⤷ Title: SMA Terbaik untuk Masa Depan di Bidang IT dan Cyber security
════════════════════════
𐀪 Author: Ali Ridlo
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 07:14:57 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #growth_hacking #hacking
════════════════════════
𐀪 Author: Ali Ridlo
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 07:14:57 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #growth_hacking #hacking
Medium
SMA Terbaik untuk Masa Depan di Bidang IT dan Cyber security
⤷ Title: From Streaming Redirect to Suspicious Payload: A Mini Threat Analysis Case Study
════════════════════════
𐀪 Author: ..
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 07:21:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #threat_analysis
════════════════════════
𐀪 Author: ..
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 07:21:02 GMT
════════════════════════
⌗ Tags: #cybersecurity #infosec #threat_analysis
Medium
From Streaming Redirect to Suspicious Payload: A Mini Threat Analysis Case Study
TL;DR: While looking up a movie on a free streaming site, I stumbled onto a malicious macOS payload delivery attempt. Instead of running…
⤷ Title: Monitoring AWS Services Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 08:45:14 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough #cybersecurity #aws_monitoring
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 08:45:14 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough #cybersecurity #aws_monitoring
Medium
Monitoring AWS Services Walkthrough Notes | TryHackMe
Simple AWS monitoring guide with practical Splunk queries.
⤷ Title: Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:50:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:50:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: How Insecure JavaScript Handling Leads to DOM-Based Vulnerabilities
════════════════════════
𐀪 Author: Naveen TK
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 10:45:57 GMT
════════════════════════
⌗ Tags: #javanoscript #web_security #cybersecurity #bug_bounty #xss_vulnerability
════════════════════════
𐀪 Author: Naveen TK
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 10:45:57 GMT
════════════════════════
⌗ Tags: #javanoscript #web_security #cybersecurity #bug_bounty #xss_vulnerability
Medium
How Insecure JavaScript Handling Leads to DOM-Based Vulnerabilities
The DOM powers modern web apps, but unsafe user input flowing into dangerous functions can trigger DOM-based XSS and client-side attacks.
⤷ Title: Anthropic Just Released Claude Code Security, and the Internet Declared Bug Hunting Dead
════════════════════════
𐀪 Author: Muhammad Haider Tallal
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:42:10 GMT
════════════════════════
⌗ Tags: #software_engineering #artificial_intelligence #cybersecurity #2026technology #bug_bounty
════════════════════════
𐀪 Author: Muhammad Haider Tallal
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:42:10 GMT
════════════════════════
⌗ Tags: #software_engineering #artificial_intelligence #cybersecurity #2026technology #bug_bounty
Medium
Anthropic Just Released Claude Code Security, and the Internet Declared Bug Hunting Dead
They’re wrong. But the real answer is more uncomfortable than you think.
⤷ Title: PNPT OSINT Techniques Cheat Sheet
════════════════════════
𐀪 Author: jaejun835
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 10:19:41 GMT
════════════════════════
⌗ Tags: #hacking #osnit #cybersecurity #pnpt #cheatsheet
════════════════════════
𐀪 Author: jaejun835
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 10:19:41 GMT
════════════════════════
⌗ Tags: #hacking #osnit #cybersecurity #pnpt #cheatsheet
Medium
PNPT OSINT Techniques Cheat Sheet
This is a cheat sheet for OSINT (Open Source Intelligence) techniques used in TCM Security’s PNPT (Practical Network Penetration Tester)…
⤷ Title: PsExec Hunt Lab — Cyberdefenders
════════════════════════
𐀪 Author: Yrddry
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:51:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #digital_forensics #hacking #blue_team #ctf_writeup
════════════════════════
𐀪 Author: Yrddry
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:51:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #digital_forensics #hacking #blue_team #ctf_writeup
Medium
PsExec Hunt Lab — Cyberdefenders
An alert from the Intrusion Detection System (IDS) flagged suspicious lateral movement activity involving PsExec. This indicates potential…
⤷ Title: The Security Gaps Hiding in Everyday IT Operations
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:43:59 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cyberattack #cybersecurity #hacking #technology
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:43:59 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #cyberattack #cybersecurity #hacking #technology
Medium
The Security Gaps Hiding in Everyday IT Operations
The breach doesn’t begin here. The crack does.
⤷ Title: Linux Local Privilege Escalation — Skills Assessment
════════════════════════
𐀪 Author: Psychopath-Traveler
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:12:31 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #privilege_escalation #penetration_testing #cybersecurity #hacking
════════════════════════
𐀪 Author: Psychopath-Traveler
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:12:31 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #privilege_escalation #penetration_testing #cybersecurity #hacking
Medium
Linux Local Privilege Escalation — Skills Assessment
Scenario
⤷ Title: How to Download View-Only / Non-Downloadable Videos from Google Drive
════════════════════════
𐀪 Author: Hack Storage
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 08:54:00 GMT
════════════════════════
⌗ Tags: #hacking #hacking_tools #cybersecurity #technology #tutorial
════════════════════════
𐀪 Author: Hack Storage
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 08:54:00 GMT
════════════════════════
⌗ Tags: #hacking #hacking_tools #cybersecurity #technology #tutorial
Medium
How to Download View-Only / Non-Downloadable Videos from Google Drive
Step-by-Step Guide to Save Restricted Google Drive Videos with Audio Using Browser DevTool (Updated 2026)
⤷ Title: How Security Teams Use LeakRadar to Find Exposures in 10 Minutes
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:01:01 GMT
════════════════════════
⌗ Tags: #enterprise_security #infosec #threat_intelligence #technology #cybersecurity
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:01:01 GMT
════════════════════════
⌗ Tags: #enterprise_security #infosec #threat_intelligence #technology #cybersecurity
Medium
How Security Teams Use LeakRadar to Find Exposures in 10 Minutes
Ten minutes. That is all it takes to know if your company is exposed.
