⤷ Title: Being a Security Researcher (SR) Changed How I See DeFi
════════════════════════
𐀪 Author: Abraham
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:42:19 GMT
════════════════════════
⌗ Tags: #smart_contract_security #smart_contracts #cybersecurity #bug_bounty #blockchain
════════════════════════
𐀪 Author: Abraham
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:42:19 GMT
════════════════════════
⌗ Tags: #smart_contract_security #smart_contracts #cybersecurity #bug_bounty #blockchain
Medium
Being a Security Researcher (SR) Changed How I See DeFi
Becoming a Security Researcher (SR) completely transformed my understanding of Decentralized Finance (DeFi).
⤷ Title: Understanding the MITRE ATT&CK Framework: A Beginner’s Guide to Thinking Like an Attacker
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:07:58 GMT
════════════════════════
⌗ Tags: #security #technology #mitre_attack #hacking #cybersecurity
════════════════════════
𐀪 Author: Rinu M J
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:07:58 GMT
════════════════════════
⌗ Tags: #security #technology #mitre_attack #hacking #cybersecurity
Medium
Understanding the MITRE ATT&CK Framework: A Beginner’s Guide to Thinking Like an Attacker
When I first came across the MITRE ATT&CK framework, it looked overwhelming. A massive matrix. Dozens of categories. Hundreds of…
❤1
⤷ Title: Hands-On Memory Forensics: A DFIR Investigation of a Compromised Windows XP Machine
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:15:16 GMT
════════════════════════
⌗ Tags: #penetration_testing #digital_forensics #cybersecurity #information_security #ethical_hacking
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 15:15:16 GMT
════════════════════════
⌗ Tags: #penetration_testing #digital_forensics #cybersecurity #information_security #ethical_hacking
Medium
Hands-On Memory Forensics: A DFIR Investigation of a Compromised Windows XP Machine
Using Volatility2 to identify malicious processes, injected DLLs, C2 communications, and phishing URLs targeting financial institutions
⤷ Title: Sherlock HackTheBox: Brutus
════════════════════════
𐀪 Author: Dixtroiza
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:57:06 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #cybersecurity
════════════════════════
𐀪 Author: Dixtroiza
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:57:06 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #hackthebox #cybersecurity
Medium
Sherlock HackTheBox: Brutus
Penulis: Dixtroiza
⤷ Title: Business Logic Vulnerability in Subnoscription Checkout
════════════════════════
𐀪 Author: Mahmoud Magdy
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:43:31 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #logic_bug #owasp_top_10 #business_logic_bug #bug_bounty_writeup
════════════════════════
𐀪 Author: Mahmoud Magdy
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:43:31 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #logic_bug #owasp_top_10 #business_logic_bug #bug_bounty_writeup
Medium
Business Logic Vulnerability in Subnoscription Checkout
Hello Hackers 👋
⤷ Title: Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:45:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:45:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Fake Zoom and Google Meet Pages Trick Users Into Installing Monitoring Tool
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:39:44 +0000
════════════════════════
⌗ Tags: #Security #Malware #Scams and Fraud #Cybersecurity #Employee Monitoring #Google Meet #Scam #Windows #Zoom
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:39:44 +0000
════════════════════════
⌗ Tags: #Security #Malware #Scams and Fraud #Cybersecurity #Employee Monitoring #Google Meet #Scam #Windows #Zoom
Hackread
Fake Zoom and Google Meet Pages Trick Users Into Installing Monitoring Tool
Follow us on all social media platforms @Hackread
⤷ Title: Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE)
════════════════════════
𐀪 Author: McCaulay Hudson
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:15:18 GMT
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: McCaulay Hudson
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 14:15:18 GMT
════════════════════════
⌗ Tags: No_Tags
watchTowr Labs
Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE)
On today’s ‘good news disguised as other things’ segment, we’re turning our gaze to CVE-2026-21902 - a recently disclosed “Incorrect Permission Assignment for Critical Resource” vulnerability affecting Juniper’s Junos OS Evolved platform. This vulnerability…
⤷ Title: I Stopped Watching Random Cybersecurity Videos — And Finally Chose a Path
════════════════════════
𐀪 Author: the copy ninja
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:20:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #portswigger #learning_journey #bug_bounty
════════════════════════
𐀪 Author: the copy ninja
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:20:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #portswigger #learning_journey #bug_bounty
Medium
I Stopped Watching Random Cybersecurity Videos — And Finally Chose a Path
I work in R&D at a cybersecurity company.
⤷ Title: Why the Best Bug Hunters Think Like Detectives, Not Hackers — And What That Difference Earns Them
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:18:51 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #business #earn_money_online #bug_bounty_tips #bug_bounty
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:18:51 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #business #earn_money_online #bug_bounty_tips #bug_bounty
Medium
Why the Best Bug Hunters Think Like Detectives, Not Hackers — And What That Difference Earns Them
Introduction
⤷ Title: Lookup-A TryHackMe Writeup
════════════════════════
𐀪 Author: 0x77
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:42:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #infosec #ctf_writeup #hacking
════════════════════════
𐀪 Author: 0x77
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:42:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #ctf #infosec #ctf_writeup #hacking
Medium
Lookup-A TryHackMe Writeup
Introduction
⤷ Title: [Dev Update] In NODE: PROTOCOL, stealing the data is only half the job.
