⤷ Title: Malware Analysis and Reverse Engineering Report: A Hands-On Journey Through Macro Malware…
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:44:31 GMT
════════════════════════
⌗ Tags: #python #microsoft #penetration_testing #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:44:31 GMT
════════════════════════
⌗ Tags: #python #microsoft #penetration_testing #ethical_hacking #cybersecurity
Medium
Malware Analysis and Reverse Engineering Report: A Hands-On Journey Through Macro Malware Dissection
Comprehensive dissection of macro-based malware: from static analysis to dynamic execution and threat intelligence validation
⤷ Title: Hackviser: SentryNode Write-ups
════════════════════════
𐀪 Author: Written by k41r0s3
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:02:03 GMT
════════════════════════
⌗ Tags: #infosec_write_ups #hackviser #penetration_testing #cybersecurity #web_penetration_testing
════════════════════════
𐀪 Author: Written by k41r0s3
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:02:03 GMT
════════════════════════
⌗ Tags: #infosec_write_ups #hackviser #penetration_testing #cybersecurity #web_penetration_testing
Medium
Hackviser: SentryNode Write-ups
By k41r0s3 | HackViser CTF Write-up
⤷ Title: TryHackMe Operation Endgame Writeup
════════════════════════
𐀪 Author: ayed djalil
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:29:40 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #ctf #tryhackme_writeup #tryhackme
════════════════════════
𐀪 Author: ayed djalil
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 15:29:40 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #ctf #tryhackme_writeup #tryhackme
Medium
TryHackMe Operation Endgame Writeup
Room link: https://tryhackme.com/room/operationendgame/
⤷ Title: 【威脅情資】nc 天堂釣魚網站遊戲安裝檔夾帶 RedCap 木馬之逆向分析
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:12:32 GMT
════════════════════════
⌗ Tags: #supply_chain #info_sec_writeups #apt #blue_team #malware_analysis
════════════════════════
𐀪 Author: segalee
════════════════════════
ⴵ Time: Thu, 26 Feb 2026 04:12:32 GMT
════════════════════════
⌗ Tags: #supply_chain #info_sec_writeups #apt #blue_team #malware_analysis
Medium
【威脅情資】遊戲安裝檔夾帶 RedCap 木馬之逆向分析
免責聲明:公開目的在於協助防禦、偵測與應變,不鼓勵亦不協助任何未經授權之入侵、存取或濫用行為
⤷ Title: New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 22:38:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 22:38:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 22:22:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 22:22:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Upcoming Opportunities in Space Investment: What to Know About SpaceX
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 18:15:15 +0000
════════════════════════
⌗ Tags: #Technology #Fintech #Press Release #Elon Musk #IPO #SpaceX
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 18:15:15 +0000
════════════════════════
⌗ Tags: #Technology #Fintech #Press Release #Elon Musk #IPO #SpaceX
Hackread
Upcoming Opportunities in Space Investment: What to Know About SpaceX
Follow us on all social media @Hackread
⤷ Title: Citrix Bleed: How a Single Bug Leaked Corporate Secrets (CVE-2023–4966)
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 17:42:28 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #hacking #cybersecurity #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 17:42:28 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #hacking #cybersecurity #bug_bounty_tips #bug_bounty
Medium
🩸 Citrix Bleed: How a Single Bug Leaked Corporate Secrets (CVE-2023–4966)
TL;DR — The Juicy Bits
⤷ Title: (High-vuln) How I Bypassed IP Restrictions, CAPTCHA, and Unlocked Unlimited Brute-Force in One Shot
════════════════════════
𐀪 Author: Ziad (Zierax)
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 17:34:39 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #hacking #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Ziad (Zierax)
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 17:34:39 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #bug_bounty_tips #hacking #bug_bounty #cybersecurity
Medium
(High-vuln) How I Bypassed IP Restrictions, CAPTCHA, and Unlocked Unlimited Brute-Force in One Shot
Target Selection: Why This One Caught My Eye
⤷ Title: The Complete Red Teaming Roadmap -Beginner to Professional (100% Free Resources)
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 18:28:45 GMT
════════════════════════
⌗ Tags: #ethical_hacking #red_team #hacking #infosec #cybersecurity
════════════════════════
𐀪 Author: Hacker MD
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 18:28:45 GMT
════════════════════════
⌗ Tags: #ethical_hacking #red_team #hacking #infosec #cybersecurity
Medium
The Complete Red Teaming Roadmap -Beginner to Professional (100% Free Resources)
Every skill, every tool, every YouTube channel you need — in the exact order you should learn them
⤷ Title: Popular Iranian App BadeSaba was Hacked to Send “Help Is on the Way” Alerts
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:04:35 +0000
════════════════════════
⌗ Tags: #Security #Hacking News #BadeSaba Calander #Cyber Attack #Cybersecurity #Cyberwar #Iran #Israel
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:04:35 +0000
════════════════════════
⌗ Tags: #Security #Hacking News #BadeSaba Calander #Cyber Attack #Cybersecurity #Cyberwar #Iran #Israel
Hackread
Popular Iranian App BadeSaba was Hacked to Send “Help Is on the Way” Alerts
Follow us on all social media platforms @Hackread
⤷ Title: Bug Bounty Cheatsheet Worth 7890$
════════════════════════
𐀪 Author: Anonymous Traiger
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:35:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #jobs #ethical_hacking #bug_bounty #google
════════════════════════
𐀪 Author: Anonymous Traiger
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:35:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #jobs #ethical_hacking #bug_bounty #google
