⤷ Title: A Critical Referral Logic Flaw Enabling Unlimited Financial Exposure
════════════════════════
𐀪 Author: 0xMo7areb
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 19:01:00 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #information_security #penetration_testing #bug_bounty #bug_bounty_tips
════════════════════════
𐀪 Author: 0xMo7areb
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 19:01:00 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #information_security #penetration_testing #bug_bounty #bug_bounty_tips
Medium
A Critical Referral Logic Flaw Enabling Unlimited Financial Exposure
Who Am I: 0xMo7areb — a bug hunter and Penenteration Tester :)
⤷ Title: ChatGPT’yi Ferrari Gibi Sürmek: Üretkenliğinizi 10 Katına Çıkaracak 10 Gizli Hack
════════════════════════
𐀪 Author: Mehmet AYDIN
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:20:52 GMT
════════════════════════
⌗ Tags: #üretkenlik #ferrari #chatgpt_prompt #chatgpt #hacking
════════════════════════
𐀪 Author: Mehmet AYDIN
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:20:52 GMT
════════════════════════
⌗ Tags: #üretkenlik #ferrari #chatgpt_prompt #chatgpt #hacking
Medium
ChatGPT’yi Ferrari Gibi Sürmek: Üretkenliğinizi 10 Katına Çıkaracak 10 Gizli Hack
Günümüzde çoğu insan için ChatGPT, basit bir “soru sor, cevap al” mekanizmasından ibaret. Ancak bu yaklaşım, garajınızda bir Ferrari varken…
⤷ Title: What is GRC?
════════════════════════
𐀪 Author: Sujon Al Mamun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:48:56 GMT
════════════════════════
⌗ Tags: #risk_management #cybersecurity #grc #infosec #governance
════════════════════════
𐀪 Author: Sujon Al Mamun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:48:56 GMT
════════════════════════
⌗ Tags: #risk_management #cybersecurity #grc #infosec #governance
Medium
What is GRC?
If you are new to information security, then you should know about GRC.
⤷ Title: Hardening Your Salesforce Organisation
════════════════════════
𐀪 Author: Connor Jackson
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:39:30 GMT
════════════════════════
⌗ Tags: #salesforce_development #infosec #salesforce #information_security
════════════════════════
𐀪 Author: Connor Jackson
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:39:30 GMT
════════════════════════
⌗ Tags: #salesforce_development #infosec #salesforce #information_security
Medium
Hardening Your Salesforce Organisation
It’s well known that Salesforce, like most cloud platforms, operates under a shared responsibility model when it comes to security. While…
⤷ Title: Networking for Cybersecurity: The Moment Attacks Stopped Looking Like Magic
════════════════════════
𐀪 Author: WinXcipher
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:00:10 GMT
════════════════════════
⌗ Tags: #infosec #computer_networking #linux #cybersecurity #cyber_security_awareness
════════════════════════
𐀪 Author: WinXcipher
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:00:10 GMT
════════════════════════
⌗ Tags: #infosec #computer_networking #linux #cybersecurity #cyber_security_awareness
Medium
Networking for Cybersecurity: The Moment Attacks Stopped Looking Like Magic
This is Part 2 of my cybersecurity roadmap series — the part where things finally started to make sense for me.
⤷ Title: Burp Suite Features Most Pentesters Ignore (But Shouldn’t)
════════════════════════
𐀪 Author: Hackers Things
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:07:46 GMT
════════════════════════
⌗ Tags: #web_security #ethical_hacking #burpsuite #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Hackers Things
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:07:46 GMT
════════════════════════
⌗ Tags: #web_security #ethical_hacking #burpsuite #penetration_testing #cybersecurity
Medium
Burp Suite Features Most Pentesters Ignore (But Shouldn’t)
Most pentesters live in Repeater. Here’s what’s hiding everywhere else.
⤷ Title: Inside the Hacker’s Mind -The Thin Line Between Criminal Curiosity and Ethical Responsibility
════════════════════════
𐀪 Author: Ayushman Misra
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 19:13:17 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #ethical_hacking #ethical_hacker_mindset #how_hackers_think #digital_security
════════════════════════
𐀪 Author: Ayushman Misra
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 19:13:17 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #ethical_hacking #ethical_hacker_mindset #how_hackers_think #digital_security
Medium
Inside the Hacker’s Mind -The Thin Line Between Criminal Curiosity and Ethical Responsibility
Introduction: The Curiosity That Can Build or Break the Digital World
⤷ Title: The Hidden Cyber Risks of Remote Work Infrastructure
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:13:06 +0000
════════════════════════
⌗ Tags: #Security #Cybersecurity
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:13:06 +0000
════════════════════════
⌗ Tags: #Security #Cybersecurity
Hackread
The Hidden Cyber Risks of Remote Work Infrastructure
Follow us on all social media platforms @Hackread
⤷ Title: mKingdom An Easy [Try Hack Me] Lab :
════════════════════════
𐀪 Author: Amrou bekhedda
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:30:49 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #cybersecurity #hacking #tryhackme
════════════════════════
𐀪 Author: Amrou bekhedda
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:30:49 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #cybersecurity #hacking #tryhackme
Medium
mKingdom An Easy [Try Hack Me] Lab :
Let’s have some fun with this easy try hack me lab :
⤷ Title: Finding a P1 in NASA: The Power of Google Dorking
════════════════════════
𐀪 Author: Khandaniyal
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:41:26 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #bug_bounty #nasa #google_dork
════════════════════════
𐀪 Author: Khandaniyal
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:41:26 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #bug_bounty #nasa #google_dork
Medium
Finding a P1 in NASA: The Power of Google Dorking
The Discovery
⤷ Title: Why Every Scanner Missed This RCE: Reviving CVE-2020–7961 On A 7 Year old Instance of Liferay
════════════════════════
𐀪 Author: Phil
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:06:36 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking
════════════════════════
𐀪 Author: Phil
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:06:36 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking
Medium
Why Every Scanner Missed This RCE: Reviving CVE-2020–7961 On A 7 Year old Instance of Liferay
By yppip (HackerOne) & zer0_sec (HackerOne, bugcrowd)
⤷ Title: Cheese CTF (THM) Tryhackme WriteUp Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:38:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ctf #ctf_writeup #tryhackme
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:38:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ctf #ctf_writeup #tryhackme
Medium
Cheese CTF (THM) Tryhackme WriteUp Answer
Denoscription : Inspired by the great cheese talk of THM!
