Articles

A discursive source of knowledge on Information Security including topics on Pentesting,
Bug Bounty, Red Teaming, Threat Hunting, Hacking Stories, and more.

Using Favicon for OSINT

Using Favicon for OSINT

When it comes to OSINT, the smallest details often uncover the biggest insights—and the favicon is a perfect example. Whether you’re on the red team or the blue team, understanding favicon hashing will sharpen your discovery techniques, enhance your infrastructure visibility, and help you uncover connections others routinely miss.

read more
Oracle ILOM Compromise via EternalBlue

Oracle ILOM Compromise via EternalBlue

During a penetration testing assessment, our team identified a critical exploitation chain affecting an enterprise network. The attack began by exploiting the EternalBlue vulnerability on an unpatched Windows server, allowing remote code execution.

read more
Major Cyber Attacks that shaped 2024

Major Cyber Attacks that shaped 2024

In this article, we dissect the most devastating cyberattacks of 2024—not just what happened, but why they happened, how attackers exploited vulnerabilities, and the lessons they left behind.

read more