PinnedPublished inThe StartupWordPress File Manager Plugin Exploit for Unauthenticated RCEIn the 1st week of September, a critical vulnerability was found on one of the popular WordPress plugins called File Manager. The…Nov 7, 2020Nov 7, 2020
Grav CMS Exploit for SSTI Vulnerability | CVE-2024–28116I just posted a deep dive into CVE-2024–28116 — a Server-Side Template Injection vulnerability in Grav, flat-file content management…Nov 18, 2024Nov 18, 2024
Understanding Credential Attacks: How Cybercriminals Steal Your Identity OnlineOur identities are not just confined to the physical realm; they also exist in the vast landscape of the internet. From social media…Feb 12, 2024Feb 12, 2024
Understanding Cookie Hijacking: How Hackers Can Steal Your Data Without You KnowingWhere much of our lives are spent online, the security of our personal information is of utmost importance. However, there’s a silent…Feb 11, 2024Feb 11, 2024
Understanding Content Security Policy: Safeguarding Your WebsiteWhere cyber threats lurk around every corner of the internet, website security is of paramount importance. Content Security Policy (CSP)…Feb 9, 2024Feb 9, 2024
Keeping Your Accounts Safe: The Importance of Preventing Account SharingWe rely heavily on various online services and platforms for communication, entertainment, and productivity. From streaming services like…Feb 8, 2024Feb 8, 2024
The Mystery of Active Directory ReconnaissanceUnderstanding the terrain is paramount. Imagine a medieval kingdom with its castle, moat, and guards — each serving as layers of defense…Feb 7, 2024Feb 7, 2024
Demystifying Security Misconfigurations: A Guide to Keeping Your Data SafeTechnology is seamlessly integrated into our daily lives, the security of our digital assets has become more critical than ever. While we…Feb 6, 2024Feb 6, 2024
Exploring Cross-Site Scripting (XSS) Attacks: A Layman’s Guide to Web SecurityIn the ever-evolving landscape of cybersecurity, one term that often surfaces is Cross-Site Scripting or XSS. While it may sound technical…Feb 4, 2024Feb 4, 2024
Unveiling Cain and Abel: A Layman’s Overview of a Security ToolCain and Abel might sound like characters from an ancient tale, but in the realm of cybersecurity, they represent a potent tool that serves…Feb 4, 20241Feb 4, 20241