⤷ Title: France’s Visio Migration Transfers Risk, It Does Not Eliminate It
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:47:44 GMT
════════════════════════
⌗ Tags: #infosec #privacy #cybersecurity #europe #technology
════════════════════════
𐀪 Author: Kaynat Muzaffar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:47:44 GMT
════════════════════════
⌗ Tags: #infosec #privacy #cybersecurity #europe #technology
Medium
France’s Visio Migration Transfers Risk, It Does Not Eliminate It
France ditched Teams. Russia built its own internet. Estonia rewired its entire government. Three countries, three outcomes, and one…
⤷ Title: AAA Framework and CA In Simple Language
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:28:52 GMT
════════════════════════
⌗ Tags: #programming #cybersecurity #infosec #information_security #security
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:28:52 GMT
════════════════════════
⌗ Tags: #programming #cybersecurity #infosec #information_security #security
Medium
AAA Framework and CA In Simple Language
AAA framework is one of the fundamentals of IT and security. So understanding this concept is very important for us to improve our…
⤷ Title: 5 Signs Your Credentials Were Stolen This Week, Not Last Year
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:01:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #infosec #data_breach #threat_intelligence
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:01:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #infosec #data_breach #threat_intelligence
Medium
5 Signs Your Credentials Were Stolen This Week, Not Last Year
Old breaches are noise. Fresh stealer logs are danger.
⤷ Title: Digital Footprint
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:13:27 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #osint #tryhackme_writeup #osint_investigation
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:13:27 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #osint #tryhackme_writeup #osint_investigation
Medium
Digital Footprint
Beginner friendly OSINT Challenge
⤷ Title: Cloud Computing Fundamentals
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:12:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #tryhackme_pre_security #cloud_computing
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:12:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #tryhackme_pre_security #cloud_computing
Medium
Cloud Computing Fundamentals
Discover how cloud computing helps businesses move faster, do more, and scale with less effort.
⤷ Title: Artificial Intelligence Certification Course Holi Offer 2026 — Apply Now
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:38:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #artificial_intelligence #cybersecurity #education #ai
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:38:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #artificial_intelligence #cybersecurity #education #ai
Medium
Artificial Intelligence Certification Course Holi Offer 2026 — Apply Now
Why Artificial Intelligence Certifications Matter in 2026
⤷ Title: Day 8 — The Image That Wasn’t an Image (Stored XSS via File Upload)
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:06:23 GMT
════════════════════════
⌗ Tags: #xs #cybersecurity #stored_xss #ethical_hacking #vapt
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:06:23 GMT
════════════════════════
⌗ Tags: #xs #cybersecurity #stored_xss #ethical_hacking #vapt
Medium
🚀 Day 8 — The Image That Wasn’t an Image (Stored XSS via File Upload)
Target Application:
https://github.com/Yavuzlar/VulnLab/tree/main
https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: WAF Bypass and JavaScript Incomplete Handling of Unicode Characters Leading to DOM-XSS
════════════════════════
𐀪 Author: Sushil Chaudhary
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:56:53 GMT
════════════════════════
⌗ Tags: #xs #bug_bounty_writeup
════════════════════════
𐀪 Author: Sushil Chaudhary
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:56:53 GMT
════════════════════════
⌗ Tags: #xs #bug_bounty_writeup
Medium
WAF Bypass and JavaScript Incomplete Handling of Unicode Characters Leading to DOM-XSS
Summary
⤷ Title: Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:05:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:05:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:39:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:39:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Your SaaS App Has an Open Door. Most Founders Never Check It.
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:36:01 GMT
════════════════════════
⌗ Tags: #progressive_web_app #cybersecurity #sass #bug_bounty #api
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:36:01 GMT
════════════════════════
⌗ Tags: #progressive_web_app #cybersecurity #sass #bug_bounty #api
Medium
Your SaaS App Has an Open Door. Most Founders Never Check It.
You built something people actually use.
⤷ Title: User-Controlled External Link Injection in Generated PDF
════════════════════════
𐀪 Author: Abdelrahman Maged
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:24:43 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Abdelrahman Maged
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:24:43 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #penetration_testing
Medium
User-Controlled External Link Injection in Generated PDF
Overview
⤷ Title: What Happens to Your Data After You Delete an App?
════════════════════════
𐀪 Author: Hafizbilaltariq
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:18:28 GMT
════════════════════════
⌗ Tags: #technology #data #google #medium #application_security
════════════════════════
𐀪 Author: Hafizbilaltariq
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:18:28 GMT
════════════════════════
⌗ Tags: #technology #data #google #medium #application_security
Medium
What Happens to Your Data After You Delete an App?
