Generative AI’s disruptive potential — boon for cyber-crime?Article is written to illuminate and prompt contemplation on the imminent and potential hazards that may arise in the near future.Jan 5Jan 5
Cyber Threat Intelligence: From Community PerspectiveThe world of Cyber Threat Intelligence (CTI) is complex and often misunderstood. An analysis of community discussions reveals critical…Dec 2, 2023Dec 2, 2023
Untold Story of Cybersecurity Professionals!The critical role of cybersecurity professionals. But what’s often unseen is the intricate dance they perform daily within the…Dec 1, 2023Dec 1, 2023
Path traversal to RCE — Openfire — CVE-2023–32315The article contains analysis on how remote code execution was achieved from Path traversal vulnerability on Openfire — CVE-2023–32315.Jun 7, 2023Jun 7, 2023
I have been a firm believer of the mentioned statement and it completely makes sense.Many times organizations tend to blindly believe problems highlighted by the vendors while the real root cause of why the failure happened…Jun 5, 2023Jun 5, 2023
Guide on bruteforcing commerical VPN, OWA and RDWebAbstract — This article aims to assist defenders in identifying, verifying, and mitigating brute-forcing activities conducted by…Jun 1, 2023Jun 1, 2023
Why Ozan SuperApp is favorite amongst Russian cyber-criminals?Contains detailed Threat Intelligence analysis on trending Turkey-based SuperApp & virtual card provider and how cyber-crime enablers fly…May 18, 2023May 18, 2023
Creating backdoor on Github accountAbstract — Importance of regularly auditing Personal Access Tokens, OAuth Apps and added SSH KeysNov 3, 2022Nov 3, 2022
What are Critical Endpoints — Cybercriminals perspectiveAbstract — In this post, we will learn thought process of a cybercriminal when they attack a company or an enterprise.Oct 25, 2022Oct 25, 2022
Yes, Agreed.But there has been shift in trend for quite sometime where threat actors no longer just exfiltrate and delete data rather extort victims…Oct 6, 2022Oct 6, 2022