Explore Our Blog & Articles
Discover Our Research and Open Information Approach
Research Case Study: Supply Chain Security at Scale – Insights into NPM Account Takeovers
by Danish
November 18, 2024
Software supply chains are complex ecosystems where even a single vulnerability can lead to widely spread security issues. This blog...
IDOR Case Study: Manipulating Billing Information and Viewing Payment History
by Danish
November 5, 2024
Manipulating Billing Information and Viewing Payment History: How IDOR and Response Manipulation Allowed Access...
Penetration Testing Steps: Beginner’s Guide
by Danish
November 5, 2024
Introduction: Penetration testing, also known to many as "pen testing," is when a simulated...
Exploiting pfsense Remote Code Execution – CVE-2022-31814
by Danish
August 9, 2024
Greetings everyone, In this write-up, we will be exploring the interesting exploitation that has...
Understanding JWT: Basics and Security Risks
by Danish
March 14, 2024
Introduction to JWT (JSON Web Token): JWT, or JSON Web Token, is a fundamental...
The Art of Intrusion: File Upload Bypass & WAF XSS Evasion in AWS S3 Demystified
by Danish
March 12, 2024
Summary: Greetings, today we will be sharing an XSS WAF bypass vulnerability that was...
Guardians of the Digital Realm: Unveiling the Importance of a Credible Cyber Security Team
by Danish
November 28, 2023
Welcome to the dynamic landscape of the digital era, where the importance of robust...