⤷ Title: FusionCorp — TryHackMe Writeup
════════════════════════
𐀪 Author: Rolando Enriquez
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:21:25 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #hacking #red_team
════════════════════════
𐀪 Author: Rolando Enriquez
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:21:25 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #hacking #red_team
Medium
FusionCorp — TryHackMe Writeup
FusionCorp is rated high level machine of the TryHackMe challenges platform.
⤷ Title: AI in cybersecurity is not going to save you (and it’s not going to kill you either)
════════════════════════
𐀪 Author: h@shtalk
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:46:47 GMT
════════════════════════
⌗ Tags: #infosec #technology #cybersecurity #ai #ai_security
════════════════════════
𐀪 Author: h@shtalk
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:46:47 GMT
════════════════════════
⌗ Tags: #infosec #technology #cybersecurity #ai #ai_security
Medium
AI in cybersecurity is not going to save you (and it’s not going to kill you either)
The hot take nobody in your vendor’s webinar will give you
⤷ Title: Reset — TryHackMe Writeup
════════════════════════
𐀪 Author: Rolando Enriquez
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:03:50 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #red_team #active_directory #oscp
════════════════════════
𐀪 Author: Rolando Enriquez
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:03:50 GMT
════════════════════════
⌗ Tags: #pentesting #tryhackme #red_team #active_directory #oscp
Medium
Reset — TryHackMe Writeup
This is an Active Directory machine in TryHackMe, labeled as Hard. In my opinion, it was a medium level machine.
⤷ Title: Recon Is Not Scanning
════════════════════════
𐀪 Author: Fateyaly
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:42:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #programming #technology #ethical_hacking #coding
════════════════════════
𐀪 Author: Fateyaly
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 10:42:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #programming #technology #ethical_hacking #coding
Medium
Recon Is Not Scanning
It’s the Art of Knowing More Than You’re Supposed To
⤷ Title: Day 14 — I Changed One Number and Suddenly Everyone’s Data Was Mine
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:52:01 GMT
════════════════════════
⌗ Tags: #idor #cybersecurity #vapt #ethical_hacking #web_app_pentesting
════════════════════════
𐀪 Author: Issan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:52:01 GMT
════════════════════════
⌗ Tags: #idor #cybersecurity #vapt #ethical_hacking #web_app_pentesting
Medium
🎨 Day 14 — I Changed One Number and Suddenly Everyone’s Data Was Mine
Target Application: https://github.com/Yavuzlar/VulnLab/tree/main
⤷ Title: The curious case of poisoned context
════════════════════════
𐀪 Author: Elina Maliarsky
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:35:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #agentic_ai #context_engineering #generative_ai_tools #large_language_models
════════════════════════
𐀪 Author: Elina Maliarsky
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 09:35:28 GMT
════════════════════════
⌗ Tags: #ethical_hacking #agentic_ai #context_engineering #generative_ai_tools #large_language_models
Medium
The curious case of poisoned context
A Red Team Mystery in Six Acts
⤷ Title: Google’s Docs Says API Keys Are Secrets and Also Not Secrets.2,863
════════════════════════
𐀪 Author: Dhayabaran V
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:22:05 GMT
════════════════════════
⌗ Tags: #api_security #cybersecurity #gemini #google_gemini #cloud_security
════════════════════════
𐀪 Author: Dhayabaran V
════════════════════════
ⴵ Time: Mon, 02 Mar 2026 19:22:05 GMT
════════════════════════
⌗ Tags: #api_security #cybersecurity #gemini #google_gemini #cloud_security
Medium
Google’s Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed. | Barrack AI
Google’s Documentation Says API Keys Are Secrets and Also Not Secrets. 2,863 Verified Keys Are Already Exposed. | Barrack AI · 28 min read Google’s Firebase security checklist reads: “You do …
⤷ Title: New RFP Template for AI Usage Control and AI Governance
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 17:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 17:00:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Phishing in 2026: 3 Attack Tactics That Beat Most Enterprise Defenses
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:51:30 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #Cyber Attack #Cybersecurity #Phishing
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:51:30 +0000
════════════════════════
⌗ Tags: #Security #Phishing Scam #Cyber Attack #Cybersecurity #Phishing
Hackread
Phishing in 2026: 3 Attack Tactics That Beat Most Enterprise Defenses
Follow us on all social media platforms @Hackread
⤷ Title: Car Tyre Sensors Can Be Used to Track Drivers Without Their Knowledge
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:58:12 +0000
════════════════════════
⌗ Tags: #Security #Privacy #Cyber Attack #Cybersecurity #Hyunda #IoT #Mercedes #Renault #Technology #Toyota #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:58:12 +0000
════════════════════════
⌗ Tags: #Security #Privacy #Cyber Attack #Cybersecurity #Hyunda #IoT #Mercedes #Renault #Technology #Toyota #Vulnerability
Hackread
Car Tyre Sensors Can Be Used to Track Drivers Without Their Knowledge
Follow us on all social media platforms @Hackread
⤷ Title: Find Last Connected USB on your system (USB Forensics)
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:32:46 GMT
════════════════════════
⌗ Tags: #hacking #blockchain #bug_bounty #cybersecurity #technology
════════════════════════
𐀪 Author: Pentester Club
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:32:46 GMT
════════════════════════
⌗ Tags: #hacking #blockchain #bug_bounty #cybersecurity #technology
Medium
Find Last Connected USB on your system (USB Forensics)
USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you…
⤷ Title: Burping, Ffufing, and Breaking Things: TCM Security Practical Bug Bounty Lab
════════════════════════
𐀪 Author: Gamuchirai
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:32:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #penetration_testing #api #bug_bounty
════════════════════════
𐀪 Author: Gamuchirai
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:32:20 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #penetration_testing #api #bug_bounty
Medium
Burping, Ffufing, and Breaking Things: TCM Security Practical Bug Bounty Lab
Introduction
⤷ Title: Active Directory ist 2026 noch immer der größte Schwachpunkt — Warum kaum jemand es richtig testet
════════════════════════
𐀪 Author: Moldrive
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:51:11 GMT
════════════════════════
⌗ Tags: #microsoft #active_directory #hacking
════════════════════════
𐀪 Author: Moldrive
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:51:11 GMT
════════════════════════
⌗ Tags: #microsoft #active_directory #hacking
Medium
Active Directory ist 2026 noch immer der größte Schwachpunkt — Warum kaum jemand es richtig testet
Wenn Unternehmen über Cybersecurity sprechen, fallen meist Begriffe wie:
⤷ Title: Hackers Are Now Faking Google's Security Tools—Here's What Gmail Users Need to Know
════════════════════════
𐀪 Author: Muneeb
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:30:28 GMT
════════════════════════
⌗ Tags: #google #artificial_intelligence #hacking #technology
════════════════════════
𐀪 Author: Muneeb
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:30:28 GMT
════════════════════════
⌗ Tags: #google #artificial_intelligence #hacking #technology
Medium
Hackers Are Now Faking Google's Security Tools—Here's What Gmail Users Need to Know
I recently recommended that Gmail users run Google's Security Checkup tool to protect themselves from ongoing attacks. Unfortunately, things just got more complicated.
