PinnedThe Dark Side of Covering Up Data Breaches: Why Transparency is CrucialIn today’s digital age, data breaches are happening more frequently. Cyberattacks that can compromise sensitive data like personal…May 7, 2023May 7, 2023
What to do to protect yourself against fake websitesNow when you are looking for something on the Internet, then most likely several links in the search engine results are fake sites that…Apr 28, 2022Apr 28, 2022
Let’s talk about Improper Resource ShutdownThe program does not release or incorrectly releases a resource before it is made available for re-use.the function fails to release a…Oct 27, 2020Oct 27, 2020
Published inInfoSec Write-upsLet’s talk about buffer overflowA buffer overflow, or buffer overrun, occurs when more data is put into a fixed-length buffer than the buffer can handle.Aug 17, 2020Aug 17, 2020
Published inInfoSec Write-upsLet’s talk about privacy violation issues in androidWhen security and privacy demands clash, privacy should usually be given the higher priority. To accomplish this and still maintain…Jun 1, 2020Jun 1, 2020
Published inInfoSec Write-upsWhen i found iframe injection and illegal redirect (dom based)An iFrame injection is a very common cross site scripting (or XSS) attack. It consists of one or more iFrame tags that have been inserted…Oct 25, 20191Oct 25, 20191
Published inInfoSec Write-upsWhen i found error logs through debug information(cgi scripts) and ws-ftp logDuring the assessment, I have found the debug URL on xyz.com which is disclosing the World Wide real time error logs..Oct 12, 2019Oct 12, 2019
Published inInfoSec Write-upsLet’s see how session cookie or cookie not sent over SSLExplanationSep 29, 2019Sep 29, 2019