⤷ Title: toc2 Walkthrough
════════════════════════
𐀪 Author: Shahd Mk
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:12:38 GMT
════════════════════════
⌗ Tags: #toc2_walkthrough #tryhackme_writeup #tryhackme_walkthrough #tryhackme #thm
════════════════════════
𐀪 Author: Shahd Mk
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:12:38 GMT
════════════════════════
⌗ Tags: #toc2_walkthrough #tryhackme_writeup #tryhackme_walkthrough #tryhackme #thm
Medium
toc2 Walkthrough
By Shahd Qishta
⤷ Title: “Hack the System (Legally): Your First Step into Ethical Hacking”
════════════════════════
𐀪 Author: Md Johirul Islam
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:33:52 GMT
════════════════════════
⌗ Tags: #security #cybersecurity #hacking #ethical_hacking
════════════════════════
𐀪 Author: Md Johirul Islam
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:33:52 GMT
════════════════════════
⌗ Tags: #security #cybersecurity #hacking #ethical_hacking
Medium
🧠💻 “Hack the System (Legally): Your First Step into Ethical Hacking”
🚀 Welcome to Lesson 1: What Is Ethical Hacking?
⤷ Title: How Impossible Is It to Guess a Crypto Wallet?
════════════════════════
𐀪 Author: Jeffrey Berthiaume
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:24:14 GMT
════════════════════════
⌗ Tags: #hacking #quantum_computing #passwords #cryptocurrency #crypto_wallet
════════════════════════
𐀪 Author: Jeffrey Berthiaume
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:24:14 GMT
════════════════════════
⌗ Tags: #hacking #quantum_computing #passwords #cryptocurrency #crypto_wallet
Medium
How Impossible Is It to Guess a Crypto Wallet?
When my 13-year-old asked, “What if someone just guesses my wallet words?”, I smiled. It sounds simple. You’ve got twelve words. You try…
⤷ Title: They’re Not After Your Password Anymore. Here’s What Phishers Really Want.
════════════════════════
𐀪 Author: Jamal Mammadli
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:30:58 GMT
════════════════════════
⌗ Tags: #social_engineering #phishing #tech #online_safety #cybersecurity
════════════════════════
𐀪 Author: Jamal Mammadli
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:30:58 GMT
════════════════════════
⌗ Tags: #social_engineering #phishing #tech #online_safety #cybersecurity
Medium
They’re Not After Your Password Anymore. Here’s What Phishers Really Want.
You receive an email that looks perfectly legitimate: “Your account has been suspended. Click this link to recover it.” You click. But your…
⤷ Title: Is the Modern internet that fragile?
════════════════════════
𐀪 Author: Olabisi Oduola
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:29:14 GMT
════════════════════════
⌗ Tags: #open_source #technology #internet #linux #cybersecurity
════════════════════════
𐀪 Author: Olabisi Oduola
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 23:29:14 GMT
════════════════════════
⌗ Tags: #open_source #technology #internet #linux #cybersecurity
Medium
Is the Modern internet that fragile?
A satire of how fragile the modern internet can be
⤷ Title: Access Control Deconstructed: Why a Single Admin Key is a Critical Threat?
════════════════════════
𐀪 Author: Zainab Ibrahim
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:36:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethereum #web3 #smart_contracts
════════════════════════
𐀪 Author: Zainab Ibrahim
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:36:38 GMT
════════════════════════
⌗ Tags: #cybersecurity #ethereum #web3 #smart_contracts
Medium
Access Control Deconstructed: Why a Single Admin Key is a Critical Threat?
Access Control Deconstructed: Why a Single Admin Key is a Critical Threat? INTRODUCTION: THE SINGLE POINT OF FAILURE IN MODERN DEFI Every experienced developer understands the onlyOwner modifier …
⤷ Title: My eCTHP Experience: A 4-Day Marathon, a 46-Page Report, and Way Too Much Coffee
════════════════════════
𐀪 Author: Tolga DEMIREL
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:33:39 GMT
════════════════════════
⌗ Tags: #blue_team #threat_hunting #cybersecurity #mitre_attack #ecthp
════════════════════════
𐀪 Author: Tolga DEMIREL
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:33:39 GMT
════════════════════════
⌗ Tags: #blue_team #threat_hunting #cybersecurity #mitre_attack #ecthp
Medium
My eCTHP Experience: A 4-Day Marathon, a 46-Page Report, and Way Too Much Coffee
I’ve been wanting to improve myself on the Blue Team side for quite some time.
