PinnedPublished inLevel Up Coding5 Valuable Lessons I Learned Moving from Bug Bounty Hunter to Security ConsultantHi, I’m Mrunal Chawda. I started my cybersecurity journey as an independent bug bounty hunter. Now, I have around 4 plus years of…Jun 9Jun 9
Published inLevel Up CodingBranch.io Fallback URL Exploit: How Hackers Redirect UsersLearn how Branch.io fallback URL exploits and exposed API keys let hackers redirect users to malicious sites. Protect your apps with these…6d ago6d ago
Published inOSINT TeamA Complete Guide to Securing Secrets in AWS LambdaLearn how to securely manage secrets in AWS Lambda using environment variables, KMS encryption, Secrets Manager, and more.Apr 12Apr 12
Published inOSINT TeamThe Dark Side of Covering Up Data Breaches: Why Transparency is CrucialIn today’s digital age, data breaches are happening more frequently. Cyberattacks that can compromise sensitive data like personal…May 7, 2023May 7, 2023
What to do to protect yourself against fake websitesNow when you are looking for something on the Internet, then most likely several links in the search engine results are fake sites that…Apr 28, 2022Apr 28, 2022
Let’s talk about Improper Resource ShutdownThe program does not release or incorrectly releases a resource before it is made available for re-use.the function fails to release a…Oct 27, 2020Oct 27, 2020
Published inInfoSec Write-upsLet’s talk about buffer overflowA buffer overflow, or buffer overrun, occurs when more data is put into a fixed-length buffer than the buffer can handle.Aug 17, 2020Aug 17, 2020
Published inInfoSec Write-upsLet’s talk about privacy violation issues in androidWhen security and privacy demands clash, privacy should usually be given the higher priority. To accomplish this and still maintain…Jun 1, 2020Jun 1, 2020