⤷ Title: —
════════════════════════
𐀪 Author: Fethallah Abdelkader GHELLAIMI
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 04:01:52 GMT
════════════════════════
⌗ Tags: #bounty_hacker_tryhackme #ctf_writeup #ctf #tryhackme #ethical_hacking
════════════════════════
𐀪 Author: Fethallah Abdelkader GHELLAIMI
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 04:01:52 GMT
════════════════════════
⌗ Tags: #bounty_hacker_tryhackme #ctf_writeup #ctf #tryhackme #ethical_hacking
Medium
𝗕𝗼𝘂𝗻𝘁𝘆 𝗛𝗮𝗰𝗸𝗲𝗿 𝘄𝗿𝗶𝘁𝗲𝘂𝗽 — 𝗧𝗿𝘆𝗛𝗮𝗰𝗸𝗠𝗲
From nmap to root. Here is my writeUp for the Bounty Hacker CTF on TryHackMe. It’s a great, quick room that covers the trifecta of…
⤷ Title: Career Opportunities in Ethical Hacking
════════════════════════
𐀪 Author: Jhoninternship
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 04:46:42 GMT
════════════════════════
⌗ Tags: #ethical_hacking #education #cybersecurity
════════════════════════
𐀪 Author: Jhoninternship
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 04:46:42 GMT
════════════════════════
⌗ Tags: #ethical_hacking #education #cybersecurity
Medium
Career Opportunities in Ethical Hacking
Life inches further into screens each day, pulled by pings and pixels. Web, driven tools keep businesses moving, tracking payments, storing…
⤷ Title: CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:05:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:05:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Shadows in the Browser: The UNC6384 Syndicate Unmasks a New PlugX Variant “Arp”
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:59:16 +0000
════════════════════════
⌗ Tags: #Malware #Cyberespionage #diplomatic missions #DLL Sideloading #G DATA antivirus #Mustang Panda #PlugX malware #RC4 encryption #Southeast Asia #Tech News 2026 #UNC6384
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:59:16 +0000
════════════════════════
⌗ Tags: #Malware #Cyberespionage #diplomatic missions #DLL Sideloading #G DATA antivirus #Mustang Panda #PlugX malware #RC4 encryption #Southeast Asia #Tech News 2026 #UNC6384
Penetration Testing Tools
Shadows in the Browser: The UNC6384 Syndicate Unmasks a New PlugX Variant "Arp"
In January 2026, cybersecurity experts at the Japanese firm IIJ intercepted a novel iteration of the PlugX malware,
⤷ Title: The Synthetic Factory: How the “Genisys” Ad Fraud Scheme Hijacked 25 Million Devices via AI
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:56:43 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Ad Fraud #Android Security #digital advertising #Generative AI #Genisys #Google Play Store #IAS Threat Lab #Mobile Malware #Operation Arcade #synthetic web #Tech News 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:56:43 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Ad Fraud #Android Security #digital advertising #Generative AI #Genisys #Google Play Store #IAS Threat Lab #Mobile Malware #Operation Arcade #synthetic web #Tech News 2026
Penetration Testing Tools
The Synthetic Factory: How the "Genisys" Ad Fraud Scheme Hijacked 25 Million Devices via AI
A smartphone rests securely in a pocket, its screen darkened, its owner initiating nothing; yet at this very
⤷ Title: The Zerobot Botnet Mutates to Hijack Tenda Routers and n8n Automation Hubs
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:55:19 +0000
════════════════════════
⌗ Tags: #Malware #Akamai #BOTNET #CVE_2025_68613 #CVE_2025_7544 #IoT Security #Mirai #n8n #RCE exploitation #supply chain attack #Tech News 2026 #Tenda AC1206 #Zerobot
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:55:19 +0000
════════════════════════
⌗ Tags: #Malware #Akamai #BOTNET #CVE_2025_68613 #CVE_2025_7544 #IoT Security #Mirai #n8n #RCE exploitation #supply chain attack #Tech News 2026 #Tenda AC1206 #Zerobot
Penetration Testing Tools
The Zerobot Botnet Mutates to Hijack Tenda Routers and n8n Automation Hubs
The malicious Zerobot network has commenced the aggressive exploitation of vulnerabilities inherent in Tenda routers and the n8n
⤷ Title: The Rise of the Autonomous Adversary: How “Hackerbot-Claw” Hijacked Major Open-Source Repositories
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:53:04 +0000
════════════════════════
⌗ Tags: #Vulnerability #Aqua Security #autonomous AI bot #CI/CD Security #Datadog #GitHub Actions #GITHUB_TOKEN #hackerbot_claw #Microsoft #pull_request_target #supply chain attack #Tech News 2026 #Trivy
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:53:04 +0000
════════════════════════
⌗ Tags: #Vulnerability #Aqua Security #autonomous AI bot #CI/CD Security #Datadog #GitHub Actions #GITHUB_TOKEN #hackerbot_claw #Microsoft #pull_request_target #supply chain attack #Tech News 2026 #Trivy
Penetration Testing Tools
The Rise of the Autonomous Adversary: How "Hackerbot-Claw" Hijacked Major Open-Source Repositories
According to a StepSecurity report, over the past week, an unidentified bot with the telling name “hackerbot-claw” launched
⤷ Title: Assessment Methodologies: Enumeration CTF 1
════════════════════════
𐀪 Author: Prasad
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:33:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #ctf
════════════════════════
𐀪 Author: Prasad
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:33:59 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #ctf
Medium
Assessment Methodologies: Enumeration CTF 1
This writeup is all about Enumeration Scanning and gathering information about the target as much as possible.
