Daily Writeups
3.31K subscribers
1 photo
115K links
Daily Bug Bounty / Cybersecurity Writeups
Source Code : https://github.com/Spix0r/writeup-miner
Download Telegram
Title: The Hunt for the Xbox Hackers
════════════════════════
𐀪 Author: Friedrich R.
════════════════════════
Time: Mon, 10 Feb 2025 23:52:00 GMT
════════════════════════
Tags: #coding #data_science #programming #crime #hacking
Title: Are CSP Nonces Really Secure? A Deep Dive on .NET
════════════════════════
𐀪 Author: Stanislav Babenko
════════════════════════
Time: Tue, 11 Feb 2025 00:53:10 GMT
════════════════════════
Tags: #dot_net_training #dot_net_framework #dot_net_core #cybersecurity #dot_net_developers
Title: Networking Secure Protocols
════════════════════════
𐀪 Author: Demegorash
════════════════════════
Time: Tue, 11 Feb 2025 00:34:20 GMT
════════════════════════
Tags: #cybersecurity #vpn #ssh #https
Title: Cybersecurity Roadmap 2025 For Navigating the Future of Digital Protection
════════════════════════
𐀪 Author: UniNets
════════════════════════
Time: Tue, 11 Feb 2025 00:29:05 GMT
════════════════════════
Tags: #cybersecurity #cybersecurity_training #cyber_security_awareness #cybersecurity_course
Title: Technical capability notice
════════════════════════
𐀪 Author: renaissance chambara
════════════════════════
Time: Tue, 11 Feb 2025 00:24:31 GMT
════════════════════════
Tags: #uk_politics #apple #cybersecurity
Title: AI vs. Child Online Predators: How ROOST Is Creating An Online Safe Haven For Kids
════════════════════════
𐀪 Author: Kelly Reeves
════════════════════════
Time: Mon, 10 Feb 2025 23:51:34 GMT
════════════════════════
Tags: #ai #technology #parenting #child_online_safety #cybersecurity
Title: Hackers Use Google Tag Manager to Plant Skimmers on Magento Stores
════════════════════════
𐀪 Author: KBS
════════════════════════
Time: Mon, 10 Feb 2025 23:23:44 GMT
════════════════════════
Tags: #google_analytics #sql_injection #cybersecurity #vulnerability
Title: Why Threat Modeling is a Must for Every Developer
════════════════════════
𐀪 Author: Fahad Ali Shaikh
════════════════════════
Time: Mon, 10 Feb 2025 23:21:54 GMT
════════════════════════
Tags: #cybersecurity #cyber_security_awareness #threat_modeling
Title: Shortcuts
════════════════════════
𐀪 Author: phonescaler
════════════════════════
Time: Mon, 10 Feb 2025 11:21:01 GMT
════════════════════════
Tags: #tinder #python #frida #penetration_testing
Title: airgorah: A WiFi auditing software that can perform deauth attacks and passwords cracking
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Tue, 11 Feb 2025 02:10:03 +0000
════════════════════════
Tags: #Ethical Hacking #Network Attacks #WiFi auditing
Title: Open Firmware Reverse Analysis Konsole: binary analysis and modification platform
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Tue, 11 Feb 2025 02:01:46 +0000
════════════════════════
Tags: #Reverse Engineering
Title: EscalateGPT: leverages the power of OpenAI to analyze AWS IAM misconfigurations
════════════════════════
𐀪 Author: ddos
════════════════════════
Time: Tue, 11 Feb 2025 01:59:13 +0000
════════════════════════
Tags: #Web AppSec #AWS IAM misconfigurations #EscalateGPT
Title: GitHub Enterprise SAML Bypass Flaw (CVE-2025-23369) Exposed – Technical Analysis and Exploit PoC
════════════════════════
𐀪 Author: do son
════════════════════════
Time: Tue, 11 Feb 2025 02:38:14 +0000
════════════════════════
Tags: #Vulnerability #CVE_2025_23369 #CVE_2025_23369 PoC #GitHub Enterprise
Title: Multiple Security and Privacy Flaws Found in DeepSeek iOS App
════════════════════════
𐀪 Author: do son
════════════════════════
Time: Tue, 11 Feb 2025 02:36:17 +0000
════════════════════════
Tags: #Data Leak #Vulnerability #ByteDance #DeepSeek #DeepSeek Privacy Flaw #Privacy Flaw
Title: Alabama Man Pleads Guilty in Bitcoin Price Manipulation Scheme Involving Hacked SEC X Account
════════════════════════
𐀪 Author: do son
════════════════════════
Time: Tue, 11 Feb 2025 02:31:35 +0000
════════════════════════
Tags: #Cyber Security #Bitcoin #SEC
Title: Malicious Models on Hugging Face: A New Threat to AI Development
════════════════════════
𐀪 Author: do son
════════════════════════
Time: Tue, 11 Feb 2025 02:28:42 +0000
════════════════════════
Tags: #Malware #Hugging Face #Hugging Face platform #nullifAI #Pickle #platform
Title: The Rise of Phishing-as-a-Service: How Cybercriminals are Outsourcing Attacks
════════════════════════
𐀪 Author: do son
════════════════════════
Time: Tue, 11 Feb 2025 02:25:54 +0000
════════════════════════
Tags: #Cyber Security #Phishing_as_a_Service
Title: LegionLoader Malware Downloader Resurfaces with 2,000+ New Samples
════════════════════════
𐀪 Author: do son
════════════════════════
Time: Tue, 11 Feb 2025 02:24:22 +0000
════════════════════════
Tags: #Malware #CurlyGate #LegionLoader #RobotDropper #Satacom
Title: CVE-2025-1077 (CVSSv4 9.5): Critical RCE Vulnerability Found in Visual Weather Products
════════════════════════
𐀪 Author: do son
════════════════════════
Time: Tue, 11 Feb 2025 02:18:53 +0000
════════════════════════
Tags: #Vulnerability #CVE_2025_1077 #IBL Software Engineering #Python #Visual Weather
Title: BadIIS Malware Hijacks Asian Websites for SEO Fraud
════════════════════════
𐀪 Author: do son
════════════════════════
Time: Tue, 11 Feb 2025 02:14:01 +0000
════════════════════════
Tags: #Malware #BadIIS malware
Title: Progress LoadMaster Security Update: Multiple Vulnerabilities Addressed
════════════════════════
𐀪 Author: do son
════════════════════════
Time: Tue, 11 Feb 2025 02:08:35 +0000
════════════════════════
Tags: #Vulnerability #CVE_2024_56131 #CVE_2024_56132 #CVE_2024_56133 #CVE_2024_56134 #CVE_2024_56135 #LoadMaster #LoadMaster Multi_Tenant #Progress