⤷ Title: Guía de Waybackurls: Extracción de URLs Históricas para Bug Bounty
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #hacking #cheatsheet #technology
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #hacking #cheatsheet #technology
Medium
Guía de Waybackurls: Extracción de URLs Históricas para Bug Bounty
Domina Waybackurls para encontrar endpoints ocultos, parámetros sensibles y archivos JS antiguos en tus auditorías de seguridad.
⤷ Title: HTB Knife: PHP 8.1.0-dev Supply Chain Backdoor RCE to Root
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 23:46:26 GMT
════════════════════════
⌗ Tags: #ctf #ethical_hacking #penetration_testing #cybersecurity #hackthebox
════════════════════════
𐀪 Author: Onurcan Genç
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 23:46:26 GMT
════════════════════════
⌗ Tags: #ctf #ethical_hacking #penetration_testing #cybersecurity #hackthebox
Medium
HTB Knife: PHP 8.1.0-dev Supply Chain Backdoor RCE to Root
First, add your IP to /etc/hosts to make the target accessible while conducting scans.
⤷ Title: Driftingblue6 Walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 23:13:06 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #vulnerability #cybersecurity #oscp
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 23:13:06 GMT
════════════════════════
⌗ Tags: #ethical_hacking #information_security #vulnerability #cybersecurity #oscp
Medium
🔥Driftingblue6 Walkthrough (Educational & Defensive Analysis)
By cyber_public_school | Cyber Security Researcher
⤷ Title: North Korean “StegaBin” Campaign Targets Developers with Steganographic Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 02:53:18 +0000
════════════════════════
⌗ Tags: #Malware #Contagious Interview #Famous Chollima #infosec #Lazarus Group #npm Security #pastebin #Socket #StegaBin #steganography #supply chain attack #truffleHog
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 02:53:18 +0000
════════════════════════
⌗ Tags: #Malware #Contagious Interview #Famous Chollima #infosec #Lazarus Group #npm Security #pastebin #Socket #StegaBin #steganography #supply chain attack #truffleHog
Daily CyberSecurity
North Korean "StegaBin" Campaign Targets Developers with Steganographic Malware
Socket uncovers "StegaBin," a North Korean malware campaign hiding C2 URLs in Pastebin essays to steal developer secrets via 26 typosquatted npm packages.
⤷ Title: Security Alert: Android March 2026 Update Targets Actively Exploited Zero-Day
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 02:12:34 +0000
════════════════════════
⌗ Tags: #Android #Vulnerability Report #Android security #CVE_2026_0006 #CVE_2026_21385 #infosec #Patch Alert #Qualcomm #rce #Remote Code Execution #vulnerability management #zero_day
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 02:12:34 +0000
════════════════════════
⌗ Tags: #Android #Vulnerability Report #Android security #CVE_2026_0006 #CVE_2026_21385 #infosec #Patch Alert #Qualcomm #rce #Remote Code Execution #vulnerability management #zero_day
Daily CyberSecurity
Security Alert: Android March 2026 Update Targets Actively Exploited Zero-Day
Google’s March 2026 Android update fixes 129 flaws, including CVE-2026-21385—a high-severity Qualcomm vulnerability currently being exploited in the wild.
⤷ Title: CVE-2026-2256: Unpatched Flaw in MS-Agent Lets Hackers Hijack AI Assistants
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 01:59:48 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI security #autonomous agents #Command Injection #CVE_2026_2256 #Cyber Threats #infosec #LLM Security #MS_Agent #Prompt injection #zero_day
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 01:59:48 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI security #autonomous agents #Command Injection #CVE_2026_2256 #Cyber Threats #infosec #LLM Security #MS_Agent #Prompt injection #zero_day
Daily CyberSecurity
CVE-2026-2256: Unpatched Flaw in MS-Agent Lets Hackers Hijack AI Assistants
An unpatched zero-day flaw (CVE-2026-2256) in the MS-Agent framework allows hackers to use prompt injection to execute OS commands and hijack AI systems.
