⤷ Title: CVE-2025–55182 (React2Shell): Vulnerable Docker Container with Deep-Dive Detection/Exploitation…
════════════════════════
𐀪 Author: Josh Beck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:08:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #docker #react #ctf
════════════════════════
𐀪 Author: Josh Beck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:08:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #docker #react #ctf
Medium
CVE-2025–55182 (React2Shell): Vulnerable Docker Container with Deep-Dive Detection/Exploitation…
Docker Container with Walkthrough:
⤷ Title: Exploiting an Exported Android Activity via Intent Injection
════════════════════════
𐀪 Author: Bharathkannan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:50:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_writeup #hacking #android_pentesting
════════════════════════
𐀪 Author: Bharathkannan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:50:24 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_writeup #hacking #android_pentesting
Medium
Exploiting an Exported Android Activity via Intent Injection
Android applications often rely on Intents for communication between components. While this mechanism is powerful, improper handling of…
⤷ Title: ⏱️️ Timelapse — One Certificate. Full Compromise
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:52:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #bug_bounty_tips #ethical_hacking
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:52:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #hacking #bug_bounty_tips #ethical_hacking
Medium
⏱️🕷️ Timelapse — One Certificate. Full Compromise
We’re still on that CRTP learning train — getting reps in and sharpening the process. This time I’m practicing on a box from Hack The Box.
⤷ Title: How the Xbox Was Hacked in the 2000s — And Why the Lessons Still Matter Today
════════════════════════
𐀪 Author: Cordula Boeck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:35:35 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #hacking
════════════════════════
𐀪 Author: Cordula Boeck
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:35:35 GMT
════════════════════════
⌗ Tags: #cybercrime #cybersecurity #hacking
Medium
How the Xbox Was Hacked in the 2000s — And Why the Lessons Still Matter Today
One of the most surprising lessons from the history of console hacks is this: attackers do not always need sophisticated malware or…
⤷ Title: TryHackMe | Compiled — Write-Up
════════════════════════
𐀪 Author: GHOST PORT
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:06:57 GMT
════════════════════════
⌗ Tags: #thm #hacking #thm_walkthrough #reverse_engineering
════════════════════════
𐀪 Author: GHOST PORT
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:06:57 GMT
════════════════════════
⌗ Tags: #thm #hacking #thm_walkthrough #reverse_engineering
Medium
TryHackMe | Compiled — Write-Up
Challenge Overview
⤷ Title: From Student to Ethical Hacker: My 2026 Journey Into Cybersecurity
════════════════════════
𐀪 Author: Kswzahidali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:37:33 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Kswzahidali
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:37:33 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #cybersecurity
Medium
From Student to Ethical Hacker: My 2026 Journey Into Cybersecurity
Introduction
⤷ Title: Read Team
════════════════════════
𐀪 Author: Heavenblack
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:23:13 GMT
════════════════════════
⌗ Tags: #netdiscover #penetration_testing #information_gathering #arp_scan #reconnaissance
════════════════════════
𐀪 Author: Heavenblack
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:23:13 GMT
════════════════════════
⌗ Tags: #netdiscover #penetration_testing #information_gathering #arp_scan #reconnaissance
Medium
Read Team
Curso de penetration testing 1
⤷ Title: Scheme Catcher — AOC Side Quest TryHackme
════════════════════════
𐀪 Author: Jatin Gahlot
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:55:46 GMT
════════════════════════
⌗ Tags: #advent_of_cyber_2025 #cybersecurity #tryhackme #ctf #ctf_writeup
════════════════════════
𐀪 Author: Jatin Gahlot
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:55:46 GMT
════════════════════════
⌗ Tags: #advent_of_cyber_2025 #cybersecurity #tryhackme #ctf #ctf_writeup
Medium
Scheme Catcher — AOC Side Quest TryHackme
Room Access : https://tryhackme.com/room/sq2-aoc2025-JxiOKUSD9R
⤷ Title: APT3 vs APT29: A Comparative Cyber Threat Intelligence Analysis Using MITRE ATT&CK
════════════════════════
𐀪 Author: Pranav More
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:31:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #threat_intelligence #cybercrime #ethical_hacking
════════════════════════
𐀪 Author: Pranav More
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:31:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #threat_intelligence #cybercrime #ethical_hacking
Medium
APT3 vs APT29: A Comparative Cyber Threat Intelligence Analysis Using MITRE ATT&CK
Advanced Persistent Threats (APTs) are among the most sophisticated forms of cyber adversaries. They are typically state-sponsored or…
⤷ Title: Solving a Bugforge Challenge — Exploiting JWT Forging in Sokudo
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:16:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #caido #web_penetration_testing #bugforge
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:16:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #caido #web_penetration_testing #bugforge
Medium
Solving a Bugforge Challenge — Exploiting JWT Forging in Sokudo
Today, I solved another challenge on Bugforge, targeting a web application called Sokudo.
