⤷ Title: Networking for Cybersecurity: The Moment Attacks Stopped Looking Like Magic
════════════════════════
𐀪 Author: WinXcipher
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:00:10 GMT
════════════════════════
⌗ Tags: #infosec #computer_networking #linux #cybersecurity #cyber_security_awareness
════════════════════════
𐀪 Author: WinXcipher
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:00:10 GMT
════════════════════════
⌗ Tags: #infosec #computer_networking #linux #cybersecurity #cyber_security_awareness
Medium
Networking for Cybersecurity: The Moment Attacks Stopped Looking Like Magic
This is Part 2 of my cybersecurity roadmap series — the part where things finally started to make sense for me.
⤷ Title: Burp Suite Features Most Pentesters Ignore (But Shouldn’t)
════════════════════════
𐀪 Author: Hackers Things
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:07:46 GMT
════════════════════════
⌗ Tags: #web_security #ethical_hacking #burpsuite #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Hackers Things
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 20:07:46 GMT
════════════════════════
⌗ Tags: #web_security #ethical_hacking #burpsuite #penetration_testing #cybersecurity
Medium
Burp Suite Features Most Pentesters Ignore (But Shouldn’t)
Most pentesters live in Repeater. Here’s what’s hiding everywhere else.
⤷ Title: Inside the Hacker’s Mind -The Thin Line Between Criminal Curiosity and Ethical Responsibility
════════════════════════
𐀪 Author: Ayushman Misra
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 19:13:17 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #ethical_hacking #ethical_hacker_mindset #how_hackers_think #digital_security
════════════════════════
𐀪 Author: Ayushman Misra
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 19:13:17 GMT
════════════════════════
⌗ Tags: #cybersecurity_awareness #ethical_hacking #ethical_hacker_mindset #how_hackers_think #digital_security
Medium
Inside the Hacker’s Mind -The Thin Line Between Criminal Curiosity and Ethical Responsibility
Introduction: The Curiosity That Can Build or Break the Digital World
⤷ Title: The Hidden Cyber Risks of Remote Work Infrastructure
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:13:06 +0000
════════════════════════
⌗ Tags: #Security #Cybersecurity
════════════════════════
𐀪 Author: Owais Sultan
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:13:06 +0000
════════════════════════
⌗ Tags: #Security #Cybersecurity
Hackread
The Hidden Cyber Risks of Remote Work Infrastructure
Follow us on all social media platforms @Hackread
⤷ Title: mKingdom An Easy [Try Hack Me] Lab :
════════════════════════
𐀪 Author: Amrou bekhedda
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:30:49 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #cybersecurity #hacking #tryhackme
════════════════════════
𐀪 Author: Amrou bekhedda
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:30:49 GMT
════════════════════════
⌗ Tags: #bug_bounty #penetration_testing #cybersecurity #hacking #tryhackme
Medium
mKingdom An Easy [Try Hack Me] Lab :
Let’s have some fun with this easy try hack me lab :
⤷ Title: Finding a P1 in NASA: The Power of Google Dorking
════════════════════════
𐀪 Author: Khandaniyal
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:41:26 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #bug_bounty #nasa #google_dork
════════════════════════
𐀪 Author: Khandaniyal
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:41:26 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #cybersecurity #bug_bounty #nasa #google_dork
Medium
Finding a P1 in NASA: The Power of Google Dorking
The Discovery
⤷ Title: Why Every Scanner Missed This RCE: Reviving CVE-2020–7961 On A 7 Year old Instance of Liferay
════════════════════════
𐀪 Author: Phil
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:06:36 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking
════════════════════════
𐀪 Author: Phil
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:06:36 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #bug_bounty #hacking
Medium
Why Every Scanner Missed This RCE: Reviving CVE-2020–7961 On A 7 Year old Instance of Liferay
By yppip (HackerOne) & zer0_sec (HackerOne, bugcrowd)
⤷ Title: Cheese CTF (THM) Tryhackme WriteUp Answer
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:38:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ctf #ctf_writeup #tryhackme
════════════════════════
𐀪 Author: Lawvye
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:38:28 GMT
════════════════════════
⌗ Tags: #hacking #cybersecurity #ctf #ctf_writeup #tryhackme
Medium
Cheese CTF (THM) Tryhackme WriteUp Answer
Denoscription : Inspired by the great cheese talk of THM!
