⤷ Title: PlugX Evolves: New “Meeting Invitation” Phishing Campaign Leverages Trusted Security Software
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:00:22 +0000
════════════════════════
⌗ Tags: #Malware #APT41 #cyber_espionage #DLL side_loading #G DATA #infosec #Lab52 #Malware Analysis #Mustang Panda #phishing #PlugX RAT #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:00:22 +0000
════════════════════════
⌗ Tags: #Malware #APT41 #cyber_espionage #DLL side_loading #G DATA #infosec #Lab52 #Malware Analysis #Mustang Panda #phishing #PlugX RAT #threat intelligence
Daily CyberSecurity
PlugX Evolves: New "Meeting Invitation" Phishing Campaign Leverages Trusted Security Software
LAB52 exposes a new China-aligned espionage campaign using fake meeting invitations and G DATA antivirus components to stealthily deploy the PlugX RAT.
⤷ Title: Waybackurls Guide: Extracting Historical URLs for Bug Bounty
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #technology #penetration_testing #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #hacking #technology #penetration_testing #bug_bounty #cybersecurity
Medium
Waybackurls Guide: Extracting Historical URLs for Bug Bounty
Master Waybackurls to find hidden endpoints, sensitive parameters, and old JS files in your security audits.
⤷ Title: Monitoring AWS Services: Splunk, Security Operations - TryHackMe
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:25:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #tryhackme #aws #cybersecurity
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:25:16 GMT
════════════════════════
⌗ Tags: #ethical_hacking #infosec #tryhackme #aws #cybersecurity
Medium
Monitoring AWS Services: Splunk, Security Operations - TryHackMe
Discover common attacks on AWS services and learn how to protect against them.
⤷ Title: CVE Program Report for Quarter 4 Calendar Year (Q4 CY) 2025
════════════════════════
𐀪 Author: CVE Program Blog
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:04:16 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #vulnerability_management #vulnerability #infosec
════════════════════════
𐀪 Author: CVE Program Blog
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:04:16 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #vulnerability_management #vulnerability #infosec
Medium
CVE Program Report for Quarter 4 Calendar Year (Q4 CY) 2025
The CVE Program’s quarterly summary of program milestones and metrics for Q4 CY 2025.
⤷ Title: From Default Password to SYSTEM: A Beginner’s Walkthrough of TryHackMe Alfred
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:52:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #infosec #ethical_hacking #cybersecurity #tryhackme
════════════════════════
𐀪 Author: Robert Perez
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:52:03 GMT
════════════════════════
⌗ Tags: #penetration_testing #infosec #ethical_hacking #cybersecurity #tryhackme
Medium
From Default Password to SYSTEM: A Beginner’s Walkthrough of TryHackMe Alfred
One of the best ways to learn penetration testing is to watch someone else work through a problem and explain their thinking along the way…
⤷ Title: Exploiting HTTP request smuggling to deliver reflected XSS
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:38:33 GMT
════════════════════════
⌗ Tags: #vulnerability #cybersecurity #penetration_testing #burpsuite #xss_attack
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:38:33 GMT
════════════════════════
⌗ Tags: #vulnerability #cybersecurity #penetration_testing #burpsuite #xss_attack
Medium
Exploiting HTTP request smuggling to deliver reflected XSS
This writeup demonstrates how to exploit HTTP request smuggling to deliver a reflected XSS payload. The application uses a front-end and…
⤷ Title: Exploiting HTTP request smuggling to reveal front-end request rewriting
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:38:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #pentesting #burpsuite #exploit #penetration_testing
════════════════════════
𐀪 Author: Ⓥ
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:38:14 GMT
════════════════════════
⌗ Tags: #cybersecurity #pentesting #burpsuite #exploit #penetration_testing
Medium
Exploiting HTTP request smuggling to reveal front-end request rewriting
This writeup demonstrates how to exploit HTTP request smuggling to reveal front-end request rewriting. The application uses a front-end and…
⤷ Title: Why Some Links Open Mobile Apps Instead of Websites — And the Security Risks Behind It
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:12:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #android #penetration_testing #cyber_security_awareness #8ksec
════════════════════════
𐀪 Author: Seif Ahmed Abdelaal
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:12:27 GMT
════════════════════════
⌗ Tags: #cybersecurity #android #penetration_testing #cyber_security_awareness #8ksec
Medium
Why Some Links Open Mobile Apps Instead of Websites — And the Security Risks Behind It
Sometimes a friend sends you a Facebook link on WhatsApp.
