⤷ Title: Malicious PHP Packages Found Hidden in Laravel Ecosystem
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:20 +0000
════════════════════════
⌗ Tags: #Malware #cybersecurity #infosec #lara_helper #Laravel Security #Packagist #PHP Development #rat #Remote Access Trojan #Socket Threat Research #supply chain attack
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:20 +0000
════════════════════════
⌗ Tags: #Malware #cybersecurity #infosec #lara_helper #Laravel Security #Packagist #PHP Development #rat #Remote Access Trojan #Socket Threat Research #supply chain attack
Daily CyberSecurity
Malicious PHP Packages Found Hidden in Laravel Ecosystem
Socket researchers uncover a Packagist supply chain attack where fake Laravel utility packages secretly install a persistent Remote Access Trojan (RAT).
⤷ Title: Guía de XSS Fundamentals: Vulnerabilidades, Payloads y Bypass de WAF/CSP
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #xss_attack #hacking #technology
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #xss_attack #hacking #technology
Medium
Guía de XSS Fundamentals: Vulnerabilidades, Payloads y Bypass de WAF/CSP
Domina el Cross-site noscripting: estrategias de inyección, vectores de ataque, evasión de WAF y técnicas avanzadas de bypass CSP.
⤷ Title: SSO Misconfiguration Leading to Privilege Escalation Lead to Full Organization Takeover + SSO Email…
════════════════════════
𐀪 Author: ali alhassoun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:41:29 GMT
════════════════════════
⌗ Tags: #sso #privilege_escalation #bug_bounty #cybersecurity #account_takeover
════════════════════════
𐀪 Author: ali alhassoun
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:41:29 GMT
════════════════════════
⌗ Tags: #sso #privilege_escalation #bug_bounty #cybersecurity #account_takeover
Medium
SSO Misconfiguration Leading to Privilege Escalation Lead to Full Organization Takeover + SSO Email…
⤷ Title: Malware Development with NIM — InfoStealers 101
════════════════════════
𐀪 Author: Edgar Huemac Sanchez Hernandez
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:49:46 GMT
════════════════════════
⌗ Tags: #coding #hacking #cybersecurity #malware #software_development
════════════════════════
𐀪 Author: Edgar Huemac Sanchez Hernandez
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 00:49:46 GMT
════════════════════════
⌗ Tags: #coding #hacking #cybersecurity #malware #software_development
Medium
Malware Development with NIM — InfoStealers 101
Hi there! Nice to see you again. Let’s get to it; we’ve been dancing around fun maldev things & concepts for a few blogs now, mostly theory…
⤷ Title: Wenn gute Hacker ins Gefängnis kommen: Die paradoxe Realität der Cybersecurity in Berlin
════════════════════════
𐀪 Author: Fatihbadem
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:11:49 GMT
════════════════════════
⌗ Tags: #hacking #pentesting
════════════════════════
𐀪 Author: Fatihbadem
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:11:49 GMT
════════════════════════
⌗ Tags: #hacking #pentesting
Medium
Wenn gute Hacker ins Gefängnis kommen: Die paradoxe Realität der Cybersecurity in Berlin
Berlin ist eine Stadt der Hacker. Nicht nur im kriminellen Sinne — sondern auch im positiven. Seit Jahrzehnten gilt die Hauptstadt als…
⤷ Title: Burp Suite : The Beginners Guide
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:49:36 GMT
════════════════════════
⌗ Tags: #linux #linux_tutorial #burpsuite #ethical_hacking
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:49:36 GMT
════════════════════════
⌗ Tags: #linux #linux_tutorial #burpsuite #ethical_hacking
Medium
Burp Suite : The Beginners Guide
What is Burp Suite?
⤷ Title: What is Metasploit | The Beginner’s Guide
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:34:32 GMT
════════════════════════
⌗ Tags: #kali_linux #linux #ethical_hacking #metasploit
════════════════════════
𐀪 Author: Ahm3d_Sec
════════════════════════
ⴵ Time: Thu, 05 Mar 2026 23:34:32 GMT
════════════════════════
⌗ Tags: #kali_linux #linux #ethical_hacking #metasploit
Medium
What is Metasploit | The Beginner’s Guide
Introduction :
⤷ Title: Server Side Template Injection (SSTI ) Got Exploited
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:46:00 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #ssti_vulnerability #ethical_hacking #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: MainEkHacker
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:46:00 GMT
════════════════════════
⌗ Tags: #bugbounty_writeup #ssti_vulnerability #ethical_hacking #cybersecurity #bug_bounty
Medium
Server Side Template Injection (SSTI ) Got Exploited
What is Server Side Template Injection?
⤷ Title: Analisis Malware Android: Penyamaran PT POS Indonesia sebagai SMS Stealer.
