Cybersecurity threats are constantly evolving, and itβs essential to stay informed about the latest risks in order to protect yourself and your organization. Here are some of
Read MoreSubdomain takeovers are an important vulnerability to be familiar with, especially as a bug bounty hunter.IntroductionSubdomain takeovers occur when a subdomain (e.g. blog.examp
Read MorePhoto by Michael Geiger on Unsplash If your computer is behaving strangely, it may be infected with malware. Malware, short for malicious software, is a type of software design
Read MoreWhat it is, how to do it, and how to prevent it Photo by Markus Winkler on Unsplash We regularly copy and paste stuff. Sometimes, the copied characters contain importa
Read MoreI just finished my first year working as security engineer and wanted to give a recap of all the things I did to get into my current role. Breaking into any industry is a mixtur
Read MoreHere we go. Again.Let me start by saying this is really unresponsible by major companies like Experian, TransUnion, and Equifax even to have this kind of bug, and critical error
Read More