⤷ Title: OTP Bypass via Premature Session Cookie
════════════════════════
𐀪 Author: Dipesh Paul
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:59:11 GMT
════════════════════════
⌗ Tags: #otp_bypass #penetration_testing #bug_bounty #ethical_hacking #vulnerability
════════════════════════
𐀪 Author: Dipesh Paul
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:59:11 GMT
════════════════════════
⌗ Tags: #otp_bypass #penetration_testing #bug_bounty #ethical_hacking #vulnerability
Medium
OTP Bypass via Premature Session Cookie
A real-world pentest finding, a vulnerable lab, and the fix every developer needs to know.
⤷ Title: Why Most Companies Fail Their First VAPT in India
════════════════════════
𐀪 Author: Rajiv Sharma
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:59:08 GMT
════════════════════════
⌗ Tags: #vapt #penetration_testing #india #information_security #cybersecurity
════════════════════════
𐀪 Author: Rajiv Sharma
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:59:08 GMT
════════════════════════
⌗ Tags: #vapt #penetration_testing #india #information_security #cybersecurity
Medium
Why Most Companies Fail Their First VAPT in India
1️⃣ Treating VAPT as a Compliance Checkbox
⤷ Title: Exploitation of Grotesque 2
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:45:36 GMT
════════════════════════
⌗ Tags: #vulnhub #vulnhub_writeup #ctf_writeup
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:45:36 GMT
════════════════════════
⌗ Tags: #vulnhub #vulnhub_writeup #ctf_writeup
Medium
Exploitation of Grotesque 2
I started with host discovery using nmap and I I found the ip address at 192.168.1.160
⤷ Title: Exploitation of Grotesque 1
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:31:38 GMT
════════════════════════
⌗ Tags: #vulnhub_writeup #vulnhub #oscp_vulnhub #ctf_writeup #vulnhub_walkthrough
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:31:38 GMT
════════════════════════
⌗ Tags: #vulnhub_writeup #vulnhub #oscp_vulnhub #ctf_writeup #vulnhub_walkthrough
Medium
Exploitation of Grotesque 1
I started with host discovery using nmap and I found the ip address at 192.168.1.121
⤷ Title: ️ Building a Packet Sniffer Using Python & Scapy
════════════════════════
𐀪 Author: Vivekprajapati
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:43:49 GMT
════════════════════════
⌗ Tags: #networking #python_scapy #python #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Vivekprajapati
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:43:49 GMT
════════════════════════
⌗ Tags: #networking #python_scapy #python #cybersecurity #ethical_hacking
Medium
🛡️ Building a Packet Sniffer Using Python & Scapy
📌 Introduction
⤷ Title: How to Choose the Best Cybersecurity Certification That Offers Top Career Opportunities for You
════════════════════════
𐀪 Author: Lorcam Securities
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:03:18 GMT
════════════════════════
⌗ Tags: #ceh_certification #cybersecurity #cyber_security_india #ethical_hacking
════════════════════════
𐀪 Author: Lorcam Securities
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:03:18 GMT
════════════════════════
⌗ Tags: #ceh_certification #cybersecurity #cyber_security_india #ethical_hacking
Medium
How to Choose the Best Cybersecurity Certification That Offers Top Career Opportunities for You
One of the rapidly growing sectors in India and the global arena is cybersecurity. Selecting an appropriate cyber security program and…
⤷ Title: Zero Public Ports: How I Secured my B2B API Against 10k Scraper Requests
════════════════════════
𐀪 Author: Ioan Istrate
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:38:04 GMT
════════════════════════
⌗ Tags: #api_security #software_engineering #cloudflare #python #django
════════════════════════
𐀪 Author: Ioan Istrate
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:38:04 GMT
════════════════════════
⌗ Tags: #api_security #software_engineering #cloudflare #python #django
Medium
Zero Public Ports: How I Secured my B2B API Against 10k Scraper Requests
I built security for “no one’s looking.” The open web is “everyone’s looking.” This is the post mortem of closing that gap. The thesis…
⤷ Title: Being a Security Researcher (SR) Changed How I See DeFi
════════════════════════
𐀪 Author: Abraham
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:42:19 GMT
════════════════════════
⌗ Tags: #smart_contract_security #smart_contracts #cybersecurity #bug_bounty #blockchain
════════════════════════
𐀪 Author: Abraham
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:42:19 GMT
════════════════════════
⌗ Tags: #smart_contract_security #smart_contracts #cybersecurity #bug_bounty #blockchain
Medium
Being a Security Researcher (SR) Changed How I See DeFi
Becoming a Security Researcher (SR) completely transformed my understanding of Decentralized Finance (DeFi).
