⤷ Title: TryHackMe Slingshot: I Watched an Attacker Steal a Customer Database in Real Time
════════════════════════
𐀪 Author: sn0x
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:50:06 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #tryhackme_writeup #tryhackme #elasticsearch
════════════════════════
𐀪 Author: sn0x
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:50:06 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #cybersecurity #tryhackme_writeup #tryhackme #elasticsearch
Medium
TryHackMe Slingshot: I Watched an Attacker Steal a Customer Database in Real Time
Reconstructed a complete web attack from ELK logs. Nmap → Gobuster → Hydra → web shell → LFI → database dump. The whole attack took 50…
⤷ Title: TryHackMe SOC Analyst Road Map Part-3
════════════════════════
𐀪 Author: safa kaya
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:00:32 GMT
════════════════════════
⌗ Tags: #tryhackme
════════════════════════
𐀪 Author: safa kaya
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 12:00:32 GMT
════════════════════════
⌗ Tags: #tryhackme
Medium
TryHackMe SOC Analyst Road Map Part-3
Search Skills
Bilginin güvenilirliğini değerlendirirken şu kriterlere dikkat edilmelidir:
- Kaynak: Bilgiyi paylaşan kişi veya kurumun…
Bilginin güvenilirliğini değerlendirirken şu kriterlere dikkat edilmelidir:
- Kaynak: Bilgiyi paylaşan kişi veya kurumun…
⤷ Title: TryHackMe John the Ripper: I Cracked 10 Passwords in 30 Minutes
════════════════════════
𐀪 Author: sn0x
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:48:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #cybersecurity_awareness #tryhackme
════════════════════════
𐀪 Author: sn0x
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:48:28 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #cybersecurity_awareness #tryhackme
Medium
TryHackMe John the Ripper: I Cracked 10 Passwords in 30 Minutes
Learned John the Ripper by cracking MD5, SHA1, SHA256, Whirlpool, NTLM hashes, plus ZIP files, RAR archives, and SSH keys. Everything fell…
⤷ Title: Solving a Bugforge Challenge — Exploiting Refund Logic in Cheesy Does It
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:15:37 GMT
════════════════════════
⌗ Tags: #caido #cybersecurity #bugforge #web_penetration_testing #ethical_hacking
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 11:15:37 GMT
════════════════════════
⌗ Tags: #caido #cybersecurity #bugforge #web_penetration_testing #ethical_hacking
Medium
Solving a Bugforge Challenge — Exploiting Refund Logic in Cheesy Does It
Today, I solved another challenge on Bugforge, targeting a pizza ordering web application called Cheesy Does It.
⤷ Title: Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:58:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 18:58:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: The Most Common Swap Scams in 2026, and How to Avoid Them
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:42:22 +0000
════════════════════════
⌗ Tags: #Crypto #Blockchain #Security #Cybersecurity #Phishing #Scam #Swap
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:42:22 +0000
════════════════════════
⌗ Tags: #Crypto #Blockchain #Security #Cybersecurity #Phishing #Scam #Swap
Hackread
The Most Common Swap Scams in 2026, and How to Avoid Them
Follow us on all social media platforms @Hackread
⤷ Title: Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:38:30 +0000
════════════════════════
⌗ Tags: #Press Release
════════════════════════
𐀪 Author: CyberNewswire
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:38:30 +0000
════════════════════════
⌗ Tags: #Press Release
Hackread
Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap
New York, USA, 4th March 2026, CyberNewswire
⤷ Title: Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:38:51 +0000
════════════════════════
⌗ Tags: #Press Release
════════════════════════
𐀪 Author: cybernewswire
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:38:51 +0000
════════════════════════
⌗ Tags: #Press Release
Daily CyberSecurity
Reclaim Security Raises $26M to Eliminate the 27-Day Remediation Gap
New York, USA, 4th March 2026, CyberNewswire
⤷ Title: The “P” in PAM is for Persistence: Linux Persistence Technique
════════════════════════
𐀪 Author: BHIS
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:00:00 +0000
════════════════════════
⌗ Tags: #Ben Bowman #Linux #Red Team #Red Team Tools
════════════════════════
𐀪 Author: BHIS
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:00:00 +0000
════════════════════════
⌗ Tags: #Ben Bowman #Linux #Red Team #Red Team Tools
Black Hills Information Security, Inc.
