⤷ Title: noname walkthrough (Educational & Defensive Analysis)
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:18:36 GMT
════════════════════════
⌗ Tags: #vulnerability #cybersecurity #ethical_hacking #oscp #information_security
════════════════════════
𐀪 Author: cyber_public_school
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:18:36 GMT
════════════════════════
⌗ Tags: #vulnerability #cybersecurity #ethical_hacking #oscp #information_security
Medium
🔥noname walkthrough (Educational & Defensive Analysis)
By cyber_public_school | Cyber Security Researcher
⤷ Title: JWT None Algorithm Attack: Testing Signature Validation in Web Applications
════════════════════════
𐀪 Author: Marwan Alsaifi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:14:08 GMT
════════════════════════
⌗ Tags: #api #jwt #cybersecurity #pentesting #ethical_hacking
════════════════════════
𐀪 Author: Marwan Alsaifi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 14:14:08 GMT
════════════════════════
⌗ Tags: #api #jwt #cybersecurity #pentesting #ethical_hacking
Medium
JWT None Algorithm Attack: Testing Signature Validation in Web Applications
JSON Web Tokens (JWTs) are widely used for authentication and authorization in modern web applications. When implemented correctly, they…
⤷ Title: Solving a Bugforge Challenge — Exploiting SSRF in Tanuki
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:53:50 GMT
════════════════════════
⌗ Tags: #caido #bugforge #web_penetration_testing #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Pranaya Shrestha
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 13:53:50 GMT
════════════════════════
⌗ Tags: #caido #bugforge #web_penetration_testing #cybersecurity #ethical_hacking
Medium
Solving a Bugforge Challenge — Exploiting SSRF in Tanuki
Today, I solved another web challenge on Bugforge, targeting a web application named Tanuki.
⤷ Title: Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
════════════════════════
𐀪 Author: Unknown
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:52:00 +0530
════════════════════════
⌗ Tags: No_Tags
⤷ Title: Chaining IDOR to Admin Panel Takeover to SQLI
════════════════════════
𐀪 Author: cryptoshant
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:29:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #ctf #hacking #pentesting
════════════════════════
𐀪 Author: cryptoshant
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:29:08 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #ctf #hacking #pentesting
Medium
Chaining IDOR to Admin Panel Takeover to SQLI 💀
Hello Hackers, After a long time… I am back again 😀. In this write-up, I am going to share a recent bug I discovered during a freelance…
⤷ Title: You Don’t Need to Be a Genius to Find Real Security Vulnerabilities — You Need a Better Process
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:02:40 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #earn_money_online #business #bug_bounty_writeup
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:02:40 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty #earn_money_online #business #bug_bounty_writeup
Medium
You Don’t Need to Be a Genius to Find Real Security Vulnerabilities — You Need a Better Process
Introduction
⤷ Title: The Penetration Tester’s Paradox: Why the Best Hackers Think Like Defenders First
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:02:24 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #success #business #hackin
════════════════════════
𐀪 Author: R.H Rizvi
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:02:24 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #success #business #hackin
Medium
The Penetration Tester’s Paradox: Why the Best Hackers Think Like Defenders First
Introduction
⤷ Title: Architecting Red Team Infrastructure: The AWS 3-Tier Model
════════════════════════
𐀪 Author: Tyreek Haynes
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:36:35 GMT
════════════════════════
⌗ Tags: #red_team #infosec #aws #cybersecurity #infastructure
════════════════════════
𐀪 Author: Tyreek Haynes
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:36:35 GMT
════════════════════════
⌗ Tags: #red_team #infosec #aws #cybersecurity #infastructure
Medium
Architecting Red Team Infrastructure: The AWS 3-Tier Model
In the previous article, I talked about a common mistake in custom C2 projects:
⤷ Title: Your Security Training Is Useless…Here’s Why?
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:08:21 GMT
════════════════════════
⌗ Tags: #infosec #cyber_security_awareness #data_breach #cyber_security_training #ciso
════════════════════════
𐀪 Author: Eugenia | Cybersecurity Awareness
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:08:21 GMT
════════════════════════
⌗ Tags: #infosec #cyber_security_awareness #data_breach #cyber_security_training #ciso
Medium
Your Security Training Is Useless…Here’s Why?
Security awareness training has become a $10 billion global industry.
⤷ Title: [DEEP RESEARCH] Who’s Most Likely to Abuse MCP Integrations? UNC3944, TraderTraitor, UNC6293
════════════════════════
𐀪 Author: Wes Young
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:46:00 GMT
════════════════════════
⌗ Tags: #infosec #scattered_spider #threat_intelligence #ai #cybersecurity
════════════════════════
𐀪 Author: Wes Young
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:46:00 GMT
════════════════════════
⌗ Tags: #infosec #scattered_spider #threat_intelligence #ai #cybersecurity
Medium
[DEEP RESEARCH] Who’s Most Likely to Abuse MCP Integrations? UNC3944, TraderTraitor, UNC6293
You’re not getting popped by a zero-day. You’re getting popped by a button. ✅ “Allow access” ✅ “Approve device” ✅ “Run this repo.” 😑
⤷ Title: Monitoring Active Directory Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:59:56 GMT
════════════════════════
⌗ Tags: #tryhackme #active_directory #tryhackme_walkthrough #tryhackme_writeup #blue_teaming
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:59:56 GMT
════════════════════════
⌗ Tags: #tryhackme #active_directory #tryhackme_walkthrough #tryhackme_writeup #blue_teaming
Medium
Monitoring Active Directory Walkthrough Notes | TryHackMe
Room: https://tryhackme.com/room/monitoringactivedirectory
⤷ Title: Dime una sola razón para no entrar, una sola, y que no sea "porque está mal".
