⤷ Title: The Trojan Prompt: How an Autonomous AI Hijacked Aqua Trivy to Weaponize Developer Copilots
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:06:28 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI Prompt Injection #Aqua Trivy #Claude #cybersecurity #DevSecOps #Gemini #GitHub Copilot #infosec #social engineering #Socket #supply chain attack #VS Code
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:06:28 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AI Prompt Injection #Aqua Trivy #Claude #cybersecurity #DevSecOps #Gemini #GitHub Copilot #infosec #social engineering #Socket #supply chain attack #VS Code
Daily CyberSecurity
The Trojan Prompt: How an Autonomous AI Hijacked Aqua Trivy to Weaponize Developer Copilots
Socket reveals how an AI bot hijacked the Aqua Trivy VS Code extension, using prompt injection to turn developer AI assistants into stealthy data thieves.
⤷ Title: PlugX Evolves: New “Meeting Invitation” Phishing Campaign Leverages Trusted Security Software
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:00:22 +0000
════════════════════════
⌗ Tags: #Malware #APT41 #cyber_espionage #DLL side_loading #G DATA #infosec #Lab52 #Malware Analysis #Mustang Panda #phishing #PlugX RAT #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:00:22 +0000
════════════════════════
⌗ Tags: #Malware #APT41 #cyber_espionage #DLL side_loading #G DATA #infosec #Lab52 #Malware Analysis #Mustang Panda #phishing #PlugX RAT #threat intelligence
Daily CyberSecurity
PlugX Evolves: New "Meeting Invitation" Phishing Campaign Leverages Trusted Security Software
LAB52 exposes a new China-aligned espionage campaign using fake meeting invitations and G DATA antivirus components to stealthily deploy the PlugX RAT.
⤷ Title: Waybackurls Guide: Extracting Historical URLs for Bug Bounty
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #technology #penetration_testing #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #technology #penetration_testing #bug_bounty #cybersecurity
Medium
Waybackurls Guide: Extracting Historical URLs for Bug Bounty
Master Waybackurls to find hidden endpoints, sensitive parameters, and old JS files in your security audits.
⤷ Title: Monitoring AWS Services: Splunk, Security Operations - TryHackMe
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:25:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #tryhackme #aws #cybersecurity
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:25:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #tryhackme #aws #cybersecurity
Medium
Monitoring AWS Services: Splunk, Security Operations - TryHackMe
Discover common attacks on AWS services and learn how to protect against them.
⤷ Title: CVE Program Report for Quarter 4 Calendar Year (Q4 CY) 2025
════════════════════════
𐀪 Author: CVE Program Blog
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:04:16 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #vulnerability_management #vulnerability #infosec
════════════════════════
𐀪 Author: CVE Program Blog
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:04:16 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #vulnerability_management #vulnerability #infosec
Medium
CVE Program Report for Quarter 4 Calendar Year (Q4 CY) 2025
The CVE Program’s quarterly summary of program milestones and metrics for Q4 CY 2025.
⤷ Title: From Default Password to SYSTEM: A Beginner’s Walkthrough of TryHackMe Alfred
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:52:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #infosec #ethical_hacking #cybersecurity #tryhackme
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:52:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #infosec #ethical_hacking #cybersecurity #tryhackme
Medium
From Default Password to SYSTEM: A Beginner’s Walkthrough of TryHackMe Alfred
One of the best ways to learn penetration testing is to watch someone else work through a problem and explain their thinking along the way…
⤷ Title: Exploiting HTTP request smuggling to deliver reflected XSS
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:38:33 GMT
════════════════════════
⌗ Tags: #vulnerability #cybersecurity #penetration_testing #burpsuite #xss_attack
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:38:33 GMT
════════════════════════
⌗ Tags: #vulnerability #cybersecurity #penetration_testing #burpsuite #xss_attack
Medium
Exploiting HTTP request smuggling to deliver reflected XSS
This writeup demonstrates how to exploit HTTP request smuggling to deliver a reflected XSS payload. The application uses a front-end and…
⤷ Title: Exploiting HTTP request smuggling to reveal front-end request rewriting
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:38:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #pentesting #burpsuite #exploit #penetration_testing
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:38:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #pentesting #burpsuite #exploit #penetration_testing
Medium
Exploiting HTTP request smuggling to reveal front-end request rewriting
This writeup demonstrates how to exploit HTTP request smuggling to reveal front-end request rewriting. The application uses a front-end and…
⤷ Title: Why Some Links Open Mobile Apps Instead of Websites — And the Security Risks Behind It
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:12:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #android #penetration_testing #cyber_security_awareness #8ksec
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:12:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #android #penetration_testing #cyber_security_awareness #8ksec
Medium
Why Some Links Open Mobile Apps Instead of Websites — And the Security Risks Behind It
Sometimes a friend sends you a Facebook link on WhatsApp.
