Daily Writeups – Telegram
Daily Writeups
3.2K subscribers
106K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: New Android Malware Impersonates Indian Banks to Steal Data & Secretly Mine Monero
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:40:07 +0000
════════════════════════
Tags: #Malware #Android Malware #Axis Bank #Banking Trojan #Cryptojacking #India #IndusInd Bank #Monero #phishing #SBI Card #XMRig
Title: Critical Triton Flaws (CVSS 9.8) Expose AI Servers to Remote Takeover – Patch Now!
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:35:13 +0000
════════════════════════
Tags: #Vulnerability Report #AI #cybersecurity #Data Tampering #Inference Server #NVIDIA Triton #rce #Remote Code Execution #Vulnerability #Wiz Research
Title: PlayPraetor: New Android RAT Infects 11,000+ Devices with Real-Time On-Device Fraud
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:28:42 +0000
════════════════════════
Tags: #Malware #Android Malware #Chinese Threat Actors #cybersecurity #financial fraud #MaaS #ODF #On_Device Fraud #PlayPraetor #rat
Title: Critical Dell DD OS Flaw (CVSS 9.8) Allows Unauthenticated Remote Access
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:16:34 +0000
════════════════════════
Tags: #Vulnerability #Authentication Bypass #Command Injection #cybersecurity #DD OS #DDSH #dell #PowerProtect
Title: The Evolution of Evasion: Raspberry Robin Malware Upgrades with New Encryption & UAC Bypass Exploit
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:10:15 +0000
════════════════════════
Tags: #Malware #ChaCha20 #CVE_2024_38196 #cybersecurity #evasion #Local Privilege Escalation #malware #Obfuscation #Raspberry Robin #tor
Title: Beavertail Malware Returns: North Korean Hackers Use NPM Packages to Steal Crypto & Secrets
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:06:14 +0000
════════════════════════
Tags: #Cybercriminals #BeaverTail malware #cryptocurrency #cybersecurity #info_stealer #North Korea #npm #supply chain attack #Veracode
Title: Kimsuky APT Escalates Cyberespionage with Stealthy LNK Files & Reflective Malware Payloads
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Tue, 05 Aug 2025 00:01:08 +0000
════════════════════════
Tags: #Cybercriminals #APT #Cyberespionage #cybersecurity #Kimsuky #LNK Files #malware #North Korea #Reflective DLL Injection #south korea
Title: Urgent Zero-Day Warning: SonicWall VPNs Under Attack, Akira Ransomware Deployed Within Hours
════════════════════════
𐀪 Author: Ddos
════════════════════════
Time: Mon, 04 Aug 2025 23:24:09 +0000
════════════════════════
Tags: #Vulnerability Report #Akira #cybersecurity #Huntress #MFA Bypass #ransomware #security alert #SonicWall #vpn #zero_day
Title: DAY 1 Recon: Manual Reconnaissance: How I Explore Targets Like a Hacker (But With Good Intentions)
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
Time: Tue, 05 Aug 2025 08:35:57 GMT
════════════════════════
Tags: #hacking #bug_bounty #ethical_hacking #programming #cybersecurity
Title: Ticket to Trouble: How I Hijacked Support Tickets to See Everyone’s Complaints ️
════════════════════════
𐀪 Author: Iski
════════════════════════
Time: Tue, 05 Aug 2025 08:35:50 GMT
════════════════════════
Tags: #hacking #infosec #money #bug_bounty #cybersecurity
Title: Burp Suite For Beginners: How I Learned the Proxy and Interceptor
════════════════════════
𐀪 Author: Ayush Kumar
════════════════════════
Time: Tue, 05 Aug 2025 08:35:21 GMT
════════════════════════
Tags: #programming #bug_bounty #hacking #ethical_hacking #cybersecurity
Title: Reflected XSS Made Easy: Catching Real Bugs in the Wild
════════════════════════
𐀪 Author: Monika sharma
════════════════════════
Time: Tue, 05 Aug 2025 08:33:44 GMT
════════════════════════
Tags: #penetration_testing #tips_and_tricks #javanoscript #vulnerability #bug_bounty
Title: Extracting Data from the Subdomain Grave
════════════════════════
𐀪 Author: SIDDHANT SHUKLA
════════════════════════
Time: Tue, 05 Aug 2025 08:33:39 GMT
════════════════════════
Tags: #bug_bounty #hacking #technology #programming #cybersecurity
Title: Forgotten by Design: How an Unused Subdomain Gave Me Full Cloud Access ☁️
════════════════════════
𐀪 Author: Iski
════════════════════════
Time: Tue, 05 Aug 2025 08:33:29 GMT
════════════════════════
Tags: #infosec #bug_bounty #cybersecurity #money #hacking
Title: I Turned IDOR and XSS Into a Mass Account Takeover
════════════════════════
𐀪 Author: Ibtissam hammadi
════════════════════════
Time: Tue, 05 Aug 2025 08:29:24 GMT
════════════════════════
Tags: #cybersecurity #idor #web_security #bug_bounty #xss_attack
Title: “Day 2: Reconnaissance — How I Found My First Real Bug (And How You Can Too)”
════════════════════════
𐀪 Author: Aman Sharma
════════════════════════
Time: Mon, 04 Aug 2025 04:45:13 GMT
════════════════════════
Tags: #cybersecurity #money #bug_bounty #programming #technology
Title: Clean-Up Fail: How a Forgotten Admin Endpoint Let Me Drop All The Data ️
════════════════════════
𐀪 Author: Iski
════════════════════════
Time: Mon, 04 Aug 2025 04:45:05 GMT
════════════════════════
Tags: #money #hacking #infosec #bug_bounty #cybersecurity
Title: Package of Problems: How a Frontend NPM Library Leaked Internal API Keys
════════════════════════
𐀪 Author: Iski
════════════════════════
Time: Mon, 04 Aug 2025 04:43:54 GMT
════════════════════════
Tags: #money #bug_bounty #infosec #cybersecurity #hacking
Title: O que é rollback e por que ele precisa estar no seu plano de segurança da informação
════════════════════════
𐀪 Author: Bughunt
════════════════════════
Time: Tue, 05 Aug 2025 13:22:41 GMT
════════════════════════
Tags: No_Tags