Articles

A discursive source of knowledge on Information Security including topics on Pentesting,
Bug Bounty, Red Teaming, Threat Hunting, Hacking Stories, and more.

Major Cyber Attacks of 2022

Major Cyber Attacks of 2022

In this article we discuss the major Cyber Attacks that shaped 2022. You’ll get informed about the top hacking incidents, including breaches, ransomware attacks, hacking campaigns and more.

read more
Exploit XSS Injections with a Powerful One-Line Technique

Exploit XSS Injections with a Powerful One-Line Technique

In this article, we’ll demonstrate practical methods for detecting and exploiting Cross-Site Scripting (XSS) injections. These techniques can be applied during source code security reviews to enhance speed and accuracy in your methodology, benefiting both security professionals and bug bounty hunters.

read more