⤷ Title: Securing Nginx With ModSecurity: A Step-by-Step Guide to Deploying a Web Application Firewall (WAF)
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:28:14 GMT
════════════════════════
⌗ Tags: #ethical_hacking #nginx #linux #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Mohamed Mostafa Sayed Saber Ali
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:28:14 GMT
════════════════════════
⌗ Tags: #ethical_hacking #nginx #linux #cybersecurity #penetration_testing
Medium
Securing Nginx With ModSecurity: A Step-by-Step Guide to Deploying a Web Application Firewall (WAF)
A step-by-step guide to installing ModSecurity, integrating with Nginx, and deploying the OWASP Core Rule Set for real-time web application…
⤷ Title: Block (THM) Tryhackme WriteUp Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:59:52 GMT
════════════════════════
⌗ Tags: #encryption #tryhackme #programming #cybersecurity #networking
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:59:52 GMT
════════════════════════
⌗ Tags: #encryption #tryhackme #programming #cybersecurity #networking
Medium
Block (THM) Tryhackme WriteUp Answer
Denoscription : Encryption? What encryption?
⤷ Title: Operation Endgame | TryHackMe | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:28:50 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #active_directory #tryhackme_walkthrough #windows
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 23:28:50 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #active_directory #tryhackme_walkthrough #windows
Medium
Operation Endgame | TryHackMe | Walkthrough
Initial Enumeration
⤷ Title: Network Forensics: RedisShell — Kinsing Lab
════════════════════════
𐀪 Author: Khoa
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:59:18 GMT
════════════════════════
⌗ Tags: #case_study #digital_forensics #cybersecurity #blue_team #info_sec_writeups
════════════════════════
𐀪 Author: Khoa
════════════════════════
ⴵ Time: Tue, 03 Mar 2026 22:59:18 GMT
════════════════════════
⌗ Tags: #case_study #digital_forensics #cybersecurity #blue_team #info_sec_writeups
Medium
Network Forensics: RedisShell — Kinsing Lab
Investigating a multi-stage container compromise from initial exploit to persistent rootkit access.
⤷ Title: Day 16: Let’s get back to enumeration (HTB Nmap room) pt.2
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:10:00 GMT
════════════════════════
⌗ Tags: #hackthebox #nmap #hackthebox_walkthrough #cybersecurity #hackthebox_writeup
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:10:00 GMT
════════════════════════
⌗ Tags: #hackthebox #nmap #hackthebox_walkthrough #cybersecurity #hackthebox_writeup
Medium
Day 16: Let’s get back to enumeration (HTB Nmap room) pt.2
Firewall and IDS/IPS Evasion
⤷ Title: Critical Auth Bypass in Apache Artemis: Attackers Can Hijack Message Queues
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:35:08 +0000
════════════════════════
⌗ Tags: #Vulnerability #ActiveMQ #Apache Artemis #Authentication Bypass #Core Protocol #cybersecurity #data exfiltration #infosec #Message Broker #Patch Alert
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:35:08 +0000
════════════════════════
⌗ Tags: #Vulnerability #ActiveMQ #Apache Artemis #Authentication Bypass #Core Protocol #cybersecurity #data exfiltration #infosec #Message Broker #Patch Alert
Daily CyberSecurity
Critical Auth Bypass in Apache Artemis: Attackers Can Hijack Message Queues
A critical flaw (CVE-2026-27446) in Apache Artemis allows unauthenticated attackers to hijack message queues via rogue brokers. Update to 2.52.0 immediately.
⤷ Title: Django Releases Security Patches to Address DoS and Permission Vulnerabilities
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:21:37 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2026_25673 #CVE_2026_25674 #Denial of Service #Django #dos #infosec #Patch Alert #Python #vulnerability management #Web Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:21:37 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CVE_2026_25673 #CVE_2026_25674 #Denial of Service #Django #dos #infosec #Patch Alert #Python #vulnerability management #Web Security
Daily CyberSecurity
Django Releases Security Patches to Address DoS and Permission Vulnerabilities
Django releases security updates (6.0.3, 5.2.12, 4.2.29) to fix a Windows DoS flaw (CVE-2026-25673) and file permission risks. Upgrade your framework now.
