Mihir ShahA Deep Dive into Advanced Cloud Security ThreatsThe Hidden Dangers Lurking in Your CloudOct 27Oct 27
Mihir ShahThe Invisible Threat Lurking in Your Code: How Simple Scripts Can Destroy Your CloudHow a Single Misconfigured Script Can Lead to Catastrophic Cloud Security Breaches — and What You Can Do to Prevent ItSep 29Sep 29
Mihir ShahStock Manipulation By Exploiting Serverless Cloud ServicesIn this article, we will be trying to understand an infamous exploitation technique and how attackers can make companies potentially incur…Jan 30, 2023Jan 30, 2023
Mihir ShahEvolution of Return Oriented ProgrammingUnderstanding the core and depths of Return Oriented ProgrammingJan 22, 2021Jan 22, 2021
Mihir ShahGaining SYSTEM in any Windows boxAs enticing as the topic of today’s article is, we will be understanding the underlying concepts of how one becomes NT AUTHORITY/SYSTEM by…Jul 25, 2019Jul 25, 2019
Mihir ShahScanning vulnerable Docker imagesTalking about red teaming and scanning images for vulnerabilities inside a containerized environment is a very tedious task at hand. Lets…Jul 21, 20191Jul 21, 20191