⤷ Title: Stored xss exposed cookies via .noscript in [ cisco] = P3 Bug → P1 bug
════════════════════════
𐀪 Author: Sai Jayanth
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 07:30:37 GMT
════════════════════════
⌗ Tags: #stored_xss #bug_bounty #cybersecurity #ato #cisco
════════════════════════
𐀪 Author: Sai Jayanth
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 07:30:37 GMT
════════════════════════
⌗ Tags: #stored_xss #bug_bounty #cybersecurity #ato #cisco
Medium
Stored xss exposed cookies via .noscript in [ cisco] = P3 Bug → P1 bug
Hello i’m back with one more P3 bug in Cisco .
⤷ Title: Starting Over in Cybersecurity, One Vulnerability at a Time
════════════════════════
𐀪 Author: Groovin'
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 07:47:08 GMT
════════════════════════
⌗ Tags: #learning #cybersecurity #self_improvement #infosec #web_security
════════════════════════
𐀪 Author: Groovin'
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 07:47:08 GMT
════════════════════════
⌗ Tags: #learning #cybersecurity #self_improvement #infosec #web_security
Medium
Starting Over in Cybersecurity, One Vulnerability at a Time
I studied cybersecurity in college, but if I’m being honest, I didn’t make the most of that time.
⤷ Title: Identifying Real-World Website Security Misconfigurations: A Practical Bug Hunter’s Guide
════════════════════════
𐀪 Author: Shivam Kumar
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 09:48:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #web_security #information_security #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Shivam Kumar
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 09:48:32 GMT
════════════════════════
⌗ Tags: #ethical_hacking #web_security #information_security #bug_bounty #cybersecurity
Medium
Identifying Real-World Website Security Misconfigurations: A Practical Bug Hunter’s Guide
Introduction
⤷ Title: Dijital Vatanda Tam Hakimiyet: Hibrit Savaş Çağında Milli Teknoloji ve Siber Güvenlik Zorunluluğu
════════════════════════
𐀪 Author: Mustafa YILMAZ
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 10:11:55 GMT
════════════════════════
⌗ Tags: #hacking #software #war #ai #cybersecurity
════════════════════════
𐀪 Author: Mustafa YILMAZ
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 10:11:55 GMT
════════════════════════
⌗ Tags: #hacking #software #war #ai #cybersecurity
Medium
Dijital Vatanda Tam Hakimiyet: Hibrit Savaş Çağında Milli Teknoloji ve Siber Güvenlik Zorunluluğu
Cepteki Truva Atları
⤷ Title: What Fresh Stealer Logs Reveal That Old Breaches Can’t
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 09:01:00 GMT
════════════════════════
⌗ Tags: #data_breach #technology #threat_intelligence #infosec #cybersecurity
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 09:01:00 GMT
════════════════════════
⌗ Tags: #data_breach #technology #threat_intelligence #infosec #cybersecurity
Medium
What Fresh Stealer Logs Reveal That Old Breaches Can’t
Breach databases show you the past. Stealer logs show you the present.
⤷ Title: Try Hack Me- Hidden Deep Into My Heart Walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 09:25:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #tryhackme_writeup #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: PulseEinher
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 09:25:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #tryhackme_writeup #tryhackme #tryhackme_walkthrough
Medium
Try Hack Me- Hidden Deep Into My Heart Walkthrough
Hello, stranger — let’s begin.
⤷ Title: TryHackMe — Blog Writeup
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 09:58:51 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #wordpress #ethical_hacking #ctf
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 09:58:51 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #wordpress #ethical_hacking #ctf
Medium
TryHackMe — Blog Writeup
A Medium difficulty room covering WordPress exploitation, Metasploit, privilege escalation via SUID binary, and flag hunting.