⤷ Title: The Illusion of Cloud Security: Why Growing Companies Must Validate Before They Scale
════════════════════════
𐀪 Author: ANSI Technologies
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 10:19:50 GMT
════════════════════════
⌗ Tags: #cloud_security #cyber_risk #penetration_testing #risk_management #vulnerability_assessment
════════════════════════
𐀪 Author: ANSI Technologies
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 10:19:50 GMT
════════════════════════
⌗ Tags: #cloud_security #cyber_risk #penetration_testing #risk_management #vulnerability_assessment
Medium
The Illusion of Cloud Security: Why Growing Companies Must Validate Before They Scale
Cloud software creates speed.
⤷ Title: OWASP WSTG Guide: Testing Configuration & Deployment for Web Security
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 10:38:13 GMT
════════════════════════
⌗ Tags: #deployment #web_security #ethical_hacking
════════════════════════
𐀪 Author: Habibi
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 10:38:13 GMT
════════════════════════
⌗ Tags: #deployment #web_security #ethical_hacking
Medium
OWASP WSTG Guide: Testing Configuration & Deployment for Web Security
Often, when talking about web application security, thoughts immediately turn to coding. They rush to prevent SQL injection, Cross-Site…
⤷ Title: Best Web Security Mitigations Every Developer Should Follow
════════════════════════
𐀪 Author: Shayaan Khan
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:59:59 GMT
════════════════════════
⌗ Tags: #security #technology #ethical_hacking #coding #cybersecurity
════════════════════════
𐀪 Author: Shayaan Khan
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:59:59 GMT
════════════════════════
⌗ Tags: #security #technology #ethical_hacking #coding #cybersecurity
Medium
Best Web Security Mitigations Every Developer Should Follow 🔐
Web applications are constantly exposed to cyber threats such as SQL Injection, Cross-Site Scripting (XSS), CSRF, and DDoS attacks. Whether…
⤷ Title: Why Most Beginner Hackers Never Make Money (And How to Avoid Their Mistakes)
════════════════════════
𐀪 Author: Satyam Pathania
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:42:35 GMT
════════════════════════
⌗ Tags: #ethical_hacking #money #beginner #cybersecurity #technology
════════════════════════
𐀪 Author: Satyam Pathania
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:42:35 GMT
════════════════════════
⌗ Tags: #ethical_hacking #money #beginner #cybersecurity #technology
Medium
Why Most Beginner Hackers Never Make Money (And How to Avoid Their Mistakes)
Let me tell you something I wish someone had told me earlier.
⤷ Title: RSA Cipher Challenge — Cryptography Writeup
════════════════════════
𐀪 Author: Santhosh Kumar R
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:01:00 GMT
════════════════════════
⌗ Tags: #rsa_algorithm #ctf_writeup #cybersecurity #ethical_hacking #cryptography
════════════════════════
𐀪 Author: Santhosh Kumar R
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 09:01:00 GMT
════════════════════════
⌗ Tags: #rsa_algorithm #ctf_writeup #cybersecurity #ethical_hacking #cryptography
Medium
RSA Cipher Challenge — Cryptography Writeup
Challenge Overview
⤷ Title: AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:40:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:40:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: I tried to solve the CTF challenge about login by brute forcing the website
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 12:17:31 GMT
════════════════════════
⌗ Tags: #hacking #ctf #web_exploitation #brute_force_attack
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 12:17:31 GMT
════════════════════════
⌗ Tags: #hacking #ctf #web_exploitation #brute_force_attack
Medium
I tried to solve the CTF challenge about login by brute forcing the website
Here I use the challenge from PicoCTF
⤷ Title: From a Simple Export Button to Full Data Exposure — Discovering a Broken Access Control in a SaaS…
════════════════════════
𐀪 Author: Dedrknex
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 12:16:54 GMT
════════════════════════
⌗ Tags: #hacking #bugbounty_writeup #cybersecurity #idor #ethical_hacking
════════════════════════
𐀪 Author: Dedrknex
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 12:16:54 GMT
════════════════════════
⌗ Tags: #hacking #bugbounty_writeup #cybersecurity #idor #ethical_hacking
Medium
From a Simple Export Button to Full Data Exposure — Discovering a Broken Access Control in a SaaS Platform
Before starting this write-up, I would like to clarify that for responsible disclosure reasons, I will refer to the target as example.com