I do have another security blog, that's extremely useful while performing security research. Click here.

LETSDEFEND - Network Fundamentals - Complete Walkthrough

What is the name of the computer network that is accepted as the basis of the Internet?

Guide to Becoming a Bug Bounty Hunter in 2024

1. Understand the Bug Bounty Hunter role in cybersecurity. 2. Familiarize yourself with different types of vulnerabilities and exploits. 3. Learn pro…

Wannacry Ransomware: A Comprehensive Security Analysis

WannaCry, also known as WannaCryptor or WCry, is a ransomware campaign that hit the globe in May 2017, causing extensive damage and affecting numerou…

Light-weight web security scanner

EasyScan EasyScan is a Python script that analyzes the security of a given website by inspecting its HTTP headers and DNS records. The script genera…

Why Log4Shell is so dangerous and what (not) helps

It is probably already too late for simple precautions against the Log4J vulnerability. Why actually? Questions and answers about Log4Shell. Microso…