Breach in the Cloud‼️- [Pwned Labs]
Scenario: You’ve been alerted to a potential security breach at Huge Logistics. Unusual activity was detected in an AWS account, prompting a deep dive into… Read More »Breach in the Cloud‼️- [Pwned Labs]
Scenario: You’ve been alerted to a potential security breach at Huge Logistics. Unusual activity was detected in an AWS account, prompting a deep dive into… Read More »Breach in the Cloud‼️- [Pwned Labs]
Hey there, fellow tech enthusiasts! 🌟 We live in an era where security reigns supreme, especially in the realm of software and technology products. Think… Read More »Demystifying Product Security vs Application Security
Introduction: The increasing frequency and severity of cyber attacks have made application security (appsec) a top priority for businesses worldwide. Appsec pipelines, which are automated… Read More »Fortify Your Code:A Robust AppSec Pipeline for Every Organisation
I am not a science student or neither I am any expertise in this subject but I am always curious to understand science because it… Read More »Understanding Science from a Non Physicist
Memory management is the process of usage of memory from our machine by the application and release the memory when in no use. Memory leaks… Read More »Exploiting & Troubleshooting Memory Leaks – 1
In this post I wanted to portray that Privacy doesn’t exist, Freedom of speech doesn’t exist. How TOR breaches your privacy including attackers and other… Read More »The art of attacking TOR (Independence Day post)
BugBounty is a crowdsourcing cybersecurity solution. Organizations like Pentagon, Google, Yahoo, Microsoft, Pornhub, Netflix, MIT, etc many other organizations from small to big paying huge to hackers for finding security issues.… Read More »10 Amazing Bug-Hunting Tools You can’t Live Without
Security Engineers & leaders consider vulnerability assessments with OWASP risk metrics proactively for several reasons. This approach provides a structured and quantifiable method to identify,… Read More »Blending Vulnerability Assessments with OWASP Risk Metrics ✳️
Alright, fellow pentesters, let’s dive into why AI hacking should be on our radar. While most companies might not have fully integrated AI into their… Read More »AI Hacking – Friendly Guide for Pentesters
Greetings, cybersecurity enthusiasts! With over 4 years entrenched in the fintech sector, I’ve had the privilege to test the digital fortresses of some of the… Read More »Pentesting the Financial Vault: My Journey hacking into Top Fintechs
Hey there, fellow security enthusiasts! Today, I’m thrilled to take you on a journey behind the scenes of Patecatl, our remarkable vulnerability management solution. Although… Read More »An Automated Cost Effective Vulnerability Management Workflow
Life is a gift, and we must cherish every moment of it. However, in our quest for happiness and fulfilment, we tend to escape life… Read More »Hacking into the Mind Trap: Finding Freedom in the Present Moment
Mindsets are powerful beliefs Mindsets are just beliefs; powerful ones, but they’re just something in your mind, and you can change them. Just by being aware… Read More »Mindset: The New Psychology of Success – Carol S. Dweck
The Six Filters for Truth When seeking truth, it is best to consider information from multiple sources. The following are six filters for evaluating the… Read More »How to Fail at Almost Everything and Still Win Big
The Feynman Learning Technique is a powerful method for accelerating learning. Simply reading a book or memorizing information does not equate to true understanding. True… Read More »The Feynman Learning Technique
Free will and determinism are not fashionable topics for discussion, partly because they are thought to be in the realm of philosophy, and philosophers are… Read More »The Debate Continues: Does Free Will Really Exist?
Gitleaks is a tool for finding sensitive information accidentally committed to a git repository. To set it up, you will need to install it on… Read More »Easy Deploy GitLeaks
The superior gift of his intellect is what differentiates a man from other forms of life.While other animals live their lives unconsciously. It’s very sad… Read More »Schools of Indian Philosophy – An Introduction
Kashmir Shaivism is sometimes compared to Advaita Vedanta, the philosophy of the Upanishads. Both these philosophies are non-dualistic approaches and teach that we are all… Read More »Philosophical difference between Advaita and Kashmir Shaivism
NFTs NFTs differ from ERC-20 tokens, such as DAI or LINK, in that each individual token is unique and not divisible. NFTs give the ability… Read More »Mint your first NFT for free (Testnet) !!
Node JS Security Tips 1. Overview These are generally applied to all the frameworks. Summarizing posts from different references. Security HTTP Headers – Strict-Transport-Security enforces secure… Read More »Node JS Security Tips
Container Security Part 3 From the last 2 parts we have understood the Attack Surface of a docker, How we can exploit a docker with… Read More »How to level up your Container Security Journey? Part 3
A significant amount of risks with it when not properly used users who are part of the docker group can elevate their privileges to root.… Read More »How to level up your Container Security Journey? Part 2
Part 1 But why Containers? We use docker for its easy use, portability, and scalability in a very efficient way. I believe it’s a big… Read More »How to level up your Container Security Journey? Part 1
We think the voice in our head is the ultimate truth. People like great artists, scientists, Philosophers, Mystics, or anyone who is deep concern and… Read More »Why smart people are dumb?
Financial Technology, also known as Fintech, which involves finance and the use of technology to ease & automate the process of Global market payment systems.… Read More »Importance of Cyber Security in India’s fintech sector
Mass surveillance leads into the rabbit hole : Yes! Privacy is just an illusion we knew it for a long time but in this era… Read More »Why privacy is just an illusion?
In this post I have shared how I use bypassing logics to convert SSRFs into RCEs and some other critical information disclosures which pays some… Read More »Bypassing SSRFs like a King
During this quarantine, I see a lot of people are using the zoom app from business meetings to connecting with your loved ones. Even Boris… Read More »Zoom is still vulnerable even after the latest patch? RCE in zoom video conferencing app