Articles

A discursive source of knowledge on Information Security including topics on Pentesting,
Bug Bounty, Red Teaming, Threat Hunting, Hacking Stories, and more.

Safe Website Checklist: Determine if a Website is Safe or Not

Safe Website Checklist: Determine if a Website is Safe or Not

We expose ourselves to a variety of websites with every click, tap, and scroll, each with its own goals and standards of integrity. Thus, a knowledgeable navigator of a website security checker is required for both users and website admins to distinguish between safe websites and risky ones.

read more
Maximizing IDOR Detection with Burp Suite’s Autorize

Maximizing IDOR Detection with Burp Suite’s Autorize

This article aims to enhance your ability to detect IDOR vulnerabilities more efficiently and take your discovery process to the next level. Additionally, you will learn how to utilize Autorize, a powerful Burp Suite extension that streamlines the testing process for access control vulnerabilities in web apps.

read more
Major Cyber Attacks of 2022

Major Cyber Attacks of 2022

In this article we discuss the major Cyber Attacks that shaped 2022. You’ll get informed about the top hacking incidents, including breaches, ransomware attacks, hacking campaigns and more.

read more