⤷ Title: What Happens 10 Minutes After You Get Hacked
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:10:54 GMT
════════════════════════
⌗ Tags: #programming #coding #hacking #cybersecurity #ai
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:10:54 GMT
════════════════════════
⌗ Tags: #programming #coding #hacking #cybersecurity #ai
Medium
What Happens 10 Minutes After You Get Hacked
You won’t hear an alarm.
⤷ Title: How Uber’s Support Team Became the Backdoor
════════════════════════
𐀪 Author: Lusine Tumoyan
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:03:58 GMT
════════════════════════
⌗ Tags: #customer_support #uber #hacking
════════════════════════
𐀪 Author: Lusine Tumoyan
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:03:58 GMT
════════════════════════
⌗ Tags: #customer_support #uber #hacking
Medium
How Uber’s Support Team Became the Backdoor
On April 23rd I watched Uber lock us out of the account again.
⤷ Title: Android Application Penetration Testing: A Complete Phase-Wise Methodology with Tools &…
════════════════════════
𐀪 Author: ArunKumarBalivada
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 18:31:53 GMT
════════════════════════
⌗ Tags: #android_security #cybersecurity #infosec #android #penetration_testing
════════════════════════
𐀪 Author: ArunKumarBalivada
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 18:31:53 GMT
════════════════════════
⌗ Tags: #android_security #cybersecurity #infosec #android #penetration_testing
Medium
Android Application Penetration Testing: A Complete Phase-Wise Methodology with Tools &…
Android applications are no longer just front-end interfaces. They contain business logic, authentication flows, API communication, local…
⤷ Title: The $2 Million Permission You Forgot You Granted
════════════════════════
𐀪 Author: Defense Stack
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 18:18:12 GMT
════════════════════════
⌗ Tags: #developer #cloud_security #infosec #supply_chain #cybersecurity
════════════════════════
𐀪 Author: Defense Stack
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 18:18:12 GMT
════════════════════════
⌗ Tags: #developer #cloud_security #infosec #supply_chain #cybersecurity
Medium
The $2 Million Permission You Forgot You Granted
How a Forgotten OAuth Permission Gave Attackers a Path Straight Into Vercel’s Infrastructure
⤷ Title: Portfolio Activity: Conduct a security audit | Google Certified Cybersecurity Professional
════════════════════════
𐀪 Author: Aruldeshwal
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:30:49 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #infosec #cybersecurity_analyst #cybersecurity_training
════════════════════════
𐀪 Author: Aruldeshwal
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:30:49 GMT
════════════════════════
⌗ Tags: #information_security #cybersecurity #infosec #cybersecurity_analyst #cybersecurity_training
Medium
Portfolio Activity: Conduct a security audit | Google Certified Cybersecurity Professional
Botium Toys: Scope, goals, and risk assessment report
⤷ Title: Supply Chain Attack Vectors Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:39:18 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cybersecurity #ai_security
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:39:18 GMT
════════════════════════
⌗ Tags: #tryhackme #tryhackme_writeup #tryhackme_walkthrough #cybersecurity #ai_security
Medium
Supply Chain Attack Vectors Walkthrough Notes | TryHackMe
How supply chain vectors affect AI systems and their behaviour
⤷ Title: Securing the AI Supply Chain Walkthrough Notes | TryHackMe
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:38:36 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #tryhackme_writeup #tryhackme_walkthrough #ai_security
════════════════════════
𐀪 Author: Sle3pyHead
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:38:36 GMT
════════════════════════
⌗ Tags: #tryhackme #cybersecurity #tryhackme_writeup #tryhackme_walkthrough #ai_security
Medium
Securing the AI Supply Chain Walkthrough Notes | TryHackMe
How to secure AI supply chains and reduce system risks
⤷ Title: TryHackMe | Understanding AI Supply Chains | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:36:24 GMT
════════════════════════
⌗ Tags: #tryhackme #supply_chain #ai #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:36:24 GMT
════════════════════════
⌗ Tags: #tryhackme #supply_chain #ai #tryhackme_walkthrough #tryhackme_writeup
Medium
TryHackMe | Understanding AI Supply Chains | WriteUp
Explore how AI’s dependency on external models, datasets, and packages creates attack surfaces.
