⤷ Title: The Neuroscience of Cybercrime: What Makes a Hacker’s Mind Different?
════════════════════════
𐀪 Author: Prisha Patel
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:46:00 GMT
════════════════════════
⌗ Tags: #psychology #cybercrime #neuroscience #hacking #criminal_minds
════════════════════════
𐀪 Author: Prisha Patel
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:46:00 GMT
════════════════════════
⌗ Tags: #psychology #cybercrime #neuroscience #hacking #criminal_minds
Medium
The Neuroscience of Cybercrime: What Makes a Hacker’s Mind Different?
When people imagine a cybercriminal, they often picture a hooded figure typing in a dark room. But researchers in behavioral science and…
⤷ Title: Design of a Remote-Control Trojan Program Suitable for Beginner-Level Information Security Learners
════════════════════════
𐀪 Author: Wisdomapple
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:54:12 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #technology #information_security #python
════════════════════════
𐀪 Author: Wisdomapple
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:54:12 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #technology #information_security #python
Medium
Design of a Remote-Control Trojan Program Suitable for Beginner-Level Information Security Learners
8Design of a Remote-Control Trojan Program Suitable for Beginner-Level Information Security Learners Preface Because information security is an extremely broad field, it is often difficult for …
⤷ Title: VulnNet: Active (THM) Tryhackme Only Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:00:40 GMT
════════════════════════
⌗ Tags: #privilege_escalation #hacking #tryhackme #windows #infrastructure
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:00:40 GMT
════════════════════════
⌗ Tags: #privilege_escalation #hacking #tryhackme #windows #infrastructure
Medium
VulnNet: Active (THM) Tryhackme Only Answer
Denoscription : VulnNet Entertainment just moved their entire infrastructure… Check this out…
⤷ Title: Hacking in 2025
════════════════════════
𐀪 Author: Blogger World
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:56:52 GMT
════════════════════════
⌗ Tags: #growth_hacking #hacking #life_hacking #ethical_hacking #redhat_hacking
════════════════════════
𐀪 Author: Blogger World
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 18:56:52 GMT
════════════════════════
⌗ Tags: #growth_hacking #hacking #life_hacking #ethical_hacking #redhat_hacking
Medium
Hacking in 2025
🔐 Hacking in the AI Era: Understanding Types, Tools, Ethics, and Impacts
⤷ Title: The Worst Wi-Fi Security Advice I Found on Facebook (And Why It’s a Hacker’s Dream)
════════════════════════
𐀪 Author: freerave
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:01:00 GMT
════════════════════════
⌗ Tags: #infosec #technology #cybersecurity #network_security #ethical_hacking
════════════════════════
𐀪 Author: freerave
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:01:00 GMT
════════════════════════
⌗ Tags: #infosec #technology #cybersecurity #network_security #ethical_hacking
Medium
The Worst Wi-Fi Security Advice I Found on Facebook (And Why It’s a Hacker’s Dream)
Why hiding your network and using MAC filtering in 2026 is basically leaving your front door wide open.
⤷ Title: TryHackMe— Linux Strength Training
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:32:04 GMT
════════════════════════
⌗ Tags: #writeup #tryhackme_writeup #tryhackme #ctf_writeup
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:32:04 GMT
════════════════════════
⌗ Tags: #writeup #tryhackme_writeup #tryhackme #ctf_writeup
Medium
TryHackMe— Linux Strength Training
Task 1: Introduction of the room.
Task 2:
Task 2:
⤷ Title: Anonymous — TryHackMe Writeup
════════════════════════
𐀪 Author: Hemantha Krishna Challa
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:24:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #tryhackme_walkthrough #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: Hemantha Krishna Challa
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:24:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf_writeup #tryhackme_walkthrough #tryhackme_writeup #tryhackme
Medium
Anonymous — TryHackMe Writeup
This room is a classic boot-to-root challenge designed for beginners to practice enumeration, exploiting misconfigured services, and…
⤷ Title: TryHackMe — TakeOver
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:06:10 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #writeup
════════════════════════
𐀪 Author: Mahidul Haque
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 19:06:10 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup #writeup
Medium
TryHackMe — TakeOver
Task 1: Help Us
⤷ Title: Lab: Reflected XSS into a JavaScript string with angle brackets HTML encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:16 GMT
════════════════════════
⌗ Tags: #ctf #xss_attack #hacking #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:16 GMT
════════════════════════
⌗ Tags: #ctf #xss_attack #hacking #bug_bounty #cybersecurity
Medium
Lab: Reflected XSS into a JavaScript string with angle brackets HTML encoded
Lab Overview
⤷ Title: Compile-Time XOR String Encryption
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:48:19 GMT
════════════════════════
⌗ Tags: #hackthebox #programming #reverse_engineering #hacking #malware
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:48:19 GMT
════════════════════════
⌗ Tags: #hackthebox #programming #reverse_engineering #hacking #malware
Medium
Compile-Time XOR String Encryption
Welcome to this new Medium post. In this one, I just created a compile-time XOR string encryption implementation in C++ that hides string…
⤷ Title: Hack The Box vs CRTP: Which One Is Actually Better?
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:31:59 GMT
════════════════════════
⌗ Tags: #pentesting #htb #crt_p #hacking #windows
════════════════════════
𐀪 Author: Joshua Goossen
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:31:59 GMT
════════════════════════
⌗ Tags: #pentesting #htb #crt_p #hacking #windows
Medium
Hack The Box vs CRTP: Which One Is Actually Better?
And do these certs even work?