⤷ Title: When the Code Reviewer Is Not Human: Claude and the Reinvention of Security
════════════════════════
𐀪 Author: Mahesh Aswani
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 01:42:26 GMT
════════════════════════
⌗ Tags: #application_security #agentic_ai #ai_code_review #claude #devsecops
════════════════════════
𐀪 Author: Mahesh Aswani
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 01:42:26 GMT
════════════════════════
⌗ Tags: #application_security #agentic_ai #ai_code_review #claude #devsecops
Medium
When the Code Reviewer Is Not Human: Claude and the Reinvention of Security
There is a particular kind of dread that settles in when a tool does not just help you do your job, but starts to perform the job itself.
⤷ Title: CSRF To 1-Step Account Takeover
════════════════════════
𐀪 Author: Yousef
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 02:39:08 GMT
════════════════════════
⌗ Tags: #hacking #account_takeover #bug_bounty_writeup #csrf
════════════════════════
𐀪 Author: Yousef
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 02:39:08 GMT
════════════════════════
⌗ Tags: #hacking #account_takeover #bug_bounty_writeup #csrf
Medium
CSRF To 1-Step Account Takeover
During the review of the client’s HTTP traffic, I observed that the SESSION_ID cookie is configured with SameSite=None. This configuration…
⤷ Title: Stealing the Keys to the Cloud: SpecterBroker Unveils the Secrets of Windows Token Broker
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:42:22 +0000
════════════════════════
⌗ Tags: #Open Source Tool #Azure #Credential Theft #DPAPI #EntraID #NGC tokens #post_exploitation #red teaming #SpecterBroker #Tech News 2026 #Token Broker #WAM #Windows Authentication Manager
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:42:22 +0000
════════════════════════
⌗ Tags: #Open Source Tool #Azure #Credential Theft #DPAPI #EntraID #NGC tokens #post_exploitation #red teaming #SpecterBroker #Tech News 2026 #Token Broker #WAM #Windows Authentication Manager
Penetration Testing Tools
Stealing the Keys to the Cloud: SpecterBroker Unveils the Secrets of Windows Token Broker
SpecterBroker is a new post-exploitation powerhouse that extracts and decrypts Windows authentication tokens (WAM/TBRes) for full EntraID and Azure takeover.
⤷ Title: Digital Vendetta: The Unmasking of “Dort,” the Kimwolf Botmaster Behind a Global Swatting Campaign
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:37:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Benjamin Brundage #Cybercrime 2026 #DDoS attacks #Dort #Jacob Butler #Kimwolf botnet #KrebsOnSecurity #LAPSUS$ #Minecraft hacking #swatting #Tech News 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:37:33 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Benjamin Brundage #Cybercrime 2026 #DDoS attacks #Dort #Jacob Butler #Kimwolf botnet #KrebsOnSecurity #LAPSUS$ #Minecraft hacking #swatting #Tech News 2026
Penetration Testing Tools
Digital Vendetta: The Unmasking of "Dort," the Kimwolf Botmaster Behind a Global Swatting Campaign
In early January, a veritable tempest engulfed the sprawling Kimwolf botnet. Following the publication of an exposé detailing
⤷ Title: Digital Phantoms for Sale: The Rise and Fall of OnlyFake’s $1.2M Counterfeit Empire
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:36:36 +0000
════════════════════════
⌗ Tags: #Cybercriminals #AI deepfake documents #cryptocurrency scams #Cybercrime 2026 #fake passports #FBI #identity fraud #KYC bypass #Money Laundering #OnlyFake #Yurii Nazarenko
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:36:36 +0000
════════════════════════
⌗ Tags: #Cybercriminals #AI deepfake documents #cryptocurrency scams #Cybercrime 2026 #fake passports #FBI #identity fraud #KYC bypass #Money Laundering #OnlyFake #Yurii Nazarenko
Penetration Testing Tools
Digital Phantoms for Sale: The Rise and Fall of OnlyFake’s $1.2M Counterfeit Empire