⤷ Title: 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Bug Bounty in 2026: Look for these Bugs!
════════════════════════
𐀪 Author: Jeosantos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:31:07 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #programming #cybersecurity #bugbounty_writeup #bug_bounty
════════════════════════
𐀪 Author: Jeosantos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:31:07 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #programming #cybersecurity #bugbounty_writeup #bug_bounty
Medium
Bug Bounty in 2026: Look for these Bugs!
Bug Bounty is a super competitive field and if you want to stay ahead of other hunters, you need to seriously know what to look for…
⤷ Title: Broken Access Control: From IDOR to Privilege Escalation
════════════════════════
𐀪 Author: vamos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:23:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #broken_access_control #authorization #access_control #web_security
════════════════════════
𐀪 Author: vamos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:23:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #broken_access_control #authorization #access_control #web_security
Medium
Broken Access Control: From IDOR to Privilege Escalation
بسم الله الرحمن الرحيم…وَقُل رَّبِّ زِدْنِى عِلْمًۭ
⤷ Title: Lab: Basic server-side template injection (code context) | PortSwigger
════════════════════════
𐀪 Author: SIGKILLers
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:57:00 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #web_security #bug_bounty #pentesting
════════════════════════
𐀪 Author: SIGKILLers
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:57:00 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #web_security #bug_bounty #pentesting
Medium
Lab: Basic server-side template injection (code context) | PortSwigger
The SSTI vulnerability in the Preferred name
⤷ Title: Mexican Government Data Exposed in AI-Assisted Cyberattack
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:36:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_breach #ai #hacking #security
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:36:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_breach #ai #hacking #security
Medium
Mexican Government Data Exposed in AI-Assisted Cyberattack
Between December 2025 and January 2026, a month-long intrusion campaign against Mexican government infrastructure demonstrated how frontier…
⤷ Title: Threat Actors Build an Active Phishing Empire Targeting Ghana’s Entire Banking Sector
════════════════════════
𐀪 Author: Prince Lassey
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:42:40 GMT
════════════════════════
⌗ Tags: #africa #phishing #cybersecurity #hacking #privacy
════════════════════════
𐀪 Author: Prince Lassey
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:42:40 GMT
════════════════════════
⌗ Tags: #africa #phishing #cybersecurity #hacking #privacy
Medium
Threat Actors Build an Active Phishing Empire Targeting Ghana’s Entire Banking Sector
It started, as most terrible discoveries do, with a suspicious email. This one was polished and professional. It had branding and it had a…
⤷ Title: vtrains:This is a control panel based on Whisper.
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:11:32 GMT
════════════════════════
⌗ Tags: #pentesting #linux #hacking #s_h4ck13 #hacker
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:11:32 GMT
════════════════════════
⌗ Tags: #pentesting #linux #hacking #s_h4ck13 #hacker
Medium
vtrains:This is a control panel based on Whisper.
Install
⤷ Title: Cybersecurity Awareness Scenario #2
════════════════════════
𐀪 Author: Devore McIntosh
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:01:01 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity_awareness #cybersecurity #infosecurity #wifihacking
════════════════════════
𐀪 Author: Devore McIntosh
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:01:01 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity_awareness #cybersecurity #infosecurity #wifihacking
Medium
Cybersecurity Awareness Scenario #2
Topic: Mobile Security
⤷ Title: Remote Code Execution in Offline Hospital Management System (CVE-2026–26462)
════════════════════════
𐀪 Author: DARN
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:54:57 GMT
════════════════════════
⌗ Tags: #cve #cybersecurity #bug_bounty #infosec #electronjs
════════════════════════
𐀪 Author: DARN
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:54:57 GMT
════════════════════════
⌗ Tags: #cve #cybersecurity #bug_bounty #infosec #electronjs
Medium
Remote Code Execution in Offline Hospital Management System (CVE-2026–26462)
An analysis of insecure Electron configuration leading to local code execution.
⤷ Title: The Ultimate TryHackMe Roadmap: Don’t Start Your Cybersecurity Journey Without Playing These Rooms…
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:26:37 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #tryhackme #hackthebox #technology
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:26:37 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #tryhackme #hackthebox #technology
Medium
The Ultimate TryHackMe Roadmap: Don’t Start Your Cybersecurity Journey Without Playing These Rooms…
So you’ve decided to jump into the world of cybersecurity because the demand is skyrocketing (as they always say and I think it’s…
⤷ Title: Wizer #61 Write Up
════════════════════════
𐀪 Author: Jeff Maley
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:19:07 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #web_penetration_testing #penetration_testing #information_security
════════════════════════
𐀪 Author: Jeff Maley
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:19:07 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #web_penetration_testing #penetration_testing #information_security
Medium
Wizer #61 Write Up
Wizer hosts CTF challenges on https://wizer-ctf.com and we’ll be looking at #61 today. Like most of the challenges, this one is based on…