⤷ Title: ChatGPT Exposed: OpenAI’s Sharing Feature Leaks Private Conversations to Google Search
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:45:01 +0000
════════════════════════
⌗ Tags: #Data Leak #AI #ChatGPT #data leak #google search #OpenAI #privacy #security incident #Sharing Feature #Social Media
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:45:01 +0000
════════════════════════
⌗ Tags: #Data Leak #AI #ChatGPT #data leak #google search #OpenAI #privacy #security incident #Sharing Feature #Social Media
Daily CyberSecurity
ChatGPT Exposed: OpenAI's Sharing Feature Leaks Private Conversations to Google Search
OpenAI has disabled a ChatGPT feature that leaked private conversations to Google Search after users unknowingly enabled indexing, exposing sensitive data and resumes.
⤷ Title: NVIDIA Ends Feature Support for GTX 7XX, 9XX, 10XX GPUs, Capping Driver Updates in October
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:37:23 +0000
════════════════════════
⌗ Tags: #Technology #Driver Support #end_of_life #gaming #GeForce #GPU #GTX 10XX #GTX 7XX #GTX 9XX #hardware #nvidia
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:37:23 +0000
════════════════════════
⌗ Tags: #Technology #Driver Support #end_of_life #gaming #GeForce #GPU #GTX 10XX #GTX 7XX #GTX 9XX #hardware #nvidia
Daily CyberSecurity
NVIDIA Ends Feature Support for GTX 7XX, 9XX, 10XX GPUs, Capping Driver Updates in October
NVIDIA will end feature and game optimization updates for Maxwell and Pascal GPUs (GTX 7XX, 9XX, 10XX series) in October, transitioning to security-only updates for three years.
⤷ Title: CoinDCX Engineer Arrested in $44M Crypto Heist: Moonlighting on Work Laptop Linked to Breach
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:31:41 +0000
════════════════════════
⌗ Tags: #Cybercriminals #CoinDCX #cryptocurrency #cyberattack #Employee Arrest #India #Keylogger #Moonlighting #Rahul Agarwal #security incident
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:31:41 +0000
════════════════════════
⌗ Tags: #Cybercriminals #CoinDCX #cryptocurrency #cyberattack #Employee Arrest #India #Keylogger #Moonlighting #Rahul Agarwal #security incident
Daily CyberSecurity
CoinDCX Engineer Arrested in $44M Crypto Heist: Moonlighting on Work Laptop Linked to Breach
A CoinDCX software engineer, Rahul Agarwal, has been arrested in connection with a $44M crypto heist after an internal probe linked the breach to his compromised work laptop.
⤷ Title: CISA Alert: Critical Flaw (CVE-2025-8286) in Güralp FMUS Seismic Devices Allows Unauthenticated Takeover, No Patch!
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:20:56 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA #Critical Infrastructure #CVE_2025_8286 #cybersecurity #Güralp FMUS #Seismic Monitoring #Telnet #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:20:56 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA #Critical Infrastructure #CVE_2025_8286 #cybersecurity #Güralp FMUS #Seismic Monitoring #Telnet #Vulnerability
Daily CyberSecurity
CISA Alert: Critical Flaw (CVE-2025-8286) in Güralp FMUS Seismic Devices Allows Unauthenticated Takeover, No Patch!
CISA issues an urgent advisory on CVE-2025-8286, a critical vulnerability in Güralp FMUS seismic devices exposing an unauthenticated Telnet interface that allows remote attackers to reconfigure, tamper with, or factory reset devices.
⤷ Title: The Trust Trap: Phishing Attacks Weaponize Security Tools by Abusing Proofpoint & Intermedia Link Wrapping
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:03:11 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cloudflare #cybersecurity #Email Security #Intermedia #Link Wrapping #Microsoft 365 #phishing #Proofpoint #Threat Report
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:03:11 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cloudflare #cybersecurity #Email Security #Intermedia #Link Wrapping #Microsoft 365 #phishing #Proofpoint #Threat Report
Daily CyberSecurity
The Trust Trap: Phishing Attacks Weaponize Security Tools by Abusing Proofpoint & Intermedia Link Wrapping
Cloudflare exposes a phishing campaign that abuses link wrapping services like Proofpoint and Intermedia, making malicious URLs appear legitimate to bypass security and trick users.
⤷ Title: From Innocent Messages to Total Takeover: How I Hacked a Professional Network!
