Daily Writeups – Telegram
Daily Writeups
3.21K subscribers
106K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Google Launches DBSC Public Beta: New Feature Binds Sessions to Devices to Combat Cookie Theft
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Sat, 02 Aug 2025 00:08:46 +0000
════════════════════════
Tags: #Google #chrome #Cookie Theft #cybersecurity #DBSC #Device Bound Session Credentials #google #Passkeys #security #Session Hijacking
Title: cats: REST API Fuzzer and negative testing tool
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Fri, 01 Aug 2025 23:20:55 +0000
════════════════════════
Tags: #Open Source Tool #REST API fuzzer
Title: Critical Buffer Overflow Flaws in Dahua IP Cameras Expose Devices to RCE
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Fri, 01 Aug 2025 23:13:29 +0000
════════════════════════
Tags: #Vulnerability #Buffer Overflow #CVE_2025_31700 #CVE_2025_31701 #cybersecurity #Dahua #Denial of Service #DoS #IP Camera #RCE #remote code execution #vulnerability
Title: The OAuth Phishing Trap: Proofpoint Exposes AiTM Attacks That Bypass MFA to Hijack Cloud Accounts
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Sat, 02 Aug 2025 00:03:13 +0000
════════════════════════
Tags: #Cybercriminals #AiTM #Cloud Security #cybersecurity #MFA Bypass #Microsoft 365 #OAuth #phishing #Proofpoint #Tycoon
Title: Software and Data Integrity Failures (OWASP A08): For Hacking, Bug Bounty, and Web Development
════════════════════════
𐀪 Author: JPablo13
════════════════════════
Time: Sat, 02 Aug 2025 00:01:39 GMT
════════════════════════
Tags: #web_development #penetration_testing #ethical_hacking #cybersecurity #bug_bounty
Title: XXE Vulnerability: কী, কেন, এবং কিভাবে এটি অ্যাটাক হয়?
════════════════════════
𐀪 Author: Ayshee
════════════════════════
Time: Fri, 01 Aug 2025 23:21:17 GMT
════════════════════════
Tags: #xxe_attack #bug_bounty #cybersecurity #xxe #ethical_hacking
Title: CTF SQHell| TryHackMe en Español
════════════════════════
𐀪 Author: Binyamin
════════════════════════
Time: Sat, 02 Aug 2025 00:04:27 GMT
════════════════════════
Tags: #tryhackme #hacking #web_app_pentesting #ctf_walkthrough #tryhackme_walkthrough
Title: Bypass de WAF com Double Encoding: Uma Jornada através de SQL Injection
════════════════════════
𐀪 Author: Jonathan M.
════════════════════════
Time: Sat, 02 Aug 2025 00:28:21 GMT
════════════════════════
Tags: #infosec #sql_injection #ctf #cybersecurity #pentesting
Title: Identity and Access Management: RBAC vs ABAC — Choosing the Right Authorisation Model
════════════════════════
𐀪 Author: Samuel Odekunle
════════════════════════
Time: Sat, 02 Aug 2025 00:34:29 GMT
════════════════════════
Tags: #role_based_access_control #cybersecurity #zero_trust #technology #access_control
Title: PM in Progress: Reading the Tea Leaves of an App in Hot Water
════════════════════════
𐀪 Author: Andrew Leng Ly
════════════════════════
Time: Sat, 02 Aug 2025 00:05:17 GMT
════════════════════════
Tags: #vibe_coding #data #product_design #product_management #cybersecurity
Title: Smart Phishing Scams Are Now Changing Tactics in Real Time. Can Your Defenses Keep Up?
════════════════════════
𐀪 Author: Akshay Chauhan
════════════════════════
Time: Fri, 01 Aug 2025 23:09:32 GMT
════════════════════════
Tags: #information_security #safeaeon #phishing #cybersecurity
Title: Fileless Malware: A Growing Threat
════════════════════════
𐀪 Author: Cyber Security Details
════════════════════════
Time: Fri, 01 Aug 2025 23:03:48 GMT
════════════════════════
Tags: #cybersecurity #security #malware #cyber_threat #fileless_malware
Title: MITRE ATT&CK T1190 ve ToolShell (CVE‑2025‑53770): Gerçek Bir RCE Saldırısının Anatomisi
════════════════════════
𐀪 Author: Serhat Çallı
════════════════════════
Time: Sat, 02 Aug 2025 01:12:06 GMT
════════════════════════
Tags: #cybersecurity #hacking #rce #soc_analyst #mitre_attck
Title: The Ultimate 2FA App Battle: Proton, Aegis, and Authy Duke It Out in 2025
════════════════════════
𐀪 Author: BiyteLüm
════════════════════════
Time: Sat, 02 Aug 2025 02:21:35 GMT
════════════════════════
Tags: #application #cybersecurity #privacy #technology #authenticator_apps
Title: The Hidden Danger of Shared Local Admin Accounts
════════════════════════
𐀪 Author: Raviteja Mureboina
════════════════════════
Time: Sat, 02 Aug 2025 01:51:38 GMT
════════════════════════
Tags: #danger #assessment #administration #cybersecurity #local
Title: SIEM LAB: Detecting LSASS Credential Dumping Attack (T1003.001) with Wazuh and Sysmon
════════════════════════
𐀪 Author: Stevanus Banu
════════════════════════
Time: Sat, 02 Aug 2025 01:37:49 GMT
════════════════════════
Tags: #blue_team #cybersecurity #siem #detection_engineering #mitre_attack
Title: Do Not Track vs. Global Privacy Control
════════════════════════
𐀪 Author: Sean Oriyano
════════════════════════
Time: Sat, 02 Aug 2025 01:36:30 GMT
════════════════════════
Tags: #cybersecurity #privacy #technology
Title: Let My Journey Begin!
════════════════════════
𐀪 Author: Jasonzamora
════════════════════════
Time: Sat, 02 Aug 2025 01:18:35 GMT
════════════════════════
Tags: #my_journey_in_tech #cybersecurity #progression #tech #learning
Title: Filtering In-Scope Domains Using Burp Suite Configuration and Domain List
════════════════════════
𐀪 Author: mattyerz
════════════════════════
Time: Sat, 02 Aug 2025 04:41:00 GMT
════════════════════════
Tags: #noscript #bug_bounty #automation #burpsuite #penetration_testing