════════════════════════
𐀪 Author: C37webak1ix
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:40:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #psychology #philosophy
════════════════════════
𐀪 Author: C37webak1ix
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:40:41 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #psychology #philosophy
Medium
Dime una sola razón para no entrar, una sola, y que no sea "porque está mal".
si ellos no lo cuidan, ¿por qué lo cuidas tú?
⤷ Title: When You Can’t Trust the Voice: Deepfake Phishing and Real-Time AI Impersonation Threats to…
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:13:25 GMT
════════════════════════
⌗ Tags: #ai #cyber_security_awareness #information_security #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Cynox Security LLP.
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 15:13:25 GMT
════════════════════════
⌗ Tags: #ai #cyber_security_awareness #information_security #cybersecurity #ethical_hacking
Medium
When You Can’t Trust the Voice: Deepfake Phishing and Real-Time AI Impersonation Threats to…
Introduction: The End of “Seeing Is Believing”
⤷ Title: Why APY Is the Most Misunderstood Metric in DeFi
════════════════════════
𐀪 Author: Anima Koley
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:52:37 GMT
════════════════════════
⌗ Tags: #cryptocurrency #web3 #vc_funding #rce_vulnerability
════════════════════════
𐀪 Author: Anima Koley
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 16:52:37 GMT
════════════════════════
⌗ Tags: #cryptocurrency #web3 #vc_funding #rce_vulnerability
Medium
Why APY Is the Most Misunderstood Metric in DeFi
For years, DeFi has competed on one number: APY. Dashboards highlight it, protocols advertise it, and users chase the highest yield.
⤷ Title: 5 Best Next Gen Endpoint Protection Platforms in 2026
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 18:35:15 +0000
════════════════════════
⌗ Tags: #Security #AI #Cybersecurity #EDR #Endpoint Protection #Next Gen #SaaS #Technology
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 18:35:15 +0000
════════════════════════
⌗ Tags: #Security #AI #Cybersecurity #EDR #Endpoint Protection #Next Gen #SaaS #Technology
Hackread
5 Best Next Gen Endpoint Protection Platforms in 2026
Follow us on all social media platforms @Hackread
⤷ Title: PleaseFix Flaw Lets Hackers Access 1Password Vault via Comet AI Browser
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 17:26:35 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #Privacy #AI #AI Browser #Perplexity #PleaseFix #Vulnerability
════════════════════════
𐀪 Author: Deeba Ahmed
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 17:26:35 +0000
════════════════════════
⌗ Tags: #Security #Artificial Intelligence #Privacy #AI #AI Browser #Perplexity #PleaseFix #Vulnerability
Hackread
PleaseFix Flaw Lets Hackers Access 1Password Vault via Comet AI Browser
Follow us on all social media platforms @Hackread
⤷ Title: CVE-2025–64424 (Coolio) Vulnerable Docker Container with Walkthrough.
════════════════════════
𐀪 Author: Josh Beck
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 18:52:28 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Josh Beck
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 18:52:28 GMT
════════════════════════
⌗ Tags: #hacking #bug_bounty #cybersecurity #penetration_testing
Medium
CVE-2025–64424 (Coolio) Vulnerable Docker Container with Walkthrough.
When I first decided to write this lab, I told myself that if this platform wasn’t “cool,” I wouldn’t write it. The platform is indeed…
⤷ Title: picoCTF writeup: MacroHard WeakEdge | Forensics Series
════════════════════════
𐀪 Author: Sarah Qym
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 17:28:43 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #vba_macros #digital_forensics #hacking
════════════════════════
𐀪 Author: Sarah Qym
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 17:28:43 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #vba_macros #digital_forensics #hacking
Medium
picoCTF writeup: MacroHard WeakEdge | Forensics Series
The challenge presents us with a pptm file which is a Microsoft PowerPoint Macro-Enabled Presentation, which is a fancy way of saying that…
⤷ Title: 10 Mistakes I Made While Learning Cybersecurity (And How to Avoid Them)
════════════════════════
𐀪 Author: Jiyaa25
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 17:31:53 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #career_development #learning #cybersecurity
════════════════════════
𐀪 Author: Jiyaa25
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 17:31:53 GMT
════════════════════════
⌗ Tags: #infosec #ethical_hacking #career_development #learning #cybersecurity
Medium
10 Mistakes I Made While Learning Cybersecurity (And How to Avoid Them)
Cybersecurity looks exciting from the outside — hacking labs, digital forensics, red team tools and cool terminal screenshots.
⤷ Title: THM: Linux Privilege Escalation
════════════════════════
𐀪 Author: Murad Salem
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 18:26:46 GMT
════════════════════════
⌗ Tags: #privilege_escalation #cybersecurity #linux #penetration_testing #tryhackme
════════════════════════
𐀪 Author: Murad Salem
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 18:26:46 GMT
════════════════════════
⌗ Tags: #privilege_escalation #cybersecurity #linux #penetration_testing #tryhackme
Medium
THM: Linux Privilege Escalation
A write-up for Linux Privilege Escalation room