════════════════════════
𐀪 Author: LordofHeaven
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:15:32 GMT
════════════════════════
⌗ Tags: #blind_xss #bug_bounty #hacking #account_takeover
════════════════════════
𐀪 Author: LordofHeaven
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:15:32 GMT
════════════════════════
⌗ Tags: #blind_xss #bug_bounty #hacking #account_takeover
Medium
💥 From Innocent Messages to Total Takeover: How I Hacked a Professional Network! 💻🔓
Let me take you on an exciting journey of how I uncovered a massive security flaw in a professional networking platform, similar to…
⤷ Title: Phishing via Swagger UI — Exploiting Misconfigurations for Fun & Bounties
════════════════════════
𐀪 Author: TSxNINJA
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:10:45 GMT
════════════════════════
⌗ Tags: #infosec #bounties #cybersecurity #swagger #bug_bounty
════════════════════════
𐀪 Author: TSxNINJA
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:10:45 GMT
════════════════════════
⌗ Tags: #infosec #bounties #cybersecurity #swagger #bug_bounty
Medium
Phishing via Swagger UI — Exploiting Misconfigurations for Fun & Bounties
जय श्री राम 🚩
⤷ Title: I Dropped Out to Learn Cybersecurity (Without a Degree) — And Landed Paid Work
════════════════════════
𐀪 Author: Satyam Pathania
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:09:50 GMT
════════════════════════
⌗ Tags: #bug_bounty #careers #cybersecurity #technology #infosec
════════════════════════
𐀪 Author: Satyam Pathania
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:09:50 GMT
════════════════════════
⌗ Tags: #bug_bounty #careers #cybersecurity #technology #infosec
Medium
I Dropped Out to Learn Cybersecurity (Without a Degree) — And Landed Paid Work
Here’s My 3-Year Self-Taught Journey
⤷ Title: CSRF in Disguise: How a Tracking Pixel Let Me Steal User Actions Like a Spy
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:08:08 GMT
════════════════════════
⌗ Tags: #infosec #money #bug_bounty #hacking #cybersecurity
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:08:08 GMT
════════════════════════
⌗ Tags: #infosec #money #bug_bounty #hacking #cybersecurity
Medium
📡 CSRF in Disguise: How a Tracking Pixel Let Me Steal User Actions Like a Spy 🚁🎯
Hey there!😁
⤷ Title: Stored DOM XSS: A Hidden Threat in Blog Comments
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:55 GMT
════════════════════════
⌗ Tags: #dom_based_xss #stored_xss #bug_bounty_tips #stored_dom_xss #bug_bounty
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:55 GMT
════════════════════════
⌗ Tags: #dom_based_xss #stored_xss #bug_bounty_tips #stored_dom_xss #bug_bounty
Medium
Stored DOM XSS: A Hidden Threat in Blog Comments
How a simple blog comment can hijack your web app. Stored DOM XSS combines the danger of persistent input with silent client-side…
⤷ Title: How I Hacked a $500 Bug Using Just an Email Field
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:49 GMT
════════════════════════
⌗ Tags: #bug_bounty #tech #hacking #passive_income #cybersecurity
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:49 GMT
════════════════════════
⌗ Tags: #bug_bounty #tech #hacking #passive_income #cybersecurity
Medium
How I Hacked a $500 Bug Using Just an Email Field
This beginner-friendly method took 15 minutes — no coding needed. Here’s exactly how I did it.
⤷ Title: Linktree Username Validation Bypass: A Hidden Threat with a Leading Space
════════════════════════
𐀪 Author: Yeswehack
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:26 GMT
════════════════════════
⌗ Tags: #google #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Yeswehack
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:26 GMT
════════════════════════
⌗ Tags: #google #bug_bounty #cybersecurity
Medium
Linktree Username Validation Bypass: A Hidden Threat with a Leading Space
By Aditya Sunny
Bug Bounty Hunter | Security Researcher | Ethical Hacker
📅 Reported: July 2025
🎯 Target: *.linktr.ee
Bug Bounty Hunter | Security Researcher | Ethical Hacker
📅 Reported: July 2025
🎯 Target: *.linktr.ee
⤷ Title: How a Small Open Redirect Flaw Became a $1000 rXSS Payday
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:13 GMT
════════════════════════
⌗ Tags: #tech #hacking #cybersecurity #programming #bug_bounty
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:13 GMT
════════════════════════
⌗ Tags: #tech #hacking #cybersecurity #programming #bug_bounty
Medium
How a Small Open Redirect Flaw Became a $1000 rXSS Payday
Most hackers ignore Open Redirects — but this one turned into a $1,000 payday. Here’s how.
