⤷ Title: Beyond the Search Bar: How the Agentic Threat Hunting Framework (ATHF) Makes Your Security Program AI-Ready
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:11:18 +0000
════════════════════════
⌗ Tags: #Open Source Tool #Agentic Threat Hunting Framework #AI Threat Hunting #ATHF #cybersecurity automation #EDR optimization #LOCK pattern #PEAK methodology #SIEM integration #TaHiTI framework #threat intelligence 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:11:18 +0000
════════════════════════
⌗ Tags: #Open Source Tool #Agentic Threat Hunting Framework #AI Threat Hunting #ATHF #cybersecurity automation #EDR optimization #LOCK pattern #PEAK methodology #SIEM integration #TaHiTI framework #threat intelligence 2026
Penetration Testing Tools
Beyond the Search Bar: How the Agentic Threat Hunting Framework (ATHF) Makes Your Security Program AI-Ready
The Agentic Threat Hunting Framework (ATHF) adds a persistent memory layer to your hunts. Use the LOCK pattern to bridge the gap between human expertise and AI.
⤷ Title: Digital Deception: OpenAI Exposes “Operation Date Bait” and the Rise of AI-Powered Scams
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:07:20 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cambodia scam syndicates #ChatGPT misuse #Cyber Espionage #OpenAI #Operation Date Bait #Operation False Witness #romance scams #Silver Lining Playbook #Tech News 2026 #threat intelligence 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:07:20 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cambodia scam syndicates #ChatGPT misuse #Cyber Espionage #OpenAI #Operation Date Bait #Operation False Witness #romance scams #Silver Lining Playbook #Tech News 2026 #threat intelligence 2026
Penetration Testing Tools
Digital Deception: OpenAI Exposes "Operation Date Bait" and the Rise of AI-Powered Scams
Fraudsters, propagandists, and state security apparatuses are increasingly co-opting language models—eschewing benign amusement in favor of extorting wealth
⤷ Title: The Illusion of Isolation: “AirSnitch” Researchers Reveal How to Hijack Wi-Fi Peers Across Any Network
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:04:36 +0000
════════════════════════
⌗ Tags: #Vulnerability #AirSnitch #client isolation #GTK abuse #MAC spoofing #man_in_the_middle #Mathy Vanhoef #NDSS 2026 #Tech News 2026 #University of California Riverside #Wi_Fi security #WPA2_Enterprise
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:04:36 +0000
════════════════════════
⌗ Tags: #Vulnerability #AirSnitch #client isolation #GTK abuse #MAC spoofing #man_in_the_middle #Mathy Vanhoef #NDSS 2026 #Tech News 2026 #University of California Riverside #Wi_Fi security #WPA2_Enterprise
Penetration Testing Tools
The Illusion of Isolation: "AirSnitch" Researchers Reveal How to Hijack Wi-Fi Peers Across Any Network
For a long time, Wi-Fi with enabled client isolation was deemed a steadfast bastion against lateral network intrusions.
⤷ Title: The Patch Paradox: Claude Code Finds 500 Flaws, but Can the Open-Source World Survive the Noise?
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:02:30 +0000
════════════════════════
⌗ Tags: #Vulnerability #Anthropic #Claude Code Security #Claude Opus 4.6 #CVE backlog #false positives #Guy Azari #National Vulnerability Database #open source security #Socket #Tech News 2026 #vulnerability management
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:02:30 +0000
════════════════════════
⌗ Tags: #Vulnerability #Anthropic #Claude Code Security #Claude Opus 4.6 #CVE backlog #false positives #Guy Azari #National Vulnerability Database #open source security #Socket #Tech News 2026 #vulnerability management
Penetration Testing Tools
The Patch Paradox: Claude Code Finds 500 Flaws, but Can the Open-Source World Survive the Noise?
Last week, Anthropic proudly unveiled its novel Claude Code Security feature—an instrument empowering security factions to unearth and
⤷ Title: Sekolah Menengah Atas dengan Jurusan Keamanan Siber, Apakah Telah Tersedia?
════════════════════════
𐀪 Author: Ali Ridlo
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:37:52 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #ethical_hacking #hacking #cybersecurity
════════════════════════
𐀪 Author: Ali Ridlo
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:37:52 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #ethical_hacking #hacking #cybersecurity
Medium
Sekolah Menengah Atas dengan Jurusan Keamanan Siber, Apakah Telah Tersedia?
