Nitin yadavUnleashing the Ethical Hacker Within: Cybersecurity Insights, Bug Bounty Tips, and the Art of…Hello everyone, I hope you all are doing great.4 min read·May 3, 2024----
Nitin yadavHow I Gained Account Access: Exploring the Risks of Password Reset Links in CybersecurityHello everyone, I hope you all are doing great.3 min read·May 2, 2024----
Nitin yadavExposed Secrets: The Peril of Broken Access ControlHello everyone, I hope you all are doing great.2 min read·May 1, 2024----
Nitin yadavTop Antivirus Programs of 2023: Protecting Computers with Malware Protection and Real-time securityWhat if I told you there was a way to keep your computer malware free and protect it against the latest threats? The answer is simple…3 min read·Feb 11, 2023----
Nitin yadavSocial Engineering: Techniques and Tools for Successful Social Engineering Attacks | Part 6Social engineering is a cybercrime involving manipulating people to gain access to sensitive information or systems. Social engineering is…2 min read·Feb 11, 2023----
Nitin yadavSocial Engineering: Tailgating | Part 5Tailgating is a common tactic used by social engineers to gain unauthorized access to buildings or secure areas. It involves following…2 min read·Dec 25, 2022----
Nitin yadavSocial Engineering: Phishing | Part 4As we have learned about Pretexting in the last blog. So it’s time to learn something new which is Phishing.3 min read·Dec 23, 2022----
Nitin yadavSocial Engineering: Pretexting | Part 3As in the last blog we got to know that social engineering comes in many forms. So today in this blog we will be looking into Pretexting.2 min read·Dec 21, 2022----
Nitin yadavSocial Engineering: What Is Social Engineering? | Part 2In the last blog, we briefly overview social engineering and how it can be used in real life. In this blog, we'll learn about what is…2 min read·Dec 18, 2022----