⤷ Title: Thinking Like an Attacker: How API Pen-Testers Identify Insecure Direct Object Reference (IDOR)
════════════════════════
𐀪 Author: Stella Obatoye
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 09:05:07 GMT
════════════════════════
⌗ Tags: #idor #api #owasp_api_security_top_10 #application_security #web_application_security
════════════════════════
𐀪 Author: Stella Obatoye
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 09:05:07 GMT
════════════════════════
⌗ Tags: #idor #api #owasp_api_security_top_10 #application_security #web_application_security
Medium
Thinking Like an Attacker: How API Pen-Testers Identify Insecure Direct Object Reference (IDOR)
Introduction
⤷ Title: Etik Hacker Nedir? Siber Güvenliğin Görünmeyen Savunma Hattı
════════════════════════
𐀪 Author: HSD İnönü Üniversitesi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:03:51 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #ethical_hacking
════════════════════════
𐀪 Author: HSD İnönü Üniversitesi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:03:51 GMT
════════════════════════
⌗ Tags: #penetration_testing #hacking #ethical_hacking
Medium
Etik Hacker Nedir? Siber Güvenliğin Görünmeyen Savunma Hattı
Merhaba, bu yazıda etik hacker’lığın ne olduğunu, nasıl çalıştığını ve dijital güvenlik için neden önemli olduğunu inceliyoruz.
⤷ Title: Two Coupons. One Logic Flaw. A Free $1337 Jacket.
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:38:04 GMT
════════════════════════
⌗ Tags: #portswigger_lab #penetration_testing #business_logic_flaw #ethical_hacking #vulnerability
════════════════════════
𐀪 Author: TEJAS
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:38:04 GMT
════════════════════════
⌗ Tags: #portswigger_lab #penetration_testing #business_logic_flaw #ethical_hacking #vulnerability
Medium
Two Coupons. One Logic Flaw. A Free $1337 Jacket.
Nobody tells you this when you start learning web security. You think hacking is about complex payloads, crazy noscripts, or some…
⤷ Title: HOW THE WEB WORKS -TryHackMe Module. Room 3: How Websites Work.
════════════════════════
𐀪 Author: Raymond Ebonine
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:27:34 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #web #website #tryhackme_walkthrough
════════════════════════
𐀪 Author: Raymond Ebonine
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:27:34 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #web #website #tryhackme_walkthrough
Medium
HOW THE WEB WORKS -TryHackMe Module. Room 3: How Websites Work.
Understand how the World Wide Web (www) truly works.
⤷ Title: TryHackMe Log Analysis with SIEM
════════════════════════
𐀪 Author: n0tsaken
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 09:02:56 GMT
════════════════════════
⌗ Tags: #tryhackme #splunk #loganalysiswithsiem
════════════════════════
𐀪 Author: n0tsaken
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 09:02:56 GMT
════════════════════════
⌗ Tags: #tryhackme #splunk #loganalysiswithsiem
Medium
TryHackMe Log Analysis with SIEM
A Walk Through of https://tryhackme.com/room/loganalysiswithsiem
⤷ Title: HackTheBox — Browsed Writeup
════════════════════════
𐀪 Author: Zarni Aung
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:33:54 GMT
════════════════════════
⌗ Tags: #htb #hackthebox_writeup #browsed
════════════════════════
𐀪 Author: Zarni Aung
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:33:54 GMT
════════════════════════
⌗ Tags: #htb #hackthebox_writeup #browsed
Medium
HackTheBox — Browsed Writeup
Medium | Linux
⤷ Title: 7 Powerful API Gateway Security Forensics Plays
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:08:16 GMT
════════════════════════
⌗ Tags: #digital_forensics #devops #api_security #cloud_security #cybersecurity
════════════════════════
𐀪 Author: Pentest_Testing_Corp
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:08:16 GMT
════════════════════════
⌗ Tags: #digital_forensics #devops #api_security #cloud_security #cybersecurity
Medium
7 Powerful API Gateway Security Forensics Plays
Forensic engineering for modern API gateways — building evidence-ready API front doors.