⤷ Title: Pen-testing a Prod H3C Private Environment in 2026: Complete Redacted Findings & Pentester Playbook
════════════════════════
𐀪 Author: suicidal_teddy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:53 GMT
════════════════════════
⌗ Tags: #hacking #writeup #bug_bounty_writeup #ctf_writeup #h3c
════════════════════════
𐀪 Author: suicidal_teddy
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 20:56:53 GMT
════════════════════════
⌗ Tags: #hacking #writeup #bug_bounty_writeup #ctf_writeup #h3c
Medium
Pen-testing a Prod H3C Private Environment in 2026: Complete Redacted Findings & Pentester Playbook
Every vulnerability was discovered during an authorized internal assessment of a modern H3C CAS deployment on UniServer hardware with…
⤷ Title: TryHackMe | Offensive Security Intro | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:42:11 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #tryhackme #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:42:11 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #tryhackme #cybersecurity #tryhackme_writeup #tryhackme_walkthrough
Medium
TryHackMe | Offensive Security Intro | WriteUp
Hack your first website (legally in a safe environment) and experience an ethical hacker’s job.
⤷ Title: HackTheBox | Redeemer | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:41:42 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #htb #hackthebox_writeup #hackthebox #ctf
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 21:41:42 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #htb #hackthebox_writeup #hackthebox #ctf
Medium
HackTheBox | Redeemer | WriteUp
Disclaimer: This writeup is based on a Capture The Flag (CTF) challenge hosted on HackTheBox and it is intended for educational purposes…
⤷ Title: The 50,000-Download Trap: How ‘ambar-src’ Typosquatting Compromised Windows, Linux, and macOS Devs
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:30 +0000
════════════════════════
⌗ Tags: #Malware #ambar_src #Apfell malware #infosec #JavaScript Security #Malicious packages #npm malware #reverse shell #supply chain attack #Tenable Research #Typosquatting
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:30 +0000
════════════════════════
⌗ Tags: #Malware #ambar_src #Apfell malware #infosec #JavaScript Security #Malicious packages #npm malware #reverse shell #supply chain attack #Tenable Research #Typosquatting
Daily CyberSecurity
The 50,000-Download Trap: How 'ambar-src' Typosquatting Compromised Windows, Linux, and macOS Devs
Tenable uncovers "ambar-src," a malicious npm package mimicking "ember-source." It uses preinstall noscripts to deploy reverse shells and Apfell malware.
⤷ Title: The Interview Trap: Malicious Next.js Repositories Weaponize Coding Tests to Hack Developers
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:54 +0000
════════════════════════
⌗ Tags: #Cybercriminals #developer security #infosec #malware #Microsoft Defender #Next.js #npm Security #social engineering #supply chain attack #Technical Interview Scam #VS Code Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:54 +0000
════════════════════════
⌗ Tags: #Cybercriminals #developer security #infosec #malware #Microsoft Defender #Next.js #npm Security #social engineering #supply chain attack #Technical Interview Scam #VS Code Security
Daily CyberSecurity
The Interview Trap: Malicious Next.js Repositories Weaponize Coding Tests to Hack Developers
Microsoft warns of a new campaign targeting engineers via fake Next.js technical assessments. Malware hides in VS Code tasks and npm noscripts to steal secrets.
⤷ Title: Guía de Netcat para Pentesting: Comandos, Reverse Shells y Exfiltración
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #networking #technology #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #networking #technology #cybersecurity #penetration_testing
Medium
Guía de Netcat para Pentesting: Comandos, Reverse Shells y Exfiltración
Domina Netcat para Bug Hunting: desde banners y transferencia de archivos hasta reverse shells y evasión de firewalls.
⤷ Title: Exploiting HTTP request smuggling to bypass front-end security controls, CL.TE vulnerability
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #penetration_testing #pentesting #burpsuite
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 00:06:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #penetration_testing #pentesting #burpsuite
Medium
Exploiting HTTP request smuggling to bypass front-end security controls, CL.TE vulnerability
This writeup demonstrates how to exploit a CL.TE HTTP request smuggling vulnerability to bypass front-end security controls. The…
⤷ Title: Cryptography and Cryptanalysis
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:01:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #cryptography #cybersecurity #cryptography_series #cryptanalysis
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:01:49 GMT
════════════════════════
⌗ Tags: #penetration_testing #cryptography #cybersecurity #cryptography_series #cryptanalysis
Medium
Cryptography and Cryptanalysis
Cryptography in Details Part 2
⤷ Title: Introducing CYBERDUDEBIVASH® Auth Bypass Tester — Premium Edition v1.0.0:
════════════════════════
𐀪 Author: CYBERDUDEBIVASH PVT LTD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 22:58:22 GMT
════════════════════════
⌗ Tags: #cyberdudebivash #auth_bypass #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: CYBERDUDEBIVASH PVT LTD
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 22:58:22 GMT
════════════════════════
⌗ Tags: #cyberdudebivash #auth_bypass #cybersecurity #penetration_testing
Medium
Introducing CYBERDUDEBIVASH® Auth Bypass Tester — Premium Edition v1.0.0:
Daily Threat Intel by CyberDudeBivash
Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks.
Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks.
⤷ Title: CTF Game Zone | TryHackMe
════════════════════════
𐀪 Author: Henrique
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:57:17 GMT
════════════════════════
⌗ Tags: #offensive_security #ctf #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: Henrique
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 23:57:17 GMT
════════════════════════
⌗ Tags: #offensive_security #ctf #tryhackme #tryhackme_walkthrough
Medium
CTF Game Zone | TryHackMe
Máquina: Game Zone Dificuldade: Fácil Plataforma: TryHackMe