⤷ Title: Active Directory Security Series — Part 3
════════════════════════
𐀪 Author: servet demirci
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 10:33:37 GMT
════════════════════════
⌗ Tags: #azure_active_directory #ethical_hacking #privilege_escalation #lateral_movement
════════════════════════
𐀪 Author: servet demirci
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 10:33:37 GMT
════════════════════════
⌗ Tags: #azure_active_directory #ethical_hacking #privilege_escalation #lateral_movement
Medium
Active Directory Security Series — Part 3
Privilege Escalation: How a Single Misconfigured Permission Can Bring Down an Entire Domain
⤷ Title: From Swagger to Shell: Turning a Misconfigured configUrl into a $400 RXSS Bounty
════════════════════════
𐀪 Author: dr34m14
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 12:05:32 GMT
════════════════════════
⌗ Tags: #swagger #hackerone #bug_bounty #bugbounty_writeup #xss_attack
════════════════════════
𐀪 Author: dr34m14
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 12:05:32 GMT
════════════════════════
⌗ Tags: #swagger #hackerone #bug_bounty #bugbounty_writeup #xss_attack
Medium
From Swagger to Shell: Turning a Misconfigured configUrl into a $400 RXSS Bounty
A practical story of how automated recon, historical URL mining, and careful testing led to a Medium-severity Reflected XSS — responsibly…
⤷ Title: Three Years of Breaking Into SaaS Products for Money Taught Me Five Things About How Software Gets…
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 11:51:00 GMT
════════════════════════
⌗ Tags: #web_security #startupş #bug_bounty #software_engineering #cybersecurity
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 11:51:00 GMT
════════════════════════
⌗ Tags: #web_security #startupş #bug_bounty #software_engineering #cybersecurity
Medium
Three Years of Breaking Into SaaS Products for Money Taught Me Five Things About How Software Gets…
The patterns I found across hundreds of bug bounty programs — and what they reveal about the conditions that produce vulnerabilities
⤷ Title: The Mindset Of A Young Programmer — Gaurav Pandey
════════════════════════
𐀪 Author: Gaurav Pandey
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 11:46:59 GMT
════════════════════════
⌗ Tags: #young_developers #computer_science #development #hacking #coding
════════════════════════
𐀪 Author: Gaurav Pandey
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 11:46:59 GMT
════════════════════════
⌗ Tags: #young_developers #computer_science #development #hacking #coding
Medium
The Mindset Of A Young Programmer — Gaurav Pandey
From A Young Teen — To A Programmer !!
⤷ Title: OSI vs TCP/IP — Ağların Gerçek Anatomisi
════════════════════════
𐀪 Author: HSD Gümüşhane
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 12:34:20 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #system_architecture #ethical_hacking #networking
════════════════════════
𐀪 Author: HSD Gümüşhane
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 12:34:20 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #system_architecture #ethical_hacking #networking
Medium
OSI vs TCP/IP — Ağların Gerçek Anatomisi
Bilgisayar ağlarını anlamadan siber güvenliği anlamak mümkün değildir. Çünkü tüm saldırılar, savunmalar ve veri alışverişi ağ üzerinden…
⤷ Title: Ghost Mantis — Faculty Upload (Hard Web CTF Challenge |Creator Writeup)
════════════════════════
𐀪 Author: Kaif Tarasgar
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 11:01:36 GMT
════════════════════════
⌗ Tags: #ethical_hacking #web_security #ctf_writeup #cybersecurity #ctf
════════════════════════
𐀪 Author: Kaif Tarasgar
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 11:01:36 GMT
════════════════════════
⌗ Tags: #ethical_hacking #web_security #ctf_writeup #cybersecurity #ctf
Medium
Ghost Mantis — Faculty Upload (Hard Web CTF Challenge |Creator Writeup)
⚠️ Disclaimer: This writeup and walkthrough video are published after the CTF event completion for educational and research purposes. The…
⤷ Title: Social Media Management for Modern Brands
════════════════════════
𐀪 Author: Reddefyinc
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 12:51:55 GMT
════════════════════════
⌗ Tags: #xs #tik_tok #instagram #facebook #social_media
════════════════════════
𐀪 Author: Reddefyinc
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 12:51:55 GMT
════════════════════════
⌗ Tags: #xs #tik_tok #instagram #facebook #social_media
Medium
Social Media Management for Modern Brands
