rootisshinrootisshLazarus Strikes Again: Tale of Zero-Days and RootkitsThe North Korean hacking group, Lazarus, has once again made headlines with its exploitation of a zero-day vulnerability in the Windows…Mar 3Mar 3
rootisshinrootisshCritical Alert: Addressing ConnectWise ScreenConnect: Vulnerabilities and RemediationConnectWise has released a critical security advisory that warns about vulnerabilities that can affect older versions of their…Mar 1Mar 1
rootisshinrootisshWhat is SIEM(Security Information and Event Management)?Security knowledge associated with Event Management (SIEM) would possibly even be a bunch of tools associate degree services giving a…Nov 13, 2023Nov 13, 2023
rootisshinrootisshSQLMap: A comprehensive guide to mastering the toolIn a previous blog, we read and understood what SQL Injection is and what its different types are. In this blog, we will learn about a tool…Nov 8, 2023Nov 8, 2023
rootisshinrootisshIndia’s Most Alarming Data Breach: 81.5 Crore Citizens’ Information at RiskA startling 81.5 crore Indians’ personal information is at risk in what is being called the biggest data leak in the nation’s history…Nov 1, 2023Nov 1, 2023
rootisshinrootisshSQL Injection Attacks: How They Work and How to Stop Themby Prateek KuberOct 30, 2023Oct 30, 2023
rootisshinrootisshOkta Security Breach: Customer Data Stolen by Malicious Actorsby Prateek KuberOct 27, 2023Oct 27, 2023
rootisshinrootisshUnderstanding HTTP/2 Rapid Reset: The Record-Breaking DDoS Attack and Its Impactby Prateek KuberOct 18, 2023Oct 18, 2023
rootisshinrootisshUnderstanding Vulnerabilities, Threats, and Risksby Prateek KuberOct 10, 2023Oct 10, 2023
rootisshinrootisshQakbot Botnet Dismantled in a Multi-Agency Operationby Prateek KuberSep 2, 2023Sep 2, 2023