⤷ Title: Bug Bounty in 2026: Look for these Bugs!
════════════════════════
𐀪 Author: Jeosantos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:31:07 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #programming #cybersecurity #bugbounty_writeup #bug_bounty
════════════════════════
𐀪 Author: Jeosantos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:31:07 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #programming #cybersecurity #bugbounty_writeup #bug_bounty
Medium
Bug Bounty in 2026: Look for these Bugs!
Bug Bounty is a super competitive field and if you want to stay ahead of other hunters, you need to seriously know what to look for…
⤷ Title: Broken Access Control: From IDOR to Privilege Escalation
════════════════════════
𐀪 Author: vamos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:23:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #broken_access_control #authorization #access_control #web_security
════════════════════════
𐀪 Author: vamos
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:23:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #broken_access_control #authorization #access_control #web_security
Medium
Broken Access Control: From IDOR to Privilege Escalation
بسم الله الرحمن الرحيم…وَقُل رَّبِّ زِدْنِى عِلْمًۭ
⤷ Title: Lab: Basic server-side template injection (code context) | PortSwigger
════════════════════════
𐀪 Author: SIGKILLers
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:57:00 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #web_security #bug_bounty #pentesting
════════════════════════
𐀪 Author: SIGKILLers
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:57:00 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #web_security #bug_bounty #pentesting
Medium
Lab: Basic server-side template injection (code context) | PortSwigger
The SSTI vulnerability in the Preferred name
⤷ Title: Mexican Government Data Exposed in AI-Assisted Cyberattack
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:36:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_breach #ai #hacking #security
════════════════════════
𐀪 Author: RealSec.io
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:36:47 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_breach #ai #hacking #security
Medium
Mexican Government Data Exposed in AI-Assisted Cyberattack
Between December 2025 and January 2026, a month-long intrusion campaign against Mexican government infrastructure demonstrated how frontier…
⤷ Title: Threat Actors Build an Active Phishing Empire Targeting Ghana’s Entire Banking Sector
════════════════════════
𐀪 Author: Prince Lassey
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:42:40 GMT
════════════════════════
⌗ Tags: #africa #phishing #cybersecurity #hacking #privacy
════════════════════════
𐀪 Author: Prince Lassey
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:42:40 GMT
════════════════════════
⌗ Tags: #africa #phishing #cybersecurity #hacking #privacy
Medium
Threat Actors Build an Active Phishing Empire Targeting Ghana’s Entire Banking Sector
It started, as most terrible discoveries do, with a suspicious email. This one was polished and professional. It had branding and it had a…
⤷ Title: vtrains:This is a control panel based on Whisper.
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:11:32 GMT
════════════════════════
⌗ Tags: #pentesting #linux #hacking #s_h4ck13 #hacker
════════════════════════
𐀪 Author: Мартин.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:11:32 GMT
════════════════════════
⌗ Tags: #pentesting #linux #hacking #s_h4ck13 #hacker
Medium
vtrains:This is a control panel based on Whisper.
Install
⤷ Title: Cybersecurity Awareness Scenario #2
════════════════════════
𐀪 Author: Devore McIntosh
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:01:01 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity_awareness #cybersecurity #infosecurity #wifihacking
════════════════════════
𐀪 Author: Devore McIntosh
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:01:01 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity_awareness #cybersecurity #infosecurity #wifihacking
Medium
Cybersecurity Awareness Scenario #2
Topic: Mobile Security
⤷ Title: Remote Code Execution in Offline Hospital Management System (CVE-2026–26462)
════════════════════════
𐀪 Author: DARN
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:54:57 GMT
════════════════════════
⌗ Tags: #cve #cybersecurity #bug_bounty #infosec #electronjs
════════════════════════
𐀪 Author: DARN
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:54:57 GMT
════════════════════════
⌗ Tags: #cve #cybersecurity #bug_bounty #infosec #electronjs
Medium
Remote Code Execution in Offline Hospital Management System (CVE-2026–26462)
An analysis of insecure Electron configuration leading to local code execution.
⤷ Title: The Ultimate TryHackMe Roadmap: Don’t Start Your Cybersecurity Journey Without Playing These Rooms…
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:26:37 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #tryhackme #hackthebox #technology
════════════════════════
𐀪 Author: Motasem Hamdan
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:26:37 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #tryhackme #hackthebox #technology
Medium
The Ultimate TryHackMe Roadmap: Don’t Start Your Cybersecurity Journey Without Playing These Rooms…
So you’ve decided to jump into the world of cybersecurity because the demand is skyrocketing (as they always say and I think it’s…
⤷ Title: Wizer #61 Write Up
════════════════════════
𐀪 Author: Jeff Maley
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:19:07 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #web_penetration_testing #penetration_testing #information_security
════════════════════════
𐀪 Author: Jeff Maley
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:19:07 GMT
════════════════════════
⌗ Tags: #ctf #ctf_writeup #web_penetration_testing #penetration_testing #information_security
Medium
Wizer #61 Write Up
Wizer hosts CTF challenges on https://wizer-ctf.com and we’ll be looking at #61 today. Like most of the challenges, this one is based on…
⤷ Title: Learning Exploit Active Directory
════════════════════════
𐀪 Author: Moci
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:02:22 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #active_directory #cybersecurity #exploitation
════════════════════════
𐀪 Author: Moci
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:02:22 GMT
════════════════════════
⌗ Tags: #learning #penetration_testing #active_directory #cybersecurity #exploitation
Medium
Learning Exploit Active Directory
🎯 Overview
⤷ Title: Try Hack Me- HTTP in Detail Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:48:14 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #tryhackme_writeup #cybersecurity
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:48:14 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #tryhackme_writeup #cybersecurity
Medium
Try Hack Me- HTTP in Detail Walkthrough
Hello, stranger — let’s begin.
