⤷ Title: Incident Response and Digital Forensics in Cybersecurity
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:38:17 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity_online #ethical_hacking_course #codered_pro_cybersecurity
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:38:17 GMT
════════════════════════
⌗ Tags: #penetration_testing #cybersecurity_online #ethical_hacking_course #codered_pro_cybersecurity
Medium
Incident Response and Digital Forensics in Cybersecurity
Introduction
⤷ Title: SQL Injection Vulnerability in Appointment Check-In Endpoint — Patient Queue Management System…
════════════════════════
𐀪 Author: Ravi Pipalwa
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:23:33 GMT
════════════════════════
⌗ Tags: #web_application_security #penetration_testing #sql_injection #cve #cve_hunting
════════════════════════
𐀪 Author: Ravi Pipalwa
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:23:33 GMT
════════════════════════
⌗ Tags: #web_application_security #penetration_testing #sql_injection #cve #cve_hunting
Medium
SQL Injection Vulnerability in Appointment Check-In Endpoint — Patient Queue Management System…
Overview
⤷ Title: Stored Cross-Site Scripting (XSS) in Reservation Management — SourceCodester Resort Reservation…
════════════════════════
𐀪 Author: Ravi Pipalwa
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:12:49 GMT
════════════════════════
⌗ Tags: #cve #xss_attack #cross_site_noscripting #cve_hunting #penetration_testing
════════════════════════
𐀪 Author: Ravi Pipalwa
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:12:49 GMT
════════════════════════
⌗ Tags: #cve #xss_attack #cross_site_noscripting #cve_hunting #penetration_testing
Medium
Stored Cross-Site Scripting (XSS) in Reservation Management — SourceCodester Resort Reservation…
Overview
⤷ Title: Authentication Bypass | TryHackMe Write-up | Farros
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:00:30 GMT
════════════════════════
⌗ Tags: #tryhackme #authenticity #ctf_writeup #farro #security
════════════════════════
𐀪 Author: Mochammad Farros Fatchur Roji
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 00:00:30 GMT
════════════════════════
⌗ Tags: #tryhackme #authenticity #ctf_writeup #farro #security
Medium
Authentication Bypass | TryHackMe Write-up
Non-members are welcome to access the full story here.
⤷ Title: 1.Scope, Legality, and Ethics of Ethical Hacking
════════════════════════
𐀪 Author: Waqashk
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:47:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Waqashk
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 10:47:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
1.Scope, Legality, and Ethics of Ethical Hacking
Scope of Ethical Hacking:
⤷ Title: SOC336 — Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025–21298)
════════════════════════
𐀪 Author: Pablo Rodriguez Sanz
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:44:06 GMT
════════════════════════
⌗ Tags: #soc_analyst #blue_team #rce #lets_defend
════════════════════════
𐀪 Author: Pablo Rodriguez Sanz
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 09:44:06 GMT
════════════════════════
⌗ Tags: #soc_analyst #blue_team #rce #lets_defend
Medium
SOC336 — Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025–21298)
Scenario
⤷ Title: 5 IoT Vulnerabilities That Stop Projects and How to Avoid Them
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:35:37 +0000
════════════════════════
⌗ Tags: #Security #Technology #Cybersecurity #IoT #Vulnerability
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:35:37 +0000
════════════════════════
⌗ Tags: #Security #Technology #Cybersecurity #IoT #Vulnerability
Hackread
5 IoT Vulnerabilities That Stop Projects and How to Avoid Them
Follow us on all social media platforms @Hackread
⤷ Title: “Bug Bounty Bootcamp #26: SQL Injection Fundamentals — Learning to Speak the Database’s Language”
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:12:23 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #technology #bug_bounty #programming
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:12:23 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #technology #bug_bounty #programming
Medium
“Bug Bounty Bootcamp #26: SQL Injection Fundamentals — Learning to Speak the Database’s Language”
SQL injection is one of the oldest and most dangerous web vulnerabilities. Before you can exploit it, you must learn to talk to the…
⤷ Title: How I Earned a €700 Bounty from an Information Disclosure Vulnerability
════════════════════════
𐀪 Author: DOD cyber solutions
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 11:23:27 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #bug_bounty #ethical_hacking
════════════════════════
𐀪 Author: DOD cyber solutions
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 11:23:27 GMT
════════════════════════
⌗ Tags: #technology #cybersecurity #bug_bounty #ethical_hacking
Medium
How I Earned a €700 Bounty from an Information Disclosure Vulnerability
Hello everyone! I’m back with another writeup — this time, I’m excited to
⤷ Title: How Hackers Actually Hack You — It’s Simpler Than You Think
════════════════════════
𐀪 Author: Mooki W
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:17:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_privacy #hacking #technology #online_safety
════════════════════════
𐀪 Author: Mooki W
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:17:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #data_privacy #hacking #technology #online_safety
Medium
How Hackers Actually Hack You — It’s Simpler Than You Think
1. Social Engineering: Humans Are the Weak Link
⤷ Title: Security & Privacy Audit: poof.new
════════════════════════
𐀪 Author: Nyakojiru
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:44:31 GMT
════════════════════════
⌗ Tags: #infosec #solana_network #web3 #cryptocurrency
════════════════════════
𐀪 Author: Nyakojiru
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:44:31 GMT
════════════════════════
⌗ Tags: #infosec #solana_network #web3 #cryptocurrency
Medium
Security & Privacy Audit: poof.new