After spending months solving labs on BTLO, playing with…
After spending months solving labs on BTLO, playing with…
⤷ Title: Introduction to SOAR — Try Hack Me Walkthrough
════════════════════════
𐀪 Author: Chaitanya Garware
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:32:14 GMT
════════════════════════
⌗ Tags: #soar #tryhackme_writeup #tryhackme_walkthrough #blue_team #cybersecurity
════════════════════════
𐀪 Author: Chaitanya Garware
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:32:14 GMT
════════════════════════
⌗ Tags: #soar #tryhackme_writeup #tryhackme_walkthrough #blue_team #cybersecurity
Medium
Introduction to SOAR — Try Hack Me Walkthrough
## Task 1—Introduction
⤷ Title: Understanding Covert Channels: Hidden Pathways of Data Leakage
════════════════════════
𐀪 Author: Raviteja Mureboina
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:19:48 GMT
════════════════════════
⌗ Tags: #data #transmission #covert_channel #cybersecurity #leaked
════════════════════════
𐀪 Author: Raviteja Mureboina
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:19:48 GMT
════════════════════════
⌗ Tags: #data #transmission #covert_channel #cybersecurity #leaked
Medium
Understanding Covert Channels: Hidden Pathways of Data Leakage
In the world of cybersecurity, not all data transmissions occur through authorized or visible means. Some communications sneak through the…
⤷ Title: TryHackMe — File Inclusion — Walkthrough
════════════════════════
𐀪 Author: Alan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:10:20 GMT
════════════════════════
⌗ Tags: #remote_file_inclusion #tryhackme #cybersecurity #local_file_inclusion #tryhackme_walkthrough
════════════════════════
𐀪 Author: Alan
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:10:20 GMT
════════════════════════
⌗ Tags: #remote_file_inclusion #tryhackme #cybersecurity #local_file_inclusion #tryhackme_walkthrough
Medium
TryHackMe — File Inclusion — Walkthrough
Welcome to this walkthrough of the File Inclusion room on TryHackMe. Remember that this post will contain the answers to the questions. I…
⤷ Title: AI: technical problems
════════════════════════
𐀪 Author: Jhoan Sebastián Fuentes Hernández
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:07:04 GMT
════════════════════════
⌗ Tags: #ai #technology #deep_learning #cybersecurity
════════════════════════
𐀪 Author: Jhoan Sebastián Fuentes Hernández
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:07:04 GMT
════════════════════════
⌗ Tags: #ai #technology #deep_learning #cybersecurity
Medium
AI: technical problems
AI has at least three technical problems that not only haven’t been solved, but have evolved.
⤷ Title: HTB Challenge — Global Hyperlink Zone
════════════════════════
𐀪 Author: Fardeen A.
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:57:49 GMT
════════════════════════
⌗ Tags: #hackthebox #learning #ctf_writeup #cybersecurity #challenge
════════════════════════
𐀪 Author: Fardeen A.
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:57:49 GMT
════════════════════════
⌗ Tags: #hackthebox #learning #ctf_writeup #cybersecurity #challenge
Medium
HTB Challenge — Global Hyperlink Zone
Hello, and thank you if you’re one of the few tech savvy, interested in HackTheBox reading this. This is one of the series that I’ve…
⤷ Title: Penforce CTF 2025 Write-up: Securing 1st Place (and 3 First Bloods)
════════════════════════
𐀪 Author: Ibraheem EL-Mougy
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:53:13 GMT
════════════════════════
⌗ Tags: #ctf #bypass #cybersecurity #xss_attack #penetration_testing
════════════════════════
𐀪 Author: Ibraheem EL-Mougy
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 21:53:13 GMT
════════════════════════
⌗ Tags: #ctf #bypass #cybersecurity #xss_attack #penetration_testing
Medium
Penforce CTF 2025 Write-up: Securing 1st Place (and 3 First Bloods)
Cover photo
⤷ Title: X Rewards & Bonus Opportunities — November 2025
════════════════════════
𐀪 Author: X Community
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:50:31 GMT
════════════════════════
⌗ Tags: #crypto #blockchain #xs #rewards #bonus
════════════════════════
𐀪 Author: X Community
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:50:31 GMT
════════════════════════
⌗ Tags: #crypto #blockchain #xs #rewards #bonus
Medium
X Airdrop 🌟 Eligibility, Checker + Bonus — [Step-By-Step Guide]
Discover all the ways to unlock rewards and bonuses with X Community.
⤷ Title: Unlock X Benefits & Rewards — November 2025
════════════════════════
𐀪 Author: Sydney
Wright
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:35:42 GMT
════════════════════════
⌗ Tags: #rewards #blockchain #crypto #bonus #xs
════════════════════════
𐀪 Author: Sydney
Wright
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:35:42 GMT
════════════════════════
⌗ Tags: #rewards #blockchain #crypto #bonus #xs
Medium
X Airdrop Guide — Claim Tokens Now! 🚀 [November 2025]
Discover how to access and benefit from the latest X reward program.
