vificatemCSS Injection within Microsoft Attack Simulator PlatformThis article details yet another frustrating experience trying to report a valid bug on Microsoft Security Response Center(MSRC). Details…Oct 25
Nadeem MansooriHow I Discovered an Account Takeover Vulnerability via 2FA BypassBy Nadeem MansooriDec 4
Maciej RakJourney to Mastering Kubernetes: The IntroductionThe invitation to a joint journey among cloud native technologies in search of security enlightment.Jul 211Jul 211
John D CyberUsing OSINT IN CYBER SECURITY RESEARCHOSINT is pivotal in cyber security research, providing valuable insights into threats, vulnerabilities, and tactics.Jul 19, 2023Jul 19, 2023
vificatemCSS Injection within Microsoft Attack Simulator PlatformThis article details yet another frustrating experience trying to report a valid bug on Microsoft Security Response Center(MSRC). Details…Oct 25
Nadeem MansooriHow I Discovered an Account Takeover Vulnerability via 2FA BypassBy Nadeem MansooriDec 4
Maciej RakJourney to Mastering Kubernetes: The IntroductionThe invitation to a joint journey among cloud native technologies in search of security enlightment.Jul 211
John D CyberUsing OSINT IN CYBER SECURITY RESEARCHOSINT is pivotal in cyber security research, providing valuable insights into threats, vulnerabilities, and tactics.Jul 19, 2023
Adnane Arharbi, EngUnmasking Cyber Threats: An Analysis of Unit 42’s ResearchIn today’s interconnected world, cybersecurity has become an integral part of our daily lives. The ever-evolving threat landscape…May 14, 2023
Adarsh KumarDiscovering a Critical Vulnerability in application : The Journey of an Accidental AdminDate: June 6, 2024Jun 6