⤷ Title: Learn about JWT if you want to Bypass Auth
════════════════════════
𐀪 Author: Mr Horbio
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:50 GMT
════════════════════════
⌗ Tags: #hacking #ethical_hacking #cybersecurity #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Mr Horbio
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:50 GMT
════════════════════════
⌗ Tags: #hacking #ethical_hacking #cybersecurity #penetration_testing #bug_bounty
Medium
Learn about JWT if you want to Bypass Auth
This article describe about JWT token. How JWT helps in authentication? and how to use JWT?
⤷ Title: Hacking Headless on Hack The Box: OSCP Prep
════════════════════════
𐀪 Author: enigma_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:09 GMT
════════════════════════
⌗ Tags: #ethical_hacking #oscp #penetration_testing #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: enigma_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:09 GMT
════════════════════════
⌗ Tags: #ethical_hacking #oscp #penetration_testing #bug_bounty #cybersecurity
Medium
Hacking Headless on Hack The Box: OSCP Prep
Recon, exploitation, privilege escalation.
⤷ Title: Reflected XSS in HTML Context with Most Tags and Attributes Blocked
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:46:44 GMT
════════════════════════
⌗ Tags: #xss_payload #bypass_waf_xss #bug_bounty #xss_attack #reflected_xss
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:46:44 GMT
════════════════════════
⌗ Tags: #xss_payload #bypass_waf_xss #bug_bounty #xss_attack #reflected_xss
Medium
Reflected XSS in HTML Context with Most Tags and Attributes Blocked
Discover how attackers exploit reflected XSS in restricted HTML contexts to bypass filters and trigger Javanoscript (print())execution.
⤷ Title: Secrets in GitHub Repos: How Hackers Find API Keys & Config Files
════════════════════════
𐀪 Author: Vipul Sonule
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:00:50 GMT
════════════════════════
⌗ Tags: #bug_bounty #ai #cybersecurity #hacking #programming
════════════════════════
𐀪 Author: Vipul Sonule
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:00:50 GMT
════════════════════════
⌗ Tags: #bug_bounty #ai #cybersecurity #hacking #programming
Medium
Secrets in GitHub Repos: How Hackers Find API Keys & Config Files 🔍
🚀 Introduction
⤷ Title: Recon in Minutes: Automating Subdomain Discovery for Penetration Tests
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:31:38 GMT
════════════════════════
⌗ Tags: #automation #penetration_testing #open_source #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:31:38 GMT
════════════════════════
⌗ Tags: #automation #penetration_testing #open_source #bug_bounty #cybersecurity
Medium
Recon in Minutes: Automating Subdomain Discovery for Penetration Tests
Time is a critical factor in penetration testing, so I have automated the use of several reconnaissance tools to efficiently gather…
⤷ Title: Password Security: “60 Million Pounds of Trouble” — Are You Next?
════════════════════════
𐀪 Author: CtrlC3
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:29:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #password_security #data_breach #hacking
════════════════════════
𐀪 Author: CtrlC3
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:29:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #password_security #data_breach #hacking
Medium
Password Security: “60 Million Pounds of Trouble” — Are You Next?
Okay, let’s talk about something that should scare you a little: password security. Or rather, the lack thereof. Imagine discovering that…
⤷ Title: Revenant: A Modern, Full-Stack Reverse Shell C2 Framework — From Payload Generation to Victim…
════════════════════════
𐀪 Author: Hack-Bat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:30:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #security #hacking #pentesting
════════════════════════
𐀪 Author: Hack-Bat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:30:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #security #hacking #pentesting
Medium
Revenant: A Modern, Full-Stack Reverse Shell C2 Framework — From Payload Generation to Victim session Management
A proof-of-concept that turns plain HTTP into a full-fledged C2 infrastructure, built entirely in C++.
⤷ Title: Master’s Degree vs. Certifications in Cybersecurity: Which Wins?
════════════════════════
𐀪 Author: Authlyn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:34 GMT
════════════════════════
⌗ Tags: #certification #infosec #cybersecurity #education #career_advice
════════════════════════
𐀪 Author: Authlyn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:34 GMT
════════════════════════
⌗ Tags: #certification #infosec #cybersecurity #education #career_advice
Medium
Master’s Degree vs. Certifications in Cybersecurity: Which Wins?
So, you want to break into cybersecurity, huh? Awesome choice! It’s a wild ride, but super rewarding. Now comes the big question: Do you…