You open your phone. You long-press an app. You tap “Delete.”
⤷ Title: Why an Application Security Audit Is Critical for Protecting Your Digital Assets
════════════════════════
𐀪 Author: SmartCLOUD Australia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:05:57 GMT
════════════════════════
⌗ Tags: #application_security #cloud_app_security #web_app_security #application_audi #app_security
════════════════════════
𐀪 Author: SmartCLOUD Australia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:05:57 GMT
════════════════════════
⌗ Tags: #application_security #cloud_app_security #web_app_security #application_audi #app_security
Medium
Why an Application Security Audit Is Critical for Protecting Your Digital Assets
In today’s fast-moving digital landscape, businesses rely heavily on web and mobile applications to serve customers, manage operations, and…
⤷ Title: Hack Apps While You Browse!!!
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:33:26 GMT
════════════════════════
⌗ Tags: #cyber #cybersecurity #ai #cyber_security_awareness #hacking
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:33:26 GMT
════════════════════════
⌗ Tags: #cyber #cybersecurity #ai #cyber_security_awareness #hacking
Medium
Hack Apps While You Browse!!!
SilentChain AI is what happens when classic web application security meets the new reality of AI driven analysis and high tempo offensive…
⤷ Title: An AI That Can Hack Things Autonomously Is Real. The Hype Around It Is Not.
════════════════════════
𐀪 Author: Hafiq Iqmal
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ai #hacking #software_development #database #pentesting
════════════════════════
𐀪 Author: Hafiq Iqmal
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ai #hacking #software_development #database #pentesting
Medium
An AI That Can Hack Things Autonomously Is Real. The Hype Around It Is Not.
PentAGI is genuinely impressive open-source software. It also requires a human to set it up, configure three databases, provide API keys…
⤷ Title: Writeup for picoCTF challenge “Client-side-again”
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #ctf #hacking #picoctf
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #ctf #hacking #picoctf
Medium
Writeup for picoCTF challenge “Client-side-again”
Analyze obfuscated client-side validation code and learn why obscurity provides no real protection
⤷ Title: 16 hours vs. 300 seconds: How malicious AI renders your security models obsolete
════════════════════════
𐀪 Author: srgg6701
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:47:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #hacking #artificial_intelligence #ux
════════════════════════
𐀪 Author: srgg6701
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:47:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #hacking #artificial_intelligence #ux
Medium
16 hours vs. 300 seconds: How malicious AI renders your security models obsolete
The shift from ‘how’ to ‘what’: How automated malevolence is destroying the intellectual barrier for attackers.
⤷ Title: I’m trying to solve a CTF challenge about finding flags in the server response.
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:36:30 GMT
════════════════════════
⌗ Tags: #ctf #burpsuite #web_exploitation #hacking
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:36:30 GMT
════════════════════════
⌗ Tags: #ctf #burpsuite #web_exploitation #hacking
Medium
I’m trying to solve a CTF challenge about finding flags in the server response.
Here I use the challenge from PicoCTF
⤷ Title: # “AI İnsanları Əvəz Edəcəkmi?
════════════════════════
𐀪 Author: cybershieldy.com
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:34:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber #siber_guvenlik #hacking #hacker
════════════════════════
𐀪 Author: cybershieldy.com
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:34:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber #siber_guvenlik #hacking #hacker
Medium
# “AI İnsanları Əvəz Edəcəkmi?
# AI İnsanları Əvəz Edəcəkmi? 🤖 **Süni İntellekt, İşsizlik və Qlobal Kiber Müharibə (2026)**
⤷ Title: Splunk Enterprise on Windows/Linux: Deploying the Universal Forwarder & Implementing Agentless…
════════════════════════
𐀪 Author: DeshmukhVinit
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:58:06 GMT
════════════════════════
⌗ Tags: #splunk #cybersecurity #siem #networking #infosec
════════════════════════
𐀪 Author: DeshmukhVinit
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:58:06 GMT
════════════════════════
⌗ Tags: #splunk #cybersecurity #siem #networking #infosec
Medium
Splunk Enterprise on Windows/Linux: Deploying the Universal Forwarder & Implementing Agentless…
In this home lab series, I rolled up my sleeves to get Splunk Enterprise and the Universal Forwarder (UF) up and running on Windows and…