⤷ Title: CeWL vs Crunch: How to Build Smart Wordlists for Bug Bounty Recon
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:27:07 GMT
════════════════════════
⌗ Tags: #hacking #security #bug_bounty #linux #cybersecurity
════════════════════════
𐀪 Author: ghostyjoe
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:27:07 GMT
════════════════════════
⌗ Tags: #hacking #security #bug_bounty #linux #cybersecurity
Medium
CeWL vs Crunch: How to Build Smart Wordlists for Bug Bounty Recon
🧠 Building Smarter Wordlists with CeWL & Crunch
⤷ Title: The Easiest RCE? How One Node.js Variable Creates Chaos
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 05:34:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #bug_bounty #bug_bounty_tips #bug_bounty_writeup
════════════════════════
𐀪 Author: Krishna Kumar
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 05:34:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #bug_bounty #bug_bounty_tips #bug_bounty_writeup
Medium
🔥 The Easiest RCE? How One Node.js Variable Creates Chaos
Based on “The Easiest Remote Code Execution Vulnerability?” by LiveOverflow
⤷ Title: Web Application Security: Hands-On Practice (Chapter 13 from The Web Application Hacker’s Handbook)
════════════════════════
𐀪 Author: Aditya Kumar
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:34:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #notes #web_application_security #chapter_13
════════════════════════
𐀪 Author: Aditya Kumar
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:34:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #notes #web_application_security #chapter_13
Medium
Web Application Security: Hands-On Practice (Chapter 13 from The Web Application Hacker’s Handbook)
Note: This write-up reflects my learning and hands-on practice based on the book The Web Application Hacker’s Handbook: Discovering and…
⤷ Title: How Hackers Attack Websites
════════════════════════
𐀪 Author: Saiful Gazi
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:27:09 GMT
════════════════════════
⌗ Tags: #web_security #wordpress #cybersecurity #hacking #security
════════════════════════
𐀪 Author: Saiful Gazi
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:27:09 GMT
════════════════════════
⌗ Tags: #web_security #wordpress #cybersecurity #hacking #security
Medium
How Hackers Attack Websites
Most website owners think “My site is small, no one will hack it.”
But hackers don’t target size — they target weakness.
But hackers don’t target size — they target weakness.
⤷ Title: The 3-Day Fast: My Body Ate Itself, and My Focus Spiked 40%
════════════════════════
𐀪 Author: Adi Insights and Innovations
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:19:24 GMT
════════════════════════
⌗ Tags: #fasting #personal_development #health #hacking #biohacking
════════════════════════
𐀪 Author: Adi Insights and Innovations
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:19:24 GMT
════════════════════════
⌗ Tags: #fasting #personal_development #health #hacking #biohacking
Medium
The 3-Day Fast: My Body Ate Itself, and My Focus Spiked 40%
Quantifying the trade-off between acute misery and long-term cellular repair.
⤷ Title: Proven Success with Ethical Hacking Course in Trivandrum Training Center
════════════════════════
𐀪 Author: Niranjandotnot
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 05:56:06 GMT
════════════════════════
⌗ Tags: #hacking
════════════════════════
𐀪 Author: Niranjandotnot
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 05:56:06 GMT
════════════════════════
⌗ Tags: #hacking
Medium
Proven Success with Ethical Hacking Course in Trivandrum Training Center
Join hundreds of successful alumni who started with an Ethical Hacking Course in Trivandrum at our academy.