⤷ Title: CISA Adds Qualcomm and VMware Flaws to Known Exploited Catalog
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:11:17 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Broadcom #CISA KEV #CVE_2026_21385 #CVE_2026_22719 #cybersecurity #infosec #Patch Alert #Qualcomm #VMware Aria Operations #vulnerability management #zero_day
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:11:17 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Broadcom #CISA KEV #CVE_2026_21385 #CVE_2026_22719 #cybersecurity #infosec #Patch Alert #Qualcomm #VMware Aria Operations #vulnerability management #zero_day
Daily CyberSecurity
CISA Adds Qualcomm and VMware Flaws to Known Exploited Catalog
CISA adds actively exploited Qualcomm (CVE-2026-21385) and VMware (CVE-2026-22719) flaws to its KEV catalog. See the impact and patch deadlines inside.
⤷ Title: Cyber Retaliation Escalates: Iranian Hacktivists Target Critical Infrastructure Following Military Strikes
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:01:04 +0000
════════════════════════
⌗ Tags: #Cyber Security #BaqiyatLock #Cyber Retaliation #cybersecurity #ddos #Handala Hack Team #Iranian Hacktivists #Operation Epic Fury #Operation Roaring Lion #Sophos X_Ops #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:01:04 +0000
════════════════════════
⌗ Tags: #Cyber Security #BaqiyatLock #Cyber Retaliation #cybersecurity #ddos #Handala Hack Team #Iranian Hacktivists #Operation Epic Fury #Operation Roaring Lion #Sophos X_Ops #threat intelligence
Daily CyberSecurity
Cyber Retaliation Escalates: Iranian Hacktivists Target Critical Infrastructure Following Military Strikes
Sophos X-Ops CTU warns of a surge in Iranian hacktivist cyber retaliation, including DDoS and targeted doxxing, following Operation Epic Fury.
⤷ Title: ️Turning Directory Data into Domain Access
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 01:29:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #hacking #ctf #bug_bounty
════════════════════════
𐀪 Author: Jabaribrown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 01:29:31 GMT
════════════════════════
⌗ Tags: #ethical_hacking #cybersecurity #hacking #ctf #bug_bounty
Medium
💻🕷️Turning Directory Data into Domain Access
Continuing my mastery of the AD journey.
⤷ Title: Forcing an AI App to generate Payloads to Cause HTML Injection
════════════════════════
𐀪 Author: Rahul Singh Chauhan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 01:11:07 GMT
════════════════════════
⌗ Tags: #html_injection #bug_bounty #cybersecurity #ai #bug_bounty_reports
════════════════════════
𐀪 Author: Rahul Singh Chauhan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 01:11:07 GMT
════════════════════════
⌗ Tags: #html_injection #bug_bounty #cybersecurity #ai #bug_bounty_reports
Medium
Forcing an AI App to generate Payloads to Cause HTML Injection
Hi everyone, in this article, I’ll walk through a recent penetration test I conducted against a custom-built AI chatbot. As usual, we’ll…
⤷ Title: HackMyVM: Lazzycorp Writeup
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:48:24 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #hackmyvm #ctf_writeup #ctf #hacking
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 02:48:24 GMT
════════════════════════
⌗ Tags: #ctf_walkthrough #hackmyvm #ctf_writeup #ctf #hacking
Medium
HackMyVM: Lazzycorp Writeup
Machine details
⤷ Title: THIS TINY DEVICE HELPED ME HACK MY UNI’S NETWORK
════════════════════════
𐀪 Author: Satyam Pathania
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 01:07:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #technology #esp32 #linux
════════════════════════
𐀪 Author: Satyam Pathania
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 01:07:10 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #technology #esp32 #linux
Medium
THIS TINY DEVICE HELPED ME HACK MY UNI’S NETWORK
NOTE:- This isn’t my article or project , we worked together on this and she Trish worked really hard on this one , so shoutout to her and…