Operator: Tarobase, Inc. Service: AI-powered no-code Solana dApp builder (prompt-to-dApp) Status: Open Beta
⤷ Title: Kendi Laboratuvarımda Zafiyet Analizi: Nessus ve Metasploitable
════════════════════════
𐀪 Author: Enes Bayraker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:03:12 GMT
════════════════════════
⌗ Tags: #security_operation_center #cybersecurity #blue_team #penetration_testing #vulnerability
════════════════════════
𐀪 Author: Enes Bayraker
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:03:12 GMT
════════════════════════
⌗ Tags: #security_operation_center #cybersecurity #blue_team #penetration_testing #vulnerability
Medium
Kendi Laboratuvarımda Zafiyet Analizi: Nessus ve Metasploitable
Siber güvenlik alanında kariyer hedeflerken, çoğu kez teorik bilginin değil hands-on experience’in ne kadar önemli olduğunun farkındayım…
⤷ Title: Cloud Security Essentials for Modern Organizations
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 11:15:58 GMT
════════════════════════
⌗ Tags: #cybersecurity_online #penetration_testing #codered_pro_cybersecurity #hands_on_cybersecurity #ethical_hacking_online
════════════════════════
𐀪 Author: Kunal Arora
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 11:15:58 GMT
════════════════════════
⌗ Tags: #cybersecurity_online #penetration_testing #codered_pro_cybersecurity #hands_on_cybersecurity #ethical_hacking_online
Medium
Cloud Security Essentials for Modern Organizations
Introduction
⤷ Title: Dari Event Viewer Windows Hingga Serangan Brutal SSH | DFIR Write-up
════════════════════════
𐀪 Author: Muhammad Ketsar Ali Abi Wahid
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:19:38 GMT
════════════════════════
⌗ Tags: #information_security #digital_forensics #ethical_hacking #cybersecurity #capture_the_flag
════════════════════════
𐀪 Author: Muhammad Ketsar Ali Abi Wahid
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 12:19:38 GMT
════════════════════════
⌗ Tags: #information_security #digital_forensics #ethical_hacking #cybersecurity #capture_the_flag
Medium
Dari Event Viewer Windows Hingga Serangan Brutal SSH | DFIR Write-up
Halo semua! Di artikel ini, saya tidak hanya ingin membagikan hasil akhir dari tugas-tugas CTF saya, tapi ingin mengajak kamu semua masuk…
⤷ Title: ethical hacking
════════════════════════
𐀪 Author: Ehtishamjk
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 11:34:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking
════════════════════════
𐀪 Author: Ehtishamjk
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 11:34:05 GMT
════════════════════════
⌗ Tags: #ethical_hacking
Medium
ethical hacking
ethical hacking is about testing the compnies and computer system with
⤷ Title: How to Identify Industry-Oriented Cyber Security Programs.
════════════════════════
𐀪 Author: logging security
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 11:17:42 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #ethical_hacking #cybersecurity_awareness
════════════════════════
𐀪 Author: logging security
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 11:17:42 GMT
════════════════════════
⌗ Tags: #cybersecurity_training #cybersecurity #ethical_hacking #cybersecurity_awareness
Medium
How to Identify Industry-Oriented Cyber Security Programs.
Choosing the right cybersecurity program can shape your entire career because it’s about investing in your future. Today, many students…
⤷ Title: DVWA: Command Injection Vulnerability (Low Security)
════════════════════════
𐀪 Author: Kamal S
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:33:54 GMT
════════════════════════
⌗ Tags: #bug_bounty #pentesting #dvwa #command_injection #owasp
════════════════════════
𐀪 Author: Kamal S
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:33:54 GMT
════════════════════════
⌗ Tags: #bug_bounty #pentesting #dvwa #command_injection #owasp
Medium
DVWA: Command Injection Vulnerability (Low Security)
Command Injection is one of the most critical web application vulnerability because it allows an attacker to execute operating system…
⤷ Title: Lab: DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:58:02 GMT
════════════════════════
⌗ Tags: #ctf #javanoscript #hacking #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: mayhack
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:58:02 GMT
════════════════════════
⌗ Tags: #ctf #javanoscript #hacking #cybersecurity #bug_bounty
Medium
Lab: DOM XSS in AngularJS expression with angle brackets and double quotes HTML-encoded
Lab Overview
⤷ Title: PyRIT Ship — Linux version
════════════════════════
𐀪 Author: 喂美女你好!
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:11:48 GMT
════════════════════════
⌗ Tags: #offensive_security #ai #application_security
════════════════════════
𐀪 Author: 喂美女你好!
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:11:48 GMT
════════════════════════
⌗ Tags: #offensive_security #ai #application_security
Medium
PyRIT Ship — Linux version
This is the Linux version of https://youtu.be/lkCnueQhbss?si=3Nx1KaOg08zTzEXd which sets up PyRIT & PyRIT-Ship for Burpsuite.
⤷ Title: Ottergram writeup (BAC) (Bugforge)
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:31:40 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #ctf
════════════════════════
𐀪 Author: 7s26Simon
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 14:31:40 GMT
════════════════════════
⌗ Tags: #ctf_writeup #hacking #ctf
Medium
Ottergram writeup (BAC) (Bugforge)
Step 1: Register and comment
⤷ Title: The Cryptography Paradox: Why Do You Have to Share Your "Private" Key? (Key Escrow)
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:38:39 GMT
════════════════════════
⌗ Tags: #information_security #infosec #cybersecurity #cryptography #programming
════════════════════════
𐀪 Author: Mahdi
════════════════════════
ⴵ Time: Sat, 28 Feb 2026 13:38:39 GMT
════════════════════════
⌗ Tags: #information_security #infosec #cybersecurity #cryptography #programming
Medium
The Cryptography Paradox: Why Do You Have to Share Your "Private" Key? (Key Escrow)
🔴Note: This article is about the reason why we share our private keys! In the later articles, we will talk about mathematics and algorithm…