Daily Writeups – Telegram
Daily Writeups
3.2K subscribers
106K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Why SOC Level 1?
════════════════════════
𐀪 Author: Furkanctiner
════════════════════════
Time: Sat, 02 Aug 2025 12:14:00 GMT
════════════════════════
Tags: #soc_analyst #cybersecurity #tryhackme #siem #incident_response
Title: CVE-2025–51503: XSS Vulnerability in Microweber CMS Puts Admin Accounts at Risk
════════════════════════
𐀪 Author: CVEHUB
════════════════════════
Time: Sat, 02 Aug 2025 12:45:36 GMT
════════════════════════
Tags: #xs #microweber #cms #vulnerability #security
Title: New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Sat, 02 Aug 2025 19:03:00 +0530
════════════════════════
Tags: No_Tags
Title: Subdomain Enumeration Like a Pro — Complete Step-by-Step Guide (2025 Edition)
════════════════════════
𐀪 Author: Rajesh Kumar
════════════════════════
Time: Sat, 02 Aug 2025 13:30:01 GMT
════════════════════════
Tags: #subdomains_enumeration #reconnaissance #cybersecurity #bug_bounty #information_gathering
Title: Tools Every Penetration Tester Must Build Themselves
════════════════════════
𐀪 Author: sudo whoami
════════════════════════
Time: Sat, 02 Aug 2025 13:05:26 GMT
════════════════════════
Tags: #pentesting #ethical_hacking #cybersecurity #bug_bounty #tools
Title: Secure Coding Part 7: Command Injection — Attack (Python) — shell=True
════════════════════════
𐀪 Author: Siddiquimohammad
════════════════════════
Time: Sat, 02 Aug 2025 13:57:06 GMT
════════════════════════
Tags: #devsecops #application_security #secure_sdlc #owasp_top_10 #secure_coding
Title: New Plague Malware Targets Linux Servers to Gain Stealthy SSH Access
════════════════════════
𐀪 Author: Chetan Seripally
════════════════════════
Time: Sat, 02 Aug 2025 14:48:04 GMT
════════════════════════
Tags: #cybersecurity #infosec #malware #hacking #cloud
Title: INFIDELITY CONCERNS. HOW I KNEW I WAS WITH A CHEATING PARTNER
════════════════════════
𐀪 Author: Poz Cajorla
════════════════════════
Time: Sat, 02 Aug 2025 14:43:34 GMT
════════════════════════
Tags: #spying #hacking #hire_a_hacker #private_investigator #cheating_spouse
Title: Basic Pentesting 1 in 3 Different Ways A Beginner-Friendly Guide
════════════════════════
𐀪 Author: SACHIN PV
════════════════════════
Time: Sat, 02 Aug 2025 14:06:11 GMT
════════════════════════
Tags: #hacking #pentesting #report #basic_pentesting #vulnhub
Title: ️ Dive Into Hacking, Virtual Machines, Linux & Networking — A Beginner’s Guide
════════════════════════
𐀪 Author: Aryaajay
════════════════════════
Time: Sat, 02 Aug 2025 14:04:17 GMT
════════════════════════
Tags: #networking #virtual_machine #hacking #linux
Title: Oops! When DevOps Becomes “DevOops”: $44M Crypto Hack
════════════════════════
𐀪 Author: CtrlC3
════════════════════════
Time: Sat, 02 Aug 2025 13:38:08 GMT
════════════════════════
Tags: #security #hacking #crypto #devops #cybersecurity
Title: Data Flow and Synchronization Between SIEM and SOAR Tools in SOC
════════════════════════
𐀪 Author: Esra Kayhan
════════════════════════
Time: Sat, 02 Aug 2025 14:46:36 GMT
════════════════════════
Tags: #soar #security_orchestration #siem #cybersecurity #cloud_security_automation
Title: Own a Domain? Then You Should Have a security.txt (RFC 9116)
════════════════════════
𐀪 Author: Mauro Stepanoski
════════════════════════
Time: Sat, 02 Aug 2025 14:36:43 GMT
════════════════════════
Tags: #cybersecurity #best_practices #rfc #website
Title: You know that feeling when you’re debugging production at 2 AM and suddenly wonder, “Wait, when did…
════════════════════════
𐀪 Author: Solo Recon
════════════════════════
Time: Sat, 02 Aug 2025 14:31:50 GMT
════════════════════════
Tags: #vibe_coding #solopreneur #cybersecurity
Title: CYBER GHOSTS Hackers — OSINT, Red Teaming & Ethical Hacking by ALPHA
════════════════════════
𐀪 Author: CYBER GHOSTS
════════════════════════
Time: Sat, 02 Aug 2025 14:28:21 GMT
════════════════════════
Tags: #osint #ethical_hacking #cybersecurity #cyberghost #alpha
Title: Investigating X Profiles and Posts Using Grok AI
════════════════════════
𐀪 Author: Bank Security
════════════════════════
Time: Sat, 02 Aug 2025 14:26:51 GMT
════════════════════════
Tags: #grok #cyber_threat_intelligence #cybersecurity #ai #threat_intelligence
Title: What Is Zero Trust Security?
════════════════════════
𐀪 Author: Osamamurtaza
════════════════════════
Time: Sat, 02 Aug 2025 14:23:03 GMT
════════════════════════
Tags: #cyber_security_awareness #cybersecurity #cybercrime
Title: The Silent Risk in Your ICS: Why S7 Protocol Needs Security Attention
════════════════════════
𐀪 Author: Azim Uddin
════════════════════════
Time: Sat, 02 Aug 2025 14:15:23 GMT
════════════════════════
Tags: #censys #attack_surface_management #cybersecurity #blue_team #red_team
Title: Regional Development: Sabah, Sarawak & the Tech North
════════════════════════
𐀪 Author: Minehli Arakelians Gheshlagh
════════════════════════
Time: Sat, 02 Aug 2025 14:13:31 GMT
════════════════════════
Tags: #economy #ai #cyber_security_awareness #sharing_economy #cybersecurity
Title: WARNING ⛔️ : Never Use Free WiFi—Don’t Connect to Public Wi-Fi With Your Mobile Phones
════════════════════════
𐀪 Author: Shahzaib
════════════════════════
Time: Sat, 02 Aug 2025 14:02:33 GMT
════════════════════════
Tags: #creativity #hacker #cybersecurity #ethical_hacking #wifihacking
Title: As a non-cyber person. Have you heard about “Dark Web Monitoring”?
════════════════════════
𐀪 Author: Noussayr Derbel
════════════════════════
Time: Sat, 02 Aug 2025 13:58:13 GMT
════════════════════════
Tags: #cybersecurity #cyber_security_awareness #data_breach #darkweb #threat_intelligence