Daily Writeups
3.3K subscribers
1 photo
117K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: Python Web API 5 — Securing Your Python Web API: Authentication and Authorization Techniques
════════════════════════
𐀪 Author: Ayşe Kübra Kuyucu
════════════════════════
Time: Mon, 10 Feb 2025 14:02:07 GMT
════════════════════════
Tags: #api_best_practices #python_security #python_authentication #api_security #web_api_authorization
Title: FROM TWITTER TO X IS THE SAME.
════════════════════════
𐀪 Author: Patrick Carafa
════════════════════════
Time: Mon, 10 Feb 2025 14:23:33 GMT
════════════════════════
Tags: #twitter #social #social_media #xs #channel
Title: Rootme CTF Walkthrough (Tryhackme)
════════════════════════
𐀪 Author: sys_br3ach3r
════════════════════════
Time: Mon, 10 Feb 2025 13:52:00 GMT
════════════════════════
Tags: #ctf #bugbounty_writeup #infosec_write_ups #ctf_writeup #ctf_walkthrough
Title: Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
════════════════════════
𐀪 Author: Unknown
════════════════════════
Time: Mon, 10 Feb 2025 20:46:00 +0530
════════════════════════
Tags: No_Tags
Title: Handala Hackers Claim Massive Data Breach on Israeli Police, Leak 350,000 Files
════════════════════════
𐀪 Author: Waqas
════════════════════════
Time: Mon, 10 Feb 2025 16:21:55 +0000
════════════════════════
Tags: #Hacking News #Leaks #Cyber Attack #Cybersecurity #data breach #Handala #Israel #LEAKS #Palestine
Title: 5 Things We Are Going to Continue to Ignore in 2025
════════════════════════
𐀪 Author: BHIS
════════════════════════
Time: Mon, 10 Feb 2025 16:00:00 +0000
════════════════════════
Tags: #Blue Team #Incident Response #John Strand #Red Team #Webcast Wrap_Up #AI #cloud #penetration testing
Title: Unveiling EXIF Metadata: How to Extract Hidden Information from Images
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
Time: Mon, 10 Feb 2025 16:37:57 GMT
════════════════════════
Tags: #bugcrowd #hacking #2025 #exiftool #bug_bounty
Title: How to Start Your Journey in Bug Bounty Hunting
════════════════════════
𐀪 Author: Vipul Sonule
════════════════════════
Time: Mon, 10 Feb 2025 16:16:08 GMT
════════════════════════
Tags: #tools #bug_bounty #technology #penetration_testing #cybersecurity
Title: STIX/TAXII: The Cybersecurity Game-Changer You’re Not Using Yet!”
════════════════════════
𐀪 Author: Paritosh
════════════════════════
Time: Mon, 10 Feb 2025 15:10:22 GMT
════════════════════════
Tags: #threat_intelligence #hacking #information_technology #cybersecurity #bug_bounty
Title: Ever wanted to be a hacker?
════════════════════════
𐀪 Author: Zaina Haider
════════════════════════
Time: Mon, 10 Feb 2025 16:20:58 GMT
════════════════════════
Tags: #generative_ai_tools #ethical_hacking #ethical_hacking_training #technology #hacking
Title: What’s the Secret? Unpacking Command-Line Argument Manipulation
════════════════════════
𐀪 Author: JustAnother-Engineer
════════════════════════
Time: Mon, 10 Feb 2025 15:46:50 GMT
════════════════════════
Tags: #windows #cybersecurity #security #hacking #technology
Title: Hacking SJCAM4000 via Wi-Fi
════════════════════════
𐀪 Author: Cyber ​​Library
════════════════════════
Time: Mon, 10 Feb 2025 15:03:55 GMT
════════════════════════
Tags: #linux #cameras #hacking #wifi
Title: Cyber Briefing: 2025.02.10
════════════════════════
𐀪 Author: CyberMaterial
════════════════════════
Time: Mon, 10 Feb 2025 15:00:03 GMT
════════════════════════
Tags: #cybersecurity #apple #cyber_briefing #technology #infosec
Title: How to Land a Tech Job: Key Tips for Success
════════════════════════
𐀪 Author: Trent W
════════════════════════
Time: Mon, 10 Feb 2025 16:42:29 GMT
════════════════════════
Tags: #jobs #cybersecurity #business #tech #startup
Title: The Financial Sector’s Quantum Reckoning: Why Europol Is Sounding the Alarm
════════════════════════
𐀪 Author: Jason Nathaniel Ader
════════════════════════
Time: Mon, 10 Feb 2025 16:38:17 GMT
════════════════════════
Tags: #cybersecurity #europol #quantum_computing
Title: Mastering Modern Red Teaming Infrastructure Part 4: Advanced OSINT Techniques, Credential…
════════════════════════
𐀪 Author: Faris Faisal 0xFF
════════════════════════
Time: Mon, 10 Feb 2025 16:23:39 GMT
════════════════════════
Tags: #darkweb #osint #cybersecurity #azure #information_security
Title: Conducting ATT&CK Assessments Based on APTs and Client Business Sectors.
════════════════════════
𐀪 Author: h4rd1n
════════════════════════
Time: Mon, 10 Feb 2025 16:18:15 GMT
════════════════════════
Tags: #threat_intelligence #intelligence #cybersecurity #mitre_attack #detection_engineering
Title: The Role of Penetration Testing in Healthcare Cybersecurity
════════════════════════
𐀪 Author: Gil Vidals
════════════════════════
Time: Mon, 10 Feb 2025 16:18:05 GMT
════════════════════════
Tags: #cybersecurity #hipaa_compliance #hipaa
Title: QRishing: When QR Codes become a Hacker’s best Friend
════════════════════════
𐀪 Author: Pavlović Goran
════════════════════════
Time: Mon, 10 Feb 2025 16:16:56 GMT
════════════════════════
Tags: #qrishing #cybersecurity #cybercrime #cyberattack #qr_code
Title: The Future is Now: 5 Tech Trends Shaping 2025
════════════════════════
𐀪 Author: Asma M.
════════════════════════
Time: Mon, 10 Feb 2025 16:07:26 GMT
════════════════════════
Tags: #artificial_intelligence #technology #technology_trends #cybersecurity #future_of_work
Title: I will write data science, tech, business analyst, cybersecurity, data analytics resume
════════════════════════
𐀪 Author: Amelia_cv
════════════════════════
Time: Mon, 10 Feb 2025 15:57:24 GMT
════════════════════════
Tags: #health #business_anayst #business #data_science #cybersecurity