⤷ Title: Understanding Static vs Dynamic Analysis in Mobile Application Penetration Testing
════════════════════════
𐀪 Author: Penetolabspentest
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:19:25 GMT
════════════════════════
⌗ Tags: #mobile_security #cybersecurity #certin_empanelled #application_security
════════════════════════
𐀪 Author: Penetolabspentest
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:19:25 GMT
════════════════════════
⌗ Tags: #mobile_security #cybersecurity #certin_empanelled #application_security
Medium
Understanding Static vs Dynamic Analysis in Mobile Application Penetration Testing
In the world of Mobile Application Penetration Testing, two powerful approaches shape how vulnerabilities are discovered: static analysis…
⤷ Title: Digital Deception and Disruption: Let's Trap some Hackers with Honeypots and Honeynets (MITRE…
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:33:41 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #infosec #programming
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:33:41 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #hacking #infosec #programming
Medium
Digital Deception and Disruption: Let's Trap some Hackers with Honeypots and Honeynets (MITRE…
Let's trap some hackers...
⤷ Title: इंटरनेटवर सुरक्षित कसे राहावे ?
════════════════════════
𐀪 Author: Priyanka Miskin
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:45:10 GMT
════════════════════════
⌗ Tags: #cybercrime #cyberattack #hacking #cybersecurity
════════════════════════
𐀪 Author: Priyanka Miskin
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:45:10 GMT
════════════════════════
⌗ Tags: #cybercrime #cyberattack #hacking #cybersecurity
Medium
इंटरनेटवर सुरक्षित कसे राहावे ?
आजच्या डिजिटल युगात मोबाइलफोन,संगणक ,इंटरनेट हे सर्व अत्यंत महत्वाचे झाले आहेत.ह्यांच्या द्वारे आपण विविध कामे करू शकतो.जसे कि ऑनलाईन…
⤷ Title: France’s Visio Migration Transfers Risk, It Does Not Eliminate It
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:47:44 GMT
════════════════════════
⌗ Tags: #infosec #privacy #cybersecurity #europe #technology
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:47:44 GMT
════════════════════════
⌗ Tags: #infosec #privacy #cybersecurity #europe #technology
Medium
France’s Visio Migration Transfers Risk, It Does Not Eliminate It
France ditched Teams. Russia built its own internet. Estonia rewired its entire government. Three countries, three outcomes, and one…
⤷ Title: AAA Framework and CA In Simple Language
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:28:52 GMT
════════════════════════
⌗ Tags: #programming #cybersecurity #infosec #information_security #security
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:28:52 GMT
════════════════════════
⌗ Tags: #programming #cybersecurity #infosec #information_security #security
Medium
AAA Framework and CA In Simple Language
AAA framework is one of the fundamentals of IT and security. So understanding this concept is very important for us to improve our…
⤷ Title: 5 Signs Your Credentials Were Stolen This Week, Not Last Year
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:01:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #infosec #data_breach #threat_intelligence
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:01:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #infosec #data_breach #threat_intelligence
Medium
5 Signs Your Credentials Were Stolen This Week, Not Last Year
Old breaches are noise. Fresh stealer logs are danger.
⤷ Title: Digital Footprint
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:13:27 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #osint #tryhackme_writeup #osint_investigation
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:13:27 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #osint #tryhackme_writeup #osint_investigation
Medium
Digital Footprint
Beginner friendly OSINT Challenge
⤷ Title: Cloud Computing Fundamentals
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:12:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #tryhackme_pre_security #cloud_computing
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:12:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #tryhackme_pre_security #cloud_computing
Medium
Cloud Computing Fundamentals
Discover how cloud computing helps businesses move faster, do more, and scale with less effort.