The "P" in PAM is for Persistence: Linux Persistence Technique - Black Hills Information Security, Inc.
Learn about Pluggable Authentication Module in Linux, and how to use the PAM Skeleton Key to escalate privileges, move laterally, and achieve persistence.
⤷ Title: How I Found a Hidden Role in JavaScript That Became a Permanent Backdoor.
════════════════════════
𐀪 Author: 0xhun73r
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:38:12 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #bug_bounty #penetration_testing #bug_bounty_tips
════════════════════════
𐀪 Author: 0xhun73r
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:38:12 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #bug_bounty #penetration_testing #bug_bounty_tips
Medium
How I Found a Hidden Role in JavaScript That Became a Permanent Backdoor.
Hi everyone, this is my first writeup, and I hope you find it informative.
⤷ Title: The Internet Is Full of Vulnerabilities — TrinetLayer Helps You Find Them
════════════════════════
𐀪 Author: Researchbynidhi
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:09:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #javanoscript_security #bug_bounty #ethical_hacking #security_research
════════════════════════
𐀪 Author: Researchbynidhi
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:09:53 GMT
════════════════════════
⌗ Tags: #cybersecurity #javanoscript_security #bug_bounty #ethical_hacking #security_research
Medium
The Internet Is Full of Vulnerabilities — TrinetLayer Helps You Find Them
Exploring how TrinetLayer helps security researchers analyze attack surfaces, uncover hidden vulnerabilities, and experiment with…
⤷ Title: Analisis Malware APK “PT. POS Indonesia.apk” Menggunakan MobSF dan jadx.gui (Bootcamp Task5)
════════════════════════
𐀪 Author: Muhammaddavidfirmansyah
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:01:25 GMT
════════════════════════
⌗ Tags: #cybersecurity #malware_analysis #malware #infosec #android_pentesting
════════════════════════
𐀪 Author: Muhammaddavidfirmansyah
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:01:25 GMT
════════════════════════
⌗ Tags: #cybersecurity #malware_analysis #malware #infosec #android_pentesting
Medium
Analisis Malware APK “PT. POS Indonesia.apk” Menggunakan MobSF dan jadx.gui (Bootcamp Task5)
Pada analisis ini saya melakukan pemeriksaan terhadap file APK bernama PT. POS Indonesia.apk untuk melihat apakah terdapat indikasi malware…
⤷ Title: Vulnerability Data Enrichment for CVE Records: 259 CNAs on the Enrichment Recognition List for…
════════════════════════
𐀪 Author: CVE Program Blog
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:18:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #vulnerability #infosec #information_technology
════════════════════════
𐀪 Author: CVE Program Blog
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:18:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #vulnerability #infosec #information_technology
Medium
Vulnerability Data Enrichment for CVE Records: 259 CNAs on the Enrichment Recognition List for…
The “CNA Enrichment Recognition List” for March 2, 2026, is now available with 259 CNAs listed. Published monthly on the CVE website, the…
⤷ Title: Analisis Malware Android Pada PT. POS Indonesia.apk
════════════════════════
𐀪 Author: Alfin Syahrin
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:43:57 GMT
════════════════════════
⌗ Tags: #android_development #penetration_testing #pentesting #mobile_pentesting #android_studio
════════════════════════
𐀪 Author: Alfin Syahrin
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:43:57 GMT
════════════════════════
⌗ Tags: #android_development #penetration_testing #pentesting #mobile_pentesting #android_studio
Medium
Analisis Malware Android Pada PT. POS Indonesia.apk
Pertama kita akan menyipkan virual machine atau VM, kemudian unduh file PT.POS Indonesia.apk ini dari drive yang telah diberikan oleh…
⤷ Title: CPL — Final Override CTF SEE Challenge WriteUp.