In today’s digital environment, social media management is no longer a secondary marketing activity — it has become a core business…
⤷ Title: My First XSS Vulnerability. The Day I Started My Bug Bounty Journey
════════════════════════
𐀪 Author: Muhammad Uzair Khan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 13:31:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #ethical_hacking #information_security #xs
════════════════════════
𐀪 Author: Muhammad Uzair Khan
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 13:31:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #ethical_hacking #information_security #xs
Medium
My First XSS Vulnerability. The Day I Started My Bug Bounty Journey
Introduction:
⤷ Title: Application Environment Isolation
════════════════════════
𐀪 Author: Robert Broeckelmann
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 14:04:57 GMT
════════════════════════
⌗ Tags: #isolation #software_architecture #application_security #environment_isolation #security
════════════════════════
𐀪 Author: Robert Broeckelmann
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 14:04:57 GMT
════════════════════════
⌗ Tags: #isolation #software_architecture #application_security #environment_isolation #security
Medium
Application Environment Isolation
Your production environment should be isolated from your non-production environments. In fact, every application environment should be…
⤷ Title: From Broken JWT Authentication to Production-Grade Security
════════════════════════
𐀪 Author: Ashutosh Hacks
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 13:08:30 GMT
════════════════════════
⌗ Tags: #application_security #flask #jwt #web_security #devsecops
════════════════════════
𐀪 Author: Ashutosh Hacks
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 13:08:30 GMT
════════════════════════
⌗ Tags: #application_security #flask #jwt #web_security #devsecops
Medium
From Broken JWT Authentication to Production-Grade Security
Building and Hardening a Flask AppSec Authentication Lab
⤷ Title: A letter from the Ghosts who type in the dark
════════════════════════
𐀪 Author: Abhinav Jain
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 14:02:24 GMT
════════════════════════
⌗ Tags: #ghostwriting #ethical_hacking #hacking_tools #growth_hacking #hacking
════════════════════════
𐀪 Author: Abhinav Jain
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 14:02:24 GMT
════════════════════════
⌗ Tags: #ghostwriting #ethical_hacking #hacking_tools #growth_hacking #hacking
Medium
A letter from the Ghosts who type in the dark
We don’t knock. We never did.
⤷ Title: Privacy Protection Made Simple | Must-Know Checklist
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 13:50:01 GMT
════════════════════════
⌗ Tags: #hacking #web_development #web3 #cybersecurity #osint
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 13:50:01 GMT
════════════════════════
⌗ Tags: #hacking #web_development #web3 #cybersecurity #osint
Medium
Privacy Protection Made Simple | Must-Know Checklist
In today’s internet, privacy isn’t a feature, it’s a fight. Trackers, advertisers, data brokers, and even ISPs quietly map your behavior…
⤷ Title: Why We Turned On MFA for Every Login (And How We Chose the Tech)
════════════════════════
𐀪 Author: Deepak Rao Gaikwad
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 13:48:17 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #mfa #product_security
════════════════════════
𐀪 Author: Deepak Rao Gaikwad
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 13:48:17 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #mfa #product_security
Medium
Why We Turned On MFA for Every Login (And How We Chose the Tech)
From a single breach scare to TOTP for everyone — here’s the business story and the technical decisions behind it.
⤷ Title: Paste With Caution: How a Fake Claude Code Installer Drops a Fileless Implant via Deserialization
════════════════════════
𐀪 Author: Maurice Fielenbach
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 12:59:05 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #infosec #dfir #malware
════════════════════════
𐀪 Author: Maurice Fielenbach
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 12:59:05 GMT
════════════════════════
⌗ Tags: #cybersecurity #threat_intelligence #infosec #dfir #malware
Medium
Paste With Caution: How a Fake Claude Code Installer Drops a Fileless Implant via .NET Deserialization
A seven-stage fileless chain from mshta.exe to a custom C2 implant that steals credentials from seven browsers and hides behind facebook.com