⤷ Title: Hutch (Proving Grounds) Walkthrough: An Active Directory Attack Path
════════════════════════
𐀪 Author: SilentExploit
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:22:24 GMT
════════════════════════
⌗ Tags: #oscp #pentesting #hacking #cybersecurity
════════════════════════
𐀪 Author: SilentExploit
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:22:24 GMT
════════════════════════
⌗ Tags: #oscp #pentesting #hacking #cybersecurity
Medium
Hutch (Proving Grounds) Walkthrough: An Active Directory Attack Path
A deep dive into LDAP enumeration, GPO exploration, and LAPS exploitation for OSCP aspirants.
⤷ Title: Getting Started with the Stardust Shellcode Generator Template
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:24:26 GMT
════════════════════════
⌗ Tags: #hacking #hackthebox #penetration_testing #tryhackme #malware
════════════════════════
𐀪 Author: S12 - 0x12Dark Development
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:24:26 GMT
════════════════════════
⌗ Tags: #hacking #hackthebox #penetration_testing #tryhackme #malware
Medium
Getting Started with the Stardust Shellcode Generator Template
Welcome to this new Medium post. In this article, I will introduce an amazing tool that allows you to generate shellcode directly from C++…
⤷ Title: Slack Bug Bounty — $1,750 Easy Bug
════════════════════════
𐀪 Author: Sirat Sami (analyz3r)
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:10:45 GMT
════════════════════════
⌗ Tags: #hackerone #infosec #bugbounty_writeup
════════════════════════
𐀪 Author: Sirat Sami (analyz3r)
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:10:45 GMT
════════════════════════
⌗ Tags: #hackerone #infosec #bugbounty_writeup
Medium
Slack Bug Bounty — $1,750 Easy Bug
Hi Everyone.
My name is Sirat, I’m 25 years old, from Kurdistan. I do bug bounty hunting on the HackerOne platform, and today I want to…
My name is Sirat, I’m 25 years old, from Kurdistan. I do bug bounty hunting on the HackerOne platform, and today I want to…
⤷ Title: Clocky | TryHackMe | Walkthrough
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:48:49 GMT
════════════════════════
⌗ Tags: #tryhackme #mysql #linux #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: Sornphut
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:48:49 GMT
════════════════════════
⌗ Tags: #tryhackme #mysql #linux #tryhackme_walkthrough #tryhackme_writeup
Medium
Clocky | TryHackMe | Walkthrough
Flag 1
⤷ Title: Day 17 : SOC L1 Alert Triage THM
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:43:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #security_operation_center #tryhackme_writeup
════════════════════════
𐀪 Author: Cybersecurity with Jojo
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 22:43:40 GMT
════════════════════════
⌗ Tags: #cybersecurity #tryhackme_walkthrough #tryhackme #security_operation_center #tryhackme_writeup
Medium
Day 17 : SOC L1 Alert Triage THM
Today I’m diving into something new! As I already finished the Jr. Pentester on TryHackMe, I actually asked myself why not diving into a…
⤷ Title: Exploitation of Grotesque 3
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #vulnhub_walkthrough #vulnhub
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:59 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #vulnhub_walkthrough #vulnhub
Medium
Exploitation of Grotesque 3
I started with host discovery using nmap and I I found the ip address at 192.168.1.106
⤷ Title: Exploitation of Hacksudo 1
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:22 GMT
════════════════════════
⌗ Tags: #walthrough #vulnhub_walkthrough #vulnhub
════════════════════════
𐀪 Author: Morontowumi Akinbogun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 21:17:22 GMT
════════════════════════
⌗ Tags: #walthrough #vulnhub_walkthrough #vulnhub
Medium
Exploitation of Hacksudo 1
I started with host discovery using nmap and I I found the ip address at 192.168.1.200
⤷ Title: Eyes on the Front: Iranian Threat Actors Weaponize IP Cameras in Middle East Conflict
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:29:52 +0000
════════════════════════
⌗ Tags: #Cyber Security #Vulnerability Report #Battle Damage Assessment #Check Point Research #Cyber Reconnaissance #cybersecurity #Dahua Security #Hikvision Vulnerabilities #IP cameras #Iranian Cyber Threat #Kinetic Warfare #Middle East Security
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:29:52 +0000
════════════════════════
⌗ Tags: #Cyber Security #Vulnerability Report #Battle Damage Assessment #Check Point Research #Cyber Reconnaissance #cybersecurity #Dahua Security #Hikvision Vulnerabilities #IP cameras #Iranian Cyber Threat #Kinetic Warfare #Middle East Security
Daily CyberSecurity
Eyes on the Front: Iranian Threat Actors Weaponize IP Cameras in Middle East Conflict
A new Check Point Research report reveals how Iranian-nexus threat actors compromise IP cameras in the Middle East for real-time missile reconnaissance.