⤷ Title: How SSenStone Hardens IoT and PLC Edge Security With Server-Side Secretless Authentication
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:03:15 GMT
════════════════════════
⌗ Tags: #plc #cybersecurity #iot #hacking #cyberattack
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:03:15 GMT
════════════════════════
⌗ Tags: #plc #cybersecurity #iot #hacking #cyberattack
Medium
How SSenStone Hardens IoT and PLC Edge Security With Server-Side Secretless Authentication
How SSenStone Hardens IoT and PLC Edge Security With Server-Side Secretless Authentication Solving the IoT Paradox The Internet of Things has become one of the most consequential security …
⤷ Title: Your Threat Intelligence Copilot Is Now in Your Pocket
════════════════════════
𐀪 Author: Threat Landscape
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:15:03 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #soc #threat_intelligence #threat_hunting
════════════════════════
𐀪 Author: Threat Landscape
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:15:03 GMT
════════════════════════
⌗ Tags: #infosec #cybersecurity #soc #threat_intelligence #threat_hunting
Medium
Your Threat Intelligence Copilot Is Now in Your Pocket
No app required. Just open your browser and ask.
⤷ Title: DepEd Lucena Data Leak By: Ch4nc3ll0rX_1337
════════════════════════
𐀪 Author: Ch4nc3ll0rX_1337
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:33:56 GMT
════════════════════════
⌗ Tags: #data_leak #data_breach #penetration_testing
════════════════════════
𐀪 Author: Ch4nc3ll0rX_1337
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:33:56 GMT
════════════════════════
⌗ Tags: #data_leak #data_breach #penetration_testing
Medium
DepEd Lucena Data Leak By: Ch4nc3ll0rX_1337
So first of all, before any of this. I’ve already stated a warning regarding to DepEd Lucena. and to my SURPRISE. I received nothing at…
⤷ Title: Windows privilege escalation: a full walk-through
════════════════════════
𐀪 Author: Malk All Banna
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:59:33 GMT
════════════════════════
⌗ Tags: #windows_security #privilege_escalation #tryhackme
════════════════════════
𐀪 Author: Malk All Banna
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:59:33 GMT
════════════════════════
⌗ Tags: #windows_security #privilege_escalation #tryhackme
Medium
Windows privilege escalation: a full walk-through
getting a foothold in a windows machine is only half the battle as a cybersecurity engineer i always focus on the next big step which is…
⤷ Title: TryHackMe Slingshot: I Watched an Attacker Steal a Customer Database in Real Time
════════════════════════
𐀪 Author: sn0x
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:50:06 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #tryhackme_writeup #tryhackme #elasticsearch
════════════════════════
𐀪 Author: sn0x
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:50:06 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #tryhackme_writeup #tryhackme #elasticsearch
Medium
TryHackMe Slingshot: I Watched an Attacker Steal a Customer Database in Real Time
Reconstructed a complete web attack from ELK logs. Nmap → Gobuster → Hydra → web shell → LFI → database dump. The whole attack took 50…
⤷ Title: TryHackMe SOC Analyst Road Map Part-3
════════════════════════
𐀪 Author: safa kaya
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:00:32 GMT
════════════════════════
⌗ Tags: #tryhackme
════════════════════════
𐀪 Author: safa kaya
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:00:32 GMT
════════════════════════
⌗ Tags: #tryhackme
Medium
TryHackMe SOC Analyst Road Map Part-3
Search Skills
Bilginin güvenilirliğini değerlendirirken şu kriterlere dikkat edilmelidir:
- Kaynak: Bilgiyi paylaşan kişi veya kurumun…
Bilginin güvenilirliğini değerlendirirken şu kriterlere dikkat edilmelidir:
- Kaynak: Bilgiyi paylaşan kişi veya kurumun…
⤷ Title: TryHackMe John the Ripper: I Cracked 10 Passwords in 30 Minutes
════════════════════════
𐀪 Author: sn0x
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:48:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #cybersecurity_awareness #tryhackme
════════════════════════
𐀪 Author: sn0x
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:48:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #cybersecurity_awareness #tryhackme
Medium
TryHackMe John the Ripper: I Cracked 10 Passwords in 30 Minutes
Learned John the Ripper by cracking MD5, SHA1, SHA256, Whirlpool, NTLM hashes, plus ZIP files, RAR archives, and SSH keys. Everything fell…