⤷ Title: Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE)
════════════════════════
𐀪 Author: McCaulay Hudson
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:15:18 GMT
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: McCaulay Hudson
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:15:18 GMT
════════════════════════
⌗ Tags: No_Tags
watchTowr Labs
Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE)
On today’s ‘good news disguised as other things’ segment, we’re turning our gaze to CVE-2026-21902 - a recently disclosed “Incorrect Permission Assignment for Critical Resource” vulnerability affecting Juniper’s Junos OS Evolved platform. This vulnerability…
⤷ Title: Phreakers: os perigos da telefonia na época do digital
════════════════════════
𐀪 Author: Bughunt
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:35:12 GMT
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Bughunt
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:35:12 GMT
════════════════════════
⌗ Tags: No_Tags
BugHunt
Phreakers: os perigos da telefonia na época do digital
Do tom de 2600 Hz à era digital, a história dos phreakers revela como vulnerabilidades nascem dentro da própria arquitetura.
⤷ Title: ATO Admin Account via Broken Password Reset Flow
════════════════════════
𐀪 Author: El Professor Qais
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:47:09 GMT
════════════════════════
⌗ Tags: #account_takeover #vulnerability #ethical_hacking #admin_password_reset #bug_bounty
════════════════════════
𐀪 Author: El Professor Qais
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:47:09 GMT
════════════════════════
⌗ Tags: #account_takeover #vulnerability #ethical_hacking #admin_password_reset #bug_bounty
Medium
ATO Admin Account via Broken Password Reset Flow
Hi everyone! I’m Qais. Back again with the critical Bug Bounty story which I think everyone would like if they found out this simple Broken…
⤷ Title: 0-Day: Exploiting the Human Operating System
════════════════════════
𐀪 Author: matitanium
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:00:27 GMT
════════════════════════
⌗ Tags: #psychology #phishing #red_team #bug_bounty #hacking
════════════════════════
𐀪 Author: matitanium
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:00:27 GMT
════════════════════════
⌗ Tags: #psychology #phishing #red_team #bug_bounty #hacking
Medium
0-Day: Exploiting the Human Operating System
Hello folks, this article explores how to execute high-precision spear phishing by targeting the fundamental architecture of the human…
⤷ Title: How does an attacker actually get access to execute the ghost pod attack?
════════════════════════
𐀪 Author: Alex
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:54:45 GMT
════════════════════════
⌗ Tags: #security #linux #kubernetes #cloud_computing #hacking
════════════════════════
𐀪 Author: Alex
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:54:45 GMT
════════════════════════
⌗ Tags: #security #linux #kubernetes #cloud_computing #hacking
Medium
How does an attacker actually get access to execute the ghost pod attack?
The ghost pod technique is Stage 2 of an attack, not the initial breach.
⤷ Title: You’ve Been Hacked Before. You Just Don’t Know It Yet.
════════════════════════
𐀪 Author: AgentCore
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:40:11 GMT
════════════════════════
⌗ Tags: #hacking #security #technology #privacy #cybersecurity
════════════════════════
𐀪 Author: AgentCore
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:40:11 GMT
════════════════════════
⌗ Tags: #hacking #security #technology #privacy #cybersecurity
Medium
You’ve Been Hacked Before. You Just Don’t Know It Yet.
Hi My Dear..,
⤷ Title: From 5G to 6G: AI-Native Telecom Networks and the Emerging Cybersecurity Battlefield
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:32:01 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #information_security #hacking #ethical_hacking #cybersecurity
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:32:01 GMT
════════════════════════
⌗ Tags: #cyber_security_awareness #information_security #hacking #ethical_hacking #cybersecurity
Medium
From 5G to 6G: AI-Native Telecom Networks and the Emerging Cybersecurity Battlefield
Introduction: The Transformation of Telecom Infrastructure
⤷ Title: From Ethical Hacking to AI-Powered Cyber Defense
════════════════════════
𐀪 Author: Mtuaha
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:17:07 GMT
════════════════════════
⌗ Tags: #ai #cybersecurity #technology #security #hacking
════════════════════════
𐀪 Author: Mtuaha
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:17:07 GMT
════════════════════════
⌗ Tags: #ai #cybersecurity #technology #security #hacking
Medium
From Ethical Hacking to AI-Powered Cyber Defense
Comprehensive overview of ethical hacking, cyber threats, and the growing impact of AI in cybersecurity. How security professionals think…
⤷ Title: eJPT v2 : Challenge Lab 29: Python PlayGround
════════════════════════
𐀪 Author: Dhanushkumar R
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:48:19 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #red_team #cybersecurity #ctf
════════════════════════
𐀪 Author: Dhanushkumar R
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:48:19 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #red_team #cybersecurity #ctf
Medium
eJPT v2 : Challenge Lab 29: Python PlayGround
Introduction
⤷ Title: OTP Bypass via Premature Session Cookie
════════════════════════
𐀪 Author: Dipesh Paul
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:59:11 GMT
════════════════════════
⌗ Tags: #otp_bypass #penetration_testing #bug_bounty #ethical_hacking #vulnerability
════════════════════════
𐀪 Author: Dipesh Paul
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:59:11 GMT
════════════════════════
⌗ Tags: #otp_bypass #penetration_testing #bug_bounty #ethical_hacking #vulnerability
Medium
OTP Bypass via Premature Session Cookie
A real-world pentest finding, a vulnerable lab, and the fix every developer needs to know.