⤷ Title: Securing Nginx With ModSecurity: A Step-by-Step Guide to Deploying a Web Application Firewall (WAF)
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:28:14 GMT
════════════════════════
⌗ Tags: #ethical_hacking #nginx #linux #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:28:14 GMT
════════════════════════
⌗ Tags: #ethical_hacking #nginx #linux #cybersecurity #penetration_testing
Medium
Securing Nginx With ModSecurity: A Step-by-Step Guide to Deploying a Web Application Firewall (WAF)
A step-by-step guide to installing ModSecurity, integrating with Nginx, and deploying the OWASP Core Rule Set for real-time web application…
⤷ Title: Block (THM) Tryhackme WriteUp Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:59:52 GMT
════════════════════════
⌗ Tags: #encryption #tryhackme #programming #cybersecurity #networking
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:59:52 GMT
════════════════════════
⌗ Tags: #encryption #tryhackme #programming #cybersecurity #networking
Medium
Block (THM) Tryhackme WriteUp Answer
Denoscription : Encryption? What encryption?
⤷ Title: Operation Endgame | TryHackMe | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:28:50 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #active_directory #tryhackme_walkthrough #windows
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:28:50 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #active_directory #tryhackme_walkthrough #windows
Medium
Operation Endgame | TryHackMe | Walkthrough
Initial Enumeration
⤷ Title: Network Forensics: RedisShell — Kinsing Lab
════════════════════════
𐀪 Author: Khoa
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:59:18 GMT
════════════════════════
⌗ Tags: #case_study #digital_forensics #cybersecurity #blue_team #info_sec_writeups
════════════════════════
𐀪 Author: Khoa
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:59:18 GMT
════════════════════════
⌗ Tags: #case_study #digital_forensics #cybersecurity #blue_team #info_sec_writeups
Medium
Network Forensics: RedisShell — Kinsing Lab
Investigating a multi-stage container compromise from initial exploit to persistent rootkit access.
⤷ Title: Day 16: Let’s get back to enumeration (HTB Nmap room) pt.2
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:10:00 GMT
════════════════════════
⌗ Tags: #hackthebox #nmap #hackthebox_walkthrough #cybersecurity #hackthebox_writeup
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:10:00 GMT
════════════════════════
⌗ Tags: #hackthebox #nmap #hackthebox_walkthrough #cybersecurity #hackthebox_writeup
Medium
Day 16: Let’s get back to enumeration (HTB Nmap room) pt.2
Firewall and IDS/IPS Evasion
⤷ Title: Critical Auth Bypass in Apache Artemis: Attackers Can Hijack Message Queues
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:35:08 +0000
════════════════════════
⌗ Tags: #Vulnerability #ActiveMQ #Apache Artemis #Authentication Bypass #Core Protocol #cybersecurity #data exfiltration #infosec #Message Broker #Patch Alert
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:35:08 +0000
════════════════════════
⌗ Tags: #Vulnerability #ActiveMQ #Apache Artemis #Authentication Bypass #Core Protocol #cybersecurity #data exfiltration #infosec #Message Broker #Patch Alert
Daily CyberSecurity
Critical Auth Bypass in Apache Artemis: Attackers Can Hijack Message Queues
A critical flaw (CVE-2026-27446) in Apache Artemis allows unauthenticated attackers to hijack message queues via rogue brokers. Update to 2.52.0 immediately.