════════════════════════
𐀪 Author: Marc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:59:29 GMT
════════════════════════
⌗ Tags: #hacking #simulation #game_development #games
════════════════════════
𐀪 Author: Marc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 16:59:29 GMT
════════════════════════
⌗ Tags: #hacking #simulation #game_development #games
Medium
[Dev Update] In NODE: PROTOCOL, stealing the data is only half the job. You have to manage the Tainted BTC economy to survive.
Hey everyone,
⤷ Title: Cybersecurity Awareness: The Shadow AI Crisis Bleeding Your Data Through Invisible APIs
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:22:50 GMT
════════════════════════
⌗ Tags: #shadow_ai #generative_ai_risks #infosec #cyber_security_awareness #threat_intelligence
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:22:50 GMT
════════════════════════
⌗ Tags: #shadow_ai #generative_ai_risks #infosec #cyber_security_awareness #threat_intelligence
Medium
Cybersecurity Awareness: The Shadow AI Crisis Bleeding Your Data Through Invisible APIs
The cybersecurity threat you can’t see is the one destroying you from within.
❤1
⤷ Title: ToolsRus walkthrough (TryHackMe)
════════════════════════
𐀪 Author: Crystalcascade14
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:31:01 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #cybersecurity #tryhackme_writeup
════════════════════════
𐀪 Author: Crystalcascade14
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 17:31:01 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #penetration_testing #tryhackme #cybersecurity #tryhackme_writeup
Medium
ToolsRus walkthrough (TryHackMe)
Nice beginner-friendly room to test your knowledge on nmap, dirbuster, hydra, nikto and Metasploit console.
⤷ Title: Confused About Cybersecurity Careers?
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:11:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #programming #tech #technology
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 18:11:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #programming #tech #technology
Medium
Confused About Cybersecurity Careers?
Let’s Simplify Your Path Into This In-Demand Field
⤷ Title: Agent-first Secure Software Development Lifecycle
════════════════════════
𐀪 Author: Bárbara Vieira
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:24:02 GMT
════════════════════════
⌗ Tags: #application_security #agent_first_development #ai #agentic_coding #security
════════════════════════
𐀪 Author: Bárbara Vieira
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:24:02 GMT
════════════════════════
⌗ Tags: #application_security #agent_first_development #ai #agentic_coding #security
Medium
Agent-first Secure Software Development Lifecycle
Agent-first development is a software development approach where autonomous AI agents plan, write, test, and modify code with minimal human…
⤷ Title: How Does M-Pesa Know My PIN Is Wrong? (And Do They Actually Know It?)
════════════════════════
𐀪 Author: Joel Orie
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:19:53 GMT
════════════════════════
⌗ Tags: #general_knowledge #application_security #cybersecurity #authentication
════════════════════════
𐀪 Author: Joel Orie
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:19:53 GMT
════════════════════════
⌗ Tags: #general_knowledge #application_security #cybersecurity #authentication
Medium
How Does M-Pesa Know My PIN Is Wrong? (And Do They Actually Know It?)
If you’ve ever mistyped your PIN on M-Pesa and received the familiar “Incorrect PIN” message, you might have wondered:
⤷ Title: Offensive Security Proving Grounds: Internal
════════════════════════
𐀪 Author: Henry Post
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 20:50:35 GMT
════════════════════════
⌗ Tags: #htb_writeup #oscp #hacking
════════════════════════
𐀪 Author: Henry Post
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 20:50:35 GMT
════════════════════════
⌗ Tags: #htb_writeup #oscp #hacking
Medium
Offensive Security Proving Grounds: Internal
See below link.
⤷ Title: Pentest GPT: Wie LLMs das Penetration Testing wirklich verändern
════════════════════════
𐀪 Author: Kerimkoc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:35:35 GMT
════════════════════════
⌗ Tags: #chatgpt #hacking #gpt #life_hacking #ai
════════════════════════
𐀪 Author: Kerimkoc
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:35:35 GMT
════════════════════════
⌗ Tags: #chatgpt #hacking #gpt #life_hacking #ai
Medium
Pentest GPT: Wie LLMs das Penetration Testing wirklich verändern
Die Rolle von KI in der Cybersecurity ist längst keine Zukunftsvision mehr. Large Language Models (LLMs) wie GPT-4 werden inzwischen in…
⤷ Title: The Invoice That Wasn’t: Uncovering a Remcos RAT-Driven Email Abuse Attack
════════════════════════
𐀪 Author: Vignesh Naidu
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:14:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberattack #phishing #malware #hacking
════════════════════════
𐀪 Author: Vignesh Naidu
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:14:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyberattack #phishing #malware #hacking
Medium
The Invoice That Wasn’t: Uncovering a Remcos RAT-Driven Email Abuse Attack
It started with a simple but alarming statement: “Emails are being sent from my account, but I did not send them.” What initially appeared…
⤷ Title: Hackviser Write-up [EN / TR] — Reflected XSS via HTML Attribute Manipulation
════════════════════════
𐀪 Author: Muhammet Alperen Şıvgın
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:13:38 GMT
════════════════════════
⌗ Tags: #hackviser #red_team #hacking #ctf #cybersecurity
════════════════════════
𐀪 Author: Muhammet Alperen Şıvgın
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 19:13:38 GMT
════════════════════════
⌗ Tags: #hackviser #red_team #hacking #ctf #cybersecurity
Medium
Hackviser Write-up [EN / TR] — Reflected XSS via HTML Attribute Manipulation
Hello everyone. Today, I will be sharing with you the solution to the “Reflected XSS via HTML Attribute Manipulation” laboratory on the…