A clandestine digital service capable of fabricating a passport from virtually any nation in mere minutes has ultimately
⤷ Title: Sovereign Security: NATO Certifies Retail iPhones and iPads for Classified Intelligence for the First Time
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:32:05 +0000
════════════════════════
⌗ Tags: #Apple #B2G #BSI #German Federal Office for Information Security #iOS 26 #iPad #iphone #military grade security #mobile defense #NATO Restricted #secure enclave #Tech News 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:32:05 +0000
════════════════════════
⌗ Tags: #Apple #B2G #BSI #German Federal Office for Information Security #iOS 26 #iPad #iphone #military grade security #mobile defense #NATO Restricted #secure enclave #Tech News 2026
Penetration Testing Tools
Sovereign Security: NATO Certifies Retail iPhones and iPads for Classified Intelligence for the First Time
Conventional iPhones and iPads are now authorized to process classified NATO intelligence. Following rigorous scrutiny by German authorities,
⤷ Title: Apple and Google Begin Testing End-to-End Encrypted RCS for iPhone and Android
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:30:30 +0000
════════════════════════
⌗ Tags: #Technology #Apple Messages #cross_platform messaging #E2EE #end_to_end encryption #Google Messages #GSMA Universal Profile 3.0 #iOS 26.4 #Messaging Layer Security #MLS #RCS #Tech News 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:30:30 +0000
════════════════════════
⌗ Tags: #Technology #Apple Messages #cross_platform messaging #E2EE #end_to_end encryption #Google Messages #GSMA Universal Profile 3.0 #iOS 26.4 #Messaging Layer Security #MLS #RCS #Tech News 2026
Penetration Testing Tools
Apple and Google Begin Testing End-to-End Encrypted RCS for iPhone and Android
Google and Apple have commenced testing end-to-end encryption for RCS messaging between Android smartphones and iPhones. The tech
⤷ Title: The Lockdown Era: Android 17 Rewrites the Rules for Apps with Uncompromising Security Mandates
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:28:49 +0000
════════════════════════
⌗ Tags: #Android #Android 17 #Android API #app development #background activity restrictions #Certificate Transparency #developer guidelines #MessageQueue #mobile security #Tech News 2026 #USE_LOOPBACK_INTERFACE
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:28:49 +0000
════════════════════════
⌗ Tags: #Android #Android 17 #Android API #app development #background activity restrictions #Certificate Transparency #developer guidelines #MessageQueue #mobile security #Tech News 2026 #USE_LOOPBACK_INTERFACE
Penetration Testing Tools
The Lockdown Era: Android 17 Rewrites the Rules for Apps with Uncompromising Security Mandates
Android 17 is fundamentally rewriting the operational paradigms for applications targeting this nascent iteration of the operating system.
⤷ Title: Digital Fog of War: Operation “Lion’s Roar” Plunges Iran into Historic 4% Connectivity Blackout
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:27:57 +0000
════════════════════════
⌗ Tags: #Cyber Security #cybersecurity #Digital Blackout #Electronic Warfare #internet shutdown #Iran cyberattack #IRGC #NetBlocks #Operation Epic Fury #Operation Lion's Roar #Tech News 2026 #Tehran
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:27:57 +0000
════════════════════════
⌗ Tags: #Cyber Security #cybersecurity #Digital Blackout #Electronic Warfare #internet shutdown #Iran cyberattack #IRGC #NetBlocks #Operation Epic Fury #Operation Lion's Roar #Tech News 2026 #Tehran
Penetration Testing Tools
Digital Fog of War: Operation "Lion's Roar" Plunges Iran into Historic 4% Connectivity Blackout
Against the backdrop of kinetic airstrikes targeting IRGC facilities in Iran, a secondary, digital front has simultaneously erupted.
