PinnedServer-side vs. Client-side VulnerabilitiesLearn about the key technical differences between server-side and client-side vulnerabilities and how they can be exploited by attackers to…Oct 12, 2023Oct 12, 2023
PinnedTinkering with product securityWelcome to my latest series on product security, where I shall be sharing some of my personal experiences in product security, the…Jul 71Jul 71
Scammers posing as customer support team of reputed e-commerce in fashion & lifestyle industry.In a recent interaction with the victims of a cyber-fraud and hack, the duo told that one of them recieved a call and a few WhatsApp…Jul 20Jul 20
Are security groups really that dumb ?Hello my AWS junkies, I'm intrigued that the title brought you here. And if you’ve made it finally and reading this let’s not delay…Jul 16Jul 16
Tinkering with product security pt. 2Welcome back to the second installment in this series, let’s carry the momentum of what we learned in the previous blog. If not you can…Jul 11Jul 11
Redis Secure Installation PracticesIn this blog, we’ll read about few best practices to install a Redis server securely.Oct 12, 2023Oct 12, 2023
Mind-map for AWS Account ID Enumeration via Public S3 bucket.I recently stumbled upon the free byte-sized labs providing great learning experience for AWS Security Testing.Oct 11, 2023Oct 11, 2023
Analyzing Breaches & Threat Landscape 20222022 saw a huge up-rise in the number of events directly or indirectly involving data breaches, social engineering attacks (especially this…Nov 15, 2022Nov 15, 2022