⤷ Title: Ensuring Windows Security
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:48 GMT
════════════════════════
⌗ Tags: #windows_security #cybersecurity #penetration_testing #microsoft_windows_series #windows
════════════════════════
𐀪 Author: Aj
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:41:48 GMT
════════════════════════
⌗ Tags: #windows_security #cybersecurity #penetration_testing #microsoft_windows_series #windows
Medium
Ensuring Windows Security
Microsoft Windows Complete Guide Part 7
⤷ Title: We Thought It Was Just a Slow Computer… — Until the Ransomware Note Appeared
════════════════════════
𐀪 Author: WEBULITY
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:56:38 GMT
════════════════════════
⌗ Tags: #ai_agent #technology #ethical_hacking #blockchain_technology #ransomware
════════════════════════
𐀪 Author: WEBULITY
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:56:38 GMT
════════════════════════
⌗ Tags: #ai_agent #technology #ethical_hacking #blockchain_technology #ransomware
Medium
We Thought It Was Just a Slow Computer… — Until the Ransomware Note Appeared
Last Tuesday, a UK-based accounting firm logged in like any other morning.
⤷ Title: Securing AI-Powered APIs: What API Security Looks Like in the Age of LLMs
════════════════════════
𐀪 Author: Maryblessing
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:19:33 GMT
════════════════════════
⌗ Tags: #api_security #llm #ai #cybersecurity #api
════════════════════════
𐀪 Author: Maryblessing
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 02:19:33 GMT
════════════════════════
⌗ Tags: #api_security #llm #ai #cybersecurity #api
Medium
Securing AI-Powered APIs: What API Security Looks Like in the Age of LLMs
Introduction
⤷ Title: Critical CISA Advisory Unmasks Severe Flaws in EV2GO Charging Networks
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:50:05 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA advisory #Critical Infrastructure #CVE_2026_24731 #EV Charging Security #EV2GO #ICS #ICSA_26_057_04 #industrial control systems #infosec #OCPP #WebSocket Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:50:05 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA advisory #Critical Infrastructure #CVE_2026_24731 #EV Charging Security #EV2GO #ICS #ICSA_26_057_04 #industrial control systems #infosec #OCPP #WebSocket Vulnerability
Daily CyberSecurity
Critical CISA Advisory Unmasks Severe Flaws in EV2GO Charging Networks
CISA issues an urgent ICS advisory (ICSA-26-057-04) for the EV2GO charging platform. Critical 9.4 severity flaws allow for session hijacking and station impersonation.
⤷ Title: Lab: DOM XSS in document.write sink using source location.search inside a select element
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:39:16 GMT
════════════════════════
⌗ Tags: #xss_attack #hacking #cybersecurity #ctf #bug_bounty
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 03:39:16 GMT
════════════════════════
⌗ Tags: #xss_attack #hacking #cybersecurity #ctf #bug_bounty
Medium
Lab: DOM XSS in document.write sink using source location.search inside a select element
Lab Overview
⤷ Title: Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:27:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:27:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Google Groups OSINT for Pentesting
════════════════════════
𐀪 Author: Abhirup Konwar
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:10:27 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #hacking #osint #osint_tool
════════════════════════
𐀪 Author: Abhirup Konwar
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:10:27 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #hacking #osint #osint_tool
Medium
Google Groups OSINT for Pentesting
Passive recon techniques to increase vulnerability attack surface
⤷ Title: What is Bug Bounty And How Real Hackers Find Bugs
════════════════════════
𐀪 Author: Novashield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:28:52 GMT
════════════════════════
⌗ Tags: #bug_bounty #vulnerability #hacker #cyber_security_awareness #privacy
════════════════════════
𐀪 Author: Novashield
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:28:52 GMT
════════════════════════
⌗ Tags: #bug_bounty #vulnerability #hacker #cyber_security_awareness #privacy
Medium
What is Bug Bounty And How Real Hackers Find Bugs
Bug bounty, as the name suggests, is a program in which ethical hackers try to identify vulnerabilities and threats in an application…
⤷ Title: The path to the core
════════════════════════
𐀪 Author: Progsky
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:49:27 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Progsky
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:49:27 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ethical_hacking
Medium
The path to the core
What can be done at the application level? Execute an unprivileged processor command, access a user memory cell, or make a system call…
⤷ Title: I tried to solve the ctf challenge about finding the flag by logging into a user whose password is…
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:22:58 GMT
════════════════════════
⌗ Tags: #cookies #web_exploitation #burpsuite #hacking #ctf
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:22:58 GMT
════════════════════════
⌗ Tags: #cookies #web_exploitation #burpsuite #hacking #ctf
Medium
I tried to solve the ctf challenge about finding the flag by logging into a user whose password is very secure
Here I use the challenge from PicoCTF
⤷ Title: The Immutable Command: An Exhaustive Analysis of Aeternum C2, Blockchain Infrastructure Abuse, and…
════════════════════════
𐀪 Author: Rakibul Hasan Sagor
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:00:54 GMT
════════════════════════
⌗ Tags: #data_breach #hacking
════════════════════════
𐀪 Author: Rakibul Hasan Sagor
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:00:54 GMT
════════════════════════
⌗ Tags: #data_breach #hacking
Medium
The Immutable Command: An Exhaustive Analysis of Aeternum C2, Blockchain Infrastructure Abuse, and…
The structural architecture of cybercrime is undergoing a profound and irreversible metamorphosis. For over two decades, the operational…
⤷ Title: TryHackMe — Walking An Application (Walkthrough)
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:08:24 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #tryhackme_pentest #walking_an_application
════════════════════════
𐀪 Author: Hudson Lois Marcus
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:08:24 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #tryhackme_pentest #walking_an_application
Medium
TryHackMe — Walking An Application (Walkthrough)
In this room, we will learn how to manually review a web application for security issues using only the in-built tools in our browser.