⤷ Title: Understanding the MITRE ATT&CK Framework: A Beginner’s Guide to Thinking Like an Attacker
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:07:58 GMT
════════════════════════
⌗ Tags: #security #technology #mitre_attack #hacking #cybersecurity
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:07:58 GMT
════════════════════════
⌗ Tags: #security #technology #mitre_attack #hacking #cybersecurity
Medium
Understanding the MITRE ATT&CK Framework: A Beginner’s Guide to Thinking Like an Attacker
When I first came across the MITRE ATT&CK framework, it looked overwhelming. A massive matrix. Dozens of categories. Hundreds of…
❤1
⤷ Title: Hands-On Memory Forensics: A DFIR Investigation of a Compromised Windows XP Machine
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:15:16 GMT
════════════════════════
⌗ Tags: #penetration_testing #digital_forensics #cybersecurity #information_security #ethical_hacking
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:15:16 GMT
════════════════════════
⌗ Tags: #penetration_testing #digital_forensics #cybersecurity #information_security #ethical_hacking
Medium
Hands-On Memory Forensics: A DFIR Investigation of a Compromised Windows XP Machine
Using Volatility2 to identify malicious processes, injected DLLs, C2 communications, and phishing URLs targeting financial institutions
⤷ Title: Sherlock HackTheBox: Brutus
════════════════════════
𐀪 Author: Dixtroiza
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:57:06 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #cybersecurity
════════════════════════
𐀪 Author: Dixtroiza
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:57:06 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #cybersecurity
Medium
Sherlock HackTheBox: Brutus
Penulis: Dixtroiza
⤷ Title: Business Logic Vulnerability in Subnoscription Checkout
════════════════════════
𐀪 Author: Mahmoud Magdy
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:43:31 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #logic_bug #owasp_top_10 #business_logic_bug #bug_bounty_writeup
════════════════════════
𐀪 Author: Mahmoud Magdy
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:43:31 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #logic_bug #owasp_top_10 #business_logic_bug #bug_bounty_writeup
Medium
Business Logic Vulnerability in Subnoscription Checkout
Hello Hackers 👋
⤷ Title: Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:45:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:45:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Fake Zoom and Google Meet Pages Trick Users Into Installing Monitoring Tool
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:39:44 +0000
════════════════════════
⌗ Tags: #Security #Malware #Scams and Fraud #Cybersecurity #Employee Monitoring #Google Meet #Scam #Windows #Zoom
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:39:44 +0000
════════════════════════
⌗ Tags: #Security #Malware #Scams and Fraud #Cybersecurity #Employee Monitoring #Google Meet #Scam #Windows #Zoom
Hackread
Fake Zoom and Google Meet Pages Trick Users Into Installing Monitoring Tool
Follow us on all social media platforms @Hackread
⤷ Title: Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE)
════════════════════════
𐀪 Author: McCaulay Hudson
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:15:18 GMT
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: McCaulay Hudson
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:15:18 GMT
════════════════════════
⌗ Tags: No_Tags
watchTowr Labs
Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE)
On today’s ‘good news disguised as other things’ segment, we’re turning our gaze to CVE-2026-21902 - a recently disclosed “Incorrect Permission Assignment for Critical Resource” vulnerability affecting Juniper’s Junos OS Evolved platform. This vulnerability…
⤷ Title: I Stopped Watching Random Cybersecurity Videos — And Finally Chose a Path
════════════════════════
𐀪 Author: the copy ninja
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:20:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #portswigger #learning_journey #bug_bounty
════════════════════════
𐀪 Author: the copy ninja
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:20:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #portswigger #learning_journey #bug_bounty
Medium
I Stopped Watching Random Cybersecurity Videos — And Finally Chose a Path
I work in R&D at a cybersecurity company.
⤷ Title: Why the Best Bug Hunters Think Like Detectives, Not Hackers — And What That Difference Earns Them
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:18:51 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #business #earn_money_online #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:18:51 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #business #earn_money_online #bug_bounty_tips #bug_bounty
Medium
Why the Best Bug Hunters Think Like Detectives, Not Hackers — And What That Difference Earns Them
Introduction
⤷ Title: Lookup-A TryHackMe Writeup
════════════════════════
𐀪 Author: 0x77
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:42:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #infosec #ctf_writeup #hacking
════════════════════════
𐀪 Author: 0x77
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:42:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #infosec #ctf_writeup #hacking
Medium
Lookup-A TryHackMe Writeup
Introduction
⤷ Title: [Dev Update] In NODE: PROTOCOL, stealing the data is only half the job.
════════════════════════
𐀪 Author: Marc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:59:29 GMT
════════════════════════
⌗ Tags: #hacking #simulation #game_development #games
════════════════════════
𐀪 Author: Marc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:59:29 GMT
════════════════════════
⌗ Tags: #hacking #simulation #game_development #games
Medium
[Dev Update] In NODE: PROTOCOL, stealing the data is only half the job. You have to manage the Tainted BTC economy to survive.
Hey everyone,
⤷ Title: Cybersecurity Awareness: The Shadow AI Crisis Bleeding Your Data Through Invisible APIs
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:22:50 GMT
════════════════════════
⌗ Tags: #shadow_ai #generative_ai_risks #infosec #cyber_security_awareness #threat_intelligence
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:22:50 GMT
════════════════════════
⌗ Tags: #shadow_ai #generative_ai_risks #infosec #cyber_security_awareness #threat_intelligence
Medium
Cybersecurity Awareness: The Shadow AI Crisis Bleeding Your Data Through Invisible APIs
The cybersecurity threat you can’t see is the one destroying you from within.
❤1
⤷ Title: ToolsRus walkthrough (TryHackMe)
════════════════════════
𐀪 Author: Crystalcascade14
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:31:01 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: Crystalcascade14
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:31:01 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #cybersecurity #tryhackme_writeup
Medium
ToolsRus walkthrough (TryHackMe)
Nice beginner-friendly room to test your knowledge on nmap, dirbuster, hydra, nikto and Metasploit console.