Karim BaggariWhat do you know about E2E encryption ?In our increasingly digital world, privacy has become a fundamental concern for individuals and organizations alike. With so much of our…2d ago
Viresh Garg, CISSP, CCSP, CISM, CISAPart III: Understanding Model Extraction AttackLets understand the Model Extraction Attack better in Part III3d ago3d ago
Stiflernation04A Guide to Mitigate Host Header Injection Vulnerability in Apache, Nginx, and IIS ServersHello readers, My name is Gaurav Pant and I am a cybersecurity professional with six years of experience in the field. I have a passion for…Jan 30, 2023Jan 30, 2023
Karim BaggariWhat do you know about E2E encryption ?In our increasingly digital world, privacy has become a fundamental concern for individuals and organizations alike. With so much of our…2d ago
Viresh Garg, CISSP, CCSP, CISM, CISAPart III: Understanding Model Extraction AttackLets understand the Model Extraction Attack better in Part III3d ago
Stiflernation04A Guide to Mitigate Host Header Injection Vulnerability in Apache, Nginx, and IIS ServersHello readers, My name is Gaurav Pant and I am a cybersecurity professional with six years of experience in the field. I have a passion for…Jan 30, 2023
DavidtheGoliathUsing Shuffle SOAR to create cases in DFIR IRISThis write up shows you how to create a ticket from an alert and perform remediating actions on your firewall using Shuffle.Jan 243
Security Is MythCreating comprehensive notes for each topic in the Blue Team Roadmap involves summarizing the key…### Blue Team Roadmap🔵🎯Jul 29
Ashish Sharma OSCPBypass file extension validation to upload Files on ServerIn this article, we discussed how we can upload files on web server by bypassing file extensionApr 11, 2023