⤷ Title: TryHackMe Pre Security (SEC0) Exam Review
════════════════════════
𐀪 Author: Rich
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:00:19 GMT
════════════════════════
⌗ Tags: #certification #tryhackme #cybersecurity #hands_on_learning #tryhackme_challenge
════════════════════════
𐀪 Author: Rich
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 05:00:19 GMT
════════════════════════
⌗ Tags: #certification #tryhackme #cybersecurity #hands_on_learning #tryhackme_challenge
Medium
TryHackMe Pre Security (SEC0) Exam Review
TL;DR This is my review of TryHackMe’s brand new Pre Security (SEC0) exam.
⤷ Title: Advent of The Relics 2 — Operation Winter Blackout
════════════════════════
𐀪 Author: Dimas Adrian
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:24:56 GMT
════════════════════════
⌗ Tags: #investigation #cybercrime #hackthebox_writeup #cybersecurity #hackthebox
════════════════════════
𐀪 Author: Dimas Adrian
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:24:56 GMT
════════════════════════
⌗ Tags: #investigation #cybercrime #hackthebox_writeup #cybersecurity #hackthebox
Medium
Advent of The Relics 2 — Operation Winter Blackout
After dealing with the phising incident in AoTR, things escalated quickly.
⤷ Title: A Practical Memory Leak Hunting Guide
════════════════════════
𐀪 Author: Fateyaly
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:39:13 GMT
════════════════════════
⌗ Tags: #coding #ethical_hacking #programming #technology #cybersecurity
════════════════════════
𐀪 Author: Fateyaly
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:39:13 GMT
════════════════════════
⌗ Tags: #coding #ethical_hacking #programming #technology #cybersecurity
Medium
A Practical Memory Leak Hunting Guide
Finding and Fixing Memory Leaks in Production
⤷ Title: Living-off-the-Land Attacks: How Adversaries Use Legitimate Tools to Stay Invisible
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:15:40 GMT
════════════════════════
⌗ Tags: #information_security #threat_intelligence #cybersecurity #cyber_security_awareness #ethical_hacking
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:15:40 GMT
════════════════════════
⌗ Tags: #information_security #threat_intelligence #cybersecurity #cyber_security_awareness #ethical_hacking
Medium
Living-off-the-Land Attacks: How Adversaries Use Legitimate Tools to Stay Invisible
Introduction
⤷ Title: The Truth About “Secure By Default” Frameworks
════════════════════════
𐀪 Author: Mwenda Kelvin
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 07:28:16 GMT
════════════════════════
⌗ Tags: #web_security #cloud_security #security #cyber_security_awareness #application_security
════════════════════════
𐀪 Author: Mwenda Kelvin
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 07:28:16 GMT
════════════════════════
⌗ Tags: #web_security #cloud_security #security #cyber_security_awareness #application_security
Medium
The Truth About “Secure By Default” Frameworks
Defaults help — until they give false confidence
⤷ Title: How Someone Almost Hacked Every Linux Server on the Planet
════════════════════════
𐀪 Author: Bhargav
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 07:26:11 GMT
════════════════════════
⌗ Tags: #hacking #linux #security
════════════════════════
𐀪 Author: Bhargav
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 07:26:11 GMT
════════════════════════
⌗ Tags: #hacking #linux #security
Medium
How Someone Almost Hacked Every Linux Server on the Planet
In early 2024, someone almost hacked millions of Linux servers around the world.
⤷ Title: No, Microsoft Isn’t Spying on You. But Here’s What’s Really Happening
════════════════════════
𐀪 Author: Arshad
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 07:15:50 GMT
════════════════════════
⌗ Tags: #microsoft #hacking #technology #tech #ai
════════════════════════
𐀪 Author: Arshad
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 07:15:50 GMT
════════════════════════
⌗ Tags: #microsoft #hacking #technology #tech #ai
Medium
No, Microsoft Isn’t Spying on You. But Here’s What’s Really Happening
Windows telemetry isn’t a spy tool. But here’s what Microsoft actually collects from you.
⤷ Title: HOW An API WORKS
════════════════════════
𐀪 Author: MUHAMMED RUMAIS MV
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 08:43:35 GMT
════════════════════════
⌗ Tags: #api #cybersecurity #software_development #penetration_testing #web_security
════════════════════════
𐀪 Author: MUHAMMED RUMAIS MV
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 08:43:35 GMT
════════════════════════
⌗ Tags: #api #cybersecurity #software_development #penetration_testing #web_security
Medium
HOW An API WORKS
🚀 Deciphering how APIs really work:
⤷ Title: gcc (Ghost C Compiler) CTF Writeup— BitSkrieg CTF 2026
════════════════════════
𐀪 Author: Shoaib Bin Rashid
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:51:55 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ctf #penetration_testing #cybersecurity #reverse_engineering
════════════════════════
𐀪 Author: Shoaib Bin Rashid
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 06:51:55 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ctf #penetration_testing #cybersecurity #reverse_engineering
Medium
👻 gcc (Ghost C Compiler) CTF Writeup— BitSkrieg CTF 2026
👻 gcc (Ghost C Compiler) — BitSkrieg CTF 2026 ✍️ Author: Shoaib Bin Rashid | R3D_XplOiT ⚡ TL;DR A binary that hides its own flag using itself as the key. The encrypted blob is carved out …