⤷ Title: TryHackMe | Payload | WriteUp
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:35:53 GMT
════════════════════════
⌗ Tags: #ctf #tryhackme #cybersecurity #tryhackme_walkthrough #tryhackme_writeup
════════════════════════
𐀪 Author: Axoloth
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:35:53 GMT
════════════════════════
⌗ Tags: #ctf #tryhackme #cybersecurity #tryhackme_walkthrough #tryhackme_writeup
Medium
TryHackMe | Payload | WriteUp
TryTrainMe’s production code review model is phoning home. Investigate the breach.
⤷ Title: TryHackMe (THM) Ice Walkthrough + Answers
════════════════════════
𐀪 Author: Mann Diwani
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:02:38 GMT
════════════════════════
⌗ Tags: #thm_walkthrough #tryhackme #tryhackme_walkthrough #ice #eternalblue
════════════════════════
𐀪 Author: Mann Diwani
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 17:02:38 GMT
════════════════════════
⌗ Tags: #thm_walkthrough #tryhackme #tryhackme_walkthrough #ice #eternalblue
Medium
TryHackMe (THM) Ice Walkthrough + Answers
🔗Room Link : https://tryhackme.com/room/ice
⤷ Title: The Illusion of Security: Why Your Frontend Is a Gift to Hackers
════════════════════════
𐀪 Author: Vasyl Oliinyk
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 18:52:03 GMT
════════════════════════
⌗ Tags: #javascript #frontend_security #cybersecurity #api_security #owasp
════════════════════════
𐀪 Author: Vasyl Oliinyk
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 18:52:03 GMT
════════════════════════
⌗ Tags: #javascript #frontend_security #cybersecurity #api_security #owasp
Medium
The Illusion of Security: Why Your Frontend Is a Gift to Hackers
I once watched a senior developer demo his “secure” admin panel to a room full of stakeholders. He proudly showed how regular users…
⤷ Title: IDOR….will help you to get bounty
════════════════════════
𐀪 Author: DEMON HACKER
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 20:00:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #idor
════════════════════════
𐀪 Author: DEMON HACKER
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 20:00:13 GMT
════════════════════════
⌗ Tags: #cybersecurity #bug_bounty #idor
Medium
IDOR….will help you to get bounty
Welcome to this blog, I’m Sandeep Singh Rajput and I’ll define all the methods, tactics and techniques I used to find IDOR in a website…
⤷ Title: The Quiet Breach: Why Your Software Supply Chain Is the Perfect Backdoor
════════════════════════
𐀪 Author: Shubham Ashish
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 20:45:53 GMT
════════════════════════
⌗ Tags: #supply_chain #hacking #cybersecurity #bitwarden #cloud_security
════════════════════════
𐀪 Author: Shubham Ashish
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 20:45:53 GMT
════════════════════════
⌗ Tags: #supply_chain #hacking #cybersecurity #bitwarden #cloud_security
Medium
The Quiet Breach: Why Your Software Supply Chain Is the Perfect Backdoor
You have spent millions on firewalls, antivirus software, and employee training. Your perimeter is locked down tight. But what if an…
⤷ Title: Active Directory Traffic Analysis & Credential Extraction
════════════════════════
𐀪 Author: ZeroDay-Security-Services
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 19:59:16 GMT
════════════════════════
⌗ Tags: #hacking #wireshark #network_security #cybersecurity #tryhackme
════════════════════════
𐀪 Author: ZeroDay-Security-Services
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 19:59:16 GMT
════════════════════════
⌗ Tags: #hacking #wireshark #network_security #cybersecurity #tryhackme
Medium
Active Directory Traffic Analysis & Credential Extraction
TryHackMe “Directory” Lab — Writeup
⤷ Title: AWS Penetration Testing Part 1: IAM Enumeration from Scratch
════════════════════════
𐀪 Author: Vimal Raj
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 20:31:05 GMT
════════════════════════
⌗ Tags: #cloud_security #penetration_testing #aws_iam #aws #cybersecurity
════════════════════════
𐀪 Author: Vimal Raj
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 20:31:05 GMT
════════════════════════
⌗ Tags: #cloud_security #penetration_testing #aws_iam #aws #cybersecurity
Medium
AWS Penetration Testing Part 1: IAM Enumeration from Scratch
This is part of an ongoing series where I document my journey into AWS penetration testing — from setting up the environment to identifying…
⤷ Title: HTB Footprinting Lab — Medium
════════════════════════
𐀪 Author: Youssef Ezzat
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 20:30:57 GMT
════════════════════════
⌗ Tags: #hackthebox #ethical_hacking #penetration_testing #cybersecurity
════════════════════════
𐀪 Author: Youssef Ezzat
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 20:30:57 GMT
════════════════════════
⌗ Tags: #hackthebox #ethical_hacking #penetration_testing #cybersecurity
Medium
HTB Footprinting Lab — Medium
Hey everyone Today I solved the Footprinting (Medium) lab on Hack The Box Academy The goal was to find the password for a user called HTB.