⤷ Title: Django Releases Security Patches to Address DoS and Permission Vulnerabilities
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:21:37 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2026_25673 #CVE_2026_25674 #Denial of Service #Django #dos #infosec #Patch Alert #Python #vulnerability management #Web Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:21:37 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2026_25673 #CVE_2026_25674 #Denial of Service #Django #dos #infosec #Patch Alert #Python #vulnerability management #Web Security
Daily CyberSecurity
Django Releases Security Patches to Address DoS and Permission Vulnerabilities
Django releases security updates (6.0.3, 5.2.12, 4.2.29) to fix a Windows DoS flaw (CVE-2026-25673) and file permission risks. Upgrade your framework now.
⤷ Title: CISA Adds Qualcomm and VMware Flaws to Known Exploited Catalog
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:11:17 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Broadcom #CISA KEV #CVE_2026_21385 #CVE_2026_22719 #cybersecurity #infosec #Patch Alert #Qualcomm #VMware Aria Operations #vulnerability management #zero_day
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:11:17 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Broadcom #CISA KEV #CVE_2026_21385 #CVE_2026_22719 #cybersecurity #infosec #Patch Alert #Qualcomm #VMware Aria Operations #vulnerability management #zero_day
Daily CyberSecurity
CISA Adds Qualcomm and VMware Flaws to Known Exploited Catalog
CISA adds actively exploited Qualcomm (CVE-2026-21385) and VMware (CVE-2026-22719) flaws to its KEV catalog. See the impact and patch deadlines inside.
⤷ Title: Cyber Retaliation Escalates: Iranian Hacktivists Target Critical Infrastructure Following Military Strikes
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:01:04 +0000
════════════════════════
⌗ Tags: #Cyber Security #BaqiyatLock #Cyber Retaliation #cybersecurity #ddos #Handala Hack Team #Iranian Hacktivists #Operation Epic Fury #Operation Roaring Lion #Sophos X_Ops #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:01:04 +0000
════════════════════════
⌗ Tags: #Cyber Security #BaqiyatLock #Cyber Retaliation #cybersecurity #ddos #Handala Hack Team #Iranian Hacktivists #Operation Epic Fury #Operation Roaring Lion #Sophos X_Ops #threat intelligence
Daily CyberSecurity
Cyber Retaliation Escalates: Iranian Hacktivists Target Critical Infrastructure Following Military Strikes
Sophos X-Ops CTU warns of a surge in Iranian hacktivist cyber retaliation, including DDoS and targeted doxxing, following Operation Epic Fury.
⤷ Title: ️Turning Directory Data into Domain Access
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 01:29:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #hacking #ctf #bug_bounty
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 01:29:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #hacking #ctf #bug_bounty
Medium
💻🕷️Turning Directory Data into Domain Access
Continuing my mastery of the AD journey.
⤷ Title: Forcing an AI App to generate Payloads to Cause HTML Injection
════════════════════════
𐀪 Author: Rahul Singh Chauhan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 01:11:07 GMT
════════════════════════
⌗ Tags: #html_injection #bug_bounty #cybersecurity #ai #bug_bounty_reports
════════════════════════
𐀪 Author: Rahul Singh Chauhan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 01:11:07 GMT
════════════════════════
⌗ Tags: #html_injection #bug_bounty #cybersecurity #ai #bug_bounty_reports
Medium
Forcing an AI App to generate Payloads to Cause HTML Injection
Hi everyone, in this article, I’ll walk through a recent penetration test I conducted against a custom-built AI chatbot. As usual, we’ll…
⤷ Title: HackMyVM: Lazzycorp Writeup
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:48:24 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #hackmyvm #ctf_writeup #ctf #hacking
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:48:24 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #hackmyvm #ctf_writeup #ctf #hacking
Medium
HackMyVM: Lazzycorp Writeup
Machine details