⤷ Title: Digital Footprint
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:13:27 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #osint #tryhackme_writeup #osint_investigation
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:13:27 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #osint #tryhackme_writeup #osint_investigation
Medium
Digital Footprint
Beginner friendly OSINT Challenge
⤷ Title: Cloud Computing Fundamentals
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:12:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #tryhackme_pre_security #cloud_computing
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:12:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #tryhackme #tryhackme_pre_security #cloud_computing
Medium
Cloud Computing Fundamentals
Discover how cloud computing helps businesses move faster, do more, and scale with less effort.
⤷ Title: Artificial Intelligence Certification Course Holi Offer 2026 — Apply Now
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:38:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #artificial_intelligence #cybersecurity #education #ai
════════════════════════
𐀪 Author: cyber security Updates
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:38:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #artificial_intelligence #cybersecurity #education #ai
Medium
Artificial Intelligence Certification Course Holi Offer 2026 — Apply Now
Why Artificial Intelligence Certifications Matter in 2026
⤷ Title: Day 8 — The Image That Wasn’t an Image (Stored XSS via File Upload)
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:06:23 GMT
════════════════════════
⌗ Tags: #xs #cybersecurity #stored_xss #ethical_hacking #vapt
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 09:06:23 GMT
════════════════════════
⌗ Tags: #xs #cybersecurity #stored_xss #ethical_hacking #vapt
Medium
🚀 Day 8 — The Image That Wasn’t an Image (Stored XSS via File Upload)
Target Application:
https://github.com/Yavuzlar/VulnLab/tree/main
https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: WAF Bypass and JavaScript Incomplete Handling of Unicode Characters Leading to DOM-XSS
════════════════════════
𐀪 Author: Sushil Chaudhary
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:56:53 GMT
════════════════════════
⌗ Tags: #xs #bug_bounty_writeup
════════════════════════
𐀪 Author: Sushil Chaudhary
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 10:56:53 GMT
════════════════════════
⌗ Tags: #xs #bug_bounty_writeup
Medium
WAF Bypass and JavaScript Incomplete Handling of Unicode Characters Leading to DOM-XSS
Summary
⤷ Title: Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:05:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 16:05:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:39:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 15:39:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Your SaaS App Has an Open Door. Most Founders Never Check It.
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:36:01 GMT
════════════════════════
⌗ Tags: #progressive_web_app #cybersecurity #sass #bug_bounty #api
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:36:01 GMT
════════════════════════
⌗ Tags: #progressive_web_app #cybersecurity #sass #bug_bounty #api
Medium
Your SaaS App Has an Open Door. Most Founders Never Check It.
You built something people actually use.
⤷ Title: User-Controlled External Link Injection in Generated PDF
════════════════════════
𐀪 Author: Abdelrahman Maged
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:24:43 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Abdelrahman Maged
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:24:43 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #penetration_testing
Medium
User-Controlled External Link Injection in Generated PDF
Overview
⤷ Title: What Happens to Your Data After You Delete an App?
════════════════════════
𐀪 Author: Hafizbilaltariq
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:18:28 GMT
════════════════════════
⌗ Tags: #technology #data #google #medium #application_security
════════════════════════
𐀪 Author: Hafizbilaltariq
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:18:28 GMT
════════════════════════
⌗ Tags: #technology #data #google #medium #application_security
Medium
What Happens to Your Data After You Delete an App?
You open your phone. You long-press an app. You tap “Delete.”
⤷ Title: Why an Application Security Audit Is Critical for Protecting Your Digital Assets
════════════════════════
𐀪 Author: SmartCLOUD Australia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:05:57 GMT
════════════════════════
⌗ Tags: #application_security #cloud_app_security #web_app_security #application_audi #app_security
════════════════════════
𐀪 Author: SmartCLOUD Australia
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:05:57 GMT
════════════════════════
⌗ Tags: #application_security #cloud_app_security #web_app_security #application_audi #app_security
Medium
Why an Application Security Audit Is Critical for Protecting Your Digital Assets
In today’s fast-moving digital landscape, businesses rely heavily on web and mobile applications to serve customers, manage operations, and…
⤷ Title: Hack Apps While You Browse!!!
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:33:26 GMT
════════════════════════
⌗ Tags: #cyber #cybersecurity #ai #cyber_security_awareness #hacking
════════════════════════
𐀪 Author: cybrNK
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:33:26 GMT
════════════════════════
⌗ Tags: #cyber #cybersecurity #ai #cyber_security_awareness #hacking
Medium
Hack Apps While You Browse!!!
SilentChain AI is what happens when classic web application security meets the new reality of AI driven analysis and high tempo offensive…
⤷ Title: An AI That Can Hack Things Autonomously Is Real. The Hype Around It Is Not.
