⤷ Title: How I Found a Critical PII Leak in a Public API | Cyber Tamarin
════════════════════════
𐀪 Author: Cyber Tamarin
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:21:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #information_disclosure #idor #vulnerability
════════════════════════
𐀪 Author: Cyber Tamarin
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:21:53 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #information_disclosure #idor #vulnerability
Medium
How I Found a Critical PII Leak in a Public API | Cyber Tamarin
What do I do?
⤷ Title: ️ Cybersecurity Roadmap 2026: The Complete Guide to Breaking Into (and Leveling Up in)…
════════════════════════
𐀪 Author: ATNO For Cybersecurity | Hacking
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:47:09 GMT
════════════════════════
⌗ Tags: #cybersecurity_roadmap #ethical_hacking #hacking #cybersecurity #ai
════════════════════════
𐀪 Author: ATNO For Cybersecurity | Hacking
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:47:09 GMT
════════════════════════
⌗ Tags: #cybersecurity_roadmap #ethical_hacking #hacking #cybersecurity #ai
Medium
🛡️ Cybersecurity Roadmap 2026: The Complete Guide to Breaking Into (and Leveling Up in) Cybersecurity in the AI Era
📌 A Quick Note Before We Dive In
⤷ Title: CTF Basics: Understanding JSON
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #hacking #ctf #cybersecurity #technology
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #hacking #ctf #cybersecurity #technology
Medium
CTF Basics: Understanding JSON
This article covers the basics of JSON (JavaScript Object Notation), how to read and manipulate JSON data, and where to look for flags in…
⤷ Title: ️ The Tale of Alerts: True or False in Cybersecurity
════════════════════════
𐀪 Author: Latha
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:29:23 GMT
════════════════════════
⌗ Tags: #network_security #learning #information_security #cybersecurity #infosec
════════════════════════
𐀪 Author: Latha
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:29:23 GMT
════════════════════════
⌗ Tags: #network_security #learning #information_security #cybersecurity #infosec
Medium
🛡️ The Tale of Alerts: True or False in Cybersecurity
In incident response, not every alert tells the truth. Some protect you. Some mislead you. And some stay silent when they shouldn’t.
⤷ Title: TryHackMe — Windows Basics |Operating Systems Basics|Pre Security (New)
════════════════════════
𐀪 Author: SiR but not Alex
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:06:16 GMT
════════════════════════
⌗ Tags: #tryhackme_room #tryhackme #tryhackme_walkthrough #tryhackme_writeup #hacker
════════════════════════
𐀪 Author: SiR but not Alex
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:06:16 GMT
════════════════════════
⌗ Tags: #tryhackme_room #tryhackme #tryhackme_walkthrough #tryhackme_writeup #hacker
Medium
TryHackMe — Windows Basics |Operating Systems Basics|Pre Security (New)
introduction:
⤷ Title: TryHackMe: Easy Peasy Walkthrough (Spoiler: The name is a trap!)
════════════════════════
𐀪 Author: VxOM
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:33:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #easypeasy #vapt #tryhackme
════════════════════════
𐀪 Author: VxOM
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:33:35 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #easypeasy #vapt #tryhackme
Medium
TryHackMe: Easy Peasy Walkthrough (Spoiler: The name is a trap!)
So, I was just chilling at my room with some coffee, trying to get some hands-on practice of labs, and I clicked on the “Easy Peasy” room…
⤷ Title: HackTheBox — Bastard-Walkthrough
════════════════════════
𐀪 Author: Kapil Verma
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:27:39 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox #bastard #hackthebox_writeup #htb
════════════════════════
𐀪 Author: Kapil Verma
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:27:39 GMT
════════════════════════
⌗ Tags: #hackthebox_walkthrough #hackthebox #bastard #hackthebox_writeup #htb
Medium
HackTheBox — Bastard-Walkthrough
Nmap scan:
⤷ Title: HTB Stocker Walkthrough
════════════════════════
𐀪 Author: Kapil Verma
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:58:42 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox_walkthrough #htb #stocker
════════════════════════
𐀪 Author: Kapil Verma
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 11:58:42 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox_walkthrough #htb #stocker
Medium
HTB Stocker Walkthrough
Let’s start with the enumeration:
⤷ Title: Web Application Security: Hands-On Practice (Chapter 12 from The Web Application Hacker’s Handbook)
════════════════════════
𐀪 Author: Aditya Kumar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:36:57 GMT
════════════════════════
⌗ Tags: #ethical_hacking #chapter12 #testing #web_application_security #cybersecurity
════════════════════════
𐀪 Author: Aditya Kumar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:36:57 GMT
════════════════════════
⌗ Tags: #ethical_hacking #chapter12 #testing #web_application_security #cybersecurity
Medium
Web Application Security: Hands-On Practice (Chapter 12 from The Web Application Hacker’s Handbook)
Note: This write-up reflects my learning and hands-on practice based on the book The Web Application Hacker’s Handbook: Discovering and…
⤷ Title: Why Small Businesses in India Are the Biggest Targets for Cyber Attacks (And How to Stay…
════════════════════════
𐀪 Author: Logging Security
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:29:37 GMT
════════════════════════
⌗ Tags: #cyberattack #ethical_hacking #cybersecurity #small_business #data_protection
════════════════════════
𐀪 Author: Logging Security
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:29:37 GMT
════════════════════════
⌗ Tags: #cyberattack #ethical_hacking #cybersecurity #small_business #data_protection
Medium
🛡 Why Small Businesses in India Are the Biggest Targets for Cyber Attacks (And How to Stay…
When people hear about cyber attacks, they think of big corporations.