⤷ Title: Beyond Web Apps: A Complete Guide to Thick Client Application Security Testing
════════════════════════
𐀪 Author: Pratik Solanki
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:37:23 GMT
════════════════════════
⌗ Tags: #penetration_testing #thick_client_security #thick_client_pentesting #thick_client
════════════════════════
𐀪 Author: Pratik Solanki
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:37:23 GMT
════════════════════════
⌗ Tags: #penetration_testing #thick_client_security #thick_client_pentesting #thick_client
Medium
Beyond Web Apps: A Complete Guide to Thick Client Application Security Testing
Thick Client Application Security Testing
⤷ Title: TryHackMe -Room Team Writeup
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:17:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #linux #ctf #ethical_hacking
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 18:17:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #linux #ctf #ethical_hacking
Medium
TryHackMe -Room Team Writeup
Difficulty: Easy | Tags: FTP, LFI, SSH, Privilege Escalation
⤷ Title: TryHackMe: Offensive Security Intro Walkthrough
════════════════════════
𐀪 Author: hazmatmonstarrr
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:38:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #tryhackme_writeup
════════════════════════
𐀪 Author: hazmatmonstarrr
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:38:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #tryhackme_writeup
Medium
TryHackMe: Offensive Security Intro Walkthrough
This walkthrough documents my journey to completing the Offensive Security Intro room and serves as a guide for you! #win-win
⤷ Title: The Rise of Agentic AI: Why Automated Pentesting Is Our Best Defense
════════════════════════
𐀪 Author: Len Noe
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:43:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #ethical_hacking #artificial_intelligence #machine_learning
════════════════════════
𐀪 Author: Len Noe
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:43:45 GMT
════════════════════════
⌗ Tags: #cybersecurity #ai #ethical_hacking #artificial_intelligence #machine_learning
Medium
The Rise of Agentic AI: Why Automated Pentesting Is Our Best Defense
Fighting AI with AI
⤷ Title: We learned that ethical hacking is not about breaking systems for harm, but about protecting…
════════════════════════
𐀪 Author: Jksantak
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:00:51 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Jksantak
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 17:00:51 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
We learned that ethical hacking is not about breaking systems for harm, but about protecting…
We learned that ethical hacking is not about breaking systems for harm, but about protecting digital environments by identifying weaknesses before attackers exploit them. Understanding the hacker …
⤷ Title: DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:41:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 23:41:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: ShinyHunters Leak 2M Records From Dutch Telecom Odido, Claim 21M Stolen
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:01:32 +0000
════════════════════════
⌗ Tags: #Data Breaches #Cyber Crime #Security #Cyber Attack #Cybersecurity #data breach #Netherlands #Odido #Privacy #ShinyHunters
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 19:01:32 +0000
════════════════════════
⌗ Tags: #Data Breaches #Cyber Crime #Security #Cyber Attack #Cybersecurity #data breach #Netherlands #Odido #Privacy #ShinyHunters
Hackread
ShinyHunters Leak 2M Records From Dutch Telecom Odido, Claim 21M Stolen
ShinyHunters hackers leak 2 million records from Dutch telecom Odido after ransom refusal, claiming up to 21 million customer records were stolen in the breach.
⤷ Title: ClawJacked Vulnerability in OpenClaw Could Let Websites Hijack AI Agents
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:39:06 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI Agents #ClawJacked #Cybersecurity #OpenClaw #Peter Steinberger #Privacy #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 16:39:06 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #AI Agents #ClawJacked #Cybersecurity #OpenClaw #Peter Steinberger #Privacy #Vulnerability
Hackread
ClawJacked Vulnerability in OpenClaw Could Let Websites Hijack AI Agents
Follow us on all social media @Hackread
⤷ Title: PortSwigger Access Control Vulnerabilities Lab Notes
════════════════════════
𐀪 Author: Emre A.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:17:24 GMT
════════════════════════
⌗ Tags: #portswigger #bug_bounty #access_control #web_security
════════════════════════
𐀪 Author: Emre A.
════════════════════════
ⴵ Time: Fri, 27 Feb 2026 20:17:24 GMT
════════════════════════
⌗ Tags: #portswigger #bug_bounty #access_control #web_security
Medium
PortSwigger Access Control Vulnerabilities Lab Notes
Lab: Unprotected admin functionality