Latest Posts

All posts sorted in descending order by date

What is the CIA Triad? -Defined, Explained, and Explored 1

What is the CIA Triad? -Defined, Explained, and Explored

In the information security (InfoSec) community, “CIA” has nothing to try to to with a particular well-recognized US intelligence. These three letters stand for Confidentiality, Integrity, and Availability, also known as the CIA Triad. Together these principles are the foundation of any organization’s information security.


SSRF Spotted in wild: Facebook gives $31k Bug Bounty to a Researcher

An Indian security researcher Bipin bragged a bounty of $31k from the tech giants facebook after the admitted that there was a blind SSRF in the internal systems.

Maze Ransomware: Not Your Average Looking Ransomware 2

Maze Ransomware: Not Your Average Looking Ransomware

Maze Ransomware not only encrypts the files, but it also adds another way to extort victims who are unwilling to pay. To have more leverage over the victim, Maze also sends the data to the attacker.


Apple paid an Indian Hacker $100,000 for finding a bug

An Indian hacker/security researcher name Bhavuk Jain has earned $100,000 (around Rs.75.3 lakh) from Apple for finding and reporting a bug in the “Sign in with Apple account authentication”. It was one of the major zero-day exploit submitted to Apple in recent years.

IPv4 vs IPv6: Where did IPv5 go? 3

IPv4 vs IPv6: Where did IPv5 go?

Every time you see some network settings, there is IPv4 or IPv6. As you can guess, the previous versions are long in the past (TCP/IP v1,v2, and v3). But why is it IPv4 vs IPv6 instead of the 5th version vs the 6th? How is that the IPv4 from the 80s is still around? Let’s find out!

3 Steps for Beginner Hackers

How to start hacking? 3 Steps Every Beginner Hacker Should Follow

There’s no fixed way to start hacking, and you need not be of a computer science background to learn this. But there are some basic knowledge and things you need to know in order to become one.
Here are 3 main things every Beginner Hacker should know about. These tips will get you started and are very important.


TCP vs UDP: Unfolded

Before jumping to TCP vs UDP we must understand what TCP and UDP are. TCP and UDP are protocols that are a part of the transport layer in the OSI model. Both of these protocols are used for sending packets over the internet. They are built over the Internet Protocol(IP).


Unacademy- One of India’s largest online learning platform got HACKED!

Unacademy-one of the India’s largest Education-technology based startup backed by investors facebook,blume ventures got hacked and its data being sold on dark web at $2000. Data of nearly 22 million users have been said to be leaked in this hacked.


Using Zoom can Hack your Windows PC

As this global pandemic spreads fear among everyone, more and more companies are having virtual conferences to continue their business’. More often than not, these are using the Zoom Video Communication, or more commonly Zoom app for this. You might have used Zoom for your online classes or such a conference. But how secure is this infamous application? Keep reading to learn more.

Start Hacking - Hacking Methadologies

Who is a Hacker? Types of Hackers

Complete information about a hacker with their skills, how to be one of them, their capabilities, there day to day duties and the types and the categories of hackers. A hacker is someone who has all the knowledge of how a program, software, application, database, server is constructed and he knows how to take our flaws from it.

Subscribe to our Newsletter