Blog

Home / Blog

Introduction to OSINT

Introduction to OSINT

Technological breakthroughs have revolutionized the entire world into what, at present, is called the information age. One of the most important things about this age

Read More »
IPV6 DNS Takeover

IPV6 DNS Takeover

Even though the usage of IPv6 is gaining traction, it is rare to find an organization using it in its network. Most people do not

Read More »
Active Directory Basics

Active Directory Basics

The number of resources such as users, databases, or servers managed in organizations poses questions about accountability as firms adjust to industry needs and norms.

Read More »
Blockchain 101

Blockchain 101

A blockchain is a shared distributed ledger between computer network nodes. It serves as an electronic database for storing data in digital form. Blockchain keeps

Read More »
JWT Authentication Bypass

JWT Authentication Bypass

What are JWTs? JSON web tokens (JWTs) are a standardized format for sending cryptographically signed JSON data between systems. Theoretically, they can contain any kind

Read More »
Insecure Deserialization in PHP

Insecure Deserialization in PHP

In this blog (part of the “Insecure Deserialization” series), we will discuss insecure deserialization vulnerabilities in PHP and its prevention. The purpose of data serialization

Read More »