Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
110K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: The Cryptography Trojan: Malicious Go Module Impersonates Foundational Library to Steal Passwords and Deploy Root Backdoors
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 02 Mar 2026 00:43:46 +0000
════════════════════════
Tags: #Malware #APT31 #cryptography #CVE_2026 #go #Golang #infosec #Linux Security #malware #Open Source Security #Rekoobe #supply chain attack
Title: Dohdoor: New Stealth Backdoor Targets US Healthcare and Education
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 02 Mar 2026 00:37:10 +0000
════════════════════════
Tags: #Malware #Cisco Talos #cyber_espionage #DLL Sideloading #DNS_over_HTTPS #DoH #Dohdoor #Education Sector #healthcare security #infosec #Lazarus Group #UAT_10027
Title: The GTFire Scheme: How Cybercriminals are Weaponizing Google’s Trusted Services for Global Phishing
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 02 Mar 2026 00:33:13 +0000
════════════════════════
Tags: #Cybercriminals #Credential Harvesting #Evasion Tactics #Google Firebase #Google Translate #Group_IB #GTFire #infosec #phishing #SaaS Abuse #threat intelligence #web app
Title: OCRFix: When Fake CAPTCHAs, AI, and Blockchains Collide to Build a Botnet
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 02 Mar 2026 00:27:28 +0000
════════════════════════
Tags: #Malware #AI SEO Poisoning #BNB Smart Chain #botnet #ClickFix #CYJAX #EtherHiding #infosec #OCRFix #PowerShell Malware #social engineering #Tesseract OCR
Title: CVE-2026-27728 (CVSS 10): Critical Command Injection Flaw in OneUptime Probe Enables Full Server Takeover
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 02 Mar 2026 00:22:54 +0000
════════════════════════
Tags: #Vulnerability Report #Command Injection #CVE_2026_27728 #CWE_78 #infosec #Monitoring Security #NetworkPathMonitor #OneUptime #Patch Alert #rce #Remote Code Execution #SaaS Security #Traceroute
Title: Critical Path Traversal Flaw in basic-ftp Exposes Node.js Apps to Arbitrary File Writes
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 02 Mar 2026 00:19:59 +0000
════════════════════════
Tags: #Vulnerability Report #basic_ftp #CVE_2026_27699 #CWE_22 #FTP Security #infosec #Node.js #Patch Alert #Path Traversal #rce #Remote Code Execution #Supply Chain Security
Title: Steering the Server: Critical 9.2 Severity SSRF Flaw in Angular SSR Allows Internal Network Probing
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 02 Mar 2026 00:14:39 +0000
════════════════════════
Tags: #Vulnerability Report #Angular #CVE_2026_27739 #Frontend Security #HttpClient #infosec #Patch Alert #Server_Side Request Forgery #SSR #ssrf #Vulnerability #Web Security
Title: The New Voice of Fraud: Cybercrime ‘Supergroup’ Recruits Female Callers to Breach Corporate IT Help Desks
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 02 Mar 2026 00:07:43 +0000
════════════════════════
Tags: #Cybercriminals #Cybercrime Recruitment #Help Desk Security #infosec #LAPSUS$ #MFA Bypass #Scattered LAPSUS$ Hunters #Scattered Spider #ShinyHunters #social engineering #Vishing
Title: Google Dismantles UNC2814’s Global Espionage Network Fueled by Google Sheets
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 02 Mar 2026 00:00:13 +0000
════════════════════════
Tags: #Cybercriminals #C2 #China_nexus #Command and Control #cyber_espionage #Google Sheets API #Google Threat Intelligence Group #GRIDTIDE #infosec #Mandiant #Telecommunications Security #UNC2814
Title: Understanding Torch Dark Web Search and Its Role in Onion Discovery
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
Time: Sun, 01 Mar 2026 23:12:57 GMT
════════════════════════
Tags: #osint #darkweb #infosec #cybersecurity
Title: Sensitive Data Exposure Attack Lab: A Hands-On Journey Through Information Leakage and File…
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
Time: Sun, 01 Mar 2026 23:52:07 GMT
════════════════════════
Tags: #python #cybersecurity #ethical_hacking #penetration_testing #web_development
Title: Steel Mountain -TryHackMe Writeup
════════════════════════
𐀪 Author: Hemantha Krishna Challa
════════════════════════
Time: Mon, 02 Mar 2026 00:15:01 GMT
════════════════════════
Tags: #ethical_hacking #tryhackme #cybersecurity #tryhackme_walkthrough #tryhackme_writeup
Title: TryHackMe: Monday Monitor Challenge Room Walkthrough
════════════════════════
𐀪 Author: Drew Arpino
════════════════════════
Time: Mon, 02 Mar 2026 00:01:01 GMT
════════════════════════
Tags: #cybersecurity #wazuh #tryhackme #tryhackme_writeup #tryhackme_walkthrough
Title: Rate Limiting Your Rails API with Rack::Attack gem
════════════════════════
𐀪 Author: Talha Khalid
════════════════════════
Time: Mon, 02 Mar 2026 00:52:59 GMT
════════════════════════
Tags: #api_rate_limiting #api_security #ruby_on_rails #web_development #rubygems
Title: How I Found a Broken Object Level Authorization (BOLA) in a Real Production App
════════════════════════
𐀪 Author: 77r4sed
════════════════════════
Time: Mon, 02 Mar 2026 00:56:04 GMT
════════════════════════
Tags: #bugbounty_writeup #idor_vulnerability #bug_bounty #bug_bounty_hunter #bug_bounty_tips
Title: Day 3 of getting started to become a Master hacker
════════════════════════
𐀪 Author: Nakul
════════════════════════
Time: Mon, 02 Mar 2026 01:03:33 GMT
════════════════════════
Tags: #penetration_testing #beginners_guide #xs #learning_to_hack #bug_bounty
Title: What Is Burp Suite?
════════════════════════
𐀪 Author: Yamini Yadav_369
════════════════════════
Time: Mon, 02 Mar 2026 02:40:12 GMT
════════════════════════
Tags: #penetration_testing #ethical_hacking #application_security #burpsuite #cybersecurity
Title: What is penetration testing? | What is pen testing?
════════════════════════
𐀪 Author: Fatihbadem
════════════════════════
Time: Mon, 02 Mar 2026 01:51:25 GMT
════════════════════════
Tags: #pentesting #hacking #sodusecure #pentest #cybersecurity
Title: How Hackers Attack Cloud Environments
════════════════════════
𐀪 Author: Md Shafiqul Baten Sumon
════════════════════════
Time: Mon, 02 Mar 2026 01:47:55 GMT
════════════════════════
Tags: #cloud_computing #artificial_intelligence #hacking #cloud_security #cybersecurity
Title: OffSec: Moneybox Walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
Time: Mon, 02 Mar 2026 01:15:48 GMT
════════════════════════
Tags: #ctf_writeup #hacking #cybersecurity #ctf #oscp
Title: The 29-Minute Window: Why AI is No Longer Optional in Cybersecurity
════════════════════════
𐀪 Author: Md Rahat Rahman Akas
════════════════════════
Time: Mon, 02 Mar 2026 01:45:23 GMT
════════════════════════
Tags: #infosec #digital_transformation #technology #cybersecurity #artificial_intelligence