PinnedPawan JaiswalinThe StartupWordPress File Manager Plugin Exploit for Unauthenticated RCEIn the 1st week of September, a critical vulnerability was found on one of the popular WordPress plugins called File Manager. The…Nov 7, 2020Nov 7, 2020
Pawan JaiswalUnderstanding Credential Attacks: How Cybercriminals Steal Your Identity OnlineOur identities are not just confined to the physical realm; they also exist in the vast landscape of the internet. From social media…Feb 12Feb 12
Pawan JaiswalUnderstanding Cookie Hijacking: How Hackers Can Steal Your Data Without You KnowingWhere much of our lives are spent online, the security of our personal information is of utmost importance. However, there’s a silent…Feb 11Feb 11
Pawan JaiswalUnderstanding Content Security Policy: Safeguarding Your WebsiteWhere cyber threats lurk around every corner of the internet, website security is of paramount importance. Content Security Policy (CSP)…Feb 9Feb 9
Pawan JaiswalKeeping Your Accounts Safe: The Importance of Preventing Account SharingWe rely heavily on various online services and platforms for communication, entertainment, and productivity. From streaming services like…Feb 8Feb 8
Pawan JaiswalThe Mystery of Active Directory ReconnaissanceUnderstanding the terrain is paramount. Imagine a medieval kingdom with its castle, moat, and guards — each serving as layers of defense…Feb 7Feb 7
Pawan JaiswalDemystifying Security Misconfigurations: A Guide to Keeping Your Data SafeTechnology is seamlessly integrated into our daily lives, the security of our digital assets has become more critical than ever. While we…Feb 6Feb 6
Pawan JaiswalExploring Cross-Site Scripting (XSS) Attacks: A Layman’s Guide to Web SecurityIn the ever-evolving landscape of cybersecurity, one term that often surfaces is Cross-Site Scripting or XSS. While it may sound technical…Feb 4Feb 4
Pawan JaiswalUnveiling Cain and Abel: A Layman’s Overview of a Security ToolCain and Abel might sound like characters from an ancient tale, but in the realm of cybersecurity, they represent a potent tool that serves…Feb 41Feb 41
Pawan JaiswalThe Power of Impacket: A Comprehensive Guide with ExamplesUnderstanding and mastering the tools available for network penetration testing and exploitation is crucial. One such powerful toolkit that…Feb 2Feb 2