The Invisible Threat Lurking in Your Code: How Simple Scripts Can Destroy Your CloudHow a Single Misconfigured Script Can Lead to Catastrophic Cloud Security Breaches — and What You Can Do to Prevent ItSep 29Sep 29
Stock Manipulation By Exploiting Serverless Cloud ServicesIn this article, we will be trying to understand an infamous exploitation technique and how attackers can make companies potentially incur…Jan 30, 2023Jan 30, 2023
Evolution of Return Oriented ProgrammingUnderstanding the core and depths of Return Oriented ProgrammingJan 22, 2021Jan 22, 2021
Gaining SYSTEM in any Windows boxAs enticing as the topic of today’s article is, we will be understanding the underlying concepts of how one becomes NT AUTHORITY/SYSTEM by…Jul 25, 2019Jul 25, 2019
Scanning vulnerable Docker imagesTalking about red teaming and scanning images for vulnerabilities inside a containerized environment is a very tedious task at hand. Lets…Jul 21, 20191Jul 21, 20191