Posts

Cloud Reconnaissance: How to Gather Intelligence from C...

Cloud services often expose valuable intelligence through misconfigurations, met...

Jaguar Land Rover Faced a Major Cyber Attack Claiming P...

In August 2025, a massive cyberattack by the "Scattered Lapsus Hunters" compromi...

Exposed IAM Credentials Drive Huge AWS Crypto Mining Op...

A large-scale cryptomining campaign is abusing exposed AWS IAM credentials to de...

VolkLocker Ransomware Broken: Hard-Coded Master Key Let...

Security researchers have uncovered a critical flaw in VolkLocker ransomware, re...

TALES FROM THE WAF | Attacking Web Application Firewall...

In this article we are going to shed some light on what WAFs are, how they work ...

Massive Data Breach: Popular Chrome Extension Found Sec...

The widely used Urban VPN Proxy browser extension, installed by millions, was ca...

Is Your Phone Really Safe? The Uncomfortable Truth Nob...

In this blog we are really going to dive deep into Mobile Security. Uncover what...

New Advanced Phishing Kits Use AI and MFA Bypass Tactic...

Four advanced phishing kits (BlackForce, GhostFrame, InboxPrime AI, and Spiderma...

0-Day Hunting Guide: Recon Techniques Nobody Talks About

Master zero-day vulnerability hunting through advanced reconnaissance techniques...

Model Context Protocol (MCP): A hands on guide

This is a hands on guide to get started creating your own AI-Agents, who work on...

Fortinet, Ivanti, and SAP Issue Urgent Patches for High...

Fortinet, Ivanti, and SAP have released urgent patches to fix serious vulnerabil...

Google Confirms In-the-Wild Attacks on Chrome Via a Hig...

Google has released new security updates for Chrome after confirming that a high...

Active Attacks Exploit Gladinet's Hard-Coded Keys for U...

Recent attacks are taking advantage of hard-coded encryption keys in Gladinet pr...

Windows PowerShell now warns when running Invoke WebReq...

Microsoft has added a new security alert in Windows PowerShell that warns users ...

PCIe 5.0+ Security Alert: Trio of Encryption Flaws Lead...

Three low-severity security flaws (CVE-2025-9612, CVE-2025-9613, CVE-2025-9614) ...

North Korea-Linked Hackers Exploit React2Shell to Deplo...

North Korea-linked threat actors are exploiting the critical React2Shell vulnera...