⤷ Title: “5 Most Common Configuration Mistakes Attacking Web Applications (According to OWASP)”
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 09:50:12 GMT
════════════════════════
⌗ Tags: #ethical_hacking #deployment #cybersecurity
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 09:50:12 GMT
════════════════════════
⌗ Tags: #ethical_hacking #deployment #cybersecurity
Medium
“5 Most Common Configuration Mistakes Attacking Web Applications (According to OWASP)”
Why is Configuration and Deployment Management Testing Important?
⤷ Title: Ethical Hacking: Stopping Hackers Before They Strike
════════════════════════
𐀪 Author: afreeza
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 09:17:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cyberattack #cybersecurity
════════════════════════
𐀪 Author: afreeza
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 09:17:30 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cyberattack #cybersecurity
Medium
Ethical Hacking: Stopping Hackers Before They Strike
Let’s be honest — almost everything we do today lives online.
⤷ Title: “Mapping Web Applications: 5 OWASP Information Gathering Steps for Pro Pentesters”
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 09:14:29 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_gathering #owasp_top_10 #website
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 09:14:29 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_gathering #owasp_top_10 #website
Medium
“Mapping Web Applications: 5 OWASP Information Gathering Steps for Pro Pentesters”
In the world of web security testing, information gathering is the primary foundation for the success of the entire penetration testing…
⤷ Title: My API Security Journey: From Endpoints to Thinking Like an Attacker
════════════════════════
𐀪 Author: Animashawunkomolara
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 10:44:09 GMT
════════════════════════
⌗ Tags: #web_application_security #api_security #cybersecurity #api
════════════════════════
𐀪 Author: Animashawunkomolara
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 10:44:09 GMT
════════════════════════
⌗ Tags: #web_application_security #api_security #cybersecurity #api
Medium
My API Security Journey: From Endpoints to Thinking Like an Attacker
Q1 2025 : AWS Cloud Practitioner
Q2 2025 : CISSP
Q3 2025 : AI Fundamentals
Q4 2025-Q3 2026: Specialization in Application Security.
Q2 2025 : CISSP
Q3 2025 : AI Fundamentals
Q4 2025-Q3 2026: Specialization in Application Security.
⤷ Title: Lab: Stored XSS into HTML context with nothing encoded
════════════════════════
𐀪 Author: jaejun835
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 09:30:13 GMT
════════════════════════
⌗ Tags: #portswigger #xs #burpsuite
════════════════════════
𐀪 Author: jaejun835
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 09:30:13 GMT
════════════════════════
⌗ Tags: #portswigger #xs #burpsuite
Medium
Lab: Stored XSS into HTML context with nothing encoded
[Problem]
⤷ Title: How I Found Yet Another Misconfiguration on This College Site
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 10:51:58 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_writeup #bug_bounty_hunting #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Md Tanjimul Islam Sifat
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 10:51:58 GMT
════════════════════════
⌗ Tags: #bug_bounty #bug_bounty_writeup #bug_bounty_hunting #cybersecurity #ethical_hacking
Medium
How I Found Yet Another Misconfiguration on This College Site
Not every bug bounty story starts with a wild hack or some high-stakes drama. Most days, it’s a lot more boring than that — just poking…
⤷ Title: How to Protect Your SaaS from Bot Attacks with SafeLine WAF
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 17:25:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 17:25:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 16:06:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 16:06:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: 6 Ways Agentic AI Changes How Systems Act and Adapt
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:25:16 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Technology #Agentic AI #AI #Automation #Machine Learning
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:25:16 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #Technology #Agentic AI #AI #Automation #Machine Learning
Hackread
6 Ways Agentic AI Changes How Systems Act and Adapt
Follow us on all social media platforms @Hackread
⤷ Title: I’ve Reviewed 47 SaaS Authentication Systems. Here Are the Five Patterns I Keep Finding.
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:01:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #software_development #infosec_write_ups #bug_bounty #sass
════════════════════════
𐀪 Author: Cyphersilhouette
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:01:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #software_development #infosec_write_ups #bug_bounty #sass
Medium
I’ve Reviewed 47 SaaS Authentication Systems. Here Are the Five Patterns I Keep Finding.
Not the dramatic vulnerabilities — the quiet, structural ones that take an afternoon to fix and months to discover without a dedicated…
⤷ Title: Beyond the Cipher: Breaking Client-Side Encryption and Uncovering Systemic API Failures
════════════════════════
𐀪 Author: HR
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:31:48 GMT
════════════════════════
⌗ Tags: #hacking #mobile_app_development #bug_bounty #pentesting #cybersecurity
════════════════════════
𐀪 Author: HR
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:31:48 GMT
════════════════════════
⌗ Tags: #hacking #mobile_app_development #bug_bounty #pentesting #cybersecurity
Medium
Beyond the Cipher: Breaking Client-Side Encryption and Uncovering Systemic API Failures
Android · API Security · AES-256-CBC · BOLA
⤷ Title: How I Found a Critical PII Leak in a Public API | Cyber Tamarin
════════════════════════
𐀪 Author: Cyber Tamarin
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:21:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #information_disclosure #idor #vulnerability
════════════════════════
𐀪 Author: Cyber Tamarin
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:21:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #information_disclosure #idor #vulnerability
Medium
How I Found a Critical PII Leak in a Public API | Cyber Tamarin
What do I do?
