⤷ Title: Understanding Linux File Permissions: A Beginner-Friendly Guide
════════════════════════
𐀪 Author: Mtuaha
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:00:34 GMT
════════════════════════
⌗ Tags: #kali_linux #cybersecurity #hacking #linux #tech
════════════════════════
𐀪 Author: Mtuaha
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:00:34 GMT
════════════════════════
⌗ Tags: #kali_linux #cybersecurity #hacking #linux #tech
Medium
Understanding Linux File Permissions: A Beginner-Friendly Guide
If you’re starting your journey with Linux, system administration, or cybersecurity, one of the most important concepts to understand is…
⤷ Title: Instagram Account Recovery!
════════════════════════
𐀪 Author: Black Hat World
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:59:41 GMT
════════════════════════
⌗ Tags: #hacking #technology #artificial_intelligence #marketing #cybersecurity
════════════════════════
𐀪 Author: Black Hat World
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:59:41 GMT
════════════════════════
⌗ Tags: #hacking #technology #artificial_intelligence #marketing #cybersecurity
Medium
Instagram Account Recovery!
Instagram Ban/UnBan
⤷ Title: Instagram Account Recovery 2026!
════════════════════════
𐀪 Author: Black Hat World
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:56:12 GMT
════════════════════════
⌗ Tags: #cybersecurity #artificial_intelligence #marketing #hacking #technology
════════════════════════
𐀪 Author: Black Hat World
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:56:12 GMT
════════════════════════
⌗ Tags: #cybersecurity #artificial_intelligence #marketing #hacking #technology
Medium
Instagram Account Recovery 2026!
Instagram Ban/UnBan
⤷ Title: What is Cybersecurity? A Beginner Friendly Guide
════════════════════════
𐀪 Author: Rocket Raccoon Real
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:45:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #ethical_hacking #infosec
════════════════════════
𐀪 Author: Rocket Raccoon Real
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:45:04 GMT
════════════════════════
⌗ Tags: #cybersecurity #technology #ethical_hacking #infosec
Medium
What is Cybersecurity? A Beginner Friendly Guide
⤷ Title: How Acoustic Testing Improves Comfort in Modern Buildings
════════════════════════
𐀪 Author: Cocokelapa64
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:54:47 GMT
════════════════════════
⌗ Tags: #penetration_testing #ai #acoustic
════════════════════════
𐀪 Author: Cocokelapa64
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:54:47 GMT
════════════════════════
⌗ Tags: #penetration_testing #ai #acoustic
Medium
How Acoustic Testing Improves Comfort in Modern Buildings
When people think about building quality, they often focus on visible things design, materials, and aesthetics. But there is another…
⤷ Title: BorderDroid-Challenge-8KSEC
════════════════════════
𐀪 Author: Mohamed Ayman
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:13:31 GMT
════════════════════════
⌗ Tags: #android_pentesting #penetration_testing #8ksec
════════════════════════
𐀪 Author: Mohamed Ayman
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:13:31 GMT
════════════════════════
⌗ Tags: #android_pentesting #penetration_testing #8ksec
Medium
BorderDroid-Challenge-8KSEC
Denoscription
⤷ Title: TryHackMe | Monitoring Active Directory | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:51:03 GMT
════════════════════════
⌗ Tags: #active_directory #tryhackme_writeup #cybersecurity #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:51:03 GMT
════════════════════════
⌗ Tags: #active_directory #tryhackme_writeup #cybersecurity #tryhackme #tryhackme_walkthrough
Medium
TryHackMe | Monitoring Active Directory | WriteUp
Learn to monitor Active Directory and find anomalies in high-volume logs.
⤷ Title: TryHackMe Writeup: Creative
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:44:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cybercrime
════════════════════════
𐀪 Author: Berkay AĞGÜL
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:44:00 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cybercrime
Medium
TryHackMe Writeup: Creative
Selamlar dostlar! Bugün TryHackMe platformunda yer alan Creative makinesini adım adım çözeceğiz. Bu makine, başlangıçta standart bir web…
⤷ Title: TryHackMe — Server-Side Template Injection (SSTI)
════════════════════════
𐀪 Author: Hitesh kumar
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:25:21 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #cybersecurity
════════════════════════
𐀪 Author: Hitesh kumar
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:25:21 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme #cybersecurity
Medium
TryHackMe — Server-Side Template Injection (SSTI)
What is SSTI?
⤷ Title: TryHackMe SOC Analyst Road Map Part-5
════════════════════════
𐀪 Author: safa kaya
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:07:07 GMT
════════════════════════
⌗ Tags: #tryhackme
════════════════════════
𐀪 Author: safa kaya
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:07:07 GMT
════════════════════════
⌗ Tags: #tryhackme
Medium
TryHackMe SOC Analyst Road Map Part-5
Task2 — A Bit of Background on Linux
⤷ Title: Challenge IronShade: An Epic Adventure Awaits in Incident Response.
