⤷ Title: APT3 vs APT29: A Comparative Cyber Threat Intelligence Analysis Using MITRE ATT&CK
════════════════════════
𐀪 Author: Pranav More
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:31:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #threat_intelligence #cybercrime #ethical_hacking
════════════════════════
𐀪 Author: Pranav More
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:31:39 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #threat_intelligence #cybercrime #ethical_hacking
Medium
APT3 vs APT29: A Comparative Cyber Threat Intelligence Analysis Using MITRE ATT&CK
Advanced Persistent Threats (APTs) are among the most sophisticated forms of cyber adversaries. They are typically state-sponsored or…
⤷ Title: Solving a Bugforge Challenge — Exploiting JWT Forging in Sokudo
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:16:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #caido #web_penetration_testing #bugforge
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 15:16:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #caido #web_penetration_testing #bugforge
Medium
Solving a Bugforge Challenge — Exploiting JWT Forging in Sokudo
Today, I solved another challenge on Bugforge, targeting a web application called Sokudo.
⤷ Title: 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:29:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Bug Bounty in 2026: Look for these Bugs!
════════════════════════
𐀪 Author: Jeosantos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:31:07 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #programming #cybersecurity #bugbounty_writeup #bug_bounty
════════════════════════
𐀪 Author: Jeosantos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:31:07 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #programming #cybersecurity #bugbounty_writeup #bug_bounty
Medium
Bug Bounty in 2026: Look for these Bugs!
Bug Bounty is a super competitive field and if you want to stay ahead of other hunters, you need to seriously know what to look for…
⤷ Title: Broken Access Control: From IDOR to Privilege Escalation
════════════════════════
𐀪 Author: vamos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:23:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #broken_access_control #authorization #access_control #web_security
════════════════════════
𐀪 Author: vamos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:23:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #broken_access_control #authorization #access_control #web_security
Medium
Broken Access Control: From IDOR to Privilege Escalation
بسم الله الرحمن الرحيم…وَقُل رَّبِّ زِدْنِى عِلْمًۭ
⤷ Title: Lab: Basic server-side template injection (code context) | PortSwigger
════════════════════════
𐀪 Author: SIGKILLers
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:57:00 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #web_security #bug_bounty #pentesting
════════════════════════
𐀪 Author: SIGKILLers
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:57:00 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #web_security #bug_bounty #pentesting
Medium
Lab: Basic server-side template injection (code context) | PortSwigger
The SSTI vulnerability in the Preferred name
⤷ Title: Mexican Government Data Exposed in AI-Assisted Cyberattack
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:36:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_breach #ai #hacking #security
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:36:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_breach #ai #hacking #security
Medium
Mexican Government Data Exposed in AI-Assisted Cyberattack
Between December 2025 and January 2026, a month-long intrusion campaign against Mexican government infrastructure demonstrated how frontier…
⤷ Title: Threat Actors Build an Active Phishing Empire Targeting Ghana’s Entire Banking Sector
════════════════════════
𐀪 Author: Prince Lassey
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:42:40 GMT
════════════════════════
⌗ Tags: #africa #phishing #cybersecurity #hacking #privacy
════════════════════════
𐀪 Author: Prince Lassey
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:42:40 GMT
════════════════════════
⌗ Tags: #africa #phishing #cybersecurity #hacking #privacy
Medium
Threat Actors Build an Active Phishing Empire Targeting Ghana’s Entire Banking Sector
It started, as most terrible discoveries do, with a suspicious email. This one was polished and professional. It had branding and it had a…
⤷ Title: vtrains:This is a control panel based on Whisper.
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:11:32 GMT
════════════════════════
⌗ Tags: #pentesting #linux #hacking #s_h4ck13 #hacker
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:11:32 GMT
════════════════════════
⌗ Tags: #pentesting #linux #hacking #s_h4ck13 #hacker
Medium
vtrains:This is a control panel based on Whisper.
Install
⤷ Title: Cybersecurity Awareness Scenario #2
════════════════════════
𐀪 Author: Devore McIntosh
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:01:01 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity_awareness #cybersecurity #infosecurity #wifihacking
════════════════════════
𐀪 Author: Devore McIntosh
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:01:01 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity_awareness #cybersecurity #infosecurity #wifihacking
Medium
Cybersecurity Awareness Scenario #2
Topic: Mobile Security
⤷ Title: Remote Code Execution in Offline Hospital Management System (CVE-2026–26462)
════════════════════════
𐀪 Author: DARN
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:54:57 GMT
════════════════════════
⌗ Tags: #cve #cybersecurity #bug_bounty #infosec #electronjs
════════════════════════
𐀪 Author: DARN
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:54:57 GMT
════════════════════════
⌗ Tags: #cve #cybersecurity #bug_bounty #infosec #electronjs
Medium
Remote Code Execution in Offline Hospital Management System (CVE-2026–26462)
An analysis of insecure Electron configuration leading to local code execution.
