⤷ Title: CISA Alert: Critical Flaw (CVE-2025-8286) in Güralp FMUS Seismic Devices Allows Unauthenticated Takeover, No Patch!
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:20:56 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA #Critical Infrastructure #CVE_2025_8286 #cybersecurity #Güralp FMUS #Seismic Monitoring #Telnet #Vulnerability
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:20:56 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #CISA #Critical Infrastructure #CVE_2025_8286 #cybersecurity #Güralp FMUS #Seismic Monitoring #Telnet #Vulnerability
Daily CyberSecurity
CISA Alert: Critical Flaw (CVE-2025-8286) in Güralp FMUS Seismic Devices Allows Unauthenticated Takeover, No Patch!
CISA issues an urgent advisory on CVE-2025-8286, a critical vulnerability in Güralp FMUS seismic devices exposing an unauthenticated Telnet interface that allows remote attackers to reconfigure, tamper with, or factory reset devices.
⤷ Title: The Trust Trap: Phishing Attacks Weaponize Security Tools by Abusing Proofpoint & Intermedia Link Wrapping
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:03:11 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cloudflare #cybersecurity #Email Security #Intermedia #Link Wrapping #Microsoft 365 #phishing #Proofpoint #Threat Report
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:03:11 +0000
════════════════════════
⌗ Tags: #Cybercriminals #cloudflare #cybersecurity #Email Security #Intermedia #Link Wrapping #Microsoft 365 #phishing #Proofpoint #Threat Report
Daily CyberSecurity
The Trust Trap: Phishing Attacks Weaponize Security Tools by Abusing Proofpoint & Intermedia Link Wrapping
Cloudflare exposes a phishing campaign that abuses link wrapping services like Proofpoint and Intermedia, making malicious URLs appear legitimate to bypass security and trick users.
⤷ Title: From Innocent Messages to Total Takeover: How I Hacked a Professional Network!
════════════════════════
𐀪 Author: LordofHeaven
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:15:32 GMT
════════════════════════
⌗ Tags: #blind_xss #bug_bounty #hacking #account_takeover
════════════════════════
𐀪 Author: LordofHeaven
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:15:32 GMT
════════════════════════
⌗ Tags: #blind_xss #bug_bounty #hacking #account_takeover
Medium
💥 From Innocent Messages to Total Takeover: How I Hacked a Professional Network! 💻🔓
Let me take you on an exciting journey of how I uncovered a massive security flaw in a professional networking platform, similar to…
⤷ Title: Phishing via Swagger UI — Exploiting Misconfigurations for Fun & Bounties
════════════════════════
𐀪 Author: TSxNINJA
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:10:45 GMT
════════════════════════
⌗ Tags: #infosec #bounties #cybersecurity #swagger #bug_bounty
════════════════════════
𐀪 Author: TSxNINJA
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:10:45 GMT
════════════════════════
⌗ Tags: #infosec #bounties #cybersecurity #swagger #bug_bounty
Medium
Phishing via Swagger UI — Exploiting Misconfigurations for Fun & Bounties
जय श्री राम 🚩
⤷ Title: I Dropped Out to Learn Cybersecurity (Without a Degree) — And Landed Paid Work
════════════════════════
𐀪 Author: Satyam Pathania
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:09:50 GMT
════════════════════════
⌗ Tags: #bug_bounty #careers #cybersecurity #technology #infosec
════════════════════════
𐀪 Author: Satyam Pathania
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:09:50 GMT
════════════════════════
⌗ Tags: #bug_bounty #careers #cybersecurity #technology #infosec
Medium
I Dropped Out to Learn Cybersecurity (Without a Degree) — And Landed Paid Work
Here’s My 3-Year Self-Taught Journey
⤷ Title: CSRF in Disguise: How a Tracking Pixel Let Me Steal User Actions Like a Spy
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:08:08 GMT
════════════════════════
⌗ Tags: #infosec #money #bug_bounty #hacking #cybersecurity
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:08:08 GMT
════════════════════════
⌗ Tags: #infosec #money #bug_bounty #hacking #cybersecurity
Medium
📡 CSRF in Disguise: How a Tracking Pixel Let Me Steal User Actions Like a Spy 🚁🎯
Hey there!😁
⤷ Title: Stored DOM XSS: A Hidden Threat in Blog Comments
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:55 GMT
════════════════════════
⌗ Tags: #dom_based_xss #stored_xss #bug_bounty_tips #stored_dom_xss #bug_bounty
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:55 GMT
════════════════════════
⌗ Tags: #dom_based_xss #stored_xss #bug_bounty_tips #stored_dom_xss #bug_bounty
Medium
Stored DOM XSS: A Hidden Threat in Blog Comments
How a simple blog comment can hijack your web app. Stored DOM XSS combines the danger of persistent input with silent client-side…
⤷ Title: How I Hacked a $500 Bug Using Just an Email Field
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:49 GMT
════════════════════════
⌗ Tags: #bug_bounty #tech #hacking #passive_income #cybersecurity
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:49 GMT
════════════════════════
⌗ Tags: #bug_bounty #tech #hacking #passive_income #cybersecurity
Medium
How I Hacked a $500 Bug Using Just an Email Field
This beginner-friendly method took 15 minutes — no coding needed. Here’s exactly how I did it.
