Ravindu LakminaHow I discovered a Critical Vulnerability during a Pentest : IDOR to Privilege EscalationHello folks 👋🏼, I hope you are doing well. My name is Ravindu, a Security Researcher and Cybersecurity Engineer. In this article I’m…Jan 111Jan 111
Ravindu LakminaBug Bounty Tips: How to Succeed in Ethical HackingBug bounty programs have become a popular way for organizations to improve their cybersecurity posture. By offering rewards to ethical..Oct 19, 2023Oct 19, 2023
Ravindu LakminaDemystifying the Difference Between Pentesting and Ethical HackingIn the realm of cybersecurity, the terms “pentesting” and “ethical hacking” are often used interchangeably, leading to some confusion among…Sep 5, 2023Sep 5, 2023
Ravindu LakminaHow I Passed my Certified in Cybersecurity Exam — (ISC)2As you already know, Certified in Cybersecurity is an entry level cybersecurity certification which is offered by (ISC)². The…Sep 2, 2023Sep 2, 2023
Ravindu LakminaSecuring Internet of Medical Things (IoMT): Safeguarding Patient Data in Healthcare’s Digital AgeIn the rapidly evolving landscape of healthcare, the Internet of Medical Things (IoMT) has emerged as a game-changer. The IoMT refers to…Jul 23, 2023Jul 23, 2023
Ravindu LakminaEnsuring Robust Security in Blockchain: The Immutable Fortress of Digital TransactionsIn the realm of decentralized technologies, blockchain stands tall as a revolutionary force, reshaping industries and empowering…May 15, 2023May 15, 2023