This study is based on the SIEM Implementation done for an analytical company where they needed…
This blog is compiled to support software organizations to secure their software within the SDLC lifecycle. We are…
I found a misconfigured s3 bucket in a global customer service tech company where the…
Kerberos Delegation
In this blog, we will see how the classic process Injection works and write your first process injection code…
Long story short, I have created my Hackerone/Bugcrowd profiles a way back in 2016 but I have…