⤷ Title: Linktree Username Validation Bypass: A Hidden Threat with a Leading Space
════════════════════════
𐀪 Author: Yeswehack
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:26 GMT
════════════════════════
⌗ Tags: #google #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: Yeswehack
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:26 GMT
════════════════════════
⌗ Tags: #google #bug_bounty #cybersecurity
Medium
Linktree Username Validation Bypass: A Hidden Threat with a Leading Space
By Aditya Sunny
Bug Bounty Hunter | Security Researcher | Ethical Hacker
📅 Reported: July 2025
🎯 Target: *.linktr.ee
Bug Bounty Hunter | Security Researcher | Ethical Hacker
📅 Reported: July 2025
🎯 Target: *.linktr.ee
⤷ Title: How a Small Open Redirect Flaw Became a $1000 rXSS Payday
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:13 GMT
════════════════════════
⌗ Tags: #tech #hacking #cybersecurity #programming #bug_bounty
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:07:13 GMT
════════════════════════
⌗ Tags: #tech #hacking #cybersecurity #programming #bug_bounty
Medium
How a Small Open Redirect Flaw Became a $1000 rXSS Payday
Most hackers ignore Open Redirects — but this one turned into a $1,000 payday. Here’s how.
⤷ Title: Learn about JWT if you want to Bypass Auth
════════════════════════
𐀪 Author: Mr Horbio
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:50 GMT
════════════════════════
⌗ Tags: #hacking #ethical_hacking #cybersecurity #penetration_testing #bug_bounty
════════════════════════
𐀪 Author: Mr Horbio
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:50 GMT
════════════════════════
⌗ Tags: #hacking #ethical_hacking #cybersecurity #penetration_testing #bug_bounty
Medium
Learn about JWT if you want to Bypass Auth
This article describe about JWT token. How JWT helps in authentication? and how to use JWT?
⤷ Title: Hacking Headless on Hack The Box: OSCP Prep
════════════════════════
𐀪 Author: enigma_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:09 GMT
════════════════════════
⌗ Tags: #ethical_hacking #oscp #penetration_testing #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: enigma_
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:04:09 GMT
════════════════════════
⌗ Tags: #ethical_hacking #oscp #penetration_testing #bug_bounty #cybersecurity
Medium
Hacking Headless on Hack The Box: OSCP Prep
Recon, exploitation, privilege escalation.
⤷ Title: Reflected XSS in HTML Context with Most Tags and Attributes Blocked
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:46:44 GMT
════════════════════════
⌗ Tags: #xss_payload #bypass_waf_xss #bug_bounty #xss_attack #reflected_xss
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:46:44 GMT
════════════════════════
⌗ Tags: #xss_payload #bypass_waf_xss #bug_bounty #xss_attack #reflected_xss
Medium
Reflected XSS in HTML Context with Most Tags and Attributes Blocked
Discover how attackers exploit reflected XSS in restricted HTML contexts to bypass filters and trigger Javanoscript (print())execution.