⤷ Title: Hutch (Proving Grounds) Walkthrough: An Active Directory Attack Path
════════════════════════
𐀪 Author: SilentExploit
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:22:24 GMT
════════════════════════
⌗ Tags: #oscp #pentesting #hacking #cybersecurity
════════════════════════
𐀪 Author: SilentExploit
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:22:24 GMT
════════════════════════
⌗ Tags: #oscp #pentesting #hacking #cybersecurity
Medium
Hutch (Proving Grounds) Walkthrough: An Active Directory Attack Path
A deep dive into LDAP enumeration, GPO exploration, and LAPS exploitation for OSCP aspirants.
⤷ Title: Getting Started with the Stardust Shellcode Generator Template
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:24:26 GMT
════════════════════════
⌗ Tags: #hacking #hackthebox #penetration_testing #tryhackme #malware
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:24:26 GMT
════════════════════════
⌗ Tags: #hacking #hackthebox #penetration_testing #tryhackme #malware
Medium
Getting Started with the Stardust Shellcode Generator Template
Welcome to this new Medium post. In this article, I will introduce an amazing tool that allows you to generate shellcode directly from C++…
⤷ Title: Slack Bug Bounty — $1,750 Easy Bug
════════════════════════
𐀪 Author: Sirat Sami (analyz3r)
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:10:45 GMT
════════════════════════
⌗ Tags: #hackerone #infosec #bugbounty_writeup
════════════════════════
𐀪 Author: Sirat Sami (analyz3r)
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:10:45 GMT
════════════════════════
⌗ Tags: #hackerone #infosec #bugbounty_writeup
Medium
Slack Bug Bounty — $1,750 Easy Bug
Hi Everyone.
My name is Sirat, I’m 25 years old, from Kurdistan. I do bug bounty hunting on the HackerOne platform, and today I want to…
My name is Sirat, I’m 25 years old, from Kurdistan. I do bug bounty hunting on the HackerOne platform, and today I want to…
⤷ Title: Clocky | TryHackMe | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:48:49 GMT
════════════════════════
⌗ Tags: #tryhackme #mysql #linux #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:48:49 GMT
════════════════════════
⌗ Tags: #tryhackme #mysql #linux #tryhackme_walkthrough #tryhackme_writeup
Medium
Clocky | TryHackMe | Walkthrough
Flag 1
⤷ Title: Day 17 : SOC L1 Alert Triage THM
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:43:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #security_operation_center #tryhackme_writeup
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:43:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #security_operation_center #tryhackme_writeup
Medium
Day 17 : SOC L1 Alert Triage THM
Today I’m diving into something new! As I already finished the Jr. Pentester on TryHackMe, I actually asked myself why not diving into a…
⤷ Title: Exploitation of Grotesque 3
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #vulnhub_walkthrough #vulnhub
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #vulnhub_walkthrough #vulnhub
Medium
Exploitation of Grotesque 3
I started with host discovery using nmap and I I found the ip address at 192.168.1.106
⤷ Title: Exploitation of Hacksudo 1
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:22 GMT
════════════════════════
⌗ Tags: #walthrough #vulnhub_walkthrough #vulnhub
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:22 GMT
════════════════════════
⌗ Tags: #walthrough #vulnhub_walkthrough #vulnhub
Medium
Exploitation of Hacksudo 1
I started with host discovery using nmap and I I found the ip address at 192.168.1.200
⤷ Title: Eyes on the Front: Iranian Threat Actors Weaponize IP Cameras in Middle East Conflict
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:29:52 +0000
════════════════════════
⌗ Tags: #Cyber Security #Vulnerability Report #Battle Damage Assessment #Check Point Research #Cyber Reconnaissance #cybersecurity #Dahua Security #Hikvision Vulnerabilities #IP cameras #Iranian Cyber Threat #Kinetic Warfare #Middle East Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:29:52 +0000
════════════════════════
⌗ Tags: #Cyber Security #Vulnerability Report #Battle Damage Assessment #Check Point Research #Cyber Reconnaissance #cybersecurity #Dahua Security #Hikvision Vulnerabilities #IP cameras #Iranian Cyber Threat #Kinetic Warfare #Middle East Security
Daily CyberSecurity
Eyes on the Front: Iranian Threat Actors Weaponize IP Cameras in Middle East Conflict
A new Check Point Research report reveals how Iranian-nexus threat actors compromise IP cameras in the Middle East for real-time missile reconnaissance.