⤷ Title: Exploitation of Grotesque 2
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:45:36 GMT
════════════════════════
⌗ Tags: #vulnhub #vulnhub_writeup #ctf_writeup
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:45:36 GMT
════════════════════════
⌗ Tags: #vulnhub #vulnhub_writeup #ctf_writeup
Medium
Exploitation of Grotesque 2
I started with host discovery using nmap and I I found the ip address at 192.168.1.160
⤷ Title: Exploitation of Grotesque 1
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:31:38 GMT
════════════════════════
⌗ Tags: #vulnhub_writeup #vulnhub #oscp_vulnhub #ctf_writeup #vulnhub_walkthrough
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:31:38 GMT
════════════════════════
⌗ Tags: #vulnhub_writeup #vulnhub #oscp_vulnhub #ctf_writeup #vulnhub_walkthrough
Medium
Exploitation of Grotesque 1
I started with host discovery using nmap and I found the ip address at 192.168.1.121
⤷ Title: ️ Building a Packet Sniffer Using Python & Scapy
════════════════════════
𐀪 Author: Vivekprajapati
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:43:49 GMT
════════════════════════
⌗ Tags: #networking #python_scapy #python #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Vivekprajapati
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:43:49 GMT
════════════════════════
⌗ Tags: #networking #python_scapy #python #cybersecurity #ethical_hacking
Medium
🛡️ Building a Packet Sniffer Using Python & Scapy
📌 Introduction
⤷ Title: How to Choose the Best Cybersecurity Certification That Offers Top Career Opportunities for You
════════════════════════
𐀪 Author: Lorcam Securities
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:03:18 GMT
════════════════════════
⌗ Tags: #ceh_certification #cybersecurity #cyber_security_india #ethical_hacking
════════════════════════
𐀪 Author: Lorcam Securities
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 13:03:18 GMT
════════════════════════
⌗ Tags: #ceh_certification #cybersecurity #cyber_security_india #ethical_hacking
Medium
How to Choose the Best Cybersecurity Certification That Offers Top Career Opportunities for You
One of the rapidly growing sectors in India and the global arena is cybersecurity. Selecting an appropriate cyber security program and…
⤷ Title: Zero Public Ports: How I Secured my B2B API Against 10k Scraper Requests
════════════════════════
𐀪 Author: Ioan Istrate
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:38:04 GMT
════════════════════════
⌗ Tags: #api_security #software_engineering #cloudflare #python #django
════════════════════════
𐀪 Author: Ioan Istrate
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:38:04 GMT
════════════════════════
⌗ Tags: #api_security #software_engineering #cloudflare #python #django
Medium
Zero Public Ports: How I Secured my B2B API Against 10k Scraper Requests
I built security for “no one’s looking.” The open web is “everyone’s looking.” This is the post mortem of closing that gap. The thesis…
⤷ Title: Being a Security Researcher (SR) Changed How I See DeFi
════════════════════════
𐀪 Author: Abraham
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:42:19 GMT
════════════════════════
⌗ Tags: #smart_contract_security #smart_contracts #cybersecurity #bug_bounty #blockchain
════════════════════════
𐀪 Author: Abraham
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:42:19 GMT
════════════════════════
⌗ Tags: #smart_contract_security #smart_contracts #cybersecurity #bug_bounty #blockchain
Medium
Being a Security Researcher (SR) Changed How I See DeFi
Becoming a Security Researcher (SR) completely transformed my understanding of Decentralized Finance (DeFi).
⤷ Title: Understanding the MITRE ATT&CK Framework: A Beginner’s Guide to Thinking Like an Attacker
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:07:58 GMT
════════════════════════
⌗ Tags: #security #technology #mitre_attack #hacking #cybersecurity
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:07:58 GMT
════════════════════════
⌗ Tags: #security #technology #mitre_attack #hacking #cybersecurity
Medium
Understanding the MITRE ATT&CK Framework: A Beginner’s Guide to Thinking Like an Attacker
When I first came across the MITRE ATT&CK framework, it looked overwhelming. A massive matrix. Dozens of categories. Hundreds of…
❤1
⤷ Title: Hands-On Memory Forensics: A DFIR Investigation of a Compromised Windows XP Machine
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:15:16 GMT
════════════════════════
⌗ Tags: #penetration_testing #digital_forensics #cybersecurity #information_security #ethical_hacking
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:15:16 GMT
════════════════════════
⌗ Tags: #penetration_testing #digital_forensics #cybersecurity #information_security #ethical_hacking
Medium
Hands-On Memory Forensics: A DFIR Investigation of a Compromised Windows XP Machine
Using Volatility2 to identify malicious processes, injected DLLs, C2 communications, and phishing URLs targeting financial institutions
⤷ Title: Sherlock HackTheBox: Brutus
════════════════════════
𐀪 Author: Dixtroiza
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:57:06 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #cybersecurity
════════════════════════
𐀪 Author: Dixtroiza
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:57:06 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #cybersecurity
Medium
Sherlock HackTheBox: Brutus
Penulis: Dixtroiza
⤷ Title: Business Logic Vulnerability in Subnoscription Checkout
════════════════════════
𐀪 Author: Mahmoud Magdy
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:43:31 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #logic_bug #owasp_top_10 #business_logic_bug #bug_bounty_writeup
════════════════════════
𐀪 Author: Mahmoud Magdy
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:43:31 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #logic_bug #owasp_top_10 #business_logic_bug #bug_bounty_writeup
Medium
Business Logic Vulnerability in Subnoscription Checkout
