Daily Writeups – Telegram
Daily Writeups
3.2K subscribers
106K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: XSS Reborn: 5 Killer Scenarios That Break Assumptions & Apps .. Advanced XSS Vol. 2
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
Time: Tue, 05 Aug 2025 06:44:40 GMT
════════════════════════
Tags: #information_security #bug_bounty #cybersecurity #ai #infosec
Title: XSS Trap Card Series — Vol. 1
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
Time: Tue, 05 Aug 2025 06:30:38 GMT
════════════════════════
Tags: #information_security #ai #infosec #cybersecurity #bug_bounty
Title: Subdomain Scanner to HTTP Hunter:
════════════════════════
𐀪 Author: Narendar Battula (nArEn)
════════════════════════
Time: Tue, 05 Aug 2025 05:46:41 GMT
════════════════════════
Tags: #infosec #information_security #cybersecurity #bug_bounty #ai
Title: Cybersecurity Leadership in a Dangerous World with Bob Zinga
════════════════════════
𐀪 Author: Matthew.Rosenquist
════════════════════════
Time: Tue, 05 Aug 2025 19:54:59 GMT
════════════════════════
Tags: #cybersecurity_insights #cybersecurity #business #podcast #leadership
Title: How criminals test each SMS message on their own phone first to confirm it will reach yours
════════════════════════
𐀪 Author: Paul Walsh
════════════════════════
Time: Tue, 05 Aug 2025 19:51:58 GMT
════════════════════════
Tags: #phishing #sms #fraud #cybersecurity
Title: America’s AI Action Plan
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
Time: Tue, 05 Aug 2025 19:49:31 GMT
════════════════════════
Tags: #innovation #national_security #cybersecurity #ai #policy
Title: Why Python Is Crucial for Cybersecurity Today
════════════════════════
𐀪 Author: The Analytics Edge
════════════════════════
Time: Tue, 05 Aug 2025 19:46:37 GMT
════════════════════════
Tags: #python #data_science #programming #machine_learning #cybersecurity
Title: Varonis and Microsoft: Securing AI’s Future with Data Protection
════════════════════════
𐀪 Author: Andrew Kagan
════════════════════════
Time: Tue, 05 Aug 2025 19:37:50 GMT
════════════════════════
Tags: #cybersecurity #cloud_security #microsoft #data_security #risk_management
Title: EXP-401 OSEE Review — Offensive Security Exploitation Expert
════════════════════════
𐀪 Author: Jake Mayhew
════════════════════════
Time: Tue, 05 Aug 2025 19:33:59 GMT
════════════════════════
Tags: #information_security #red_team #windows #penetration_testing #cybersecurity
Title: Introducción a Linux — Parte 3: Primeros Comandos y Estructura del Sistema
════════════════════════
𐀪 Author: Zeyled Nazey
════════════════════════
Time: Tue, 05 Aug 2025 19:26:07 GMT
════════════════════════
Tags: #ethical_hacking #learn_cybersecurity #ctf_challenges #cybersecurity
Title: Análisis del ESET Security Report 2025 | ¿Cuál es el estado actual de la ciberseguridad en…
════════════════════════
𐀪 Author: Tiziano Mass
════════════════════════
Time: Tue, 05 Aug 2025 19:20:51 GMT
════════════════════════
Tags: #information_security #security_report #eset #cybersecurity #ciberseguridad
Title: Who Needs to Comply with EN 18031 Cybersecurity Standards?
════════════════════════
𐀪 Author: Simon Stampfl
════════════════════════
Time: Tue, 05 Aug 2025 19:20:02 GMT
════════════════════════
Tags: #software #cybersecurity #cyber_resilience_act #radio_equipment_directive #en_18031
Title: When Bad Data Becomes the Real Threat: The Dark Trick Behind Poisoned Intel
════════════════════════
𐀪 Author: Akshay Chauhan
════════════════════════
Time: Tue, 05 Aug 2025 19:14:06 GMT
════════════════════════
Tags: #cybersecurity #data #monitoring #information_security #safeaeon
Title: Penetration Testing Process
════════════════════════
𐀪 Author: Mena George
════════════════════════
Time: Tue, 05 Aug 2025 19:38:54 GMT
════════════════════════
Tags: #ethical_hacking #offensive_security #penetration_testing
Title: The Ultimate Guide to the Best Penetration Testing Tools in 2025
════════════════════════
𐀪 Author: cybrNK
════════════════════════
Time: Tue, 05 Aug 2025 18:39:12 GMT
════════════════════════
Tags: #cyber #penetration_testing #2025 #cybersecurity #cybrmonk
Title: Day 72: Wireless Connections
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
Time: Tue, 05 Aug 2025 17:18:26 GMT
════════════════════════
Tags: #cybersecurity #penetration_testing #wifi #networking
Title: Starting Bug Bounty — Documenting My Journey
════════════════════════
𐀪 Author: Calvaryhasarrived
════════════════════════
Time: Tue, 05 Aug 2025 15:33:53 GMT
════════════════════════
Tags: #penetration_testing #cybersecurity #bug_bounty #information_security #ethical_hacking
Title: Day 71: Metasploit
════════════════════════
𐀪 Author: Nile Okomo
════════════════════════
Time: Tue, 05 Aug 2025 14:37:50 GMT
════════════════════════
Tags: #metasploit #penetration_testing #metasploit_framework #cybersecurity
Title: I Found a Major Privacy Leak in a Popular Social App Just Because a Friend Said “Check This Out”
════════════════════════
𐀪 Author: KonaN
════════════════════════
Time: Tue, 05 Aug 2025 12:43:01 GMT
════════════════════════
Tags: #bug_bounty #data_breach #penetration_testing #cybersecurity #hacking
Title: Zero.WebAppSecurity Penetrasyon Testi
════════════════════════
𐀪 Author: Bilge Güngör
════════════════════════
Time: Tue, 05 Aug 2025 12:11:16 GMT
════════════════════════
Tags: #zerowebappsecurity #web_security #cybersecurity #penetration_testing #web_penetration_testing
Title: Cyber Security Audits: Evaluating the Security Posture
════════════════════════
𐀪 Author: Cyber Security Research
════════════════════════
Time: Tue, 05 Aug 2025 11:17:56 GMT
════════════════════════
Tags: #vulnerability_assessment #security_posture #penetration_testing #risk_assessment #cybersecurity_audit