⤷ Title: From Learning APIs to Protecting Systems: My API Security Journey
════════════════════════
𐀪 Author: Stella Obatoye
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 09:23:03 GMT
════════════════════════
⌗ Tags: #api #owasp_api_security_top_10 #web_applications #api_security #ai
════════════════════════
𐀪 Author: Stella Obatoye
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 09:23:03 GMT
════════════════════════
⌗ Tags: #api #owasp_api_security_top_10 #web_applications #api_security #ai
Medium
From Learning APIs to Protecting Systems: My API Security Journey
When I first started learning about APIs, I saw them simply as connectors. They were the invisible bridges that allowed different…
⤷ Title: Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 17:31:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 17:31:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Where Multi-Factor Authentication Stops and Credential Abuse Starts
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:30:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:30:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Authorities Shut Down Tycoon 2FA Phishing Platform Used to Bypass MFA
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:53:20 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Phishing Scam #Security #2FA #Cybersecurity #Europol #Fraud #MFA #Phishing #Scam #Tycoon 2FA
════════════════════════
𐀪 Author: Waqas
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:53:20 +0000
════════════════════════
⌗ Tags: #Cyber Crime #Phishing Scam #Security #2FA #Cybersecurity #Europol #Fraud #MFA #Phishing #Scam #Tycoon 2FA
Hackread
Authorities Shut Down Tycoon 2FA Phishing Platform Used to Bypass MFA
Follow us on all social media platforms @Hackread
⤷ Title: Linkə Klik Etmək Bank Hesabınızı Necə Oğurlada bilər? | Phishing və Hacker Hücumları (2026)
════════════════════════
𐀪 Author: cybershieldy.com
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:35:45 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #cibersecurity #hacker #azerbaijan
════════════════════════
𐀪 Author: cybershieldy.com
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:35:45 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #cibersecurity #hacker #azerbaijan
Medium
Linkə Klik Etmək Bank Hesabınızı Necə Oğurlada bilər? | Phishing və Hacker Hücumları (2026)
cybersecurity, hacking, phishing, infosec, ethicalhacking
⤷ Title: CTF Basics: Understanding APIs and JavaScript
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #technology #ctf
════════════════════════
𐀪 Author: Walter Moar
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:01:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #hacking #technology #ctf
Medium
CTF Basics: Understanding APIs and JavaScript
This article covers the basics of Application Programming Interfaces (APIs), how JavaScript uses them to communicate with servers, and…
⤷ Title: I’m trying to solve a ctf challenge about controlling a server by inputting files
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 11:03:23 GMT
════════════════════════
⌗ Tags: #rce #ctf_writeup #ctf #web_exploitation #hacking
════════════════════════
𐀪 Author: Billy Elvonda Aron Umpel
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 11:03:23 GMT
════════════════════════
⌗ Tags: #rce #ctf_writeup #ctf #web_exploitation #hacking
Medium
I’m trying to solve a ctf challenge about controlling a server by inputting files
Here I use the challenge from PicoCTF
⤷ Title: Beginner Penetration Testing Lab: Exploiting vsftpd 2.3.4 on Metasploitable
════════════════════════
𐀪 Author: Ertsberg Tjahyosedjati
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 11:13:44 GMT
════════════════════════
⌗ Tags: #homelab #penetration_testing #metasploit #cybersecurity
════════════════════════
𐀪 Author: Ertsberg Tjahyosedjati
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 11:13:44 GMT
════════════════════════
⌗ Tags: #homelab #penetration_testing #metasploit #cybersecurity
Medium
Beginner Penetration Testing Lab: Exploiting vsftpd 2.3.4 on Metasploitable
Executive Summary
⤷ Title: Invite Only: A Threat Intelligence Investigation and Malware Analysis writeup
════════════════════════
𐀪 Author: Citadel Cybersec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 11:44:14 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #threat_intelligence #soc_analyst #malware_analysis
════════════════════════
𐀪 Author: Citadel Cybersec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 11:44:14 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #threat_intelligence #soc_analyst #malware_analysis
Medium
Invite Only: A Threat Intelligence Investigation and Malware Analysis writeup
A practical SOC analyst investigation of malicious hashes, phishing techniques, and malware delivery chains from the Invite Only TryHackMe…
⤷ Title: Registration and Navigation of Online CTF Platforms: A Hands-on Introduction Using TryHackMe
════════════════════════
𐀪 Author: Jeslyn sandra
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:58:20 GMT
════════════════════════
⌗ Tags: #tryhackme
════════════════════════
𐀪 Author: Jeslyn sandra
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 10:58:20 GMT
════════════════════════
⌗ Tags: #tryhackme
Medium
Registration and Navigation of Online CTF Platforms: A Hands-on Introduction Using TryHackMe
1.Introduction
⤷ Title: I Built My First Cybersecurity Trap ! Here’s What I Learned About Honeypots
════════════════════════
𐀪 Author: Shamini Nirodya
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 11:31:12 GMT
════════════════════════
⌗ Tags: #ethical_hacking #networking #cybersecurity #web_security #python
════════════════════════
𐀪 Author: Shamini Nirodya
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 11:31:12 GMT
════════════════════════
⌗ Tags: #ethical_hacking #networking #cybersecurity #web_security #python
Medium
I Built My First Cybersecurity Trap ! Here’s What I Learned About Honeypots
When people think about cybersecurity, they often imagine firewalls, antivirus software, and systems that block hackers immediately. But…
⤷ Title: ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 19:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 19:14:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 18:43:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 18:43:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Interview with Tom Howe of Hydrolix: AI Bots, the Friends, Foes, and Frenemies of Online Shopping
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:55:13 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #AI #Bots #Business #eCommerce #Hydrolix #Technology
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:55:13 +0000
════════════════════════
⌗ Tags: #Artificial Intelligence #AI #Bots #Business #eCommerce #Hydrolix #Technology
Hackread
Interview with Tom Howe of Hydrolix: AI Bots, the Friends, Foes, and Frenemies of Online Shopping
Follow us on all social media platforms @Hackread