════════════════════════
𐀪 Author: z3r0trac3
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:42:06 GMT
════════════════════════
⌗ Tags: #technology #ctf_writeup #cybersecurity #cyber_premier_league #penetration_testing
════════════════════════
𐀪 Author: z3r0trac3
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:42:06 GMT
════════════════════════
⌗ Tags: #technology #ctf_writeup #cybersecurity #cyber_premier_league #penetration_testing
Medium
CPL — Final Override CTF SEE Challenge WriteUp.
Category: Misc.
“can you see meee”
“can you see meee”
⤷ Title: TryHackMe SOC Analyst Road Map Part-4
════════════════════════
𐀪 Author: safa kaya
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:40:56 GMT
════════════════════════
⌗ Tags: #tryhackme
════════════════════════
𐀪 Author: safa kaya
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:40:56 GMT
════════════════════════
⌗ Tags: #tryhackme
Medium
TryHackMe SOC Analyst Road Map Part-4
Wİndows Fundemantals 1
Task1- Windows Editions
Windows, 1985’ten beri var olan, hem ev hem de iş ortamlarında en çok kullanılan işletim…
Task1- Windows Editions
Windows, 1985’ten beri var olan, hem ev hem de iş ortamlarında en çok kullanılan işletim…
⤷ Title: HTB | AoTR 2: Operation Winter Blackout
════════════════════════
𐀪 Author: Javeed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:57:15 GMT
════════════════════════
⌗ Tags: #osint #hackthebox_writeup #ctf #hackthebox
════════════════════════
𐀪 Author: Javeed
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 13:57:15 GMT
════════════════════════
⌗ Tags: #osint #hackthebox_writeup #ctf #hackthebox
Medium
HTB | AoTR 2: Operation Winter Blackout
Pada bagian kedua dari rangkaian HTB Sherlock Scenario: Advent of The Relics, investigasi berlanjut setelah temuan pada challenge…
⤷ Title: Top 10 Cybersecurity Tools Every Student Should Learn
════════════════════════
𐀪 Author: Antonyrajvedamanickam
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:19:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #soc #ethical_hacking #technology
════════════════════════
𐀪 Author: Antonyrajvedamanickam
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:19:54 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #soc #ethical_hacking #technology
Medium
Top 10 Cybersecurity Tools Every Student Should Learn
Cybersecurity is not just about theory. While understanding concepts is important, learning how to use real tools is what truly builds…
⤷ Title: Why Authentication Alone Doesn’t Make Your App Secure
════════════════════════
𐀪 Author: Ritwish Basu
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:40:31 GMT
════════════════════════
⌗ Tags: #software_engineering #cybersecurity #authentication #backend_development #api_security
════════════════════════
𐀪 Author: Ritwish Basu
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:40:31 GMT
════════════════════════
⌗ Tags: #software_engineering #cybersecurity #authentication #backend_development #api_security
Medium
Why Authentication Alone Doesn’t Make Your App Secure
A lot of developers feel safe once authentication is done.
⤷ Title: SigV4 in Production: Why “SignatureDoesNotMatch” Keeps Hitting You
════════════════════════
𐀪 Author: Chaos To Clarity
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:00:35 GMT
════════════════════════
⌗ Tags: #aws #authentication #cloud_security #amazon_s3 #api_security
════════════════════════
𐀪 Author: Chaos To Clarity
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 14:00:35 GMT
════════════════════════
⌗ Tags: #aws #authentication #cloud_security #amazon_s3 #api_security
Medium
🔐 SigV4 in Production: Why “SignatureDoesNotMatch” Keeps Hitting You
The real causes (not the textbook ones), plus a debugging playbook, presign traps, proxy gotchas
⤷ Title: Best DeleteMe Alternatives (2026): Competitors and Comparisons
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 16:58:31 +0000
════════════════════════
⌗ Tags: #Security #Privacy #Cybersecurity #DeleteMe
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Wed, 04 Mar 2026 16:58:31 +0000
════════════════════════
⌗ Tags: #Security #Privacy #Cybersecurity #DeleteMe
Hackread
Best DeleteMe Alternatives (2026): Competitors and Comparisons
Follow us on all social media platforms @Hackread