⤷ Title: Shattered Trust: Coupang’s Q4 Profits Plunge 97% Following Massive 33-Million Record Data Leak
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:26:24 +0000
════════════════════════
⌗ Tags: #Data Leak #Bom Kim #Consumer Privacy #corporate accountability #Coupang #data breach #e_commerce security #KFTC fine #Operating Profit #South Korea #Tech News 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:26:24 +0000
════════════════════════
⌗ Tags: #Data Leak #Bom Kim #Consumer Privacy #corporate accountability #Coupang #data breach #e_commerce security #KFTC fine #Operating Profit #South Korea #Tech News 2026
Penetration Testing Tools
Shattered Trust: Coupang’s Q4 Profits Plunge 97% Following Massive 33-Million Record Data Leak
The South Korean e-commerce behemoth Coupang has registered a precipitous decline in profits amidst the fallout from a
⤷ Title: Inside the Breach: Hackers Annexed Dutch Prison Agency Infrastructure for Five Months via Ivanti Flaw
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:23:29 +0000
════════════════════════
⌗ Tags: #Data Leak #CVE_2026_1281 #Data Breach 2026 #Dienst Justitiële Inrichtingen #DJI hack #Dutch Custodial Institutions Agency #Ivanti EPMM #Ivanti Zero_Day #Mobile Device Management #NCSC_NL #prison security #Tech News 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:23:29 +0000
════════════════════════
⌗ Tags: #Data Leak #CVE_2026_1281 #Data Breach 2026 #Dienst Justitiële Inrichtingen #DJI hack #Dutch Custodial Institutions Agency #Ivanti EPMM #Ivanti Zero_Day #Mobile Device Management #NCSC_NL #prison security #Tech News 2026
Penetration Testing Tools
Inside the Breach: Hackers Annexed Dutch Prison Agency Infrastructure for Five Months via Ivanti Flaw
Hackers have resided within the IT infrastructure of the Dutch Custodial Institutions Agency for a minimum of five
⤷ Title: “Oblivion” Malware Hijacks Android 15 with Unprecedented Stealth
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:22:11 +0000
════════════════════════
⌗ Tags: #Malware #Accessibility Service exploit #Android 15 security #Android malware #APK builder #Certo research #Cyber Security 2026 #HVNC #mobile banking trojan #Oblivion RAT #Remote Access Trojan
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:22:11 +0000
════════════════════════
⌗ Tags: #Malware #Accessibility Service exploit #Android 15 security #Android malware #APK builder #Certo research #Cyber Security 2026 #HVNC #mobile banking trojan #Oblivion RAT #Remote Access Trojan
Penetration Testing Tools
"Oblivion" Malware Hijacks Android 15 with Unprecedented Stealth
An advertisement hawking Oblivion, a novel Remote Access Trojan (RAT) designed explicitly for Android ecosystems, has materialized on
⤷ Title: Encrypted Deception: Cisco Talos Unmasks “Dohdoor” and the Stealthy UAT-10027 Campaign Targeting Healthcare
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:20:07 +0000
════════════════════════
⌗ Tags: #Malware #Cisco Talos #Cloudflare #DLL Sideloading #DNS over HTTPS #Dohdoor #EDR Bypass #healthcare cybersecurity #Lazarus Group #Process Hollowing #Tech News 2026 #UAT_10027
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:20:07 +0000
════════════════════════
⌗ Tags: #Malware #Cisco Talos #Cloudflare #DLL Sideloading #DNS over HTTPS #Dohdoor #EDR Bypass #healthcare cybersecurity #Lazarus Group #Process Hollowing #Tech News 2026 #UAT_10027
Penetration Testing Tools
Encrypted Deception: Cisco Talos Unmasks "Dohdoor" and the Stealthy UAT-10027 Campaign Targeting Healthcare
Since the twilight of 2025, Cisco Talos has been vigilantly tracking a malicious campaign directed against educational and
⤷ Title: The Great Dispersal: How the Fall of the RAMP Forum Birthed a New Breed of Ransomware Enclaves
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:19:31 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cyber Espionage #Cybercrime 2026 #Dark Web #FBI seizure #Qilin #RAMP forum #ransomware #Ransomware_as_a_Service #Rehub #Stallman #T1erOne
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:19:31 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Cyber Espionage #Cybercrime 2026 #Dark Web #FBI seizure #Qilin #RAMP forum #ransomware #Ransomware_as_a_Service #Rehub #Stallman #T1erOne
Penetration Testing Tools
The Great Dispersal: How the Fall of the RAMP Forum Birthed a New Breed of Ransomware Enclaves
In late January 2026, American law enforcement agencies dismantled a prominent platform that had served for years as
⤷ Title: The End of PGP? How “Linux ID” is Revolutionizing Kernel Trust in the Wake of xz Utils
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:17:47 +0000
════════════════════════
⌗ Tags: #Linux #cryptography #decentralized identifiers #DIDs #Greg Kroah_Hartman #Linux Foundation #Linux ID #Linux Kernel #PGP #Supply Chain Security #Tech News 2026 #xz Utils
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 04:17:47 +0000
════════════════════════
⌗ Tags: #Linux #cryptography #decentralized identifiers #DIDs #Greg Kroah_Hartman #Linux Foundation #Linux ID #Linux Kernel #PGP #Supply Chain Security #Tech News 2026 #xz Utils
Penetration Testing Tools
The End of PGP? How "Linux ID" is Revolutionizing Kernel Trust in the Wake of xz Utils
“Who are you, and why should the Linux kernel trust you?” Within the kernel development community, this query