⤷ Title: Fake wallet app on Apple store leads to $420,000 theft with nearly 6 BTC stolen
════════════════════════
𐀪 Author: Coin Headlines
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:11:23 GMT
════════════════════════
⌗ Tags: #cryptocurrency #hacking #cyber_security_awareness #bitcoin
════════════════════════
𐀪 Author: Coin Headlines
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:11:23 GMT
════════════════════════
⌗ Tags: #cryptocurrency #hacking #cyber_security_awareness #bitcoin
Medium
Fake wallet app on Apple store leads to $420,000 theft with nearly 6 BTC stolen
There’s a rule that every crypto holder learns, or should learn, early: your seed phrase never goes anywhere near an internet-connected…
⤷ Title: ENG | TryHackMe Basic Pentesting CTF Solution
════════════════════════
𐀪 Author: Efe Özel
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:03:24 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #pentesting #hacking #tryhackme
════════════════════════
𐀪 Author: Efe Özel
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:03:24 GMT
════════════════════════
⌗ Tags: #ctf #cybersecurity #pentesting #hacking #tryhackme
Medium
ENG | TryHackMe Basic Pentesting CTF Solution
Basic Pentesting
My solution process for the Basic Pentesting CTF on TryHackMe.
My solution process for the Basic Pentesting CTF on TryHackMe.
⤷ Title: Cybersecurity Technical Writer | Translating Technical Complexity into Business Protection
════════════════════════
𐀪 Author: Petersmuditha
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:56:45 GMT
════════════════════════
⌗ Tags: #infosec #data_privacy #cybersecurity #technical_writing #digital_forensics
════════════════════════
𐀪 Author: Petersmuditha
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:56:45 GMT
════════════════════════
⌗ Tags: #infosec #data_privacy #cybersecurity #technical_writing #digital_forensics
Medium
🎯 Cybersecurity Technical Writer | Translating Technical Complexity into Business Protection
📖 Table of Contents
⤷ Title: Blaster v2.0 — A Modular Evolution of a Security Reconnaissance Framework
════════════════════════
𐀪 Author: Muhammad Usman Faridi
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:49:45 GMT
════════════════════════
⌗ Tags: #infosec #red_team #cybersecurity #python #hacking_tools
════════════════════════
𐀪 Author: Muhammad Usman Faridi
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:49:45 GMT
════════════════════════
⌗ Tags: #infosec #red_team #cybersecurity #python #hacking_tools
Medium
Blaster v2.0 — A Modular Evolution of a Security Reconnaissance Framework
Introduction
⤷ Title: [HackTheBox Sherlocks] OpTinselTrace-4 (Network forensics of Printer traffic)
════════════════════════
𐀪 Author: Chicken0248
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:53:29 GMT
════════════════════════
⌗ Tags: #hackthebox #cybersecurity #network_forensics #blue_team #hackthebox_writeup
════════════════════════
𐀪 Author: Chicken0248
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:53:29 GMT
════════════════════════
⌗ Tags: #hackthebox #cybersecurity #network_forensics #blue_team #hackthebox_writeup
Medium
[HackTheBox Sherlocks] OpTinselTrace-4 (Network forensics of Printer traffic)
investigating the printer's local storage exploitation from pcap
⤷ Title: HackTheBox Sherlocks — OpTinselTrace-3 (Memory dump forensics with volatility)
════════════════════════
𐀪 Author: Chicken0248
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:52:45 GMT
════════════════════════
⌗ Tags: #blue_team #digital_forensics #hackthebox_writeup #hackthebox #cybersecurity
════════════════════════
𐀪 Author: Chicken0248
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:52:45 GMT
════════════════════════
⌗ Tags: #blue_team #digital_forensics #hackthebox_writeup #hackthebox #cybersecurity
Medium
[HackTheBox Sherlocks] OpTinselTrace-3 (Memory dump forensics with volatility)
Investigating Windows memory dump revealing execution chains start from lnk to process injection.
⤷ Title: HTB University CTF 2025: Tinsel Trouble Clearing Forensics Challenges
════════════════════════
𐀪 Author: Loay Salah
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:28:23 GMT
════════════════════════
⌗ Tags: #hackthebox #digital_forensics #network_security #incident_response #hackthebox_writeup
════════════════════════
𐀪 Author: Loay Salah
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 21:28:23 GMT
════════════════════════
⌗ Tags: #hackthebox #digital_forensics #network_security #incident_response #hackthebox_writeup
Medium
HTB University CTF 2025: Tinsel Trouble Clearing Forensics Challenges
Hi, I’m glad to share with you my writeup for solving ALL Forensics Challenges in HTB University CTF 2025: Tinsel Trouble.
