PinnedPawan JaiswalinThe StartupWordPress File Manager Plugin Exploit for Unauthenticated RCEIn the 1st week of September, a critical vulnerability was found on one of the popular WordPress plugins called File Manager. The…4 min read·Nov 7, 2020----
Pawan JaiswalUnderstanding Credential Attacks: How Cybercriminals Steal Your Identity OnlineOur identities are not just confined to the physical realm; they also exist in the vast landscape of the internet. From social media…4 min read·Feb 12, 2024----
Pawan JaiswalUnderstanding Cookie Hijacking: How Hackers Can Steal Your Data Without You KnowingWhere much of our lives are spent online, the security of our personal information is of utmost importance. However, there’s a silent…4 min read·Feb 11, 2024----
Pawan JaiswalUnderstanding Content Security Policy: Safeguarding Your WebsiteWhere cyber threats lurk around every corner of the internet, website security is of paramount importance. Content Security Policy (CSP)…3 min read·Feb 9, 2024----
Pawan JaiswalKeeping Your Accounts Safe: The Importance of Preventing Account SharingWe rely heavily on various online services and platforms for communication, entertainment, and productivity. From streaming services like…3 min read·Feb 8, 2024----
Pawan JaiswalThe Mystery of Active Directory ReconnaissanceUnderstanding the terrain is paramount. Imagine a medieval kingdom with its castle, moat, and guards — each serving as layers of defense…3 min read·Feb 7, 2024----
Pawan JaiswalDemystifying Security Misconfigurations: A Guide to Keeping Your Data SafeTechnology is seamlessly integrated into our daily lives, the security of our digital assets has become more critical than ever. While we…3 min read·Feb 6, 2024----
Pawan JaiswalExploring Cross-Site Scripting (XSS) Attacks: A Layman’s Guide to Web SecurityIn the ever-evolving landscape of cybersecurity, one term that often surfaces is Cross-Site Scripting or XSS. While it may sound technical…4 min read·Feb 4, 2024----
Pawan JaiswalUnveiling Cain and Abel: A Layman’s Overview of a Security ToolCain and Abel might sound like characters from an ancient tale, but in the realm of cybersecurity, they represent a potent tool that serves…3 min read·Feb 4, 2024--1--1
Pawan JaiswalThe Power of Impacket: A Comprehensive Guide with ExamplesUnderstanding and mastering the tools available for network penetration testing and exploitation is crucial. One such powerful toolkit that…4 min read·Feb 2, 2024----