⤷ Title: Add Medium to The List of Potential Censors
════════════════════════
𐀪 Author: Elyon - AGI’s Architect - L2s & LLMs Mirror Me
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:21:41 GMT
════════════════════════
⌗ Tags: #medium #artificial_intelligence #twitter #censorship #xs
════════════════════════
𐀪 Author: Elyon - AGI’s Architect - L2s & LLMs Mirror Me
════════════════════════
ⴵ Time: Sun, 09 Nov 2025 22:21:41 GMT
════════════════════════
⌗ Tags: #medium #artificial_intelligence #twitter #censorship #xs
Medium
Add Medium to The List of Potential Censors
My Medium Story Stats Are Now Showing Signs of Manipulation
⤷ Title: Touchscreen MacBook Pro & Foldable iPhone: Apple’s “Most Pivotal Year Yet” Revealed
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 01:49:24 +0000
════════════════════════
⌗ Tags: #Technology #2026Roadmap #Apple #AppleIntelligence #FoldableiPhone #Health #M6Chip #MacBookPro #MarkGurman #OLED #Touchscreen
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 01:49:24 +0000
════════════════════════
⌗ Tags: #Technology #2026Roadmap #Apple #AppleIntelligence #FoldableiPhone #Health #M6Chip #MacBookPro #MarkGurman #OLED #Touchscreen
Daily CyberSecurity
Touchscreen MacBook Pro & Foldable iPhone: Apple's "Most Pivotal Year Yet" Revealed
Apple's 2026 roadmap is huge: M6 Pro/Max MacBook Pros with OLED and touchscreen, a foldable iPhone, and a new AI-powered Health+ service.
⤷ Title: iPhone’s Off-Grid Future: Maps, Photos, & ‘Natural Usage’ Satellite Features Revealed
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 01:43:00 +0000
════════════════════════
⌗ Tags: #Technology #5GNTN #Apple #AppleMaps #Bloomberg #Globalstar #iphone #MarkGurman #NaturalUsage #PhotoMessaging #Satellite Connectivity
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 01:43:00 +0000
════════════════════════
⌗ Tags: #Technology #5GNTN #Apple #AppleMaps #Bloomberg #Globalstar #iphone #MarkGurman #NaturalUsage #PhotoMessaging #Satellite Connectivity
Daily CyberSecurity
iPhone's Off-Grid Future: Maps, Photos, & 'Natural Usage' Satellite Features Revealed
Apple is expanding iPhone satellite features beyond SOS! New capabilities include off-grid Maps, photo messaging, 5G NTN support, and seamless "natural usage."
⤷ Title: Zero-Click Samsung Zero-Day (CVE-2025-21042) Delivered LANDFALL Spyware Via Malicious DNG Images
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:43:08 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability Report #CVE_2025_21042 #DNG Image #LANDFALL #Middle East #samsung #spyware #Unit 42 #WhatsApp #Zero_Click
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:43:08 +0000
════════════════════════
⌗ Tags: #Malware #Vulnerability Report #CVE_2025_21042 #DNG Image #LANDFALL #Middle East #samsung #spyware #Unit 42 #WhatsApp #Zero_Click
Daily CyberSecurity
Zero-Click Samsung Zero-Day (CVE-2025-21042) Delivered LANDFALL Spyware Via Malicious DNG Images
Unit 42 exposed LANDFALL, commercial-grade spyware that exploited a Samsung zero-day (CVE-2025-21042) in the image library libimagecodec.quram.so to compromise Galaxy phones via DNG images sent over WhatsApp.
⤷ Title: Fantasy Hub RAT MaaS Uncovered: Russian Spyware Uses Telegram Bot and WebRTC to Hijack Android Devices
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:40:08 +0000
════════════════════════
⌗ Tags: #Malware #Android RAT #Banking Trojan #Fantasy Hub #MaaS #phishing #spyware #Telegram bot #WebRTC
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:40:08 +0000
════════════════════════
⌗ Tags: #Malware #Android RAT #Banking Trojan #Fantasy Hub #MaaS #phishing #spyware #Telegram bot #WebRTC
Daily CyberSecurity
Fantasy Hub RAT MaaS Uncovered: Russian Spyware Uses Telegram Bot and WebRTC to Hijack Android Devices
Zimperium exposed Fantasy Hub, a Russian MaaS Android RAT. It uses a Telegram bot for subscriptions and WebRTC to covertly stream live video and audio, targeting Russian banks with dynamic overlays.
⤷ Title: NuGet Sabotage: Time-Delayed Logic in 9 Packages Risks Total App Destruction on Hardcoded Dates
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:35:37 +0000
════════════════════════
⌗ Tags: #Malware #Destructive Payload #NuGet #PLC #Ransomware_as_a_Service #Shanhai666 #Sharp7Extend #supply chain attack #Time_Delayed Logic
════════════════════════
𐀪 Author: Ddos
════════════════════════
ⴵ Time: Mon, 10 Nov 2025 00:35:37 +0000
════════════════════════
⌗ Tags: #Malware #Destructive Payload #NuGet #PLC #Ransomware_as_a_Service #Shanhai666 #Sharp7Extend #supply chain attack #Time_Delayed Logic
Daily CyberSecurity
NuGet Sabotage: Time-Delayed Logic in 9 Packages Risks Total App Destruction on Hardcoded Dates
A NuGet supply chain attack injected time-delayed destructive logic into 9 packages. The malware triggers random crashes and silent data corruption on hardcoded future dates, targeting database/PLC applications.