PinnedPublished inInfoSec Write-upsBeginner Guide on Attacking and Defending FTP Server | PART 1/2From this post, we will learn how an attacker is able to target the FTP Server and what steps should be taken by the administrator to…Dec 11, 2020Dec 11, 2020
PinnedPublished inThe StartupWordPress File Manager Plugin Exploit for Unauthenticated RCEIn the 1st week of September, a critical vulnerability was found on one of the popular WordPress plugins called File Manager. The…Nov 7, 2020Nov 7, 2020
How to Secure Your Home Wi-Fi Network from HackersYour home Wi-Fi is the entrance to your digital life. It connects your phones, laptops, smart TVs, security cameras, and even smart lights…2h ago2h ago
Published inWrite A CatalystCommon Cybersecurity Interview Questions (With Answers)Whether you’re a recent grad or transitioning into cybersecurity from some other IT role, interviews are intimidating. Worry not, though —…1d ago1d ago
Published inOSINT Team4 Reasons Zero Trust Security Model Is Better Than Traditional SecurityCyber attacks evolve by the minute, and traditional security measures no longer cut it. The days of “trust everything inside the network”…1d ago1d ago
Published inWrite A CatalystSocial Engineering 101: How Hackers Trick PeopleWhen we say hacking, most imagine someone typing on a keyboard, cracking digital doors with intricate codes. But sometimes the greatest…2d ago2d ago
Published inInfoSec Write-upsThe History and Impact of Notorious Cyber AttacksCyber attacks now pose a major threat to individuals, companies, and even countries. From data theft to crippling critical infrastructure…4d ago4d ago
Published inCyber Security Write-upsWhat is XSS and How to Prevent ItWhat is XSS and How to Prevent It4d ago4d ago
Published inInfoSec Write-upsTop 20 Linux Commands Every Pentester Should KnowAs a pentester (penetration tester), you’re often operating in Linux environments. Whether you’re navigating a compromised system…5d ago5d ago
Published inOSINT TeamBeginner’s Guide to Bug Bounty HuntingCybersecurity is vast and exciting, and bug bounty hunting is one of its most rewarding paths. Imagine being paid to find security flaws in…Apr 15Apr 15