⤷ Title: Artificial Intelligence Certification Course Holi Offer 2026 — Apply Now
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:38:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #artificial_intelligence #cybersecurity #education #ai
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:38:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #artificial_intelligence #cybersecurity #education #ai
Medium
Artificial Intelligence Certification Course Holi Offer 2026 — Apply Now
Why Artificial Intelligence Certifications Matter in 2026
⤷ Title: Day 8 — The Image That Wasn’t an Image (Stored XSS via File Upload)
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:06:23 GMT
════════════════════════
⌗ Tags: #xs #cybersecurity #stored_xss #ethical_hacking #vapt
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:06:23 GMT
════════════════════════
⌗ Tags: #xs #cybersecurity #stored_xss #ethical_hacking #vapt
Medium
🚀 Day 8 — The Image That Wasn’t an Image (Stored XSS via File Upload)
Target Application:
https://github.com/Yavuzlar/VulnLab/tree/main
https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: WAF Bypass and JavaScript Incomplete Handling of Unicode Characters Leading to DOM-XSS
════════════════════════
𐀪 Author: Sushil Chaudhary
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:56:53 GMT
════════════════════════
⌗ Tags: #xs #bug_bounty_writeup
════════════════════════
𐀪 Author: Sushil Chaudhary
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:56:53 GMT
════════════════════════
⌗ Tags: #xs #bug_bounty_writeup
Medium
WAF Bypass and JavaScript Incomplete Handling of Unicode Characters Leading to DOM-XSS
Summary
⤷ Title: Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:05:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:05:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:39:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:39:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Your SaaS App Has an Open Door. Most Founders Never Check It.
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:36:01 GMT
════════════════════════
⌗ Tags: #progressive_web_app #cybersecurity #sass #bug_bounty #api
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:36:01 GMT
════════════════════════
⌗ Tags: #progressive_web_app #cybersecurity #sass #bug_bounty #api
Medium
Your SaaS App Has an Open Door. Most Founders Never Check It.
You built something people actually use.
⤷ Title: User-Controlled External Link Injection in Generated PDF
════════════════════════
𐀪 Author: Abdelrahman Maged
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:24:43 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Abdelrahman Maged
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:24:43 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #penetration_testing
Medium
User-Controlled External Link Injection in Generated PDF
Overview
⤷ Title: What Happens to Your Data After You Delete an App?
════════════════════════
𐀪 Author: Hafizbilaltariq
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:18:28 GMT
════════════════════════
⌗ Tags: #technology #data #google #medium #application_security
════════════════════════
𐀪 Author: Hafizbilaltariq
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:18:28 GMT
════════════════════════
⌗ Tags: #technology #data #google #medium #application_security
Medium
What Happens to Your Data After You Delete an App?
You open your phone. You long-press an app. You tap “Delete.”
⤷ Title: Why an Application Security Audit Is Critical for Protecting Your Digital Assets
════════════════════════
𐀪 Author: SmartCLOUD Australia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:05:57 GMT
════════════════════════
⌗ Tags: #application_security #cloud_app_security #web_app_security #application_audi #app_security
════════════════════════
𐀪 Author: SmartCLOUD Australia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:05:57 GMT
════════════════════════
⌗ Tags: #application_security #cloud_app_security #web_app_security #application_audi #app_security
Medium
Why an Application Security Audit Is Critical for Protecting Your Digital Assets
In today’s fast-moving digital landscape, businesses rely heavily on web and mobile applications to serve customers, manage operations, and…
⤷ Title: Hack Apps While You Browse!!!
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:33:26 GMT
════════════════════════
⌗ Tags: #cyber #cybersecurity #ai #cyber_security_awareness #hacking
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:33:26 GMT
════════════════════════
⌗ Tags: #cyber #cybersecurity #ai #cyber_security_awareness #hacking
Medium
Hack Apps While You Browse!!!
SilentChain AI is what happens when classic web application security meets the new reality of AI driven analysis and high tempo offensive…
⤷ Title: An AI That Can Hack Things Autonomously Is Real. The Hype Around It Is Not.
════════════════════════
𐀪 Author: Hafiq Iqmal
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ai #hacking #software_development #database #pentesting
════════════════════════
𐀪 Author: Hafiq Iqmal
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ai #hacking #software_development #database #pentesting
Medium
An AI That Can Hack Things Autonomously Is Real. The Hype Around It Is Not.
PentAGI is genuinely impressive open-source software. It also requires a human to set it up, configure three databases, provide API keys…
⤷ Title: Writeup for picoCTF challenge “Client-side-again”
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #ctf #hacking #picoctf
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #ctf #hacking #picoctf
Medium
Writeup for picoCTF challenge “Client-side-again”
Analyze obfuscated client-side validation code and learn why obscurity provides no real protection
⤷ Title: 16 hours vs. 300 seconds: How malicious AI renders your security models obsolete
════════════════════════
𐀪 Author: srgg6701
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:47:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #hacking #artificial_intelligence #ux
════════════════════════
𐀪 Author: srgg6701
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:47:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #hacking #artificial_intelligence #ux
Medium
16 hours vs. 300 seconds: How malicious AI renders your security models obsolete
The shift from ‘how’ to ‘what’: How automated malevolence is destroying the intellectual barrier for attackers.