⤷ Title: APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:44:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:44:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Digital Phantoms: Unmasking the Iranian Cyber Syndicates Fueling the 2026 Middle East Conflict
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:19:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #Check Point Research #Cotton Sandstorm #Educated Manticore #Handala Hack Team #IRGC cyber #Middle East cyberwar 2026 #MOIS #MuddyWater #WezRat #WhiteLock ransomware
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:19:35 +0000
════════════════════════
⌗ Tags: #Cyber Security #Check Point Research #Cotton Sandstorm #Educated Manticore #Handala Hack Team #IRGC cyber #Middle East cyberwar 2026 #MOIS #MuddyWater #WezRat #WhiteLock ransomware
Penetration Testing Tools
Digital Phantoms: Unmasking the Iranian Cyber Syndicates Fueling the 2026 Middle East Conflict
Cyberspace has long served as a collateral theater of war within the Middle Eastern conflict. Amidst the latest
⤷ Title: The invisible Splinter: How a Hidden Node.js Flaw Bypasses 160 Million Weekly Security Guards
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:18:32 +0000
════════════════════════
⌗ Tags: #Vulnerability #ClientRequest #CVE_2018_12116 #HackerOne #HTTP request splitting #http_proxy_middleware #Node.js #r3verii #superagent #Tech News 2026 #TOCTOU #Vulnerability Research #web security
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:18:32 +0000
════════════════════════
⌗ Tags: #Vulnerability #ClientRequest #CVE_2018_12116 #HackerOne #HTTP request splitting #http_proxy_middleware #Node.js #r3verii #superagent #Tech News 2026 #TOCTOU #Vulnerability Research #web security
Penetration Testing Tools
The invisible Splinter: How a Hidden Node.js Flaw Bypasses 160 Million Weekly Security Guards
Within the Node.js ecosystem, a vulnerability has been unearthed pertaining to the foundational logic of the HTTP client,
⤷ Title: Predictable Secrets: The “Null Key” Flaw in Matrix’s Vodozemac Library That Could Expose Conversational History
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:17:02 +0000
════════════════════════
⌗ Tags: #Vulnerability #cryptographic audit #end_to_end encryption #Matrix #null key attack #Olm #protocol downgrade #Rust security #Soatok #Tech News 2026 #Vodozemac #X25519
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:17:02 +0000
════════════════════════
⌗ Tags: #Vulnerability #cryptographic audit #end_to_end encryption #Matrix #null key attack #Olm #protocol downgrade #Rust security #Soatok #Tech News 2026 #Vodozemac #X25519
Penetration Testing Tools
Predictable Secrets: The "Null Key" Flaw in Matrix’s Vodozemac Library That Could Expose Conversational History
The proprietor of the Soatok weblog has promulgated an exhaustive exposition detailing the vulnerabilities within Vodozemac, the Rust-based
⤷ Title: The Trust Trap: How Hackers Weaponize Legitimate Google and Microsoft Login Pages via OAuth Redirection
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:15:05 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Credential Theft #DLL Sideloading #EvilProxy #Google Accounts #Microsoft Defender #Microsoft Entra ID #OAuth redirection #phishing 2026 #RFC 6749 #Tech News 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:15:05 +0000
════════════════════════
⌗ Tags: #Cybercriminals #Credential Theft #DLL Sideloading #EvilProxy #Google Accounts #Microsoft Defender #Microsoft Entra ID #OAuth redirection #phishing 2026 #RFC 6749 #Tech News 2026
Penetration Testing Tools
The Trust Trap: How Hackers Weaponize Legitimate Google and Microsoft Login Pages via OAuth Redirection
An electronic missive imploring the recipient to “sign a document” or “authenticate an account” may not invariably lead
⤷ Title: The Unstoppable Hive: Aeternum C2 Abandons Servers to Command Botnets via the Polygon Blockchain
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:12:57 +0000
════════════════════════
⌗ Tags: #Malware #Aeternum C2 #Anti_Virtualization #BOTNET #C2 Infrastructure #cybersecurity #decentralization #Kleenscan #Polygon Blockchain #Qrator Labs #smart contracts #Tech News 2026
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:12:57 +0000
════════════════════════
⌗ Tags: #Malware #Aeternum C2 #Anti_Virtualization #BOTNET #C2 Infrastructure #cybersecurity #decentralization #Kleenscan #Polygon Blockchain #Qrator Labs #smart contracts #Tech News 2026
Penetration Testing Tools
The Unstoppable Hive: Aeternum C2 Abandons Servers to Command Botnets via the Polygon Blockchain
Qrator Labs has heralded the emergence of a novel botnet, dubbed Aeternum C2, which seamlessly transposes the orchestration
⤷ Title: Man’s Best Friend or Trojan Horse? Critical “Root” Flaws Unmasked in Unitree Robotic Canines
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:10:23 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2026_27509 #CVE_2026_27510 #Eclipse CycloneDDS #hardware hacking #IoT vulnerabilities #Python injection #remote code execution #robotic security #Tech News 2026 #Unitree Go2
