⤷ Title: Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 15:07:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 15:07:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Telegram Increasingly Used to Sell Access, Malware and Stolen Logs
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:17:42 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Security #Cybersecurity #CYFIRMA #dark web #HACKTIVISM #IndoHaxSec #Telegram #Tor
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:17:42 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Security #Cybersecurity #CYFIRMA #dark web #HACKTIVISM #IndoHaxSec #Telegram #Tor
Hackread
Telegram Increasingly Used to Sell Access, Malware and Stolen Logs
Follow us on all social media platforms @Hackread
⤷ Title: Intigriti launches new global Hacker Ambassador Program
════════════════════════
𐀪 Author: Eleanor Barlow
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:00:00 GMT
════════════════════════
⌗ Tags: #Business Insights
════════════════════════
𐀪 Author: Eleanor Barlow
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 00:00:00 GMT
════════════════════════
⌗ Tags: #Business Insights
Intigriti
Intigriti launches new global Hacker Ambassador Program
The Intigriti Hacker Ambassador Program is built to support and empower trusted members of the hacking community who want to make a difference locally and globally.
⤷ Title: FusionCorp — TryHackMe Writeup
════════════════════════
𐀪 Author: Rolando Enriquez
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:21:25 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #hacking #red_team
════════════════════════
𐀪 Author: Rolando Enriquez
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:21:25 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #hacking #red_team
Medium
FusionCorp — TryHackMe Writeup
FusionCorp is rated high level machine of the TryHackMe challenges platform.
⤷ Title: AI in cybersecurity is not going to save you (and it’s not going to kill you either)
════════════════════════
𐀪 Author: h@shtalk
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:46:47 GMT
════════════════════════
⌗ Tags: #infosec #technology #cybersecurity #ai #ai_security
════════════════════════
𐀪 Author: h@shtalk
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:46:47 GMT
════════════════════════
⌗ Tags: #infosec #technology #cybersecurity #ai #ai_security
Medium
AI in cybersecurity is not going to save you (and it’s not going to kill you either)
The hot take nobody in your vendor’s webinar will give you
⤷ Title: Reset — TryHackMe Writeup
════════════════════════
𐀪 Author: Rolando Enriquez
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:03:50 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #red_team #active_directory #oscp
════════════════════════
𐀪 Author: Rolando Enriquez
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:03:50 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #red_team #active_directory #oscp
Medium
Reset — TryHackMe Writeup
This is an Active Directory machine in TryHackMe, labeled as Hard. In my opinion, it was a medium level machine.
⤷ Title: Recon Is Not Scanning
════════════════════════
𐀪 Author: Fateyaly
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:42:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #programming #technology #ethical_hacking #coding
════════════════════════
𐀪 Author: Fateyaly
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:42:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #programming #technology #ethical_hacking #coding
Medium
Recon Is Not Scanning
It’s the Art of Knowing More Than You’re Supposed To
⤷ Title: Day 14 — I Changed One Number and Suddenly Everyone’s Data Was Mine
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:52:01 GMT
════════════════════════
⌗ Tags: #idor #cybersecurity #vapt #ethical_hacking #web_app_pentesting
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:52:01 GMT
════════════════════════
⌗ Tags: #idor #cybersecurity #vapt #ethical_hacking #web_app_pentesting
Medium
🎨 Day 14 — I Changed One Number and Suddenly Everyone’s Data Was Mine
Target Application: https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: The curious case of poisoned context
════════════════════════
𐀪 Author: Elina Maliarsky
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:35:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #agentic_ai #context_engineering #generative_ai_tools #large_language_models
════════════════════════
𐀪 Author: Elina Maliarsky
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:35:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #agentic_ai #context_engineering #generative_ai_tools #large_language_models
Medium
The curious case of poisoned context
A Red Team Mystery in Six Acts
⤷ Title: Google’s Docs Says API Keys Are Secrets and Also Not Secrets.2,863
════════════════════════
𐀪 Author: Dhayabaran V
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:22:05 GMT
════════════════════════
⌗ Tags: #api_security #cybersecurity #gemini #google_gemini #cloud_security
════════════════════════
𐀪 Author: Dhayabaran V
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:22:05 GMT
════════════════════════
⌗ Tags: #api_security #cybersecurity #gemini #google_gemini #cloud_security
Medium
Google’s Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed. | Barrack AI
Google’s Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed. | Barrack AI · 28 min read Google’s Firebase security checklist reads: “You do …
⤷ Title: New RFP Template for AI Usage Control and AI Governance
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 17:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 17:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Phishing in 2026: 3 Attack Tactics That Beat Most Enterprise Defenses
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:51:30 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #Cyber Attack #Cybersecurity #Phishing
