~/blogs

Security Insights

Technical Articles
CTF Writeups
Community Driven
0
1
0
1
1
0
0
1

$All Articles(18)

digital-turbulence.md
Digital Turbulence: How a Cyberattack Brought European Airports to a Standstill
News

Digital Turbulence: How a Cyberattack Brought European Airports to a Standstill

Analyzing the cyberattack that disrupted European airports and the lessons learned.

OWASP PCCOESep 20255 min read
Read more
trust-crisis.md
The Trust Crisis: Is Your Software’s Family Tree Under Attack?
Security

The Trust Crisis: Is Your Software’s Family Tree Under Attack?

Discussing software supply chain attacks and how to secure your software's dependencies.

OWASP PCCOEAug 20255 min read
Read more
phishing-wave.md
Cyber Alert: Unprecedented Phishing Wave Targets Hundreds of Brands Globally
Security

Cyber Alert: Unprecedented Phishing Wave Targets Hundreds of Brands Globally

A look at the massive phishing campaign targeting global brands and how to stay safe.

OWASP PCCOEAug 20254 min read
Read more
ai-copilot-security.md
Helpful, Not Harmless: Why Your AI Co-Pilot Needs a Human Cybersecurity Expert
Research

Helpful, Not Harmless: Why Your AI Co-Pilot Needs a Human Cybersecurity Expert

Why human oversight is crucial when using AI co-pilots for coding and security tasks.

OWASP PCCOEJul 20256 min read
Read more
winrar-0day.md
WinRAR 0-Day Vulnerabilities Exploited
Security

WinRAR 0-Day Vulnerabilities Exploited

Details on the exploitation of WinRAR zero-day vulnerabilities and mitigation steps.

OWASP PCCOEJul 20253 min read
Read more
hawkins-paradox.md
CyberKavach QuestCon Series: The Hawkins Paradox
CTF

CyberKavach QuestCon Series: The Hawkins Paradox

We’ll explore 'The Hawkins Paradox,' a multi-layered OSINT challenge inspired by the Stranger Things universe.

Jay SuranaOct 28, 20255 min read
Read more
hawkins-incident.md
CyberKavach QuestCon Series: The Hawkins Incident
CTF

CyberKavach QuestCon Series: The Hawkins Incident

Diving into the multi-stage OSINT challenge 'The Hawkins Incident,' tracking a strange energy surge from Hawkins National Laboratory.

Ayush JayatkarOct 28, 20256 min read
Read more
cipher-breach.md
CyberKavach QuestCon Series: The Cipher Breach
CTF

CyberKavach QuestCon Series: The Cipher Breach

Explore a challenging three-part cryptographic puzzle designed to test your understanding of real-world vulnerabilities.

Radhika SuryavanshiOct 28, 20257 min read
Read more
lost-transmission.md
CyberKavach QuestCon Series: Lost Transmission
CTF

CyberKavach QuestCon Series: Lost Transmission

Break down the unique 'Lost Transmission' challenge from QuestCon, hidden inside the OWASP Discord Server.

KunalOct 28, 20254 min read
Read more
hawkins-national-lab.md
CyberKavach QuestCon Series: Hawkins National Lab
CTF

CyberKavach QuestCon Series: Hawkins National Lab

Delving into 'Hawkins Lab SSRF', a hands-on web security challenge exploring server-side request forgery and cloud abuse.

Madhura BarveOct 28, 20258 min read
Read more
hawkins-bola.md
CyberKavach QuestCon Series: Hawkins Laboratory Research Portal (BOLA Challenge)
CTF

CyberKavach QuestCon Series: Hawkins Laboratory Research Portal (BOLA Challenge)

A walkthrough for the Hawkins Laboratory Research Portal challenge, demonstrating Broken Object Level Authorization (BOLA) vulnerabilities.

Aaryan BhujangOct 28, 20256 min read
Read more
upside-down-packet.md
CyberKavach QuestCon Series: The Upside Down Packet Mystery
CTF

CyberKavach QuestCon Series: The Upside Down Packet Mystery

Investigate a suspicious packet capture file and reconstruct the secrets before they fade into the digital void.

Rudraksh CharhateOct 28, 20255 min read
Read more
upside-down-forensics.md
CyberKavach QuestCon Series: The Upside Down
CTF

CyberKavach QuestCon Series: The Upside Down

A fun forensics challenge themed around the Stranger Things universe. Retrieve fragmented flags to reconstruct the full secret.

Rudraksh CharhateOct 28, 20255 min read
Read more
keras-deserialization.md
CyberKavach QuestCon Series: Exploiting Keras Model Deserialization
CTF

CyberKavach QuestCon Series: Exploiting Keras Model Deserialization

Exploit a vulnerable Keras/TensorFlow stack for Remote Code Execution (RCE) using a recent CVE.

Aaryan BhujangOct 28, 20257 min read
Read more
firewalls-hacker-doorway.md
From Open Networks to Safe Systems: How Firewalls Block the Hacker’s Doorway
CTF

From Open Networks to Safe Systems: How Firewalls Block the Hacker’s Doorway

Understanding how firewalls act as vigilant security guards for your network, blocking unauthorized access.

OWASP PCCOEOct 28, 20254 min read
Read more