⤷ Title: Recruit — TryHackMe CTF Challenge Walkthrough
════════════════════════
𐀪 Author: Karim Hesham
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 20:15:20 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #recruit_tryhackme #recruit_writeup_tr #tryhackme
════════════════════════
𐀪 Author: Karim Hesham
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 20:15:20 GMT
════════════════════════
⌗ Tags: #tryhackme_walkthrough #tryhackme_writeup #recruit_tryhackme #recruit_writeup_tr #tryhackme
Medium
Recruit — TryHackMe CTF Challenge Walkthrough
Infiltrate Recruit’s new portal. Map the site, hunt for flaws, and gain unauthorized access
⤷ Title: From Shell to System
════════════════════════
𐀪 Author: Justin Jude Cabodil
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 19:40:43 GMT
════════════════════════
⌗ Tags: #privilege_escalation #tryhackme #linux
════════════════════════
𐀪 Author: Justin Jude Cabodil
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 19:40:43 GMT
════════════════════════
⌗ Tags: #privilege_escalation #tryhackme #linux
Medium
From Shell to System
Write-up for Linux Privilege Escalation (TryHackMe)
⤷ Title: TryHackMe: ItsyBitsy | Write-Up
════════════════════════
𐀪 Author: Ash T
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 18:52:40 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough #information_security #cybersecurity
════════════════════════
𐀪 Author: Ash T
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 18:52:40 GMT
════════════════════════
⌗ Tags: #tryhackme_writeup #tryhackme #tryhackme_walkthrough #information_security #cybersecurity
Medium
TryHackMe: ItsyBitsy | Write-Up
This is a write-up for the ItsyBitsy room. I will explain how to complete the room and the reasons behind each step.
⤷ Title: The 42,000 Credit Heist: Finding Zero-Day at 42 Schools
════════════════════════
𐀪 Author: Yanard
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 21:30:17 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #bug_bounty #privilege_escalation #zero_day
════════════════════════
𐀪 Author: Yanard
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 21:30:17 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethical_hacking #bug_bounty #privilege_escalation #zero_day
Medium
The 42,000 Credit Heist: Finding Zero-Day at 42 Schools
Published: April 2026 | Research conducted: February 2026
⤷ Title: The 14-Year-Old Next Door Just Became a Hacker. AI Made It Possible
════════════════════════
𐀪 Author: Nasruddin
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 21:41:46 GMT
════════════════════════
⌗ Tags: #agentic_ai #ai_agent #hacking #cybersecurity #vibe_coding
════════════════════════
𐀪 Author: Nasruddin
════════════════════════
ⴵ Time: Sat, 25 Apr 2026 21:41:46 GMT
════════════════════════
⌗ Tags: #agentic_ai #ai_agent #hacking #cybersecurity #vibe_coding
Medium
The 14-Year-Old Next Door Just Became a Hacker. AI Made It Possible
Meet Aarav. He’s 14. He lives in a Tier-2 city in India. He’s average in school, spends most of his time on Discord, and his parents think…