Bypassing and Securing Kubernetes Ingress Network Policies
AuthorsKavyashree Ramesh, Tousif Khazi, Tejas Jaiswal About UsIBM PTC is a proficient internal Security Test Team responsible for vulnerability assessment & ethical hacking of web, mobile...
View ArticleOSINT: A Thoughtfulness About the Advantages and Disadvantages of this Technique
OSINT, What is it? OSINT, acronym word from English Open Source Intelligence, refers to a set of techniques about collection of data of interest, raw at first sometimes, obtained through publicly...
View ArticleSecure Coding Practices in Python: Best Practices for Avoiding Common...
Overview Creating a program is only one aspect of coding. Because stolen data is just as harmful as viruses, protecting sensitive data is just as crucial as creating the application of choice. Even...
View ArticleExclusive Interview with Alexandre Teyar - the creator of BurpGPT
Dear Readers, Burp Suite and ChatGPT have been hot topics in the world of Cybersecurity. That is why we have decided to talk with the person who connected them both. The guest in this interview is...
View ArticleEngaging Social Engineering: Extracting Information through Strategic...
Editorial note: We decided to remove any and all last names from the examples section as to not be drawn into any potential legal disputes. In the place of any last names, you will find “*****”...
View ArticleExternal Understanding: Dissecting APIs inside of IoT devices (Part 1)
Introduction As the world of IoT evolves, so does the security within this realm, like most fields. One of the more popular brands for being quite hidden from the public is Apple. Despite Apple having...
View ArticleExternal Understanding: Dissecting APIs inside of IoT devices (Part2)
Introduction If you have not read Part 1, it is highly suggested that you do so. This article is the second part and continuation of the article `External Understanding: Dissecting APIs inside of IoT...
View ArticleRegular Expression Denial of Service
Service uptime and availability is a crucial factor that determines the success of online businesses. In a rapidly evolving world, it is important that transactions remain productive, and they help...
View ArticleVPN vs. MPLS: Choosing the Right Solution for Your Business
The corporate world of today is all about connectivity. Having a dependable and secure network is essential to your business, whether you’re managing a small start-up or a huge international...
View ArticleRisks and Opportunities: Exploring the Impact of Google's New TLDs
In its expansion of top-level domains (TLDs), Google Registry has introduced eight new domains, including .dad, .phd, .prof, .esq, .foo, .nexus, .zip, and .mov. These additions aim to cater to various...
View ArticlePenetration Testing with Burp Suite: Enhancing Web Application Security
In today's interconnected world, web applications play a critical role in various aspects of our lives, ranging from online banking to e-commerce and social media. However, with the increasing...
View ArticleThe Issue of Overlooking Personal Network Security and Its Implications
Technology is an integrated part of society in nearly every aspect of life these days, and this leads to information processed and stored by technology being commonplace. This leads to the issue of how...
View ArticleCyber Threat with Chat GPT
Repetitive tasks, tons of labor hours going into mundane tasks, delayed response to complex customer queries and lack of real-time customer engagement, are no more, thanks to AI chatbots that help...
View ArticleProtecting Yourself From People Like Me
As a pentester, part of my job is running social engineering exercises. To be successful, I look for information I can use that will make my communication appear more authentic, and can be used to...
View ArticleAuthenticity Verification of Findings in OSINT: Tools to Ensure Data Credibility
This is a continuation of the article: OSINT: A THOUGHTFULNESS ABOUT THE ADVANTAGES AND DISADVANTAGES OF THIS TECHNIQUE INTRODUCTION: As the world becomes increasingly interconnected, the amount of...
View ArticleInterview with D4RKR4BB1T
Background: My name is Pavel M. Kravchenko. I was born 23-10-1996 in the US to a Russian mother, and a …
View ArticleFrom SEH Overwrite with Egg Hunter to Get a Shell
Introduction The Windows operating system has a default "handler" that catches any exception that is not handled by the program. …
View ArticleHow the Human Factor Plays a Role in Android Security
When it comes to security, we should have a thorough understanding of how various components impact and interact with it. …
View ArticleKeys to Mitigating Insider Threats
Cyber threats can come from anywhere. For organizations facing an onslaught of external attacks, it’s easy to forget that fact. …
View ArticlePrivacy: Protecting your personal information Online
With the growth of technology, the ways of marketing have observed a paradigm shift. In the past, the marketing agencies …
View Article