⤷ Title: ⚡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 18:56:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 18:56:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Phishing Pages for Zoom and Google Meet Install Teramind Monitoring Tool
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:31:14 +0000
════════════════════════
⌗ Tags: #Security #Malware #Scams and Fraud #Cybersecurity #Employee Monitoring #Google Meet #Scam #Teramind #Windows #Zoom
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:31:14 +0000
════════════════════════
⌗ Tags: #Security #Malware #Scams and Fraud #Cybersecurity #Employee Monitoring #Google Meet #Scam #Teramind #Windows #Zoom
Hackread
Phishing Pages for Zoom and Google Meet Install Teramind Monitoring Tool
Follow us on all social media platforms @Hackread
⤷ Title: Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:00:17 +0000
════════════════════════
⌗ Tags: #Press Release
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:00:17 +0000
════════════════════════
⌗ Tags: #Press Release
Hackread
Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026
Torrance, United States / California, 2nd March 2026, CyberNewswire
⤷ Title: Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:00:34 +0000
════════════════════════
⌗ Tags: #Press Release
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:00:34 +0000
════════════════════════
⌗ Tags: #Press Release
Daily CyberSecurity
Criminal IP to Present Decision-Ready Threat Intelligence at RSAC™ 2026
Torrance, United States / California, 2nd March 2026, CyberNewswire
⤷ Title: How a Missing Type Check Turned Into a Remote Node Crash ($100 Bounty)
════════════════════════
𐀪 Author: Sumit Shah (HackSage)
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:51:39 GMT
════════════════════════
⌗ Tags: #web3 #web3hacking #cybersecurity #bug_bounty #javanoscript
════════════════════════
𐀪 Author: Sumit Shah (HackSage)
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:51:39 GMT
════════════════════════
⌗ Tags: #web3 #web3hacking #cybersecurity #bug_bounty #javanoscript
Medium
How a Missing Type Check Turned Into a Remote Node Crash ($100 Bounty)
Hey there, security enthusiasts and fellow hackers! 🙂↔️
⤷ Title: Part 2: Thinking Like an API Attacker
════════════════════════
𐀪 Author: Falilatowolabi(leogold)
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:46:30 GMT
════════════════════════
⌗ Tags: #apisattackermindset #bug_bounty
════════════════════════
𐀪 Author: Falilatowolabi(leogold)
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:46:30 GMT
════════════════════════
⌗ Tags: #apisattackermindset #bug_bounty
Medium
Part 2: Thinking Like an API Attacker
Thinking like an API attacker means stepping outside the normal user flow. A regular user follows the UI. An attacker interacts directly…
⤷ Title: From Recon to Exploitation: How Attackers Discover, Exploit, and Chain Web App Vulnerabilities —…
════════════════════════
𐀪 Author: Aanchal Singh Rajawat
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:31:52 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #web_security #threat_intelligence #bug_bounty
════════════════════════
𐀪 Author: Aanchal Singh Rajawat
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:31:52 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #web_security #threat_intelligence #bug_bounty
Medium
From Recon to Exploitation: How Attackers Discover, Exploit, and Chain Web App Vulnerabilities — and How Defenders Can Detect and…
Hello Hackers, It’s me again… your chota-mota H@ck3r
⤷ Title: Access Control Vulnerabilities (Through Burp Suite Labs) Pt. 2: Horizontal Privilege Escalation
════════════════════════
𐀪 Author: heckor
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:10:22 GMT
════════════════════════
⌗ Tags: #access_control #penetration_testing #bug_bounty #cybersecurity #vulnerability_assessment
════════════════════════
𐀪 Author: heckor
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:10:22 GMT
════════════════════════
⌗ Tags: #access_control #penetration_testing #bug_bounty #cybersecurity #vulnerability_assessment
Medium
Access Control Vulnerabilities (Through Burp Suite Labs) Pt. 2: Horizontal Privilege Escalation
Horizontal Privilege Escalation, IDOR, Multi-step Access Control
⤷ Title: How Hackers Bypass Multi-Factor Authentication (MFA) in 2026
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:26:20 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ethical_hacking #cyber_security_awareness #hacking
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:26:20 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #ethical_hacking #cyber_security_awareness #hacking
Medium
How Hackers Bypass Multi-Factor Authentication (MFA) in 2026
Introduction
⤷ Title: Malware Development — 4 (APC Injection)
════════════════════════
𐀪 Author: 0r
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:25:51 GMT
════════════════════════
⌗ Tags: #red_team #pentesting #malware #security #hacking
════════════════════════
𐀪 Author: 0r
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 13:25:51 GMT
════════════════════════
⌗ Tags: #red_team #pentesting #malware #security #hacking
Medium
Malware Development — 4 (APC Injection)
This article is written for educational and defensive security research purposes only. Understanding how malicious techniques work is…
⤷ Title: Understanding Sliver C2 Framework: Beacon and Session Modes
════════════════════════
𐀪 Author: Allen Ace
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:14:47 GMT
════════════════════════
⌗ Tags: #penetration_testing #command_and_control #cybersecurity #security_research #ethical_hacking
════════════════════════
𐀪 Author: Allen Ace
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 14:14:47 GMT
════════════════════════
⌗ Tags: #penetration_testing #command_and_control #cybersecurity #security_research #ethical_hacking
Medium
Understanding Sliver C2 Framework: Beacon and Session Modes
Implant Architecture and Design Philosophy