Hello Hackers 👋
⤷ Title: Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:45:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:45:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Fake Zoom and Google Meet Pages Trick Users Into Installing Monitoring Tool
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:39:44 +0000
════════════════════════
⌗ Tags: #Security #Malware #Scams and Fraud #Cybersecurity #Employee Monitoring #Google Meet #Scam #Windows #Zoom
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:39:44 +0000
════════════════════════
⌗ Tags: #Security #Malware #Scams and Fraud #Cybersecurity #Employee Monitoring #Google Meet #Scam #Windows #Zoom
Hackread
Fake Zoom and Google Meet Pages Trick Users Into Installing Monitoring Tool
Follow us on all social media platforms @Hackread
⤷ Title: Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE)
════════════════════════
𐀪 Author: McCaulay Hudson
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:15:18 GMT
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: McCaulay Hudson
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:15:18 GMT
════════════════════════
⌗ Tags: No_Tags
watchTowr Labs
Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE)
On today’s ‘good news disguised as other things’ segment, we’re turning our gaze to CVE-2026-21902 - a recently disclosed “Incorrect Permission Assignment for Critical Resource” vulnerability affecting Juniper’s Junos OS Evolved platform. This vulnerability…
⤷ Title: I Stopped Watching Random Cybersecurity Videos — And Finally Chose a Path
════════════════════════
𐀪 Author: the copy ninja
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:20:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #portswigger #learning_journey #bug_bounty
════════════════════════
𐀪 Author: the copy ninja
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:20:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #portswigger #learning_journey #bug_bounty
Medium
I Stopped Watching Random Cybersecurity Videos — And Finally Chose a Path
I work in R&D at a cybersecurity company.
⤷ Title: Why the Best Bug Hunters Think Like Detectives, Not Hackers — And What That Difference Earns Them
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:18:51 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #business #earn_money_online #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:18:51 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #business #earn_money_online #bug_bounty_tips #bug_bounty
Medium
Why the Best Bug Hunters Think Like Detectives, Not Hackers — And What That Difference Earns Them
Introduction
⤷ Title: Lookup-A TryHackMe Writeup
════════════════════════
𐀪 Author: 0x77
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:42:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #infosec #ctf_writeup #hacking
════════════════════════
𐀪 Author: 0x77
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:42:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #infosec #ctf_writeup #hacking
Medium
Lookup-A TryHackMe Writeup
Introduction
⤷ Title: [Dev Update] In NODE: PROTOCOL, stealing the data is only half the job.
════════════════════════
𐀪 Author: Marc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:59:29 GMT
════════════════════════
⌗ Tags: #hacking #simulation #game_development #games
════════════════════════
𐀪 Author: Marc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:59:29 GMT
════════════════════════
⌗ Tags: #hacking #simulation #game_development #games
Medium
[Dev Update] In NODE: PROTOCOL, stealing the data is only half the job. You have to manage the Tainted BTC economy to survive.
Hey everyone,
⤷ Title: Cybersecurity Awareness: The Shadow AI Crisis Bleeding Your Data Through Invisible APIs
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:22:50 GMT
════════════════════════
⌗ Tags: #shadow_ai #generative_ai_risks #infosec #cyber_security_awareness #threat_intelligence
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:22:50 GMT
════════════════════════
⌗ Tags: #shadow_ai #generative_ai_risks #infosec #cyber_security_awareness #threat_intelligence
Medium
Cybersecurity Awareness: The Shadow AI Crisis Bleeding Your Data Through Invisible APIs
The cybersecurity threat you can’t see is the one destroying you from within.
❤1
⤷ Title: ToolsRus walkthrough (TryHackMe)
════════════════════════
𐀪 Author: Crystalcascade14
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:31:01 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: Crystalcascade14
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:31:01 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #cybersecurity #tryhackme_writeup
Medium
ToolsRus walkthrough (TryHackMe)
Nice beginner-friendly room to test your knowledge on nmap, dirbuster, hydra, nikto and Metasploit console.
⤷ Title: Confused About Cybersecurity Careers?
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:11:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #programming #tech #technology
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:11:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #programming #tech #technology
Medium
Confused About Cybersecurity Careers?
Let’s Simplify Your Path Into This In-Demand Field
⤷ Title: Agent-first Secure Software Development Lifecycle
════════════════════════
𐀪 Author: Bárbara Vieira
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:24:02 GMT
════════════════════════
⌗ Tags: #application_security #agent_first_development #ai #agentic_coding #security
════════════════════════
𐀪 Author: Bárbara Vieira
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:24:02 GMT
════════════════════════
⌗ Tags: #application_security #agent_first_development #ai #agentic_coding #security
Medium
Agent-first Secure Software Development Lifecycle
Agent-first development is a software development approach where autonomous AI agents plan, write, test, and modify code with minimal human…