⤷ Title: CVE-2023–6972 Wordpress Backup Migration ≤1.3.9 Arbitrary File Deletion Case Study
════════════════════════
𐀪 Author: phantom_hat
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:53:20 GMT
════════════════════════
⌗ Tags: #cve #wordpress #rce #exploit #security_research
════════════════════════
𐀪 Author: phantom_hat
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:53:20 GMT
════════════════════════
⌗ Tags: #cve #wordpress #rce #exploit #security_research
Medium
CVE-2023–6972 Wordpress Backup Migration ≤1.3.9 Arbitrary File Deletion Case Study
﷽
⤷ Title: Blind SQL injection with time delays and information retrieval
════════════════════════
𐀪 Author: Mohamed Ahmed
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:04:18 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #web_security #portswigger #pentesting
════════════════════════
𐀪 Author: Mohamed Ahmed
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 22:04:18 GMT
════════════════════════
⌗ Tags: #sql_injection #cybersecurity #web_security #portswigger #pentesting
Medium
Blind SQL injection with time delays and information retrieval
Welcome to this write-up.
⤷ Title: Guía de OAuth: Vulnerabilidades, Vectores de Ataque y Seguridad
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #technology #web_development #cybersecurity #bug_bounty #hacking
════════════════════════
𐀪 Author: JPablo13
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 00:01:01 GMT
════════════════════════
⌗ Tags: #technology #web_development #cybersecurity #bug_bounty #hacking
Medium
Guía de OAuth: Vulnerabilidades, Vectores de Ataque y Seguridad
Domina OAuth: aprende sus vulnerabilidades, vectores críticos como JKU y Account Takeover, y estrategias de encadenamiento.
⤷ Title: I Saw Someone Build an AI-Powered Kali Lab at BSides San Diego. Then I Built My Own.
════════════════════════
𐀪 Author: erik
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:49:54 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty #cybersecurity #docker
════════════════════════
𐀪 Author: erik
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:49:54 GMT
════════════════════════
⌗ Tags: #ai #bug_bounty #cybersecurity #docker
Medium
I Saw Someone Build an AI-Powered Kali Lab at BSides San Diego. Then I Built My Own.
*How a conference demo turned into a full bug bounty lab with Claude Desktop, Discord remote access, and automated health monitoring on…
⤷ Title: JWT Editor: The Burp Suite Extension That Turns Token Testing from Guesswork into a Science
════════════════════════
𐀪 Author: Ajay Yadav
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:36:01 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #bug_bounty #web_security #cybersecurity
════════════════════════
𐀪 Author: Ajay Yadav
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:36:01 GMT
════════════════════════
⌗ Tags: #penetration_testing #ethical_hacking #bug_bounty #web_security #cybersecurity
Medium
JWT Editor: The Burp Suite Extension That Turns Token Testing from Guesswork into a Science
Almost every modern web application uses JSON Web Tokens. Login to a site, get a JWT. Call an API, include your JWT. Change your role…
⤷ Title: Regex Injection ve E-posta Parametre Manipülasyonu ile Hesap Ele Geçirme
════════════════════════
𐀪 Author: Şahnur Eren Aloğlu
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:48:07 GMT
════════════════════════
⌗ Tags: #regex #web_security #hacking #pentester
════════════════════════
𐀪 Author: Şahnur Eren Aloğlu
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:48:07 GMT
════════════════════════
⌗ Tags: #regex #web_security #hacking #pentester
Medium
Regex Injection ve E-posta Parametre Manipülasyonu ile Hesap Ele Geçirme
Keşif Süreci: Duvara Toslamak
⤷ Title: We’re Building the Thing Mike Frantzen Is Asking For
════════════════════════
𐀪 Author: R. Demetri Vallejos
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:31:28 GMT
════════════════════════
⌗ Tags: #ai #artificial_intelligence #cybersecurity #hacking #computer_science
════════════════════════
𐀪 Author: R. Demetri Vallejos
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:31:28 GMT
════════════════════════
⌗ Tags: #ai #artificial_intelligence #cybersecurity #hacking #computer_science
Medium
We’re Building the Thing Mike Frantzen Is Asking For
He wrote the business case. Here’s the engineering.
⤷ Title: TryHackMe — Ra: Writeup
════════════════════════
𐀪 Author: Taher Borgi
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:44:22 GMT
════════════════════════
⌗ Tags: #active_directory #cybersecurity #ethical_hacking #penetration_testing #tryhackme
════════════════════════
𐀪 Author: Taher Borgi
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:44:22 GMT
════════════════════════
⌗ Tags: #active_directory #cybersecurity #ethical_hacking #penetration_testing #tryhackme
Medium
TryHackMe — Ra: Writeup
Room: Ra Difficulty: Hard Infrastructure: Active Directory / Windows Server 2019 Made by: @4nqr34z and @theart42
⤷ Title: Building Secure APIs at Scale: A Practical Guide to SSO, MFA, and RBAC
════════════════════════
𐀪 Author: Vaishnavius Apply
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:28:13 GMT
════════════════════════
⌗ Tags: #microservices #oauth #software_engineering #backend_development #api_security
════════════════════════
𐀪 Author: Vaishnavius Apply
════════════════════════
ⴵ Time: Mon, 13 Apr 2026 23:28:13 GMT
════════════════════════
⌗ Tags: #microservices #oauth #software_engineering #backend_development #api_security
Medium
Building Secure APIs at Scale: A Practical Guide to SSO, MFA, and RBAC
Learn how to design scalable and secure APIs using SSO, MFA, JWT, and RBAC in real-world distributed systems.