⤷ Title: Stream Hijacked: Critical Zero-Click Command Injection Flaw Exposed in AVideo-Encoder
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:22:50 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AVideo_Encoder #Command Injection #CVE_2026_29058 #cybersecurity #infosec #Open Source Security #Patch Alert #unauthenticated RCE #Vulnerability #YouPHPTube
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:22:50 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AVideo_Encoder #Command Injection #CVE_2026_29058 #cybersecurity #infosec #Open Source Security #Patch Alert #unauthenticated RCE #Vulnerability #YouPHPTube
Daily CyberSecurity
Stream Hijacked: Critical Zero-Click Command Injection Flaw Exposed in AVideo-Encoder
A critical 9.8 CVSS flaw (CVE-2026-29058) in AVideo-Encoder allows unauthenticated remote attackers to execute arbitrary system commands. Patch now.
⤷ Title: Cracking the Cloud’s Crypto: Unauthenticated Bypass Flaws Found in Amazon’s AWS-LC Library
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:18:10 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Amazon Web Services #AWS_LC #Cloud Security #cryptography #CVE_2026_3336 #CVE_2026_3337 #CVE_2026_3338 #infosec #Patch Alert #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:18:10 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Amazon Web Services #AWS_LC #Cloud Security #cryptography #CVE_2026_3336 #CVE_2026_3337 #CVE_2026_3338 #infosec #Patch Alert #Vulnerability
Daily CyberSecurity
Cracking the Cloud's Crypto: Unauthenticated Bypass Flaws Found in Amazon's AWS-LC Library
Researchers discovered three major flaws in Amazon’s AWS-LC cryptographic library, allowing hackers to bypass digital signature validation. Update now.
⤷ Title: Signed Malware Masquerading as Workplace Apps Deploys Persistent Backdoors
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:13:17 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cybersecurity #EV Certificate Phishing #infosec #malware #MeshAgent #Microsoft Defender #RMM Backdoors #ScreenConnect #Tactical RMM #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:13:17 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cybersecurity #EV Certificate Phishing #infosec #malware #MeshAgent #Microsoft Defender #RMM Backdoors #ScreenConnect #Tactical RMM #threat intelligence
Daily CyberSecurity
Signed Malware Masquerading as Workplace Apps Deploys Persistent Backdoors
Microsoft Defender exposes a new phishing campaign using EV certificates and fake Teams invites to silently deploy RMM backdoors on corporate networks.
⤷ Title: Unmasking OCRFix: The New Russian Botnet Hiding its C2 Infrastructure in the Blockchain
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:07:58 +0000
════════════════════════
⌗ Tags: #Malware #Blockchain security #ClickFix #cybersecurity #EtherHiding #infosec #OCRFix Botnet #Russian Malware #smart contracts #threat intelligence #VBScript Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:07:58 +0000
════════════════════════
⌗ Tags: #Malware #Blockchain security #ClickFix #cybersecurity #EtherHiding #infosec #OCRFix Botnet #Russian Malware #smart contracts #threat intelligence #VBScript Malware
Daily CyberSecurity
Unmasking OCRFix: The New Russian Botnet Hiding its C2 Infrastructure in the Blockchain
Cybersecurity researchers uncover OCRFix, a Russian-linked botnet using EtherHiding and fake CAPTCHAs to mask its C2 servers in blockchain smart contracts.
⤷ Title: Malicious PHP Packages Found Hidden in Laravel Ecosystem
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:20 +0000
════════════════════════
⌗ Tags: #Malware #cybersecurity #infosec #lara_helper #Laravel Security #Packagist #PHP Development #rat #Remote Access Trojan #Socket Threat Research #supply chain attack
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:20 +0000
════════════════════════
⌗ Tags: #Malware #cybersecurity #infosec #lara_helper #Laravel Security #Packagist #PHP Development #rat #Remote Access Trojan #Socket Threat Research #supply chain attack
Daily CyberSecurity
Malicious PHP Packages Found Hidden in Laravel Ecosystem
Socket researchers uncover a Packagist supply chain attack where fake Laravel utility packages secretly install a persistent Remote Access Trojan (RAT).