════════════════════════
𐀪 Author: Damiereee
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:52:55 GMT
════════════════════════
⌗ Tags: #bug_bounty #android_pentesting #infosec #malware_analysis #cybersecurity
════════════════════════
𐀪 Author: Damiereee
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:52:55 GMT
════════════════════════
⌗ Tags: #bug_bounty #android_pentesting #infosec #malware_analysis #cybersecurity
Medium
Analisis Malware Android: Penyamaran PT POS Indonesia sebagai SMS Stealer.
Oleh: Damiereee Collaborative Research with Gemini AI
⤷ Title: How I Found a “Zombie Bug” That Refused to Die: A Lesson in Logic Flaws
════════════════════════
𐀪 Author: Abdelkafi Habbeddine
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:25:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Abdelkafi Habbeddine
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:25:36 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty
Medium
How I Found a “Zombie Bug” That Refused to Die: A Lesson in Logic Flaws
In the world of Bug Bounty, the most dangerous moment isn’t when you find a vulnerability — it’s when the organization tells you they’ve…
⤷ Title: HackMyVM: Skid Walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:27:12 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ctf #hacking #hackmyvm #ctf_walkthrough
════════════════════════
𐀪 Author: Antonio
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:27:12 GMT
════════════════════════
⌗ Tags: #ctf_writeup #ctf #hacking #hackmyvm #ctf_walkthrough
Medium
HackMyVM: Skid Walkthrough
Recon and Enum
⤷ Title: From Zero to RF Security Engineer
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:14:35 GMT
════════════════════════
⌗ Tags: #radio #programming #rf_security #hacking
════════════════════════
𐀪 Author: Michael Preston
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:14:35 GMT
════════════════════════
⌗ Tags: #radio #programming #rf_security #hacking
Medium
From Zero to RF Security Engineer
My Learning Path into Software-Defined Radio, Spectrum Analysis, and Wireless Pentesting
⤷ Title: How Hackers Break Into Companies Without Cracking a Single Password
════════════════════════
𐀪 Author: Armansyah hakim
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:08:51 GMT
════════════════════════
⌗ Tags: #hacking #data_security #cybersecurity #social_engineering #information_security
════════════════════════
𐀪 Author: Armansyah hakim
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:08:51 GMT
════════════════════════
⌗ Tags: #hacking #data_security #cybersecurity #social_engineering #information_security
Medium
How Hackers Break Into Companies Without Cracking a Single Password
The uncomfortable truth about modern cyberattacks (and why most companies never see it coming)
⤷ Title: Unmasking the Shadows: A Global Hunt for PlugX Staging Infrastructure
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:38:27 +0000
════════════════════════
⌗ Tags: #Malware #C2 Procurement #Cloudflare Evasion #cybersecurity #Expired Domains #infosec #Mustang Panda #PlugX #RedDelta #threat intelligence #UNC6384
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:38:27 +0000
════════════════════════
⌗ Tags: #Malware #C2 Procurement #Cloudflare Evasion #cybersecurity #Expired Domains #infosec #Mustang Panda #PlugX #RedDelta #threat intelligence #UNC6384
Daily CyberSecurity
Unmasking the Shadows: A Global Hunt for PlugX Staging Infrastructure
Researcher @goyaramen reveals how PRC threat actors like Mustang Panda use expired domains and Cloudflare to mask their PlugX C2 infrastructure.
⤷ Title: Unmasking Genisys: The AI-Powered Ad Fraud Scheme Silently Hijacking Your Smartphone
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:27:42 +0000
════════════════════════
⌗ Tags: #Malware #AI Fraud #App Spoofing #cybersecurity #digital advertising #Genisys #Google Play Protect #IAS Threat Lab #infosec #malware #Mobile Ad Fraud
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:27:42 +0000
════════════════════════
⌗ Tags: #Malware #AI Fraud #App Spoofing #cybersecurity #digital advertising #Genisys #Google Play Protect #IAS Threat Lab #infosec #malware #Mobile Ad Fraud
Daily CyberSecurity
Unmasking Genisys: The AI-Powered Ad Fraud Scheme Silently Hijacking Your Smartphone
IAS Threat Lab unmasks Genisys, a massive AI-powered mobile ad fraud scheme hijacking smartphones to generate fake traffic and steal from advertisers.
⤷ Title: Exposed in Plain Sight: Critical Privacy Flaw Defeats Viber’s Anti-Censorship ‘Cloak’ Mode
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:14:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Censorship Bypass #Cloak Mode #CVE_2025_13476 #cybersecurity #DPI Evasion #infosec #Patch Alert #Privacy Flaw #Rakuten Viber #TLS Fingerprinting
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 03:14:15 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Censorship Bypass #Cloak Mode #CVE_2025_13476 #cybersecurity #DPI Evasion #infosec #Patch Alert #Privacy Flaw #Rakuten Viber #TLS Fingerprinting
Daily CyberSecurity
Exposed in Plain Sight: Critical Privacy Flaw Defeats Viber's Anti-Censorship 'Cloak' Mode
CERT/CC reveals a major privacy flaw (CVE-2025-13476) in Viber's Cloak mode, allowing network censors to easily identify and block proxy traffic. Update now.