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:10:23 +0000
════════════════════════
⌗ Tags: #Vulnerability #CVE_2026_27509 #CVE_2026_27510 #Eclipse CycloneDDS #hardware hacking #IoT vulnerabilities #Python injection #remote code execution #robotic security #Tech News 2026 #Unitree Go2
Penetration Testing Tools
Man's Best Friend or Trojan Horse? Critical "Root" Flaws Unmasked in Unitree Robotic Canines
A domestic robotic canine can swiftly transmute into a veritable Trojan horse should an individual wielding a laptop
⤷ Title: The Skeleton Key: How Google’s “Safe” Maps Keys Silently Became Gemini Credentials
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:09:01 +0000
════════════════════════
⌗ Tags: #Data Leak #AIStudio #API key security #cybersecurity research #Data Breach 2026 #firebase #Gemini API #google cloud #privilege escalation #Tech News 2026 #Truffle Security
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:09:01 +0000
════════════════════════
⌗ Tags: #Data Leak #AIStudio #API key security #cybersecurity research #Data Breach 2026 #firebase #Gemini API #google cloud #privilege escalation #Tech News 2026 #Truffle Security
Penetration Testing Tools
The Skeleton Key: How Google’s "Safe" Maps Keys Silently Became Gemini Credentials
For years, Google reassured developers that its API keys could be safely left in plain sight, embedded directly
⤷ Title: Jumping the Gap: APT37’s “Ruby Jumper” Campaign Weaponizes Cloud Storage and USBs to Breach Isolated Networks
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:01:03 +0000
════════════════════════
⌗ Tags: #Cybercriminals #air_gapped network #APT37 #Cybersecurity 2026 #RESTLEAF #Ruby Jumper #ScarCruft #SNAKEDROPPER #THUMBSBD #USB Malware #Velvet Chollima #VIRUSTASK #Zoho WorkDrive #Zscaler ThreatLabz
════════════════════════
𐀪 Author: ddos
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:01:03 +0000
════════════════════════
⌗ Tags: #Cybercriminals #air_gapped network #APT37 #Cybersecurity 2026 #RESTLEAF #Ruby Jumper #ScarCruft #SNAKEDROPPER #THUMBSBD #USB Malware #Velvet Chollima #VIRUSTASK #Zoho WorkDrive #Zscaler ThreatLabz
Penetration Testing Tools
Jumping the Gap: APT37’s "Ruby Jumper" Campaign Weaponizes Cloud Storage and USBs to Breach Isolated Networks
The DPRK-affiliated syndicate APT37 has augmented its arsenal dedicated to breaching air-gapped networks. The Zscaler ThreatLabz vanguard has
⤷ Title: Context Is Everything: A Practical Guide to XSS
════════════════════════
𐀪 Author: Marduk I Am
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 08:33:05 GMT
════════════════════════
⌗ Tags: #web_security #cross_site_noscripting #cybersecurity #ethical_hacking #bug_bounty
════════════════════════
𐀪 Author: Marduk I Am
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 08:33:05 GMT
════════════════════════
⌗ Tags: #web_security #cross_site_noscripting #cybersecurity #ethical_hacking #bug_bounty
Medium
Context Is Everything: A Practical Guide to XSS
Understanding XSS Using Five Portwigger Labs.
⤷ Title: Building an Enterprise .NET 10 API — Part 2: Security & Authentication
════════════════════════
𐀪 Author: Marc Kenneth Lomio & Melrose Mejidana
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:55:40 GMT
════════════════════════
⌗ Tags: #user_authorization #user_authentication #application_security
════════════════════════
𐀪 Author: Marc Kenneth Lomio & Melrose Mejidana
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:55:40 GMT
════════════════════════
⌗ Tags: #user_authorization #user_authentication #application_security
Medium
Building an Enterprise .NET 10 API — Part 2: Security & Authentication
Adding JWT authentication, refresh tokens, brute-force protection, and role-based authorization — without changing a single existing…
⤷ Title: Achieving Application Environment Isolation
════════════════════════
𐀪 Author: Robert Broeckelmann
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 14:04:57 GMT
════════════════════════
⌗ Tags: #isolation #software_architecture #application_security #environment_isolation #security
════════════════════════
𐀪 Author: Robert Broeckelmann
════════════════════════
ⴵ Time: Sun, 01 Mar 2026 14:04:57 GMT
════════════════════════
⌗ Tags: #isolation #software_architecture #application_security #environment_isolation #security
Medium
Application Environment Isolation
Your production environment should be isolated from your non-production environments. In fact, every application environment should be…
⤷ Title: I Found Valid VPN Credentials for 7 Out of 10 Companies I Searched
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 08:59:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #infosec #data_breach #threat_intelligence
════════════════════════
𐀪 Author: Alexandre Vandamme
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 08:59:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #infosec #data_breach #threat_intelligence
Medium
I Found Valid VPN Credentials for 7 Out of 10 Companies I Searched
I picked 10 random companies. Searched each one on LeakRadar. Filtered for VPN credentials.