Medium
Bug Bounty Cheatsheet Worth 7890$
Friend Link
⤷ Title: The False Promise of Multi Login Isolation: An Architectural “Identity Bridge” in Google’s…
════════════════════════
𐀪 Author: Jawad Momani
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:30:12 GMT
════════════════════════
⌗ Tags: #google #cybersecurity #bug_bounty_tips #bug_bounty #infosec
════════════════════════
𐀪 Author: Jawad Momani
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:30:12 GMT
════════════════════════
⌗ Tags: #google #cybersecurity #bug_bounty_tips #bug_bounty #infosec
Medium
The False Promise of Multi Login Isolation: An Architectural “Identity Bridge” in Google’s InnerTube API
Date: March 2, 2026
⤷ Title: Hobins Toolbox: The pwnagotchi
════════════════════════
𐀪 Author: Hobin Rood
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:11:00 GMT
════════════════════════
⌗ Tags: #technology #hacking #cybersecurity #education #social_engineering
════════════════════════
𐀪 Author: Hobin Rood
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:11:00 GMT
════════════════════════
⌗ Tags: #technology #hacking #cybersecurity #education #social_engineering
Medium
Hobins Toolbox: The pwnagotchi
Pwnagotchi is what happens when someone looks at a Tamagotchi and thinks, what if this thing actually fed on Wi‑Fi instead of digital…
⤷ Title: Understanding Haystak Dark Web Search and How It Indexes Onion Sites
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:11:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #darkweb #osint #infosec
════════════════════════
𐀪 Author: Tor BBB
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:11:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #darkweb #osint #infosec
Medium
Understanding Haystak Dark Web Search and How It Indexes Onion Sites
Dark web search engines operate very differently from Google. They do not crawl the entire web, nor do they promise complete indexing…
⤷ Title: Thinking Like an Attacker: How API Pen-Testers Identify Injection Vulnerabilities
════════════════════════
𐀪 Author: Esther Kenneth
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:27:07 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #api #api_security #penetration_testing
════════════════════════
𐀪 Author: Esther Kenneth
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:27:07 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #api #api_security #penetration_testing
Medium
Thinking Like an Attacker: How API Pen-Testers Identify Injection Vulnerabilities
APIs are designed to accept data. From an attacker’s point of view, every field that accepts input is a potential entry point into backend…
⤷ Title: Why API Penetration Testing Is Different from Web Application Testing
════════════════════════
𐀪 Author: Iseoluwa Ogunnaike
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:05:21 GMT
════════════════════════
⌗ Tags: #penetration_testing #api #pentesting
════════════════════════
𐀪 Author: Iseoluwa Ogunnaike
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:05:21 GMT
════════════════════════
⌗ Tags: #penetration_testing #api #pentesting
Medium
Why API Penetration Testing Is Different from Web Application Testing
API penetration testing requires a different mindset, methodology, and depth of reasoning compared to traditional web application testing…
⤷ Title: Non-Technical Bug Bounty Tips
════════════════════════
𐀪 Author: Austin Long
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:24:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #web_security #bug_bounty
════════════════════════
𐀪 Author: Austin Long
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 12:24:31 GMT
════════════════════════
⌗ Tags: #cybersecurity #penetration_testing #web_security #bug_bounty
Medium
Non-Technical Bug Bounty Tips
Some lessons learned that has helped me be successful
⤷ Title: Windows Ransomware Investigation - TryHackMe 25 Days of Cyber Security Day 23
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:21:55 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #tryhackme #blue_team #information_security
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:21:55 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #tryhackme #blue_team #information_security
Medium
Windows Ransomware Investigation - TryHackMe 25 Days of Cyber Security Day 23
Get hands-on experience investigating the impact of a ransomware attack on a Windows endpoint using Task Scheduler, Disk Management…
⤷ Title: API Penetration Testing: Exploiting Vulnerabilities in the Damn Vulnerable RESTaurant
════════════════════════
𐀪 Author: Reduan Islam Badhon
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:36:31 GMT
════════════════════════
⌗ Tags: #api #owasp_api_security_top_10 #web_security #api_security #owasp_top_10
════════════════════════
𐀪 Author: Reduan Islam Badhon
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:36:31 GMT
════════════════════════
⌗ Tags: #api #owasp_api_security_top_10 #web_security #api_security #owasp_top_10
Medium
API Penetration Testing: Exploiting Vulnerabilities in the Damn Vulnerable RESTaurant
Setup & Installation
⤷ Title: Securing AI-Powered APIs: What API Security Looks Like in the Age of LLMs
════════════════════════
𐀪 Author: Esther Kenneth
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:35:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security #llm #api #ai_agent
════════════════════════
𐀪 Author: Esther Kenneth
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 20:35:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #api_security #llm #api #ai_agent
Medium
Securing AI-Powered APIs: What API Security Looks Like in the Age of LLMs
AI-powered APIs now sit at the center of many modern systems. Chatbots, copilots, recommendation engines, and decision-support tools all…