⤷ Title: Secrets in GitHub Repos: How Hackers Find API Keys & Config Files
════════════════════════
𐀪 Author: Vipul Sonule
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:00:50 GMT
════════════════════════
⌗ Tags: #bug_bounty #ai #cybersecurity #hacking #programming
════════════════════════
𐀪 Author: Vipul Sonule
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:00:50 GMT
════════════════════════
⌗ Tags: #bug_bounty #ai #cybersecurity #hacking #programming
Medium
Secrets in GitHub Repos: How Hackers Find API Keys & Config Files 🔍
🚀 Introduction
⤷ Title: Recon in Minutes: Automating Subdomain Discovery for Penetration Tests
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:31:38 GMT
════════════════════════
⌗ Tags: #automation #penetration_testing #open_source #bug_bounty #cybersecurity
════════════════════════
𐀪 Author: mattyerz
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:31:38 GMT
════════════════════════
⌗ Tags: #automation #penetration_testing #open_source #bug_bounty #cybersecurity
Medium
Recon in Minutes: Automating Subdomain Discovery for Penetration Tests
Time is a critical factor in penetration testing, so I have automated the use of several reconnaissance tools to efficiently gather…
⤷ Title: Password Security: “60 Million Pounds of Trouble” — Are You Next?
════════════════════════
𐀪 Author: CtrlC3
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:29:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #password_security #data_breach #hacking
════════════════════════
𐀪 Author: CtrlC3
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:29:03 GMT
════════════════════════
⌗ Tags: #cybersecurity #privacy #password_security #data_breach #hacking
Medium
Password Security: “60 Million Pounds of Trouble” — Are You Next?
Okay, let’s talk about something that should scare you a little: password security. Or rather, the lack thereof. Imagine discovering that…
⤷ Title: Revenant: A Modern, Full-Stack Reverse Shell C2 Framework — From Payload Generation to Victim…
════════════════════════
𐀪 Author: Hack-Bat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:30:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #security #hacking #pentesting
════════════════════════
𐀪 Author: Hack-Bat
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 03:30:37 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #security #hacking #pentesting
Medium
Revenant: A Modern, Full-Stack Reverse Shell C2 Framework — From Payload Generation to Victim session Management
A proof-of-concept that turns plain HTTP into a full-fledged C2 infrastructure, built entirely in C++.
⤷ Title: Master’s Degree vs. Certifications in Cybersecurity: Which Wins?
════════════════════════
𐀪 Author: Authlyn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:34 GMT
════════════════════════
⌗ Tags: #certification #infosec #cybersecurity #education #career_advice
════════════════════════
𐀪 Author: Authlyn
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:34:34 GMT
════════════════════════
⌗ Tags: #certification #infosec #cybersecurity #education #career_advice
Medium
Master’s Degree vs. Certifications in Cybersecurity: Which Wins?
So, you want to break into cybersecurity, huh? Awesome choice! It’s a wild ride, but super rewarding. Now comes the big question: Do you…
⤷ Title: ️ Securing Binaries Against Reverse Engineering: A Developer’s Guide
════════════════════════
𐀪 Author: Geeky Vartika
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:54:50 GMT
════════════════════════
⌗ Tags: #data_security #information_security #reverse_engineering #cyber_security_awareness #cybersecurity
════════════════════════
𐀪 Author: Geeky Vartika
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:54:50 GMT
════════════════════════
⌗ Tags: #data_security #information_security #reverse_engineering #cyber_security_awareness #cybersecurity
Medium
🛡️ Securing Binaries Against Reverse Engineering: A Developer’s Guide
Software development isn’t just about writing code — it’s also about protecting it. Once your code is compiled into a binary and shipped…
⤷ Title: Rapid7 Layoffs: “Brutal, but is it really a surprise?”
════════════════════════
𐀪 Author: Truspex
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:48:05 GMT
════════════════════════
⌗ Tags: #career_advice #cybersecurity #security #layoffs #tech_industry
════════════════════════
𐀪 Author: Truspex
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:48:05 GMT
════════════════════════
⌗ Tags: #career_advice #cybersecurity #security #layoffs #tech_industry
Medium
Rapid7 Layoffs: “Brutal, but is it really a surprise?”
Okay, let’s address the elephant in the room. The cybersecurity world is buzzing about the recent layoffs at Rapid7. It’s never good news…
⤷ Title: What is the difference between IoC and IoA?
════════════════════════
𐀪 Author: BnHany
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:44:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_threat_intelligence #society #technology #information_security
════════════════════════
𐀪 Author: BnHany
════════════════════════
ⴵ Time: Fri, 01 Aug 2025 04:44:21 GMT
════════════════════════
⌗ Tags: #cybersecurity #cyber_threat_intelligence #society #technology #information_security
Medium
What is the difference between IoC and IoA?
“‘IoA’ Indicator of Attack VS ‘IOC’ Indicator of Compromise”