⤷ Title: ️ Cybersecurity Roadmap 2026: The Complete Guide to Breaking Into (and Leveling Up in)…
════════════════════════
𐀪 Author: ATNO For Cybersecurity | Hacking
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:47:09 GMT
════════════════════════
⌗ Tags: #cybersecurity_roadmap #ethical_hacking #hacking #cybersecurity #ai
════════════════════════
𐀪 Author: ATNO For Cybersecurity | Hacking
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:47:09 GMT
════════════════════════
⌗ Tags: #cybersecurity_roadmap #ethical_hacking #hacking #cybersecurity #ai
Medium
🛡️ Cybersecurity Roadmap 2026: The Complete Guide to Breaking Into (and Leveling Up in) Cybersecurity in the AI Era
📌 A Quick Note Before We Dive In
⤷ Title: CTF Basics: Understanding JSON
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #hacking #ctf #cybersecurity #technology
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #hacking #ctf #cybersecurity #technology
Medium
CTF Basics: Understanding JSON
This article covers the basics of JSON (JavaScript Object Notation), how to read and manipulate JSON data, and where to look for flags in…
⤷ Title: ️ The Tale of Alerts: True or False in Cybersecurity
════════════════════════
𐀪 Author: Latha
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:29:23 GMT
════════════════════════
⌗ Tags: #network_security #learning #information_security #cybersecurity #infosec
════════════════════════
𐀪 Author: Latha
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:29:23 GMT
════════════════════════
⌗ Tags: #network_security #learning #information_security #cybersecurity #infosec
Medium
🛡️ The Tale of Alerts: True or False in Cybersecurity
In incident response, not every alert tells the truth. Some protect you. Some mislead you. And some stay silent when they shouldn’t.
⤷ Title: TryHackMe — Windows Basics |Operating Systems Basics|Pre Security (New)
════════════════════════
𐀪 Author: SiR but not Alex
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:06:16 GMT
════════════════════════
⌗ Tags: #tryhackme_room #tryhackme #tryhackme_walkthrough #tryhackme_writeup #hacker
════════════════════════
𐀪 Author: SiR but not Alex
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:06:16 GMT
════════════════════════
⌗ Tags: #tryhackme_room #tryhackme #tryhackme_walkthrough #tryhackme_writeup #hacker
Medium
TryHackMe — Windows Basics |Operating Systems Basics|Pre Security (New)
introduction:
⤷ Title: TryHackMe: Easy Peasy Walkthrough (Spoiler: The name is a trap!)
════════════════════════
𐀪 Author: VxOM
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:33:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #easypeasy #vapt #tryhackme
════════════════════════
𐀪 Author: VxOM
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:33:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #easypeasy #vapt #tryhackme
Medium
TryHackMe: Easy Peasy Walkthrough (Spoiler: The name is a trap!)
So, I was just chilling at my room with some coffee, trying to get some hands-on practice of labs, and I clicked on the “Easy Peasy” room…
⤷ Title: HackTheBox — Bastard-Walkthrough
════════════════════════
𐀪 Author: Kapil Verma
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:27:39 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox #bastard #hackthebox_writeup #htb
════════════════════════
𐀪 Author: Kapil Verma
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:27:39 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox #bastard #hackthebox_writeup #htb
Medium
HackTheBox — Bastard-Walkthrough
Nmap scan:
⤷ Title: HTB Stocker Walkthrough
════════════════════════
𐀪 Author: Kapil Verma
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:58:42 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox_walkthrough #htb #stocker
════════════════════════
𐀪 Author: Kapil Verma
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:58:42 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox_walkthrough #htb #stocker
Medium
HTB Stocker Walkthrough
Let’s start with the enumeration:
⤷ Title: Web Application Security: Hands-On Practice (Chapter 12 from The Web Application Hacker’s Handbook)
════════════════════════
𐀪 Author: Aditya Kumar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:36:57 GMT
════════════════════════
⌗ Tags: #ethical_hacking #chapter12 #testing #web_application_security #cybersecurity
════════════════════════
𐀪 Author: Aditya Kumar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:36:57 GMT
════════════════════════
⌗ Tags: #ethical_hacking #chapter12 #testing #web_application_security #cybersecurity
Medium
Web Application Security: Hands-On Practice (Chapter 12 from The Web Application Hacker’s Handbook)
Note: This write-up reflects my learning and hands-on practice based on the book The Web Application Hacker’s Handbook: Discovering and…
⤷ Title: Why Small Businesses in India Are the Biggest Targets for Cyber Attacks (And How to Stay…
════════════════════════
𐀪 Author: Logging Security
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:29:37 GMT
════════════════════════
⌗ Tags: #cyberattack #ethical_hacking #cybersecurity #small_business #data_protection
════════════════════════
𐀪 Author: Logging Security
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:29:37 GMT
════════════════════════
⌗ Tags: #cyberattack #ethical_hacking #cybersecurity #small_business #data_protection
Medium
🛡 Why Small Businesses in India Are the Biggest Targets for Cyber Attacks (And How to Stay…
When people hear about cyber attacks, they think of big corporations.