I Got Investigated by the Secret Service. Here’s How to Not Be Me
Unfortunately, my thought process wasn’t that complex when I suddenly had to talk to a federal agent on my phone about what I’d posted to…
Unfortunately, my thought process wasn’t that complex when I suddenly had to talk to a federal agent on my phone about what I’d posted to…
Recently, Microsoft released a series of patches to address around 80 security vulnerabilities, including two zero-day exploits. One of the critical zero-day exploits, CVE-2023-23397, is…
INTERVIEW WITH @_BASE_64 : 19 Y/o | TOP 150 WORLDWIDE on H1 | METHODOLOGY, MINDSET & MORE… Source link
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Samsung, Vivo, Google phones open to remote compromise without user…
I quite enjoy external Pentest, especially when the scope is large. There has been some really interesting stuff I have found in the past but…
As a hacker and bug bounty hunter, I spend a lot of my time optimizing and improving. So, as a father of three, I work…
Cookie Tossing Source link
H.E. Dr. Mohamed Hamad Al-Kuwaiti, Head of the UAE Cybersecurity Council, was recognized and celebrated by hundreds of cyber leaders from across the world for…
This is the story about how I’ve chained a seemingly uninteresting request smuggling vulnerability with an even more uninteresting header-based XSS to redirect network-internal web…
Broken Access Control – Lab #8 UID controlled by parameter, with unpredictable UIDs | Short Version Source link
When You Use One Wrong Javascript Module Source link
I originally wanted to name this article “The RCE that everyone missed”, but since it was too “clickbait”, this is the title you see now.…