Beberapa tahun yang lalu, menjadi seorang hacker mungkin dianggap seperti cerita di film. Sekarang, keamanan siber menjadi salah satu…
⤷ Title: Investigasi Forensik Digital: Membongkar Forum Kriminal Dalam Operasi Winter Blackout
════════════════════════
𐀪 Author: Donysetyon
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:06:00 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #threat_intelligence #digital_forensics #infosec
════════════════════════
𐀪 Author: Donysetyon
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:06:00 GMT
════════════════════════
⌗ Tags: #osint #cybersecurity #threat_intelligence #digital_forensics #infosec
Medium
Investigasi Forensik Digital: Membongkar Forum Kriminal Dalam Operasi Winter Blackout
Kategori: Forensik Digital & OSINT Tingkat Kesulitan: Mudah Estimasi Waktu Baca: 8–10 menit
⤷ Title: I Checked 10 Random Companies for Leaked Credentials. All 10 Were Exposed.
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:01:04 GMT
════════════════════════
⌗ Tags: #threat_intelligence #infosec #cybersecurity #data_breach #technology
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:01:04 GMT
════════════════════════
⌗ Tags: #threat_intelligence #infosec #cybersecurity #data_breach #technology
Medium
I Checked 10 Random Companies for Leaked Credentials. All 10 Were Exposed.
I picked 10 random mid-sized companies. Tech, finance, retail, healthcare. No specific criteria.
⤷ Title: Web Penetration Testing’e Giriş: Temel Kavramlar
════════════════════════
𐀪 Author: Berre Zehra
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 10:13:01 GMT
════════════════════════
⌗ Tags: #penetration_testing #ctf #cybersecurity #web_security_testing #web_vulnerabilities
════════════════════════
𐀪 Author: Berre Zehra
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 10:13:01 GMT
════════════════════════
⌗ Tags: #penetration_testing #ctf #cybersecurity #web_security_testing #web_vulnerabilities
Medium
Web Penetration Testing’e Giriş: Temel Kavramlar
Web güvenliği öğrenmeye başladığınızda karşınıza çok sayıda yeni terim çıkıyor. Vulnerability, exploit, payload, session, authentication…
⤷ Title: How to Connect & Use Burp MCP with Antigravity?
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:52:32 GMT
════════════════════════
⌗ Tags: #security_research #burpsuite #cybersecurity #google_antigravity #penetration_testing
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:52:32 GMT
════════════════════════
⌗ Tags: #security_research #burpsuite #cybersecurity #google_antigravity #penetration_testing
Medium
How to Connect & Use Burp MCP with Antigravity?
Complete guide to using Burp MCP with AI tools.
⤷ Title: ️ Leveling Up: Web Security Essentials
════════════════════════
𐀪 Author: Chamith Sirisena
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 10:49:14 GMT
════════════════════════
⌗ Tags: #tryhackme #web_security #cybersecurity
════════════════════════
𐀪 Author: Chamith Sirisena
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 10:49:14 GMT
════════════════════════
⌗ Tags: #tryhackme #web_security #cybersecurity
Medium
🛡️ Leveling Up: Web Security Essentials
Hello, cyber-enthusiasts! Today, I’m taking a look at the Web Security Essentials room on TryHackMe. As we move away from desktop apps…
⤷ Title: Operating System Security
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:51:57 GMT
════════════════════════
⌗ Tags: #security_operations #tryhackme #tryhackme_pre_security #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: THM{0x416469747961204D6163686972616A75}
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:51:57 GMT
════════════════════════
⌗ Tags: #security_operations #tryhackme #tryhackme_pre_security #tryhackme_walkthrough #tryhackme_writeup
Medium
Operating System Security
This room introduces users to operating system security and demonstrates SSH authentication on Linux.
