⤷ Title: Stream Hijacked: Critical Zero-Click Command Injection Flaw Exposed in AVideo-Encoder
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:22:50 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AVideo_Encoder #Command Injection #CVE_2026_29058 #cybersecurity #infosec #Open Source Security #Patch Alert #unauthenticated RCE #Vulnerability #YouPHPTube
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:22:50 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #AVideo_Encoder #Command Injection #CVE_2026_29058 #cybersecurity #infosec #Open Source Security #Patch Alert #unauthenticated RCE #Vulnerability #YouPHPTube
Daily CyberSecurity
Stream Hijacked: Critical Zero-Click Command Injection Flaw Exposed in AVideo-Encoder
A critical 9.8 CVSS flaw (CVE-2026-29058) in AVideo-Encoder allows unauthenticated remote attackers to execute arbitrary system commands. Patch now.
⤷ Title: Cracking the Cloud’s Crypto: Unauthenticated Bypass Flaws Found in Amazon’s AWS-LC Library
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:18:10 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Amazon Web Services #AWS_LC #Cloud Security #cryptography #CVE_2026_3336 #CVE_2026_3337 #CVE_2026_3338 #infosec #Patch Alert #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:18:10 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Amazon Web Services #AWS_LC #Cloud Security #cryptography #CVE_2026_3336 #CVE_2026_3337 #CVE_2026_3338 #infosec #Patch Alert #Vulnerability
Daily CyberSecurity
Cracking the Cloud's Crypto: Unauthenticated Bypass Flaws Found in Amazon's AWS-LC Library
Researchers discovered three major flaws in Amazon’s AWS-LC cryptographic library, allowing hackers to bypass digital signature validation. Update now.
⤷ Title: Signed Malware Masquerading as Workplace Apps Deploys Persistent Backdoors
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:13:17 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cybersecurity #EV Certificate Phishing #infosec #malware #MeshAgent #Microsoft Defender #RMM Backdoors #ScreenConnect #Tactical RMM #threat intelligence
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:13:17 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cybersecurity #EV Certificate Phishing #infosec #malware #MeshAgent #Microsoft Defender #RMM Backdoors #ScreenConnect #Tactical RMM #threat intelligence
Daily CyberSecurity
Signed Malware Masquerading as Workplace Apps Deploys Persistent Backdoors
Microsoft Defender exposes a new phishing campaign using EV certificates and fake Teams invites to silently deploy RMM backdoors on corporate networks.
⤷ Title: Unmasking OCRFix: The New Russian Botnet Hiding its C2 Infrastructure in the Blockchain
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:07:58 +0000
════════════════════════
⌗ Tags: #Malware #Blockchain security #ClickFix #cybersecurity #EtherHiding #infosec #OCRFix Botnet #Russian Malware #smart contracts #threat intelligence #VBScript Malware
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:07:58 +0000
════════════════════════
⌗ Tags: #Malware #Blockchain security #ClickFix #cybersecurity #EtherHiding #infosec #OCRFix Botnet #Russian Malware #smart contracts #threat intelligence #VBScript Malware
Daily CyberSecurity
Unmasking OCRFix: The New Russian Botnet Hiding its C2 Infrastructure in the Blockchain
Cybersecurity researchers uncover OCRFix, a Russian-linked botnet using EtherHiding and fake CAPTCHAs to mask its C2 servers in blockchain smart contracts.
⤷ Title: Malicious PHP Packages Found Hidden in Laravel Ecosystem
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:20 +0000
════════════════════════
⌗ Tags: #Malware #cybersecurity #infosec #lara_helper #Laravel Security #Packagist #PHP Development #rat #Remote Access Trojan #Socket Threat Research #supply chain attack
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:20 +0000
════════════════════════
⌗ Tags: #Malware #cybersecurity #infosec #lara_helper #Laravel Security #Packagist #PHP Development #rat #Remote Access Trojan #Socket Threat Research #supply chain attack
Daily CyberSecurity
Malicious PHP Packages Found Hidden in Laravel Ecosystem
Socket researchers uncover a Packagist supply chain attack where fake Laravel utility packages secretly install a persistent Remote Access Trojan (RAT).
⤷ Title: Guía de XSS Fundamentals: Vulnerabilidades, Payloads y Bypass de WAF/CSP
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #xss_attack #hacking #technology
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #xss_attack #hacking #technology
Medium
Guía de XSS Fundamentals: Vulnerabilidades, Payloads y Bypass de WAF/CSP
Domina el Cross-site noscripting: estrategias de inyección, vectores de ataque, evasión de WAF y técnicas avanzadas de bypass CSP.