════════════════════════
𐀪 Author: Hafiq Iqmal
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ai #hacking #software_development #database #pentesting
════════════════════════
𐀪 Author: Hafiq Iqmal
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ai #hacking #software_development #database #pentesting
Medium
An AI That Can Hack Things Autonomously Is Real. The Hype Around It Is Not.
PentAGI is genuinely impressive open-source software. It also requires a human to set it up, configure three databases, provide API keys…
⤷ Title: Writeup for picoCTF challenge “Client-side-again”
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #ctf #hacking #picoctf
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #ctf_writeup #cybersecurity #ctf #hacking #picoctf
Medium
Writeup for picoCTF challenge “Client-side-again”
Analyze obfuscated client-side validation code and learn why obscurity provides no real protection
⤷ Title: 16 hours vs. 300 seconds: How malicious AI renders your security models obsolete
════════════════════════
𐀪 Author: srgg6701
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:47:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #hacking #artificial_intelligence #ux
════════════════════════
𐀪 Author: srgg6701
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:47:11 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #hacking #artificial_intelligence #ux
Medium
16 hours vs. 300 seconds: How malicious AI renders your security models obsolete
The shift from ‘how’ to ‘what’: How automated malevolence is destroying the intellectual barrier for attackers.
⤷ Title: I’m trying to solve a CTF challenge about finding flags in the server response.
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:36:30 GMT
════════════════════════
⌗ Tags: #ctf #burpsuite #web_exploitation #hacking
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:36:30 GMT
════════════════════════
⌗ Tags: #ctf #burpsuite #web_exploitation #hacking
Medium
I’m trying to solve a CTF challenge about finding flags in the server response.
Here I use the challenge from PicoCTF
⤷ Title: # “AI İnsanları Əvəz Edəcəkmi?
════════════════════════
𐀪 Author: cybershieldy.com
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:34:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber #siber_guvenlik #hacking #hacker
════════════════════════
𐀪 Author: cybershieldy.com
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:34:30 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber #siber_guvenlik #hacking #hacker
Medium
# “AI İnsanları Əvəz Edəcəkmi?
# AI İnsanları Əvəz Edəcəkmi? 🤖 **Süni İntellekt, İşsizlik və Qlobal Kiber Müharibə (2026)**
⤷ Title: Splunk Enterprise on Windows/Linux: Deploying the Universal Forwarder & Implementing Agentless…
════════════════════════
𐀪 Author: DeshmukhVinit
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:58:06 GMT
════════════════════════
⌗ Tags: #splunk #cybersecurity #siem #networking #infosec
════════════════════════
𐀪 Author: DeshmukhVinit
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:58:06 GMT
════════════════════════
⌗ Tags: #splunk #cybersecurity #siem #networking #infosec
Medium
Splunk Enterprise on Windows/Linux: Deploying the Universal Forwarder & Implementing Agentless…
In this home lab series, I rolled up my sleeves to get Splunk Enterprise and the Universal Forwarder (UF) up and running on Windows and…
⤷ Title: Large-Scale Online Deanonymization with LLMs (Language Models Becoming Privacy Threats)
════════════════════════
𐀪 Author: J.C. James
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:53:32 GMT
════════════════════════
⌗ Tags: #cybersecurity #large_language_models #infosec #ai
════════════════════════
𐀪 Author: J.C. James
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:53:32 GMT
════════════════════════
⌗ Tags: #cybersecurity #large_language_models #infosec #ai
Medium
Large-Scale Online Deanonymization with LLMs (Language Models Becoming Privacy Threats)
You know that feeling of safety you get posting under a pseudonym? That quiet confidence that your throwaway Reddit account, your forum…
⤷ Title: 7 Bulletproof Secure AI Pentesting Workflows
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:22:08 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #devsecops #cybersecurity #penetration_testing #llm
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:22:08 GMT
════════════════════════
⌗ Tags: #artificial_intelligence #devsecops #cybersecurity #penetration_testing #llm
Medium
7 Bulletproof Secure AI Pentesting Workflows
Hardening LLM-Powered Testing and Ops Pipelines
⤷ Title: The Digital Backbone: A Deep Dive into the OSI Model
════════════════════════
𐀪 Author: Hanaa Abdelghafar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:36:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #networking #osi_model #tryhackme
════════════════════════
𐀪 Author: Hanaa Abdelghafar
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 11:36:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #networking #osi_model #tryhackme
Medium
The Digital Backbone: A Deep Dive into the OSI Model
The Digital Backbone: A Deep Dive into the OSI Model Why I Started with the OSI Model ?! In my journey as an IT and Project Management student, and while developing HanComply, I’ve realized …