PinnedMRunalThe Dark Side of Covering Up Data Breaches: Why Transparency is CrucialIn today’s digital age, data breaches are happening more frequently. Cyberattacks that can compromise sensitive data like personal…·4 min read·May 7, 2023----
MRunalWhat to do to protect yourself against fake websitesNow when you are looking for something on the Internet, then most likely several links in the search engine results are fake sites that…·3 min read·Apr 28, 2022----
MRunalLet’s talk about Improper Resource ShutdownThe program does not release or incorrectly releases a resource before it is made available for re-use.the function fails to release a…·4 min read·Oct 27, 2020----
MRunalinInfoSec Write-upsLet’s talk about buffer overflowA buffer overflow, or buffer overrun, occurs when more data is put into a fixed-length buffer than the buffer can handle.·6 min read·Aug 17, 2020----
MRunalinInfoSec Write-upsLet’s talk about privacy violation issues in androidWhen security and privacy demands clash, privacy should usually be given the higher priority. To accomplish this and still maintain…·5 min read·Jun 1, 2020----
MRunalinInfoSec Write-upsWhen i found iframe injection and illegal redirect (dom based)An iFrame injection is a very common cross site scripting (or XSS) attack. It consists of one or more iFrame tags that have been inserted…·2 min read·Oct 25, 2019--1--1
MRunalinInfoSec Write-upsWhen i found error logs through debug information(cgi scripts) and ws-ftp logDuring the assessment, I have found the debug URL on xyz.com which is disclosing the World Wide real time error logs..·5 min read·Oct 12, 2019----
MRunalinInfoSec Write-upsLet’s see how session cookie or cookie not sent over SSLExplanation·3 min read·Sep 29, 2019----