Ananya GhoshMicrosoft Outage: A Glitch, Not an Attack, But Still a Security Wake-Up CallOn July 19, 2024, a widespread outage wreaked havoc for Microsoft users globally. This outage led to BSOD (Blue Screens of Death) which in…Jul 20Jul 20
Ananya GhoshEavesdropping: A General WalkthroughSniffing or Eavesdropping pertains to the act of acquiring or intercepting data by capturing the communication flow within a network using…Aug 1, 2023Aug 1, 2023
Ananya GhoshOpen Redirection VulnerabilityOpen Redirection is a web application vulnerability that allows an attacker to redirect users to a malicious website by manipulating a…Jul 14, 2023Jul 14, 2023
Ananya GhoshA brief Introduction to DMARC — Part 1Nowadays, email has become an essential way for people to communicate, whether it’s for personal or business reasons. However, as email…Jun 21, 20231Jun 21, 20231
Ananya GhoshBeginner’s Guide to OSINT and it’s toolsAs we know, the first stage of Ethical Hacking is gathering information about the target system, network or device. This phase is referred…Jun 15, 20231Jun 15, 20231
Ananya GhoshBeginner’s Guide to Automated ScannersAutomated scanners are software tools or systems designed specifically to do automatic scanning and analysis of various data or resources…Jun 8, 20232Jun 8, 20232
Ananya GhoshWhy is cyber defense necessary for organizations?With an ever-evolving threat landscape, organizations of all sizes face an ever-growing array of cyber threats and attacks. Additionally…May 27, 2023May 27, 2023