⤷ Title: The High-Stakes Return of 0xFFF: ‘notnullOSX’ Stealer Targets macOS Crypto Whales
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 02:30:33 +0000
════════════════════════
⌗ Tags: #Malware #0xFFF #alh1mik #ClickFix #Crypto Stealer #cyber_espionage #DeFi Security #Go malware #Hardware Wallet #macOS Malware #Moonlock Lab #notnullOSX
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 02:30:33 +0000
════════════════════════
⌗ Tags: #Malware #0xFFF #alh1mik #ClickFix #Crypto Stealer #cyber_espionage #DeFi Security #Go malware #Hardware Wallet #macOS Malware #Moonlock Lab #notnullOSX
Daily CyberSecurity
The High-Stakes Return of 0xFFF: 'notnullOSX' Stealer Targets macOS Crypto Whales
Moonlock Lab reveals notnullOSX, a predatory macOS stealer targeting crypto users with $10k+ holdings. See how it uses ClickFix to hijack wallet apps.
⤷ Title: The Billion-Dollar Invite: How UNC1069’s Fake Meetings Hijack Crypto Fortunes
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 02:14:31 +0000
════════════════════════
⌗ Tags: #Cybercriminals #BlueNoroff #Cryptocurrency Security #cyber_espionage #macOS Malware #North Korea APT #phishing #Session Hijacking #social engineering #UNC1069 #Web3
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 02:14:31 +0000
════════════════════════
⌗ Tags: #Cybercriminals #BlueNoroff #Cryptocurrency Security #cyber_espionage #macOS Malware #North Korea APT #phishing #Session Hijacking #social engineering #UNC1069 #Web3
Daily CyberSecurity
The Billion-Dollar Invite: How UNC1069’s Fake Meetings Hijack Crypto Fortunes
North Korean group UNC1069 (BlueNoroff) targets Web3 with fake Zoom/Teams links. 164 domains blocked. Secure your crypto assets and browser extensions now!
⤷ Title: Industrial Key Leak: Critical 9.3 CVSS Flaws Expose Mitsubishi’s GENESIS64 and ICONICS Suite
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 01:46:46 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Credential Disclosure #CVE_2025_14815 #CVE_2025_14816 #GENESIS64 #ICONICS Suite #ICS #Industrial Security #infosec #Mitsubishi Electric #SCADA #sql server
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 01:46:46 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Credential Disclosure #CVE_2025_14815 #CVE_2025_14816 #GENESIS64 #ICONICS Suite #ICS #Industrial Security #infosec #Mitsubishi Electric #SCADA #sql server
Daily CyberSecurity
Industrial Key Leak: Critical 9.3 CVSS Flaws Expose Mitsubishi’s GENESIS64 and ICONICS Suite
Mitsubishi Electric warns of 9.3 CVSS flaws in GENESIS64 & ICONICS. Attackers can leak SQL credentials to destroy or tamper with industrial data. Patch now!
⤷ Title: Critical SSRF Flaw Discovered in Axios – CVE-2025-62718 (CVSS 9.3)
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 01:35:47 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Axios #CVE_2025_62718 #data exfiltration #Hostname Normalization #infosec #NO_PROXY #Node.js Security #ssrf #vulnerability management #web development
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 01:35:47 +0000
════════════════════════
⌗ Tags: #Vulnerability Report #Axios #CVE_2025_62718 #data exfiltration #Hostname Normalization #infosec #NO_PROXY #Node.js Security #ssrf #vulnerability management #web development
Daily CyberSecurity
Critical SSRF Flaw Discovered in Axios - CVE-2025-62718 (CVSS 9.3)
Axios CVE-2025-62718 allows a critical NO_PROXY bypass via hostname normalization errors. Protect your internal network from SSRF—patch or normalize today!
⤷ Title: ⚙️ 11. — Method-based Access Control Can Be Circumvented
════════════════════════
𐀪 Author: The4v1
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 01:15:07 GMT
════════════════════════
⌗ Tags: #web_security #cybersecurity #portswigger #bug_bounty
════════════════════════
𐀪 Author: The4v1
════════════════════════
ⴵ Time: Tue, 14 Apr 2026 01:15:07 GMT
════════════════════════
⌗ Tags: #web_security #cybersecurity #portswigger #bug_bounty
Medium
⚙️ 11. — Method-based Access Control Can Be Circumvented
⚙️ 11. — Method-based Access Control Can Be Circumvented Difficulty: 🟡 Practitioner Goal: 🔍 Log in as administrator:admin → promote carlos via the admin panel → capture POST …