⤷ Title: AI-Powered Cyber threats: How Hackers are using AI for Cyber attacks
════════════════════════
𐀪 Author: Borderless CS
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:52:41 GMT
════════════════════════
⌗ Tags: #cyber_threat #cyberattack #cybersecurity #artificial_intelligence
════════════════════════
𐀪 Author: Borderless CS
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:52:41 GMT
════════════════════════
⌗ Tags: #cyber_threat #cyberattack #cybersecurity #artificial_intelligence
Medium
AI-Powered Cyber threats: How Hackers are using AI for Cyber attacks
Introduction of AI-Powered Cyber threats
⤷ Title: Unauthorized Access to the Uploads Directory in Web Applications
════════════════════════
𐀪 Author: Vikas Rai
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:52:03 GMT
════════════════════════
⌗ Tags: #security #web_development #penetration_testing #cybersecurity #ethical_hacking
════════════════════════
𐀪 Author: Vikas Rai
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:52:03 GMT
════════════════════════
⌗ Tags: #security #web_development #penetration_testing #cybersecurity #ethical_hacking
Medium
Unauthorized Access to the Uploads Directory in Web Applications
Recently, I discovered a critical flaw in a web application that allowed unauthorized access to its uploads directory, exposing sensitive…
⤷ Title: Apple and Google Remove 20 Malicious Apps Infecting Users with Data-Stealing Malware!
════════════════════════
𐀪 Author: Rutuja Desai
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:35:46 GMT
════════════════════════
⌗ Tags: #google_play #app_store #data_breach #malwarealert #cybersecurity
════════════════════════
𐀪 Author: Rutuja Desai
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:35:46 GMT
════════════════════════
⌗ Tags: #google_play #app_store #data_breach #malwarealert #cybersecurity
Medium
Apple and Google Remove 20 Malicious Apps Infecting Users with Data-Stealing Malware!
Apple and Google have taken swift action to remove 20 malicious apps from their respective app stores after security researchers discovered…
⤷ Title: Best Solution to Avoid Phishing attacks in Chicago
════════════════════════
𐀪 Author: Cyber Bark LLC
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:31:41 GMT
════════════════════════
⌗ Tags: #usa #cyber_bark_llc #b2b #cybersecurity #phishing
════════════════════════
𐀪 Author: Cyber Bark LLC
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:31:41 GMT
════════════════════════
⌗ Tags: #usa #cyber_bark_llc #b2b #cybersecurity #phishing
Medium
Best Solution to Avoid Phishing attacks in Chicago
Today, one of the most hazardous cyber threats in businesses is a phishing attack. In such, employees or a person may fall into such traps…
⤷ Title: HTB Sherlock Writeup “Loggy”
════════════════════════
𐀪 Author: Joanbrea
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:20:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #malware_analysis #reverse_engineering #htb_writeup
════════════════════════
𐀪 Author: Joanbrea
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:20:09 GMT
════════════════════════
⌗ Tags: #cybersecurity #malware_analysis #reverse_engineering #htb_writeup
Medium
Scenario
Writeup Loggy
⤷ Title: LFI to RCE, Web Exploitation - Watcher : TryHackMe Walkthrough
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:13:49 GMT
════════════════════════
⌗ Tags: #web_development #penetration_testing #cybersecurity #tryhackme #tryhackme_walkthrough
════════════════════════
𐀪 Author: RosanaFSS
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:13:49 GMT
════════════════════════
⌗ Tags: #web_development #penetration_testing #cybersecurity #tryhackme #tryhackme_walkthrough
Medium
LFI to RCE, Web Exploitation - Watcher : TryHackMe Walkthrough - 210 points
Linux boot2root CTF! Explore Broken Object Level Authorization (BOLA), API3:2023 practicing Local File Inclusion (LFI), Remote Code…
⤷ Title: Elevating Security and Privacy with ServiceNow Vault
════════════════════════
𐀪 Author: Rachana Gupta
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:08:04 GMT
════════════════════════
⌗ Tags: #saas_security #servicenow #cybersecurity #saas #vault
════════════════════════
𐀪 Author: Rachana Gupta
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 04:08:04 GMT
════════════════════════
⌗ Tags: #saas_security #servicenow #cybersecurity #saas #vault
Medium
Elevating Security and Privacy with ServiceNow Vault
In today’s digital age, organizations increasingly rely on cloud platforms to manage workflows, store sensitive data, and drive efficiency…
⤷ Title: Evil Crow RF: A Portable Radio Frequency Device
════════════════════════
𐀪 Author: mh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:52:34 +0000
════════════════════════
⌗ Tags: #Evil Crow RF #Flipper Zero #Radio Frequency #SDR #Sub_GHz
════════════════════════
𐀪 Author: mh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:52:34 +0000
════════════════════════
⌗ Tags: #Evil Crow RF #Flipper Zero #Radio Frequency #SDR #Sub_GHz
Mobile Hacker
Evil Crow RF: A Portable Radio Frequency Device
This tool expands your smartphone’s capabilities, allowing you to dive into RF analysis, penetration testing, and signal manipulation—bringing mobile hacking to a whole new level.
⤷ Title: Selecting A Program for Bug Bounty on HackerOne
════════════════════════
𐀪 Author: the_unlucky_guy
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:30:42 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #cybersecurity #hackerone #bug_bounty
════════════════════════
𐀪 Author: the_unlucky_guy
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:30:42 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #bug_bounty_writeup #cybersecurity #hackerone #bug_bounty
Medium
Selecting A Program for Bug Bounty on HackerOne
Hello hackers, welcome back to my new article. This article will be focused purely on selecting a program for bug bounty on the platform…
⤷ Title: Mastering Amass: The Ultimate Recon Toolkit
════════════════════════
𐀪 Author: Muhammad Abdullah Niazi
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:28:15 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #reconnaissance #enumeration #bug_bounty
════════════════════════
𐀪 Author: Muhammad Abdullah Niazi
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:28:15 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #reconnaissance #enumeration #bug_bounty
Medium
Mastering Amass: The Ultimate Recon Toolkit
From Basics to Pro: Amass Explained
⤷ Title: Finding subdomains that are hidden in the cloud.
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:25:15 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #penetration_testing #cybersecurity #cloud
════════════════════════
𐀪 Author: loyalonlytoday
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:25:15 GMT
════════════════════════
⌗ Tags: #bug_bounty #hacking #penetration_testing #cybersecurity #cloud
Medium
Finding subdomains that are hidden in the cloud.
👋 Hello all👋
⤷ Title: Stored XSS into Onclick Event: Bypassing Angle Brackets, Double Quotes, and Escaped Characters —…
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:25:04 GMT
════════════════════════
⌗ Tags: #exploiting_onclick_xss #bug_bounty #portswigger_xss_lab #stored_xss_bypass #bypass_html_encoding
════════════════════════
𐀪 Author: Bash Overflow
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:25:04 GMT
════════════════════════
⌗ Tags: #exploiting_onclick_xss #bug_bounty #portswigger_xss_lab #stored_xss_bypass #bypass_html_encoding
Medium
Stored XSS into Onclick Event: Bypassing Angle Brackets, Double Quotes, and Escaped Characters — XSS Labs
[Write-up] Stored XSS into Onclick Event with Angle Brackets and Double Quotes HTML-encoded and Single Quotes and Backslash Escaped.
⤷ Title: How to Uncover Hidden Attack Surfaces? Recon part 6
════════════════════════
𐀪 Author: It4chis3c
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:17 GMT
════════════════════════
⌗ Tags: #bug_bounty #attack_surface #hidden #port_scanning #ip_scans
════════════════════════
𐀪 Author: It4chis3c
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:17 GMT
════════════════════════
⌗ Tags: #bug_bounty #attack_surface #hidden #port_scanning #ip_scans
Medium
How to Uncover Hidden Attack Surfaces? Recon part 6
Probing | IP Resolution | Port Scanning
⤷ Title: Bug Bounty Target Selection: How Hackers Find the Most Profitable & Juicy Bugs Before Anyone Else!
════════════════════════
𐀪 Author: Akash Ghosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:18:51 GMT
════════════════════════
⌗ Tags: #technology #programming #cybersecurity #bug_bounty_writeup #bug_bounty
════════════════════════
𐀪 Author: Akash Ghosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:18:51 GMT
════════════════════════
⌗ Tags: #technology #programming #cybersecurity #bug_bounty_writeup #bug_bounty
Medium
Bug Bounty Target Selection: How Hackers Find the Most Profitable & Juicy Bugs Before Anyone Else!
Free Link
⤷ Title: Threat Hunting Techniques and Generative AI: A Practical Approach
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:20:05 GMT
════════════════════════
⌗ Tags: #information_technology #cybersecurity #bug_bounty #threat_hunting #ai
════════════════════════
𐀪 Author: Paritosh
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:20:05 GMT
════════════════════════
⌗ Tags: #information_technology #cybersecurity #bug_bounty #threat_hunting #ai
Medium
Threat Hunting Techniques and Generative AI: A Practical Approach
Cyber threats are evolving rapidly, making proactive threat hunting a crucial security function. Traditional detection methods, such as…
⤷ Title: Notify Tutorial for Bug Hunters
════════════════════════
𐀪 Author: AbhirupKonwar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:11:46 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #pentesting #hacking #bug_bounty_tips
════════════════════════
𐀪 Author: AbhirupKonwar
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:11:46 GMT
════════════════════════
⌗ Tags: #bug_bounty #cybersecurity #pentesting #hacking #bug_bounty_tips
Medium
Notify Tutorial for Bug Hunters
Get quick alerts on Discord (Automation Guide)
⤷ Title: Unleashing the Power of Delta Executor APK: A Gamer’s Journey
════════════════════════
𐀪 Author: MalikHassan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:22 GMT
════════════════════════
⌗ Tags: #application_security #application #application_development #applicant_tracking_system #apps
════════════════════════
𐀪 Author: MalikHassan
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:17:22 GMT
════════════════════════
⌗ Tags: #application_security #application #application_development #applicant_tracking_system #apps
Medium
Unleashing the Power of Delta Executor APK: A Gamer’s Journey
Gaming has evolved beyond simple entertainment. For many, it’s a world of endless possibilities, customization, and innovation. Among the…
⤷ Title: Linux Privilege Escalation, some ideas from tryhackme machines — part 1
════════════════════════
𐀪 Author: Loaymorad
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:49:28 GMT
════════════════════════
⌗ Tags: #tryhackme #bugbounty_writeup #hacking #cybersecurity #penetration_testing
════════════════════════
𐀪 Author: Loaymorad
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:49:28 GMT
════════════════════════
⌗ Tags: #tryhackme #bugbounty_writeup #hacking #cybersecurity #penetration_testing
Medium
Linux Privilege Escalation, some ideas from tryhackme machines — part 1
بسم الله الرحمن الرحيم
⤷ Title: Creating a Code Obfuscation Program For C
════════════════════════
𐀪 Author: Aleksa Zatezalo
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:55 GMT
════════════════════════
⌗ Tags: #hacking #c #python #code_obfuscation
════════════════════════
𐀪 Author: Aleksa Zatezalo
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:23:55 GMT
════════════════════════
⌗ Tags: #hacking #c #python #code_obfuscation
Medium
Creating a Code Obfuscation Program For C
Imagine you’re trying to sneak past a security guard. If you walk right up wearing a mask and carrying suspicious stuff, you’ll get caught…
⤷ Title: Understanding XSS (Cross-Site Scripting) — A Complete Guide
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:12:54 GMT
════════════════════════
⌗ Tags: #cross_site_scripting #bugbounty_writeup #xss_attack #hacking #bug_bounty_tips
════════════════════════
𐀪 Author: xabit • hacks
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 05:12:54 GMT
════════════════════════
⌗ Tags: #cross_site_scripting #bugbounty_writeup #xss_attack #hacking #bug_bounty_tips
Medium
Understanding XSS (Cross-Site Scripting) — A Complete Guide
Hello! My name is XABIT, and I am an ethical hacker and part-time bug bounty hunter. In this write-up, I will teach you everything about…
⤷ Title: Do you want to ?
════════════════════════
𐀪 Author: Horizon Secured
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:41:05 GMT
════════════════════════
⌗ Tags: #windows_security #active_directory_security #cybersecurity #windows #active_directory
════════════════════════
𐀪 Author: Horizon Secured
════════════════════════
ⴵ Time: Tue, 11 Feb 2025 06:41:05 GMT
════════════════════════
⌗ Tags: #windows_security #active_directory_security #cybersecurity #windows #active_directory
Medium
Do you want to 𝗱𝗶𝘀𝗮𝗯𝗹𝗲 𝗥𝗖𝟰 𝗶𝗻 𝘆𝗼𝘂𝗿 𝗱𝗼𝗺𝗮𝗶𝗻?
You definitely should!