⤷ Title: Proving Grounds — Practice — Flimsy
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 05:00:42 GMT
════════════════════════
⌗ Tags: #oscp #penetration_testing #ctf #ethical_hacking
════════════════════════
𐀪 Author: Makoyi
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 05:00:42 GMT
════════════════════════
⌗ Tags: #oscp #penetration_testing #ctf #ethical_hacking
Medium
Proving Grounds — Practice — Flimsy
Flimsy is rated easy by offsec, but rated intermediate by the community. I found the machine straightforward and on the easier side. The…
❤1
⤷ Title: TryHackMe Monitoring AWS Services writeup
════════════════════════
𐀪 Author: ayed djalil
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:26:44 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: ayed djalil
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 06:26:44 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough
Medium
TryHackMe Monitoring AWS Services writeup
🦊 Discover common attacks on AWS services and learn how to protect against them.
⤷ Title: Screaming Into the Void Taught Me to Think
════════════════════════
𐀪 Author: Shivani
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 04:57:12 GMT
════════════════════════
⌗ Tags: #twitter #xs #void #critical_thinking #thought_leadership
════════════════════════
𐀪 Author: Shivani
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 04:57:12 GMT
════════════════════════
⌗ Tags: #twitter #xs #void #critical_thinking #thought_leadership
Medium
Screaming Into the Void Taught Me to Think
Having an opinion is intelligent. Holding and defending one is a skill. It demonstrates research, knowledge, and a practiced moral compass…
⤷ Title: APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:44:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:44:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Digital Phantoms: Unmasking the Iranian Cyber Syndicates Fueling the 2026 Middle East Conflict
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:19:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #Check Point Research #Cotton Sandstorm #Educated Manticore #Handala Hack Team #IRGC cyber #Middle East cyberwar 2026 #MOIS #MuddyWater #WezRat #WhiteLock ransomware
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:19:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #Check Point Research #Cotton Sandstorm #Educated Manticore #Handala Hack Team #IRGC cyber #Middle East cyberwar 2026 #MOIS #MuddyWater #WezRat #WhiteLock ransomware
Penetration Testing Tools
Digital Phantoms: Unmasking the Iranian Cyber Syndicates Fueling the 2026 Middle East Conflict
Cyberspace has long served as a collateral theater of war within the Middle Eastern conflict. Amidst the latest
⤷ Title: The invisible Splinter: How a Hidden Node.js Flaw Bypasses 160 Million Weekly Security Guards
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:18:32 +0000
════════════════════════
⌗ Tags: #Vulnerability #ClientRequest #CVE_2018_12116 #HackerOne #HTTP request splitting #http_proxy_middleware #Node.js #r3verii #superagent #Tech News 2026 #TOCTOU #Vulnerability Research #web security
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:18:32 +0000
════════════════════════
⌗ Tags: #Vulnerability #ClientRequest #CVE_2018_12116 #HackerOne #HTTP request splitting #http_proxy_middleware #Node.js #r3verii #superagent #Tech News 2026 #TOCTOU #Vulnerability Research #web security
Penetration Testing Tools
The invisible Splinter: How a Hidden Node.js Flaw Bypasses 160 Million Weekly Security Guards
Within the Node.js ecosystem, a vulnerability has been unearthed pertaining to the foundational logic of the HTTP client,
⤷ Title: Predictable Secrets: The “Null Key” Flaw in Matrix’s Vodozemac Library That Could Expose Conversational History
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:17:02 +0000
════════════════════════
⌗ Tags: #Vulnerability #cryptographic audit #end_to_end encryption #Matrix #null key attack #Olm #protocol downgrade #Rust security #Soatok #Tech News 2026 #Vodozemac #X25519
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:17:02 +0000
════════════════════════
⌗ Tags: #Vulnerability #cryptographic audit #end_to_end encryption #Matrix #null key attack #Olm #protocol downgrade #Rust security #Soatok #Tech News 2026 #Vodozemac #X25519
Penetration Testing Tools
Predictable Secrets: The "Null Key" Flaw in Matrix’s Vodozemac Library That Could Expose Conversational History
The proprietor of the Soatok weblog has promulgated an exhaustive exposition detailing the vulnerabilities within Vodozemac, the Rust-based