⤷ Title: SSO Misconfiguration Leading to Privilege Escalation Lead to Full Organization Takeover + SSO Email…
════════════════════════
𐀪 Author: ali alhassoun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:41:29 GMT
════════════════════════
⌗ Tags: #sso #privilege_escalation #bug_bounty #cybersecurity #account_takeover
════════════════════════
𐀪 Author: ali alhassoun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:41:29 GMT
════════════════════════
⌗ Tags: #sso #privilege_escalation #bug_bounty #cybersecurity #account_takeover
Medium
SSO Misconfiguration Leading to Privilege Escalation Lead to Full Organization Takeover + SSO Email…
⤷ Title: Malware Development with NIM — InfoStealers 101
════════════════════════
𐀪 Author: Edgar Huemac Sanchez Hernandez
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:49:46 GMT
════════════════════════
⌗ Tags: #coding #hacking #cybersecurity #malware #software_development
════════════════════════
𐀪 Author: Edgar Huemac Sanchez Hernandez
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:49:46 GMT
════════════════════════
⌗ Tags: #coding #hacking #cybersecurity #malware #software_development
Medium
Malware Development with NIM — InfoStealers 101
Hi there! Nice to see you again. Let’s get to it; we’ve been dancing around fun maldev things & concepts for a few blogs now, mostly theory…
⤷ Title: Wenn gute Hacker ins Gefängnis kommen: Die paradoxe Realität der Cybersecurity in Berlin
════════════════════════
𐀪 Author: Fatihbadem
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:11:49 GMT
════════════════════════
⌗ Tags: #hacking #pentesting
════════════════════════
𐀪 Author: Fatihbadem
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:11:49 GMT
════════════════════════
⌗ Tags: #hacking #pentesting
Medium
Wenn gute Hacker ins Gefängnis kommen: Die paradoxe Realität der Cybersecurity in Berlin
Berlin ist eine Stadt der Hacker. Nicht nur im kriminellen Sinne — sondern auch im positiven. Seit Jahrzehnten gilt die Hauptstadt als…
⤷ Title: Burp Suite : The Beginners Guide
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:49:36 GMT
════════════════════════
⌗ Tags: #linux #linux_tutorial #burpsuite #ethical_hacking
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:49:36 GMT
════════════════════════
⌗ Tags: #linux #linux_tutorial #burpsuite #ethical_hacking
Medium
Burp Suite : The Beginners Guide
What is Burp Suite?
⤷ Title: What is Metasploit | The Beginner’s Guide
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:34:32 GMT
════════════════════════
⌗ Tags: #kali_linux #linux #ethical_hacking #metasploit
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:34:32 GMT
════════════════════════
⌗ Tags: #kali_linux #linux #ethical_hacking #metasploit
Medium
What is Metasploit | The Beginner’s Guide
Introduction :
⤷ Title: Server Side Template Injection (SSTI ) Got Exploited
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:46:00 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #ssti_vulnerability #ethical_hacking #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:46:00 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #ssti_vulnerability #ethical_hacking #cybersecurity #bug_bounty
Medium
Server Side Template Injection (SSTI ) Got Exploited
What is Server Side Template Injection?
⤷ Title: Analisis Malware Android: Penyamaran PT POS Indonesia sebagai SMS Stealer.
════════════════════════
𐀪 Author: Damiereee
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:52:55 GMT
════════════════════════
⌗ Tags: #bug_bounty #android_pentesting #infosec #malware_analysis #cybersecurity
════════════════════════
𐀪 Author: Damiereee
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:52:55 GMT
════════════════════════
⌗ Tags: #bug_bounty #android_pentesting #infosec #malware_analysis #cybersecurity
Medium
Analisis Malware Android: Penyamaran PT POS Indonesia sebagai SMS Stealer.