⤷ Title: Why Most Companies Fail Their First VAPT in India
════════════════════════
𐀪 Author: Rajiv Sharma
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:59:08 GMT
════════════════════════
⌗ Tags: #vapt #penetration_testing #india #information_security #cybersecurity
════════════════════════
𐀪 Author: Rajiv Sharma
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:59:08 GMT
════════════════════════
⌗ Tags: #vapt #penetration_testing #india #information_security #cybersecurity
Medium
Why Most Companies Fail Their First VAPT in India
1️⃣ Treating VAPT as a Compliance Checkbox
⤷ Title: Exploitation of Grotesque 2
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:45:36 GMT
════════════════════════
⌗ Tags: #vulnhub #vulnhub_writeup #ctf_writeup
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:45:36 GMT
════════════════════════
⌗ Tags: #vulnhub #vulnhub_writeup #ctf_writeup
Medium
Exploitation of Grotesque 2
I started with host discovery using nmap and I I found the ip address at 192.168.1.160
⤷ Title: Exploitation of Grotesque 1
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:31:38 GMT
════════════════════════
⌗ Tags: #vulnhub_writeup #vulnhub #oscp_vulnhub #ctf_writeup #vulnhub_walkthrough
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:31:38 GMT
════════════════════════
⌗ Tags: #vulnhub_writeup #vulnhub #oscp_vulnhub #ctf_writeup #vulnhub_walkthrough
Medium
Exploitation of Grotesque 1
I started with host discovery using nmap and I found the ip address at 192.168.1.121
⤷ Title: ️ Building a Packet Sniffer Using Python & Scapy
════════════════════════
𐀪 Author: Vivekprajapati
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:43:49 GMT
════════════════════════
⌗ Tags: #networking #python_scapy #python #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Vivekprajapati
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:43:49 GMT
════════════════════════
⌗ Tags: #networking #python_scapy #python #cybersecurity #ethical_hacking
Medium
🛡️ Building a Packet Sniffer Using Python & Scapy
📌 Introduction
⤷ Title: How to Choose the Best Cybersecurity Certification That Offers Top Career Opportunities for You
════════════════════════
𐀪 Author: Lorcam Securities
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:03:18 GMT
════════════════════════
⌗ Tags: #ceh_certification #cybersecurity #cyber_security_india #ethical_hacking
════════════════════════
𐀪 Author: Lorcam Securities
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:03:18 GMT
════════════════════════
⌗ Tags: #ceh_certification #cybersecurity #cyber_security_india #ethical_hacking
Medium
How to Choose the Best Cybersecurity Certification That Offers Top Career Opportunities for You
One of the rapidly growing sectors in India and the global arena is cybersecurity. Selecting an appropriate cyber security program and…
⤷ Title: Zero Public Ports: How I Secured my B2B API Against 10k Scraper Requests
════════════════════════
𐀪 Author: Ioan Istrate
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:38:04 GMT
════════════════════════
⌗ Tags: #api_security #software_engineering #cloudflare #python #django
════════════════════════
𐀪 Author: Ioan Istrate
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:38:04 GMT
════════════════════════
⌗ Tags: #api_security #software_engineering #cloudflare #python #django
Medium
Zero Public Ports: How I Secured my B2B API Against 10k Scraper Requests
I built security for “no one’s looking.” The open web is “everyone’s looking.” This is the post mortem of closing that gap. The thesis…
⤷ Title: Being a Security Researcher (SR) Changed How I See DeFi
════════════════════════
𐀪 Author: Abraham
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:42:19 GMT
════════════════════════
⌗ Tags: #smart_contract_security #smart_contracts #cybersecurity #bug_bounty #blockchain
════════════════════════
𐀪 Author: Abraham
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:42:19 GMT
════════════════════════
⌗ Tags: #smart_contract_security #smart_contracts #cybersecurity #bug_bounty #blockchain
Medium
Being a Security Researcher (SR) Changed How I See DeFi
Becoming a Security Researcher (SR) completely transformed my understanding of Decentralized Finance (DeFi).
⤷ Title: Understanding the MITRE ATT&CK Framework: A Beginner’s Guide to Thinking Like an Attacker
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:07:58 GMT
════════════════════════
⌗ Tags: #security #technology #mitre_attack #hacking #cybersecurity
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:07:58 GMT
════════════════════════
⌗ Tags: #security #technology #mitre_attack #hacking #cybersecurity
Medium
Understanding the MITRE ATT&CK Framework: A Beginner’s Guide to Thinking Like an Attacker
When I first came across the MITRE ATT&CK framework, it looked overwhelming. A massive matrix. Dozens of categories. Hundreds of…
❤1
⤷ Title: Hands-On Memory Forensics: A DFIR Investigation of a Compromised Windows XP Machine
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:15:16 GMT
════════════════════════
⌗ Tags: #penetration_testing #digital_forensics #cybersecurity #information_security #ethical_hacking
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:15:16 GMT
════════════════════════
⌗ Tags: #penetration_testing #digital_forensics #cybersecurity #information_security #ethical_hacking
Medium
Hands-On Memory Forensics: A DFIR Investigation of a Compromised Windows XP Machine
Using Volatility2 to identify malicious processes, injected DLLs, C2 communications, and phishing URLs targeting financial institutions
⤷ Title: Sherlock HackTheBox: Brutus
════════════════════════
𐀪 Author: Dixtroiza
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:57:06 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #cybersecurity
════════════════════════
𐀪 Author: Dixtroiza
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:57:06 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #cybersecurity
Medium
Sherlock HackTheBox: Brutus
Penulis: Dixtroiza
⤷ Title: Business Logic Vulnerability in Subnoscription Checkout
════════════════════════
𐀪 Author: Mahmoud Magdy
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:43:31 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #logic_bug #owasp_top_10 #business_logic_bug #bug_bounty_writeup
════════════════════════
𐀪 Author: Mahmoud Magdy
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:43:31 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #logic_bug #owasp_top_10 #business_logic_bug #bug_bounty_writeup
Medium
Business Logic Vulnerability in Subnoscription Checkout
Hello Hackers 👋