⤷ Title: Path Traversal
════════════════════════
𐀪 Author: Abdulnafayk
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 08:32:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #offensive_security #path_traversal #penetration_testing #red_team
════════════════════════
𐀪 Author: Abdulnafayk
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 08:32:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #offensive_security #path_traversal #penetration_testing #red_team
Medium
Path Traversal
Path traversal is also known as directory traversal. These vulnerabilities enable an attacker to read arbitrary files on the server that is…
⤷ Title: TryHackMe - Mr Robot CTF Writeup
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 08:52:50 GMT
════════════════════════
⌗ Tags: #rce #ethical_hacking #tryhackme_linux_privesc #tryhackme #ctf
════════════════════════
𐀪 Author: giorgi gochitidze
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 08:52:50 GMT
════════════════════════
⌗ Tags: #rce #ethical_hacking #tryhackme_linux_privesc #tryhackme #ctf
Medium
TryHackMe - Mr Robot CTF Writeup 🤖
Difficulty: Medium Platform: TryHackMe Category: Web, WordPress, Privilege Escalation Flags: 3 Keys
⤷ Title: The Cybersecurity Tool Sprawl Problem: How to Organize & Maintain Your Security Toolkit
════════════════════════
𐀪 Author: ATNO For Cybersecurity | Hacking
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:55:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #cyber_security_awareness #tool_sprawl
════════════════════════
𐀪 Author: ATNO For Cybersecurity | Hacking
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:55:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #cyber_security_awareness #tool_sprawl
Medium
🧰 The Cybersecurity Tool Sprawl Problem: How to Organize & Maintain Your Security Toolkit
Tool sprawl is what happens when your toolkit grows faster than your ability to manage it.
⤷ Title: Belajar Hacking Itu
Butuh Playground-nya Dulu
════════════════════════
𐀪 Author: Ferdi Maulana Ikhsan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:08:22 GMT
════════════════════════
⌗ Tags: #ethical_hacking #kali_linux #virtualbox #teknologi_informasi #untidar
Butuh Playground-nya Dulu
════════════════════════
𐀪 Author: Ferdi Maulana Ikhsan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 07:08:22 GMT
════════════════════════
⌗ Tags: #ethical_hacking #kali_linux #virtualbox #teknologi_informasi #untidar
Medium
Belajar Hacking Itu Butuh Playground-nya Dulu
Panduan lengkap instalasi VirtualBox dan Kali Linux dari nol — supaya kamu bisa belajar keamanan siber dengan aman, tanpa merusak sistem…
⤷ Title: Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 15:07:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 15:07:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Telegram Increasingly Used to Sell Access, Malware and Stolen Logs
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:17:42 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Security #Cybersecurity #CYFIRMA #dark web #HACKTIVISM #IndoHaxSec #Telegram #Tor
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:17:42 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Security #Cybersecurity #CYFIRMA #dark web #HACKTIVISM #IndoHaxSec #Telegram #Tor
Hackread
Telegram Increasingly Used to Sell Access, Malware and Stolen Logs
Follow us on all social media platforms @Hackread
⤷ Title: Intigriti launches new global Hacker Ambassador Program
════════════════════════
𐀪 Author: Eleanor Barlow
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:00:00 GMT
════════════════════════
⌗ Tags: #Business Insights
════════════════════════
𐀪 Author: Eleanor Barlow
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:00:00 GMT
════════════════════════
⌗ Tags: #Business Insights
Intigriti
Intigriti launches new global Hacker Ambassador Program
The Intigriti Hacker Ambassador Program is built to support and empower trusted members of the hacking community who want to make a difference locally and globally.
⤷ Title: FusionCorp — TryHackMe Writeup
════════════════════════
𐀪 Author: Rolando Enriquez
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:21:25 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #hacking #red_team
════════════════════════
𐀪 Author: Rolando Enriquez
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:21:25 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #hacking #red_team
Medium
FusionCorp — TryHackMe Writeup
FusionCorp is rated high level machine of the TryHackMe challenges platform.