Recent Blog Posts

Find out what's new in cybersecurity

ElasticSearch as a backend. Why or why not?
A guide for noobs to start their footprinting journey with sherlock
Cloud Security Posture Management (CSPM)
Hunting Subdomains for a Website
How hackers take advantage of pip to steal user's data ?
Web 3.0 and its Cybersecurity Implications
Secure Boot : Security Layer or Menace?