Over 900k users were hit by malicious Chrome extensions posing as ChatGPT and DeepSeek tools. We dive deep into the analysis, the C2 exfiltration, and how to secure your browser....
What is Control-Flow Enforcement Technology (CET) ?
The Intel's Control-Flow Enforcement technology also known as CET is a harware solution proposed by the intel to protect against Control Hijacking.
Essential Cyber Security for Non-Technical Users
Assuming you have little to no knowledge about Cyber Security, In this blog I am going to share...
How To Hide Files using Alternate Data Streams ?
Alternate data streams have been used for decades for hiding data we will see its history and benefits so
What is a Shadow Stack ?
Shadow stack is a secondary stack present in your computer that stores return addresses of the main stack.
What is Data Execution Prevention (DEP) in OS ?
Data Execution Prevention (DEP) is an essential security feature in modern operating systems to protect computers from harmful attacks.
Master Cyber Security Key Concepts and Best Practices
Feeling overwhelmed by cyber threats? This guide breaks it down. Learn key terms, protect your data, and navigate the digital world confidently. Click to learn!
The 5 Pillars of Cyber Security: What Holds the Cyber Kingdom
Cyber Security is a big field in its own, in this article we will explore the 5 pillars, which holds the whole cyber security kingdom together.
Understanding Cyber Threats and Vulnerabilities
Cyber Threats are increasing and criminals to so why not learn about some cool tools and techniques used by hackers?
Salt, Pepper, and Hashing: Three Ingredients to Secure Passwords
Our password travel on a boat in an open ocean that everyone has access to. We will see how Hashing, peppering and salting actually save us from hackers on the internet..
Creating and Breaking MD5 Hash
We will see how MD5 is created and why it is not considered secure anymore. How Hackers have managed to Hack the Hashes