HackTheBox - Pterodactyl

YouTube
what the hell is even happening

YouTube
Hackers earn $1,298,250 for 47 zero-days at Pwn2Own Berlin 2026

The Pwn2Own Berlin 2026 hacking contest has concluded, with security researchers collecting $1,298,250 in rewards after exploiting 47 zero-day flaws.

BleepingComputer
A File Format Uncracked for 20 Years: Part 2

I reimplemented your data file loader and all I got were these stupid cut missions

lander's posts

Social Engineering Exposes Vulnerability in Corporate Networks

A clever phone call can be all it takes to breach a corporate network - just ask Brandon Dixon, a former penetration tester who convinced an IT security team to hand over root access by pretending to be their boss. With a simple social engineering trick, Dixon was able to reset his "password" and gain unrestricted access…

https://osintsights.com/social-engineering-exposes-vulnerability-in-corporate-networks?utm_source=mastodon&utm_medium=social

#SocialEngineering #Challengeresponse #MfaBypass #PenetrationTesting #EmergingThreats

Social Engineering Exposes Vulnerability in Corporate Networks

Learn how social engineering exposes corporate network vulnerabilities and discover how to protect your business from devastating attacks - read the expert insights now.

OSINTSights

The Bug Bounty Roadmap I'd Follow If I Started Over (With AI)

https://www.youtube.com/watch?v=kujCmXELWqo

#aisecurity #vulnerability #penetrationtesting

The Bug Bounty Roadmap I'd Follow If I Started Over (With AI)

YouTube
How I Got RCE by Bypassing a JavaScript Sandbox

YouTube
Sorry.

YouTube

iX-Workshop: Active Directory hacken und schützen

Werden Sie selbst zum Hacker und lernen, wie Angreifer gezielt Schwachstellen in Active Directory ausnutzen, um Server und Domänencontroller zu kompromittieren.

https://www.heise.de/news/iX-Workshop-Active-Directory-hacken-und-schuetzen-11280076.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&utm_source=mastodon

#ActiveDirectory #Hacking #IT #iXWorkshops #Microsoft #PenetrationTesting #Security #news

iX-Workshop: Active Directory hacken und schützen

Werden Sie selbst zum Hacker und lernen, wie Angreifer gezielt Schwachstellen in Active Directory ausnutzen, um Server und Domänencontroller zu kompromittieren.

heise online
Now You See Me: AADGraphActivityLogs

KQL hunting queries for the new AADGraphActivityLogs table to detect Entra ID reconnaissance tooling based on UserAgent, RequestUri, and volume.

Cloudbrothers