Dig deeper into OWASP Kubernetes
The Power of Simple Cyber: You have the Cyber Mojo. But do you have the Power of Simple Cyber?
How to have visibility and security OF CICD ecosystem
A Deep Dive into Browser Security: Uncovering Security Bugs in Mobile Browsers
From On-Premises to Cloud: A Comprehensive Analysis of SAP Security Issues
Hey You! Get Off my Satellite!
Save The Environment (Variable): Hijacking Legitimate Applications with a Minimal Footprint
LATMA – Lateral movement analyzer
Adventures in the Underland: Uncommon Hacker’s Persistence Methods and Countermeasures
Hacking Serverless Applications: A Treasure Map for Uncharted Waters
A Tale of Credential Leak of a Popular Cloud Threat Actor
Microsoft Defender for Office 365 Evasion – The Story of Confirmed Vulnerability
Stake at the heart : Destroying common security wisdom
A journey into Medical Device Security Research