⤷ Title: Mr. Phisher | TryHackMe Write-up
════════════════════════
𐀪 Author: iIyas
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:31:00 GMT
════════════════════════
⌗ Tags: #tryhackme #vba_macros #phishing #ctf #cybersecurity
════════════════════════
𐀪 Author: iIyas
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:31:00 GMT
════════════════════════
⌗ Tags: #tryhackme #vba_macros #phishing #ctf #cybersecurity
Medium
Mr. Phisher | TryHackMe Write-up
Hi everyone,
⤷ Title: TryHackMe Inside a Computer System writup
════════════════════════
𐀪 Author: ayed djalil
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:06:09 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: ayed djalil
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:06:09 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_walkthrough #tryhackme_writeup
Medium
TryHackMe Inside a Computer System writup
This room covers the basic components of a computer system.
⤷ Title: Carlos Didn’t Make a Mistake. The AI Did………..
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:17:56 GMT
════════════════════════
⌗ Tags: #llm #artificial_intelligence #ethical_hacking #web_security #cybersecurity
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:17:56 GMT
════════════════════════
⌗ Tags: #llm #artificial_intelligence #ethical_hacking #web_security #cybersecurity
Medium
Carlos Didn’t Make a Mistake. The AI Did………..
By Tejas Saubhage | PortSwigger Lab Walkthrough
⤷ Title: API SECURITY CONTROLS-Part5
════════════════════════
𐀪 Author: crązŷrąiɲ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 10:30:42 GMT
════════════════════════
⌗ Tags: #api_security
════════════════════════
𐀪 Author: crązŷrąiɲ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 10:30:42 GMT
════════════════════════
⌗ Tags: #api_security
Medium
API SECURITY CONTROLS-Part5
Integration Patterns & Architecture
⤷ Title: API SECURITY CONTROLS-Part4
════════════════════════
𐀪 Author: crązŷrąiɲ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 10:29:44 GMT
════════════════════════
⌗ Tags: #api_security
════════════════════════
𐀪 Author: crązŷrąiɲ
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 10:29:44 GMT
════════════════════════
⌗ Tags: #api_security
Medium
API SECURITY CONTROLS-Part4
API Gateways
⤷ Title: HTB: Era
════════════════════════
𐀪 Author: bluesnow
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:30:45 GMT
════════════════════════
⌗ Tags: #signature_section #cronjob #rce #php_wrappers #idor
════════════════════════
𐀪 Author: bluesnow
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:30:45 GMT
════════════════════════
⌗ Tags: #signature_section #cronjob #rce #php_wrappers #idor
Medium
HTB: Era
| Subdomain | IDOR | SQLite | SSH2.exec:// PHP Stream Wrapper | RCE | Cron Job | .text_sig Signature |
⤷ Title: WP-Hunter: Smarter WordPress Recon with Heuristic Scoring + Semgrep SAST
════════════════════════
𐀪 Author: Ali Sünbül (xeloxa)
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:23:38 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #wordpress #cybersecurity #static_code_analysis #ai
════════════════════════
𐀪 Author: Ali Sünbül (xeloxa)
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 09:23:38 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #wordpress #cybersecurity #static_code_analysis #ai
Medium
WP-Hunter: Smarter WordPress Recon with Heuristic Scoring + Semgrep SAST
Github: https://github.com/xeloxa/wp-hunter
⤷ Title: Hackers Use 1Campaign to Hide Malicious Ads From Google Reviewers
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 11:16:11 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #Scams and Fraud #1Campaign #Cloaking #Google #Google Ads #Malvertising #Phishing Kit #Varonis
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 11:16:11 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #Scams and Fraud #1Campaign #Cloaking #Google #Google Ads #Malvertising #Phishing Kit #Varonis
Hackread
Hackers Use 1Campaign to Hide Malicious Ads From Google Reviewers
Follow us on all social media @Hackread
⤷ Title: Understanding IDOR (Insecure Direct Object Reference)
════════════════════════
𐀪 Author: Mansi Sharma
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:45:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #web_security #vapt
════════════════════════
𐀪 Author: Mansi Sharma
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:45:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #infosec #web_security #vapt
Medium
Understanding IDOR (Insecure Direct Object Reference)
🔐 Introduction
⤷ Title: Crack the Gate 2 — picoCTF Writeup
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:33:57 GMT
════════════════════════
⌗ Tags: #hacking #ctf_writeup #ctf #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 12:33:57 GMT
════════════════════════
⌗ Tags: #hacking #ctf_writeup #ctf #cybersecurity #bug_bounty
Medium
Crack the Gate 2 — picoCTF Writeup
Challenge Denoscription