Oleh: Damiereee Collaborative Research with Gemini AI
⤷ Title: How I Found a “Zombie Bug” That Refused to Die: A Lesson in Logic Flaws
════════════════════════
𐀪 Author: Abdelkafi Habbeddine
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:25:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Abdelkafi Habbeddine
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:25:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty
Medium
How I Found a “Zombie Bug” That Refused to Die: A Lesson in Logic Flaws
In the world of Bug Bounty, the most dangerous moment isn’t when you find a vulnerability — it’s when the organization tells you they’ve…
⤷ Title: HackMyVM: Skid Walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:27:12 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ctf #hacking #hackmyvm #ctf_walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:27:12 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ctf #hacking #hackmyvm #ctf_walkthrough
Medium
HackMyVM: Skid Walkthrough
Recon and Enum
⤷ Title: From Zero to RF Security Engineer
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:14:35 GMT
════════════════════════
⌗ Tags: #radio #programming #rf_security #hacking
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:14:35 GMT
════════════════════════
⌗ Tags: #radio #programming #rf_security #hacking
Medium
From Zero to RF Security Engineer
My Learning Path into Software-Defined Radio, Spectrum Analysis, and Wireless Pentesting
⤷ Title: How Hackers Break Into Companies Without Cracking a Single Password
════════════════════════
𐀪 Author: Armansyah hakim
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:08:51 GMT
════════════════════════
⌗ Tags: #hacking #data_security #cybersecurity #social_engineering #information_security
════════════════════════
𐀪 Author: Armansyah hakim
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:08:51 GMT
════════════════════════
⌗ Tags: #hacking #data_security #cybersecurity #social_engineering #information_security
Medium
How Hackers Break Into Companies Without Cracking a Single Password
The uncomfortable truth about modern cyberattacks (and why most companies never see it coming)
⤷ Title: Unmasking the Shadows: A Global Hunt for PlugX Staging Infrastructure
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:38:27 +0000
════════════════════════
⌗ Tags: #Malware #C2 Procurement #Cloudflare Evasion #cybersecurity #Expired Domains #infosec #Mustang Panda #PlugX #RedDelta #threat intelligence #UNC6384
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:38:27 +0000
════════════════════════
⌗ Tags: #Malware #C2 Procurement #Cloudflare Evasion #cybersecurity #Expired Domains #infosec #Mustang Panda #PlugX #RedDelta #threat intelligence #UNC6384
Daily CyberSecurity
Unmasking the Shadows: A Global Hunt for PlugX Staging Infrastructure
Researcher @goyaramen reveals how PRC threat actors like Mustang Panda use expired domains and Cloudflare to mask their PlugX C2 infrastructure.
⤷ Title: Unmasking Genisys: The AI-Powered Ad Fraud Scheme Silently Hijacking Your Smartphone
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:27:42 +0000
════════════════════════
⌗ Tags: #Malware #AI Fraud #App Spoofing #cybersecurity #digital advertising #Genisys #Google Play Protect #IAS Threat Lab #infosec #malware #Mobile Ad Fraud
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:27:42 +0000
════════════════════════
⌗ Tags: #Malware #AI Fraud #App Spoofing #cybersecurity #digital advertising #Genisys #Google Play Protect #IAS Threat Lab #infosec #malware #Mobile Ad Fraud
Daily CyberSecurity
Unmasking Genisys: The AI-Powered Ad Fraud Scheme Silently Hijacking Your Smartphone
IAS Threat Lab unmasks Genisys, a massive AI-powered mobile ad fraud scheme hijacking smartphones to generate fake traffic and steal from advertisers.
⤷ Title: Exposed in Plain Sight: Critical Privacy Flaw Defeats Viber’s Anti-Censorship ‘Cloak’ Mode
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:14:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Censorship Bypass #Cloak Mode #CVE_2025_13476 #cybersecurity #DPI Evasion #infosec #Patch Alert #Privacy Flaw #Rakuten Viber #TLS Fingerprinting
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:14:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Censorship Bypass #Cloak Mode #CVE_2025_13476 #cybersecurity #DPI Evasion #infosec #Patch Alert #Privacy Flaw #Rakuten Viber #TLS Fingerprinting
Daily CyberSecurity
Exposed in Plain Sight: Critical Privacy Flaw Defeats Viber's Anti-Censorship 'Cloak' Mode
CERT/CC reveals a major privacy flaw (CVE-2025-13476) in Viber's Cloak mode, allowing network censors to easily identify and block proxy traffic. Update now.
⤷ Title: OpenAI Unveils GPT-5.4: The “Professional” Frontier with Native Computer Control and 1M Token Context
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:19:50 +0000
════════════════════════
⌗ Tags: #Technology #AI Agents #API pricing #Computer_Use AI #Context Window #GPT_5.4 #GPT_5.4 Pro #OpenAI #OSWorld #presentation generation #spreadsheet modeling #Tech News 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:19:50 +0000
════════════════════════
⌗ Tags: #Technology #AI Agents #API pricing #Computer_Use AI #Context Window #GPT_5.4 #GPT_5.4 Pro #OpenAI #OSWorld #presentation generation #spreadsheet modeling #Tech News 2026
Daily CyberSecurity
OpenAI Unveils GPT-5.4: The "Professional" Frontier with Native Computer Control and 1M Token Context
OpenAI launches GPT-5.4, featuring native computer control that beats human benchmarks and a 1M token context window. See the new "Professional" AI in action.