags: #Technology #Agentic AI #AI orchestration #ChatGPT_5.2 #Digital Employee #enterprise AI #Gemini #Nano Banana #Opus 4.6 #Perplexity Computer #Perplexity Max #Tech News 2026 #Veo 3.1
Daily CyberSecurity
The $200 Monthly Employee: Perplexity Computer Unites GPT-5, Opus 4.6, and Gemini into One Autonomous Powerhouse
Perplexity Computer Max is here. For $200/month, this "Digital Employee" orchestrates GPT-5.2, Opus 4.6, and Gemini to automate your entire professional workflow.
⤷ Title: From curiosity to critical bugs: Interview with Marc-Oliver Munz (c1phy)
════════════════════════
𐀪 Author: Eleanor Barlow
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:00:00 GMT
════════════════════════
⌗ Tags: #Business Insights
════════════════════════
𐀪 Author: Eleanor Barlow
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 00:00:00 GMT
════════════════════════
⌗ Tags: #Business Insights
Intigriti
From curiosity to critical bugs. Interview with Marc-Oliver Munz
Intigriti recently spoke with Marc-Oliver Munz, an ethical hacker from Germany with a global reach. In this Q&A, learn about his story, his adventures in cybersecurity, the trends he is seeing in the industry, and the importance of curiosity in driving real…
⤷ Title: Lab: Stored XSS into anchor href attribute with double quotes HTML-encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:58:12 GMT
════════════════════════
⌗ Tags: #bug_bounty #ctf #xss_attack #cybersecurity #hacking
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:58:12 GMT
════════════════════════
⌗ Tags: #bug_bounty #ctf #xss_attack #cybersecurity #hacking
Medium
Lab: Stored XSS into anchor href attribute with double quotes HTML-encoded
Lab Overview
⤷ Title: How I Exploited a Race Condition to Bypass Subnoscription Limits
════════════════════════
𐀪 Author: 0xGh4zy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:55:44 GMT
════════════════════════
⌗ Tags: #race_condition #vulnerability #cybersecurity #bug_bounty #hacking
════════════════════════
𐀪 Author: 0xGh4zy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:55:44 GMT
════════════════════════
⌗ Tags: #race_condition #vulnerability #cybersecurity #bug_bounty #hacking
Medium
How I Exploited a Race Condition to Bypass Subnoscription Limits
How I Exploited a Race Condition to Bypass Subnoscription Limits بسم الله ، اللهم علمنا ما ينفعنا و انفعنا بما علمتنا و زدنا بك علما Hello …
⤷ Title: Improper Session Invalidations: When Admin Privileges Linger
════════════════════════
𐀪 Author: Mantosh Sah
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:23:37 GMT
════════════════════════
⌗ Tags: #software_developer #bug_bounty #cybersecurity #broken_access_control #privilege_escalation
════════════════════════
𐀪 Author: Mantosh Sah
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:23:37 GMT
════════════════════════
⌗ Tags: #software_developer #bug_bounty #cybersecurity #broken_access_control #privilege_escalation
Medium
Improper Session Invalidations: When Admin Privileges Linger
As bug hunters, we often focus on obvious vulnerabilities such as XSS and SQLi. But sometimes, the most impactful bugs hide in plain sight…
⤷ Title: Understanding Static vs Dynamic Analysis in Mobile Application Penetration Testing
════════════════════════
𐀪 Author: Penetolabspentest
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:19:25 GMT
════════════════════════
⌗ Tags: #mobile_security #cybersecurity #certin_empanelled #application_security
════════════════════════
𐀪 Author: Penetolabspentest
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:19:25 GMT
════════════════════════
⌗ Tags: #mobile_security #cybersecurity #certin_empanelled #application_security
Medium
Understanding Static vs Dynamic Analysis in Mobile Application Penetration Testing
In the world of Mobile Application Penetration Testing, two powerful approaches shape how vulnerabilities are discovered: static analysis…
⤷ Title: Digital Deception and Disruption: Let's Trap some Hackers with Honeypots and Honeynets (MITRE…
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:33:41 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #infosec #programming
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:33:41 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #infosec #programming
Medium
Digital Deception and Disruption: Let's Trap some Hackers with Honeypots and Honeynets (MITRE…
Let's trap some hackers...
⤷ Title: इंटरनेटवर सुरक्षित कसे राहावे ?
════════════════════════
𐀪 Author: Priyanka Miskin
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:45:10 GMT
════════════════════════
⌗ Tags: #cybercrime #cyberattack #hacking #cybersecurity
════════════════════════
𐀪 Author: Priyanka Miskin
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:45:10 GMT
════════════════════════
⌗ Tags: #cybercrime #cyberattack #hacking #cybersecurity
Medium
इंटरनेटवर सुरक्षित कसे राहावे ?
आजच्या डिजिटल युगात मोबाइलफोन,संगणक ,इंटरनेट हे सर्व अत्यंत महत्वाचे झाले आहेत.ह्यांच्या द्वारे आपण विविध कामे करू शकतो.जसे कि ऑनलाईन…
⤷ Title: France’s Visio Migration Transfers Risk, It Does Not Eliminate It
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:47:44 GMT
════════════════════════
⌗ Tags: #infosec #privacy #cybersecurity #europe #technology
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:47:44 GMT
════════════════════════
⌗ Tags: #infosec #privacy #cybersecurity #europe #technology
Medium
France’s Visio Migration Transfers Risk, It Does Not Eliminate It
France ditched Teams. Russia built its own internet. Estonia rewired its entire government. Three countries, three outcomes, and one…