════════════════════════
𐀪 Author: Misbah Ur Rehman
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:58:23 GMT
════════════════════════
⌗ Tags: #tryhackme #linux #incident_response #cybersecurity #ctf_writeup
════════════════════════
𐀪 Author: Misbah Ur Rehman
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 12:58:23 GMT
════════════════════════
⌗ Tags: #tryhackme #linux #incident_response #cybersecurity #ctf_writeup
Medium
Challenge IronShade: An Epic Adventure Awaits in Incident Response.
In this write-up, we will investigate the compromised Linux server. Let’s begin. Make sure to switch the terminal to the root user
⤷ Title: Writeup — Brutus (HTB Sherlock)| Cybersecurity Bootcamp IDN Week 3 (Blue Team)
════════════════════════
𐀪 Author: FAIZ AIDIL BAIHAQI
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:18:06 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #blue_team #brutus #hackthebox #cybersecurity
════════════════════════
𐀪 Author: FAIZ AIDIL BAIHAQI
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:18:06 GMT
════════════════════════
⌗ Tags: #hackthebox_writeup #blue_team #brutus #hackthebox #cybersecurity
Medium
Writeup — Brutus (HTB Sherlock)| Cybersecurity Bootcamp IDN Week 3 (Blue Team)
By: Faizylux
⤷ Title: noname walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:18:36 GMT
════════════════════════
⌗ Tags: #vulnerability #cybersecurity #ethical_hacking #oscp #information_security
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:18:36 GMT
════════════════════════
⌗ Tags: #vulnerability #cybersecurity #ethical_hacking #oscp #information_security
Medium
🔥noname walkthrough (Educational & Defensive Analysis)
By cyber_public_school | Cyber Security Researcher
⤷ Title: JWT None Algorithm Attack: Testing Signature Validation in Web Applications
════════════════════════
𐀪 Author: Marwan Alsaifi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:14:08 GMT
════════════════════════
⌗ Tags: #api #jwt #cybersecurity #pentesting #ethical_hacking
════════════════════════
𐀪 Author: Marwan Alsaifi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:14:08 GMT
════════════════════════
⌗ Tags: #api #jwt #cybersecurity #pentesting #ethical_hacking
Medium
JWT None Algorithm Attack: Testing Signature Validation in Web Applications
JSON Web Tokens (JWTs) are widely used for authentication and authorization in modern web applications. When implemented correctly, they…
⤷ Title: Solving a Bugforge Challenge — Exploiting SSRF in Tanuki
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:53:50 GMT
════════════════════════
⌗ Tags: #caido #bugforge #web_penetration_testing #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:53:50 GMT
════════════════════════
⌗ Tags: #caido #bugforge #web_penetration_testing #cybersecurity #ethical_hacking
Medium
Solving a Bugforge Challenge — Exploiting SSRF in Tanuki
Today, I solved another web challenge on Bugforge, targeting a web application named Tanuki.
⤷ Title: Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Chaining IDOR to Admin Panel Takeover to SQLI
════════════════════════
𐀪 Author: cryptoshant
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:29:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #ctf #hacking #pentesting
════════════════════════
𐀪 Author: cryptoshant
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:29:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #ctf #hacking #pentesting
Medium
Chaining IDOR to Admin Panel Takeover to SQLI 💀
Hello Hackers, After a long time… I am back again 😀. In this write-up, I am going to share a recent bug I discovered during a freelance…
⤷ Title: You Don’t Need to Be a Genius to Find Real Security Vulnerabilities — You Need a Better Process
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:02:40 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #earn_money_online #business #bug_bounty_writeup
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:02:40 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #earn_money_online #business #bug_bounty_writeup
Medium
You Don’t Need to Be a Genius to Find Real Security Vulnerabilities — You Need a Better Process
Introduction
⤷ Title: The Penetration Tester’s Paradox: Why the Best Hackers Think Like Defenders First
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:02:24 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #success #business #hackin
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:02:24 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #success #business #hackin
Medium
The Penetration Tester’s Paradox: Why the Best Hackers Think Like Defenders First
Introduction
⤷ Title: Architecting Red Team Infrastructure: The AWS 3-Tier Model
════════════════════════
𐀪 Author: Tyreek Haynes
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:36:35 GMT
════════════════════════
⌗ Tags: #red_team #infosec #aws #cybersecurity #infastructure
════════════════════════
𐀪 Author: Tyreek Haynes
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:36:35 GMT
════════════════════════
⌗ Tags: #red_team #infosec #aws #cybersecurity #infastructure
Medium
Architecting Red Team Infrastructure: The AWS 3-Tier Model
In the previous article, I talked about a common mistake in custom C2 projects: