⤷ Title: How a File-Manager Link Could Be Your Biggest Cyber Security Threat
════════════════════════
𐀪 Author: Syed Muhammad Hatim Javaid
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:30:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #links #ethical_hacking #hacking
════════════════════════
𐀪 Author: Syed Muhammad Hatim Javaid
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:30:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #vulnerability #links #ethical_hacking #hacking
Medium
How a File-Manager Link Could Be Your Biggest Cyber Security Threat
In every organization, file-managers are used for convenience — sharing documents, collaborating, granting access. But what happens when…
⤷ Title: AI Prompt Injection Attack – A Technical Deep Dive into the Emerging AI Security Frontier
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:12:15 GMT
════════════════════════
⌗ Tags: #ai #cybersecurity #hacking #cybercrime #artificial_intelligence
════════════════════════
𐀪 Author: David SEHYEON Baek
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:12:15 GMT
════════════════════════
⌗ Tags: #ai #cybersecurity #hacking #cybercrime #artificial_intelligence
Medium
AI Prompt Injection Attack – A Technical Deep Dive into the Emerging AI Security Frontier
AI Prompt Injection Attack – A Technical Deep Dive into the Emerging AI Security Frontier As AI systems evolve from passive information retrieval tools to autonomous agents capable of browsing the …
⤷ Title: Metasploitable 3 (Windows) Write-up — Part [III]: Port 80 — CVE-2015–1635 & FTP Upload Exploitation
════════════════════════
𐀪 Author: Kalash Kundaliya
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:11:21 GMT
════════════════════════
⌗ Tags: #linux #cybersecurity #metasploitable #hacking #privilege_escalation
════════════════════════
𐀪 Author: Kalash Kundaliya
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:11:21 GMT
════════════════════════
⌗ Tags: #linux #cybersecurity #metasploitable #hacking #privilege_escalation
Medium
Metasploitable 3 (Windows) Write-up — Part [III]: Port 80 — CVE-2015–1635 & FTP Upload Exploitation
This guide is strictly for educational purposes only. All demonstrations are performed in a controlled environment using Metasploitable 3…
⤷ Title: Blockchain & Cryptography Development: The Real Difference Between Shor, Grover, and Annealing
════════════════════════
𐀪 Author: SORA SS256 Satoshi is SHA-256
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:07:01 GMT
════════════════════════
⌗ Tags: #quantum_computing #blockchain #web3 #bitcoin #hacking
════════════════════════
𐀪 Author: SORA SS256 Satoshi is SHA-256
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:07:01 GMT
════════════════════════
⌗ Tags: #quantum_computing #blockchain #web3 #bitcoin #hacking
Medium
Blockchain & Cryptography Development: The Real Difference Between Shor, Grover, and Annealing
I get this question all the time:
“What’s the difference between Shor and Grover?”
“What’s the difference between Shor and Grover?”
⤷ Title: Top 10 Cybersecurity Trends to Watch Out for in 2026
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:42:07 GMT
════════════════════════
⌗ Tags: #hacking #cyberattack #cyber_security_awareness #ai #cybersecurity
════════════════════════
𐀪 Author: Manisha Chaudhary
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:42:07 GMT
════════════════════════
⌗ Tags: #hacking #cyberattack #cyber_security_awareness #ai #cybersecurity
Medium
Top 10 Cybersecurity Trends to Watch Out for in 2026
Introduction: Top 10 Cybersecurity Trends to Watch Out for in 2026
⤷ Title: Supply-Chain Attacks Explained: Lessons from Recent Incidents
════════════════════════
𐀪 Author: Hania Khan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:36:07 GMT
════════════════════════
⌗ Tags: #zero_trust #cybersecurity #software_development #infosec #supply_chain_attack
════════════════════════
𐀪 Author: Hania Khan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:36:07 GMT
════════════════════════
⌗ Tags: #zero_trust #cybersecurity #software_development #infosec #supply_chain_attack
Medium
Supply-Chain Attacks Explained: Lessons from Recent Incidents
The Code You Trust Is Betraying You
⤷ Title: Whisper Leak: How Encrypted AI Chats Aren’t as Private as You Think
════════════════════════
𐀪 Author: Virus Vanguard
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:54:06 GMT
════════════════════════
⌗ Tags: #machine_learning #technology #cybersecurity #artificial_intelligence
════════════════════════
𐀪 Author: Virus Vanguard
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:54:06 GMT
════════════════════════
⌗ Tags: #machine_learning #technology #cybersecurity #artificial_intelligence
Medium
Whisper Leak: How Encrypted AI Chats Aren’t as Private as You Think
Whisper Leak: How Encrypted AI Chats Aren’t as Private as You Think Encryption makes us feel safe. When you use an AI chat service, you generally assume that your conversation is …
⤷ Title: Before You Laugh at the Louvre, Check your own Passwords
════════════════════════
𐀪 Author: Raphael Moutard
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:44:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #cyber_security_awareness
════════════════════════
𐀪 Author: Raphael Moutard
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:44:15 GMT
════════════════════════
⌗ Tags: #cybersecurity #information_security #cyber_security_awareness
Medium
Before You Laugh at the Louvre, Check your own Passwords
What this story says about real-world security
⤷ Title: The Most Influential Phrases About Achieving Your Goals
════════════════════════
𐀪 Author: Aliyu Ibrahim
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:21:38 GMT
════════════════════════
⌗ Tags: #bloody_sweet_writers #google #love_letters #writers_on_medium #cybersecurity
════════════════════════
𐀪 Author: Aliyu Ibrahim
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:21:38 GMT
════════════════════════
⌗ Tags: #bloody_sweet_writers #google #love_letters #writers_on_medium #cybersecurity
Medium
The Most Influential Phrases About Achieving Your Goals
Because sometimes all it takes is one line to spark an idea. I learned that words could save my life on the day I realized it.
⤷ Title: Bandit OverTheWire writeup — Level 16 → Level 17
════════════════════════
𐀪 Author: Dawid Kowalski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:17:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #bandit_walkthrough
════════════════════════
𐀪 Author: Dawid Kowalski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:17:06 GMT
════════════════════════
⌗ Tags: #cybersecurity #bandit_walkthrough
Medium
Bandit OverTheWire writeup — Level 16 → Level 17
The credentials for the next level can be retrieved by submitting the password of the current level to a port on localhost in the range…
⤷ Title: CivoraX Internship Programme 2026 — Launch Your Tech Career with Civora Nexus
════════════════════════
𐀪 Author: Shubhamdighe
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:16:57 GMT
════════════════════════
⌗ Tags: #fullstack_development #startup_internship #cybersecurity #civora_nexus #internships
════════════════════════
𐀪 Author: Shubhamdighe
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:16:57 GMT
════════════════════════
⌗ Tags: #fullstack_development #startup_internship #cybersecurity #civora_nexus #internships
Medium
CivoraX Internship Programme 2026 — Launch Your Tech Career with Civora Nexus
Are you ready to kickstart your tech career in 2026? The CivoraX Internship Programme 2026 by Civora Nexus is now open for registrations!
⤷ Title: Bandit OverTheWire writeup — Level 17 → Level 18
════════════════════════
𐀪 Author: Dawid Kowalski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:15:12 GMT
════════════════════════
⌗ Tags: #bandit_walkthrough #cybersecurity
════════════════════════
𐀪 Author: Dawid Kowalski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:15:12 GMT
════════════════════════
⌗ Tags: #bandit_walkthrough #cybersecurity
Medium
Bandit OverTheWire writeup — Level 17 → Level 18
There are 2 files in the homedirectory: passwords.old and passwords.new. The password for the next level is in passwords.new and is the…
⤷ Title: Bandit OverTheWire writeup — Level 15 → Level 16
════════════════════════
𐀪 Author: Dawid Kowalski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:13:48 GMT
════════════════════════
⌗ Tags: #bandit_walkthrough #cybersecurity
════════════════════════
𐀪 Author: Dawid Kowalski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 07:13:48 GMT
════════════════════════
⌗ Tags: #bandit_walkthrough #cybersecurity
Medium
Bandit OverTheWire writeup — Level 15 → Level 16
The password for the next level can be retrieved by submitting the password of the current level to port 30001 on localhost using SSL/TLS…
⤷ Title: Mastering JWT Auth in Laravel from Zero - Part 1
════════════════════════
𐀪 Author: Ali Mousavi
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:23:05 GMT
════════════════════════
⌗ Tags: #php #api_security #jwt_authentication #laravel_framework #backend_development
════════════════════════
𐀪 Author: Ali Mousavi
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:23:05 GMT
════════════════════════
⌗ Tags: #php #api_security #jwt_authentication #laravel_framework #backend_development
Medium
Mastering JWT Auth in Laravel from Zero - Part 1
Set up JWT authentication in Laravel from scratch — no third-party packages, just clean, maintainable code
⤷ Title: OAuth Authentication Bypass leading to PII disclosure
════════════════════════
𐀪 Author: janlele91
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:19:06 GMT
════════════════════════
⌗ Tags: #authentication_bypass #bug_bounty_writeup #bug_bounty_tips #oauth2
════════════════════════
𐀪 Author: janlele91
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 06:19:06 GMT
════════════════════════
⌗ Tags: #authentication_bypass #bug_bounty_writeup #bug_bounty_tips #oauth2
Medium
OAuth Authentication Bypass leading to PII disclosure
Hi — I’m janlele91, an ethical hacker and pentester based in Vietnam, currently working at Viettel Cyber Security (VCS). I also hunt on…
⤷ Title: From Wooden Ducks to Digital Flags: My First v1t CTF OSINT Challenge
════════════════════════
𐀪 Author: Chetan Chinchulkar
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:31:02 GMT
════════════════════════
⌗ Tags: #ctf #bug_bounty #osint #infosec #cybersecurity
════════════════════════
𐀪 Author: Chetan Chinchulkar
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:31:02 GMT
════════════════════════
⌗ Tags: #ctf #bug_bounty #osint #infosec #cybersecurity
Medium
From Wooden Ducks to Digital Flags: My First v1t CTF OSINT Challenge
When a Halloween decoration becomes your next cybersecurity puzzle
⤷ Title: How I Used AI to Become Someone Else (And Why Your Face Is No Longer Your Password)
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:29:24 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #infosec #hacking #cybersecurity #bug_bounty
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:29:24 GMT
════════════════════════
⌗ Tags: #bug_bounty_tips #infosec #hacking #cybersecurity #bug_bounty
Medium
How I Used AI to Become Someone Else (And Why Your Face Is No Longer Your Password) 🤖🎭
Free Link 🎈
⤷ Title: Capture: A TryHackMe CTF writeup
════════════════════════
𐀪 Author: Huzaifa Malik
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:28:53 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #hacking #bug_bounty #web_security
════════════════════════
𐀪 Author: Huzaifa Malik
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:28:53 GMT
════════════════════════
⌗ Tags: #tryhackme #ctf #hacking #bug_bounty #web_security
Medium
Capture: A TryHackMe CTF writeup
Learn how to bypass login form and automate the process using Python script
⤷ Title: The Authorization Circus: Where Security Was the Main Clown
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:22:23 GMT
════════════════════════
⌗ Tags: #infosec #bug_bounty #cybersecurity #bug_bounty_tips #hacking
════════════════════════
𐀪 Author: Iski
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:22:23 GMT
════════════════════════
⌗ Tags: #infosec #bug_bounty #cybersecurity #bug_bounty_tips #hacking
Medium
The Authorization Circus: Where Security Was the Main Clown 🤡🎪
Free Link 🎈
⤷ Title: Time-of-check Time-of-use (TOCTOU) Race Condition Leads to Broken Authentication | Critical Finding
════════════════════════
𐀪 Author: Irsyad Muhammad Fawwaz
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:20:19 GMT
════════════════════════
⌗ Tags: #infosec #security #cybersecurity #bug_bounty #information_security
════════════════════════
𐀪 Author: Irsyad Muhammad Fawwaz
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:20:19 GMT
════════════════════════
⌗ Tags: #infosec #security #cybersecurity #bug_bounty #information_security
Medium
Time-of-check Time-of-use (TOCTOU) Race Condition Leads to Broken Authentication
Time-of-check Time-of-use (TOCTOU) Race Condition Leads to Broken Authentication How I started I was bored and started poking at random public bug bounty programs. As usual I began with subdomain …
⤷ Title: Account Takeover via IDOR: From UserID to Full Access
════════════════════════
𐀪 Author: 0xP0L73R63157
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:19:13 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #ethical_hacking #bug_bounty #bug_bounty_tips #information_security
════════════════════════
𐀪 Author: 0xP0L73R63157
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 09:19:13 GMT
════════════════════════
⌗ Tags: #bug_bounty_writeup #ethical_hacking #bug_bounty #bug_bounty_tips #information_security
Medium
Account Takeover via IDOR: From UserID to Full Access
After discovering an unauthenticated endpoint leaking sensitive user data in the same application (see my previous writeup here), I had a…