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:51:30 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #Cyber Attack #Cybersecurity #Phishing
Hackread
Phishing in 2026: 3 Attack Tactics That Beat Most Enterprise Defenses
Follow us on all social media platforms @Hackread
⤷ Title: Car Tyre Sensors Can Be Used to Track Drivers Without Their Knowledge
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:58:12 +0000
════════════════════════
⌗ Tags: #Security #Privacy #Cyber Attack #Cybersecurity #Hyunda #IoT #Mercedes #Renault #Technology #Toyota #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:58:12 +0000
════════════════════════
⌗ Tags: #Security #Privacy #Cyber Attack #Cybersecurity #Hyunda #IoT #Mercedes #Renault #Technology #Toyota #Vulnerability
Hackread
Car Tyre Sensors Can Be Used to Track Drivers Without Their Knowledge
Follow us on all social media platforms @Hackread
⤷ Title: Find Last Connected USB on your system (USB Forensics)
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:32:46 GMT
════════════════════════
⌗ Tags: #hacking #blockchain #bug_bounty #cybersecurity #technology
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:32:46 GMT
════════════════════════
⌗ Tags: #hacking #blockchain #bug_bounty #cybersecurity #technology
Medium
Find Last Connected USB on your system (USB Forensics)
USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you…
⤷ Title: Burping, Ffufing, and Breaking Things: TCM Security Practical Bug Bounty Lab
════════════════════════
𐀪 Author: Gamuchirai
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:32:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #penetration_testing #api #bug_bounty
════════════════════════
𐀪 Author: Gamuchirai
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:32:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #penetration_testing #api #bug_bounty
Medium
Burping, Ffufing, and Breaking Things: TCM Security Practical Bug Bounty Lab
Introduction
⤷ Title: Active Directory ist 2026 noch immer der größte Schwachpunkt — Warum kaum jemand es richtig testet
════════════════════════
𐀪 Author: Moldrive
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:51:11 GMT
════════════════════════
⌗ Tags: #microsoft #active_directory #hacking
════════════════════════
𐀪 Author: Moldrive
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:51:11 GMT
════════════════════════
⌗ Tags: #microsoft #active_directory #hacking
Medium
Active Directory ist 2026 noch immer der größte Schwachpunkt — Warum kaum jemand es richtig testet
Wenn Unternehmen über Cybersecurity sprechen, fallen meist Begriffe wie:
⤷ Title: Hackers Are Now Faking Google's Security Tools—Here's What Gmail Users Need to Know
════════════════════════
𐀪 Author: Muneeb
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:30:28 GMT
════════════════════════
⌗ Tags: #google #artificial_intelligence #hacking #technology
════════════════════════
𐀪 Author: Muneeb
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:30:28 GMT
════════════════════════
⌗ Tags: #google #artificial_intelligence #hacking #technology
Medium
Hackers Are Now Faking Google's Security Tools—Here's What Gmail Users Need to Know
I recently recommended that Gmail users run Google's Security Checkup tool to protect themselves from ongoing attacks. Unfortunately, things just got more complicated.
⤷ Title: How SSenStone Hardens IoT and PLC Edge Security With Server-Side Secretless Authentication
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:03:15 GMT
════════════════════════
⌗ Tags: #plc #cybersecurity #iot #hacking #cyberattack
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:03:15 GMT
════════════════════════
⌗ Tags: #plc #cybersecurity #iot #hacking #cyberattack
Medium
How SSenStone Hardens IoT and PLC Edge Security With Server-Side Secretless Authentication
How SSenStone Hardens IoT and PLC Edge Security With Server-Side Secretless Authentication Solving the IoT Paradox The Internet of Things has become one of the most consequential security …
⤷ Title: Your Threat Intelligence Copilot Is Now in Your Pocket
════════════════════════
𐀪 Author: Threat Landscape
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:15:03 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #soc #threat_intelligence #threat_hunting
════════════════════════
𐀪 Author: Threat Landscape
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:15:03 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #soc #threat_intelligence #threat_hunting
Medium
Your Threat Intelligence Copilot Is Now in Your Pocket
No app required. Just open your browser and ask.
⤷ Title: DepEd Lucena Data Leak By: Ch4nc3ll0rX_1337
════════════════════════
𐀪 Author: Ch4nc3ll0rX_1337
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:33:56 GMT
════════════════════════
⌗ Tags: #data_leak #data_breach #penetration_testing
════════════════════════
𐀪 Author: Ch4nc3ll0rX_1337
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:33:56 GMT
════════════════════════
⌗ Tags: #data_leak #data_breach #penetration_testing
Medium
DepEd Lucena Data Leak By: Ch4nc3ll0rX_1337
So first of all, before any of this. I’ve already stated a warning regarding to DepEd Lucena. and to my SURPRISE. I received nothing at…
⤷ Title: Windows privilege escalation: a full walk-through
════════════════════════
𐀪 Author: Malk All Banna
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:59:33 GMT
════════════════════════
⌗ Tags: #windows_security #privilege_escalation #tryhackme
════════════════════════
𐀪 Author: Malk All Banna
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:59:33 GMT
════════════════════════
⌗ Tags: #windows_security #privilege_escalation #tryhackme
Medium
Windows privilege escalation: a full walk-through
getting a foothold in a windows machine is only half the battle as a cybersecurity engineer i always focus on the next big step which is…