⤷ Title: OpenAI Unveils GPT-5.4: The “Professional” Frontier with Native Computer Control and 1M Token Context
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:19:50 +0000
════════════════════════
⌗ Tags: #Technology #AI Agents #API pricing #Computer_Use AI #Context Window #GPT_5.4 #GPT_5.4 Pro #OpenAI #OSWorld #presentation generation #spreadsheet modeling #Tech News 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 02:19:50 +0000
════════════════════════
⌗ Tags: #Technology #AI Agents #API pricing #Computer_Use AI #Context Window #GPT_5.4 #GPT_5.4 Pro #OpenAI #OSWorld #presentation generation #spreadsheet modeling #Tech News 2026
Daily CyberSecurity
OpenAI Unveils GPT-5.4: The "Professional" Frontier with Native Computer Control and 1M Token Context
OpenAI launches GPT-5.4, featuring native computer control that beats human benchmarks and a 1M token context window. See the new "Professional" AI in action.
⤷ Title: Sovereign & AI-Native: Broadcom’s VMware Telco Cloud Platform 9 Rewrites the TCO Rulebook at MWC 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:56:46 +0000
════════════════════════
⌗ Tags: #Technology #5G Core #AI_native #Broadcom #GPU virtualization #MWC 2026 #NVMe Memory Tiering #Sovereign Cloud #TCO reduction #Tech News 2026 #Telco Cloud Platform 9 #vmware #vSAN ESA
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:56:46 +0000
════════════════════════
⌗ Tags: #Technology #5G Core #AI_native #Broadcom #GPU virtualization #MWC 2026 #NVMe Memory Tiering #Sovereign Cloud #TCO reduction #Tech News 2026 #Telco Cloud Platform 9 #vmware #vSAN ESA
Daily CyberSecurity
Sovereign & AI-Native: Broadcom’s VMware Telco Cloud Platform 9 Rewrites the TCO Rulebook at MWC 2026
Broadcom unveils VMware Telco Cloud Platform 9 at MWC 2026, promising a 40% TCO reduction through AI-native architecture and sovereign cloud-ready infrastructure.
⤷ Title: The iPhone’s Shadow: Why the MacBook Neo is Trapped with 8GB of RAM and a Single Chip
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:51:55 +0000
════════════════════════
⌗ Tags: #Technology #8GB memory #A18 Pro #Apple #entry_level MacBook #iPhone 16 Pro #laptop hardware #MacBook Neo #RAM limits #Tech News 2026 #TSMC InFO_POP
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:51:55 +0000
════════════════════════
⌗ Tags: #Technology #8GB memory #A18 Pro #Apple #entry_level MacBook #iPhone 16 Pro #laptop hardware #MacBook Neo #RAM limits #Tech News 2026 #TSMC InFO_POP
Daily CyberSecurity
The iPhone's Shadow: Why the MacBook Neo is Trapped with 8GB of RAM and a Single Chip
Discover why Apple's new MacBook Neo is stuck with 8GB of RAM. We dive into the A18 Pro chip constraints and the trade-offs of this $599 ultra-entry laptop.
⤷ Title: The Cart is Empty: Why OpenAI is Abandoning In-App Shopping to Become an “AI Discovery Engine”
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:41:07 +0000
════════════════════════
⌗ Tags: #Technology #AI Shopping #Amazon #ChatGPT #digital advertising #e_commerce #google search #monetization strategy #OpenAI #product discovery #Shopify #Tech News 2026
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 01:41:07 +0000
════════════════════════
⌗ Tags: #Technology #AI Shopping #Amazon #ChatGPT #digital advertising #e_commerce #google search #monetization strategy #OpenAI #product discovery #Shopify #Tech News 2026
Daily CyberSecurity
The Cart is Empty: Why OpenAI is Abandoning In-App Shopping to Become an "AI Discovery Engine"
OpenAI is pulling the plug on ChatGPT's native checkout. Discover why the "Amazon killer" is pivoting to an ad-based discovery model after a Shopify slump.
⤷ Title: Bypassing Rate Limits via Race Conditions
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 04:04:28 GMT
════════════════════════
⌗ Tags: #bug_bounty #brute_force_login #brute_force #race_condition #bypassing_rate_limit
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 06 Mar 2026 04:04:28 GMT
════════════════════════
⌗ Tags: #bug_bounty #brute_force_login #brute_force #race_condition #bypassing_rate_limit
Medium
Bypassing Rate Limits via Race Conditions
How Race Conditions Quietly Break Login Rate Limits.