Daily Writeups – Telegram
Daily Writeups
3.33K subscribers
1 photo
111K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title:
════════════════════════
𐀪 Author: Fethallah Abdelkader GHELLAIMI
════════════════════════
Time: Wed, 04 Mar 2026 04:01:52 GMT
════════════════════════
Tags: #bounty_hacker_tryhackme #ctf_writeup #ctf #tryhackme #ethical_hacking
Title: Career Opportunities in Ethical Hacking
════════════════════════
𐀪 Author: Jhoninternship
════════════════════════
Time: Wed, 04 Mar 2026 04:46:42 GMT
════════════════════════
Tags: #ethical_hacking #education #cybersecurity
Title: CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Wed, 04 Mar 2026 10:05:00 +0530
════════════════════════
Tags: No_Tags
Title: Shadows in the Browser: The UNC6384 Syndicate Unmasks a New PlugX Variant “Arp”
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 06:59:16 +0000
════════════════════════
Tags: #Malware #Cyberespionage #diplomatic missions #DLL Sideloading #G DATA antivirus #Mustang Panda #PlugX malware #RC4 encryption #Southeast Asia #Tech News 2026 #UNC6384
Title: The Synthetic Factory: How the “Genisys” Ad Fraud Scheme Hijacked 25 Million Devices via AI
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 06:56:43 +0000
════════════════════════
Tags: #Cybercriminals #Ad Fraud #Android Security #digital advertising #Generative AI #Genisys #Google Play Store #IAS Threat Lab #Mobile Malware #Operation Arcade #synthetic web #Tech News 2026
Title: The Zerobot Botnet Mutates to Hijack Tenda Routers and n8n Automation Hubs
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 06:55:19 +0000
════════════════════════
Tags: #Malware #Akamai #BOTNET #CVE_2025_68613 #CVE_2025_7544 #IoT Security #Mirai #n8n #RCE exploitation #supply chain attack #Tech News 2026 #Tenda AC1206 #Zerobot
Title: The Rise of the Autonomous Adversary: How “Hackerbot-Claw” Hijacked Major Open-Source Repositories
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 06:53:04 +0000
════════════════════════
Tags: #Vulnerability #Aqua Security #autonomous AI bot #CI/CD Security #Datadog #GitHub Actions #GITHUB_TOKEN #hackerbot_claw #Microsoft #pull_request_target #supply chain attack #Tech News 2026 #Trivy
Title: Assessment Methodologies: Enumeration CTF 1
════════════════════════
𐀪 Author: Prasad
════════════════════════
Time: Wed, 04 Mar 2026 06:33:59 GMT
════════════════════════
Tags: #cybersecurity #bug_bounty #ctf
Title: CeWL vs Crunch: How to Build Smart Wordlists for Bug Bounty Recon
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
Time: Wed, 04 Mar 2026 06:27:07 GMT
════════════════════════
Tags: #hacking #security #bug_bounty #linux #cybersecurity
Title: The Easiest RCE? How One Node.js Variable Creates Chaos
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
Time: Wed, 04 Mar 2026 05:34:09 GMT
════════════════════════
Tags: #cybersecurity #hacking #bug_bounty #bug_bounty_tips #bug_bounty_writeup
Title: Web Application Security: Hands-On Practice (Chapter 13 from The Web Application Hacker’s Handbook)
════════════════════════
𐀪 Author: Aditya Kumar
════════════════════════
Time: Wed, 04 Mar 2026 06:34:28 GMT
════════════════════════
Tags: #hacking #cybersecurity #notes #web_application_security #chapter_13
Title: How Hackers Attack Websites
════════════════════════
𐀪 Author: Saiful Gazi
════════════════════════
Time: Wed, 04 Mar 2026 06:27:09 GMT
════════════════════════
Tags: #web_security #wordpress #cybersecurity #hacking #security
Title: The 3-Day Fast: My Body Ate Itself, and My Focus Spiked 40%
════════════════════════
𐀪 Author: Adi Insights and Innovations
════════════════════════
Time: Wed, 04 Mar 2026 06:19:24 GMT
════════════════════════
Tags: #fasting #personal_development #health #hacking #biohacking
Title: Proven Success with Ethical Hacking Course in Trivandrum Training Center
════════════════════════
𐀪 Author: Niranjandotnot
════════════════════════
Time: Wed, 04 Mar 2026 05:56:06 GMT
════════════════════════
Tags: #hacking
Title: Proving Grounds — Practice — Flimsy
════════════════════════
𐀪 Author: Makoyi
════════════════════════
Time: Wed, 04 Mar 2026 05:00:42 GMT
════════════════════════
Tags: #oscp #penetration_testing #ctf #ethical_hacking
1
Title: TryHackMe Monitoring AWS Services writeup
════════════════════════
𐀪 Author: ayed djalil
════════════════════════
Time: Wed, 04 Mar 2026 06:26:44 GMT
════════════════════════
Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough
Title: Screaming Into the Void Taught Me to Think
════════════════════════
𐀪 Author: Shivani
════════════════════════
Time: Wed, 04 Mar 2026 04:57:12 GMT
════════════════════════
Tags: #twitter #xs #void #critical_thinking #thought_leadership
Title: APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Wed, 04 Mar 2026 13:44:00 +0530
════════════════════════
Tags: No_Tags
Title: Digital Phantoms: Unmasking the Iranian Cyber Syndicates Fueling the 2026 Middle East Conflict
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 07:19:35 +0000
════════════════════════
Tags: #Cyber Security #Check Point Research #Cotton Sandstorm #Educated Manticore #Handala Hack Team #IRGC cyber #Middle East cyberwar 2026 #MOIS #MuddyWater #WezRat #WhiteLock ransomware
Title: The invisible Splinter: How a Hidden Node.js Flaw Bypasses 160 Million Weekly Security Guards
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 07:18:32 +0000
════════════════════════
Tags: #Vulnerability #ClientRequest #CVE_2018_12116 #HackerOne #HTTP request splitting #http_proxy_middleware #Node.js #r3verii #superagent #Tech News 2026 #TOCTOU #Vulnerability Research #web security
Title: Predictable Secrets: The “Null Key” Flaw in Matrix’s Vodozemac Library That Could Expose Conversational History
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Wed, 04 Mar 2026 07:17:02 +0000
════════════════════════
Tags: #Vulnerability #cryptographic audit #end_to_end encryption #Matrix #null key attack #Olm #protocol downgrade #Rust security #Soatok #Tech News 2026 #Vodozemac #X25519