Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Critical 9.9 Severity Flaws Expose Centreon Servers to Remote Takeover
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 09:57:16 +0000
════════════════════════
Tags: #Vulnerability #Centreon #CLAPI #infosec #IT monitoring #network_security #Patch Alert #Path Traversal #rce #Remote Code Execution
Title: The $200 Monthly Employee: Perplexity Computer Unites GPT-5, Opus 4.6, and Gemini into One Autonomous Powerhouse
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Thu, 26 Feb 2026 09:04:32 +0000
════════════════════════
Tags: #Technology #Agentic AI #AI orchestration #ChatGPT_5.2 #Digital Employee #enterprise AI #Gemini #Nano Banana #Opus 4.6 #Perplexity Computer #Perplexity Max #Tech News 2026 #Veo 3.1
Title: From curiosity to critical bugs: Interview with Marc-Oliver Munz (c1phy)
════════════════════════
𐀪 Author: Eleanor Barlow
════════════════════════
Time: Thu, 26 Feb 2026 00:00:00 GMT
════════════════════════
Tags: #Business Insights
Title: Lab: Stored XSS into anchor href attribute with double quotes HTML-encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
Time: Thu, 26 Feb 2026 09:58:12 GMT
════════════════════════
Tags: #bug_bounty #ctf #xss_attack #cybersecurity #hacking
Title: How I Exploited a Race Condition to Bypass Subnoscription Limits
════════════════════════
𐀪 Author: 0xGh4zy
════════════════════════
Time: Thu, 26 Feb 2026 09:55:44 GMT
════════════════════════
Tags: #race_condition #vulnerability #cybersecurity #bug_bounty #hacking
Title: Improper Session Invalidations: When Admin Privileges Linger
════════════════════════
𐀪 Author: Mantosh Sah
════════════════════════
Time: Thu, 26 Feb 2026 09:23:37 GMT
════════════════════════
Tags: #software_developer #bug_bounty #cybersecurity #broken_access_control #privilege_escalation
Title: Understanding Static vs Dynamic Analysis in Mobile Application Penetration Testing
════════════════════════
𐀪 Author: Penetolabspentest
════════════════════════
Time: Thu, 26 Feb 2026 10:19:25 GMT
════════════════════════
Tags: #mobile_security #cybersecurity #certin_empanelled #application_security
Title: Digital Deception and Disruption: Let's Trap some Hackers with Honeypots and Honeynets (MITRE…
════════════════════════
𐀪 Author: Mahdi
════════════════════════
Time: Thu, 26 Feb 2026 10:33:41 GMT
════════════════════════
Tags: #technology #cybersecurity #hacking #infosec #programming
Title: France’s Visio Migration Transfers Risk, It Does Not Eliminate It
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
Time: Thu, 26 Feb 2026 10:47:44 GMT
════════════════════════
Tags: #infosec #privacy #cybersecurity #europe #technology
Title: AAA Framework and CA In Simple Language
════════════════════════
𐀪 Author: Mahdi
════════════════════════
Time: Thu, 26 Feb 2026 10:28:52 GMT
════════════════════════
Tags: #programming #cybersecurity #infosec #information_security #security
Title: 5 Signs Your Credentials Were Stolen This Week, Not Last Year
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
Time: Thu, 26 Feb 2026 09:01:00 GMT
════════════════════════
Tags: #cybersecurity #technology #infosec #data_breach #threat_intelligence
Title: Digital Footprint
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
Time: Thu, 26 Feb 2026 09:13:27 GMT
════════════════════════
Tags: #tryhackme_walkthrough #tryhackme #osint #tryhackme_writeup #osint_investigation
Title: Cloud Computing Fundamentals
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
Time: Thu, 26 Feb 2026 09:12:59 GMT
════════════════════════
Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #tryhackme_pre_security #cloud_computing
Title: Artificial Intelligence Certification Course Holi Offer 2026 — Apply Now
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
Time: Thu, 26 Feb 2026 09:38:16 GMT
════════════════════════
Tags: #ethical_hacking #artificial_intelligence #cybersecurity #education #ai
Title: Day 8 — The Image That Wasn’t an Image (Stored XSS via File Upload)
════════════════════════
𐀪 Author: Issan
════════════════════════
Time: Thu, 26 Feb 2026 09:06:23 GMT
════════════════════════
Tags: #xs #cybersecurity #stored_xss #ethical_hacking #vapt
Title: WAF Bypass and JavaScript Incomplete Handling of Unicode Characters Leading to DOM-XSS
════════════════════════
𐀪 Author: Sushil Chaudhary
════════════════════════
Time: Thu, 26 Feb 2026 10:56:53 GMT
════════════════════════
Tags: #xs #bug_bounty_writeup
Title: Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Thu, 26 Feb 2026 16:05:00 +0530
════════════════════════
Tags: No_Tags
Title: Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Thu, 26 Feb 2026 15:39:00 +0530
════════════════════════
Tags: No_Tags
Title: Your SaaS App Has an Open Door. Most Founders Never Check It.
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
Time: Thu, 26 Feb 2026 12:36:01 GMT
════════════════════════
Tags: #progressive_web_app #cybersecurity #sass #bug_bounty #api
Title: User-Controlled External Link Injection in Generated PDF
════════════════════════
𐀪 Author: Abdelrahman Maged
════════════════════════
Time: Thu, 26 Feb 2026 11:24:43 GMT
════════════════════════
Tags: #bug_bounty #cybersecurity #penetration_testing