CloudSEK Hiring CTF 2025On 23rd August, 2025, I participated in the CloudSEK Hiring CTF, a 48-hour progressive, Jeopardy-style competition consisting of five…Aug 27A response icon1Aug 27A response icon1
Part 3: In-Memory Execution Methods — How Malware Lives Rent-Free in Your SystemYou’re working late, half-distracted.Jul 3Jul 3
Part 2: Initial Access — From Clickbait to Code ExecutionImagine you ordered something simple last week — a power bank from Flipkart. Paid online. Everything went fine.Jun 22A response icon1Jun 22A response icon1
Introduction — Fileless MalwareIntroduction to Fileless Malware: The Invisible Threat That’s Probably Already in Your Coffee MachineJun 17Jun 17
Business/Application Logic VulnerabilitiesI have a few question especially for all the coders/developers. If you have ever tried to write a program or create an application/project…May 28, 2024May 28, 2024
Email Spoofing and prevention of Email Spoofing using SPF, DKIM and DMARCHave you ever received an email?May 17, 2024May 17, 2024