PinnedLog4J Vulnerability — Attack & Defense Strategy for Cyber-Security AnalystsOVERVIEWDec 24, 2021Dec 24, 2021
Getting ChatGPT’s latest o1 model to perform malicious activity using “Cross-Model Contextual…Photo by Jonathan Kemper on UnsplashSep 28Sep 28
Is Your Information for Sale on the Dark Web? Check Now with AmIBreachedHave you ever worried about your personal information being exposed in a data breach? Unfortunately, data breaches are a common occurrence…Apr 24Apr 24
Bypassing Gmail’s Attachment FileRestrictions with HTML SmugglingIn today’s digital era, where cybersecurity threats loom at every corner, it’s crucial for professionals and individuals alike to stay…Apr 10Apr 10
DIRTY COW: Vulnerability that Shook the IT World (Case Study)The year was 2016, and a seemingly insignificant vulnerability named Dirty Cow (CVE-2016–5195) lurked within the Linux kernel, waiting to…Feb 18Feb 18
Automate Your CIS Server Hardening Baseline Documentation using PythonAs security professionals, we know the importance of server hardening and following industry best practices like CIS benchmarks. But let’s…Jan 7Jan 7
How to hide your personal spaces from Google Maps Street View?NOTE: The example used below is only for the demonstration purposes. Use this privacy option only for your personal locations.Oct 4, 2023Oct 4, 2023
Curtailing Privacy: The Intrusion, Government Surveillance and Hidden Secrets of IntelligenceDepending upon your circumstances, your government, law enforcement agencies, military or other organizations may be an active threat to…Sep 17, 2023Sep 17, 2023
Adversarial Artificial Intelligence: Bypassing ChatGPT content restrictions using AI PoisoningNOTE: THE CONTENT PROVIDED BELOW IS ONLY FOR THE EDUCATIONAL PURPOSE. I TAKE NO RESPONSIBILITY FOR ANY HARM OR DAMAGES CAUSED BY THE…Apr 14, 2023Apr 14, 2023
“Dumpster Diving”: The most “OUT OF THE ORDINARY” technique used by the threat actorsApart from stealing information from online bank accounts, e-commerce websites etc. Have you ever thought of any hacker who can steal your…Jul 1, 2022Jul 1, 2022