8 followers
Decoding the Art of Offensive Security
Identifying Vulnerabilities and Implementing Robust Security Measures for Cloudflare's Image Resizing Function Introduction: During a recent...
Strategies and Techniques for Identifying and Mitigating External Threats to Your Kubernetes Cluster · Introduction: Over the past few months, I have...
The Dark Side of Data, Revealing a Chilling PII Data Exposure · Introduction: Discovering sensitive information disclosure in cybersecurity can have...
Unveiling the Risks of Client-Side Encryption: Insights and Remediation · Introduction: Have you ever explored the depth of tools available within your...
Hey there! Today, let's go on a little adventure into the world of website secrets. Imagine this: if you add ?_debug=1 to the end of a JavaScript(.js)...
Cracking the Code: Risks of Hardcoded Encryption Keys · Introduction: During a recent penetration testing engagement, I identified a critical security...