⤷ Title: The Ultimate TryHackMe Roadmap: Don’t Start Your Cybersecurity Journey Without Playing These Rooms…
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:26:37 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #tryhackme #hackthebox #technology
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:26:37 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #tryhackme #hackthebox #technology
Medium
The Ultimate TryHackMe Roadmap: Don’t Start Your Cybersecurity Journey Without Playing These Rooms…
So you’ve decided to jump into the world of cybersecurity because the demand is skyrocketing (as they always say and I think it’s…
⤷ Title: Wizer #61 Write Up
════════════════════════
𐀪 Author: Jeff Maley
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:19:07 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #web_penetration_testing #penetration_testing #information_security
════════════════════════
𐀪 Author: Jeff Maley
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:19:07 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #web_penetration_testing #penetration_testing #information_security
Medium
Wizer #61 Write Up
Wizer hosts CTF challenges on https://wizer-ctf.com and we’ll be looking at #61 today. Like most of the challenges, this one is based on…
⤷ Title: Learning Exploit Active Directory
════════════════════════
𐀪 Author: Moci
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:02:22 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #active_directory #cybersecurity #exploitation
════════════════════════
𐀪 Author: Moci
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:02:22 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #active_directory #cybersecurity #exploitation
Medium
Learning Exploit Active Directory
🎯 Overview
⤷ Title: Try Hack Me- HTTP in Detail Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:48:14 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #tryhackme_writeup #cybersecurity
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:48:14 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #tryhackme_writeup #cybersecurity
Medium
Try Hack Me- HTTP in Detail Walkthrough
Hello, stranger — let’s begin.
⤷ Title: Beyond Web Apps: A Complete Guide to Thick Client Application Security Testing
════════════════════════
𐀪 Author: Pratik Solanki
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:37:23 GMT
════════════════════════
⌗ Tags: #penetration_testing #thick_client_security #thick_client_pentesting #thick_client
════════════════════════
𐀪 Author: Pratik Solanki
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:37:23 GMT
════════════════════════
⌗ Tags: #penetration_testing #thick_client_security #thick_client_pentesting #thick_client
Medium
Beyond Web Apps: A Complete Guide to Thick Client Application Security Testing
Thick Client Application Security Testing
⤷ Title: TryHackMe -Room Team Writeup
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:17:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #linux #ctf #ethical_hacking
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:17:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #linux #ctf #ethical_hacking
Medium
TryHackMe -Room Team Writeup
Difficulty: Easy | Tags: FTP, LFI, SSH, Privilege Escalation
⤷ Title: TryHackMe: Offensive Security Intro Walkthrough
════════════════════════
𐀪 Author: hazmatmonstarrr
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:38:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #tryhackme_writeup
════════════════════════
𐀪 Author: hazmatmonstarrr
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:38:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #tryhackme_writeup
Medium
TryHackMe: Offensive Security Intro Walkthrough
This walkthrough documents my journey to completing the Offensive Security Intro room and serves as a guide for you! #win-win
⤷ Title: The Rise of Agentic AI: Why Automated Pentesting Is Our Best Defense
════════════════════════
𐀪 Author: Len Noe
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:43:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #ethical_hacking #artificial_intelligence #machine_learning
════════════════════════
𐀪 Author: Len Noe
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:43:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #ethical_hacking #artificial_intelligence #machine_learning
Medium
The Rise of Agentic AI: Why Automated Pentesting Is Our Best Defense
Fighting AI with AI
⤷ Title: We learned that ethical hacking is not about breaking systems for harm, but about protecting…
════════════════════════
𐀪 Author: Jksantak
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:00:51 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Jksantak
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:00:51 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
We learned that ethical hacking is not about breaking systems for harm, but about protecting…
We learned that ethical hacking is not about breaking systems for harm, but about protecting digital environments by identifying weaknesses before attackers exploit them. Understanding the hacker …
⤷ Title: DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:41:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:41:00 +0530
════════════════════════
⌗ Tags: No_Tags