Sign in

rootissh

Here’s what we know about the biggest spying scandal in Cyber history!

What went down?

A week’s investigation done by the Guardian and 16 other media forums revealed a continuing abuse of NSO’s spyware named Pegasus.

The consortium believes the data acquired by the spyware exposes potential targets but NSO’s government clients have identified possible surveillance attempts of the common public.


What stemmed the obnoxious vulnerability?

“PrintNightmare” issued an unscheduled patch, reported by Microsoft on July 2nd, 2021 for CVE-2021–34527, a vulnerability that enables remote code execution attacks and system privileges, actively moving in all Windows systems!

The Case of the Incompetent Emergency Patch!


Here’s a 2 min read on Kaseya Releasing their Security Patch as Companies Continue to Recover from their zero-day blow!

Do refer to our previous blogs to catch up with the latest events on Cyber Security!

How the mighty fell!


These startling digital artists astonished the world in 2021 and topped the headlines.

Best-selling artist, Beeple sold a digital image collage for $69 million.

Nyan Cat gif creator, Chris Torres made his final selling bid reaching 300 ETH (about $590,000).

Twitter’s CEO, Jack Dorsey’s first tweet was sold for 1630 ETH.

The question of how someone can own the original copy from the very creator/artist was through NFT, Non-Fungible Tokens.

Let’s break this down.

If Martha and Robert have each got $100 bills and they interchange them, the value and identity of the bill remains the same, this is “Fungible”…


A series of Android apps were used to steal Facebook credentials that were downloaded a total of nearly six million times (almost the number of times I’ve heard Levitating by Dua Lipa) before Google permanently banned and removed them from the Play Store!

The Nitty-Gritties!


On July 2 Friday 2021,Kesaya went around recommending all their VSA customers to shut down their services due to a bump-like breach, little did they know this monumental attack was about to go in the history books of ransomware (holding encrypted files for ransom) attacks.

Who’s Kaseya?

Kaseya designs and develops IT software, offering IT infrastructure management solutions for MSPs (managed service providers) and other internal IT organizations to manage a large fleet of computers. Kaseya VSA is a product-more specifically an RMM-Remote Monitoring and Management product, it’s an on-premises software or “on-prem”, it basically runs on computers “on the…


Air India is the flag carrier airline of India, headquartered at New Delhi. It is owned by Air India Limited, a government-owned enterprise, and operates a fleet of Airbus and Boeing aircraft serving 102 domestic and international destinations.

Who was attacked?

SITA, one of the largest aviation IT companies, confirmed that the company was affected by a Cyberattack that resulted in a data breach. This breach affected not just Air India but also Malaysia Airlines, Finnair, Singapore Airlines, Jeju Air etc. This attack leaked data of all those customers who used their services between August of 2011 and February 2021. SITA claims that…


We have all been playing games since we were very young, may it be outdoor games or board games or even video games. One game that we have all definitely played at some point of our life is treasure hunt or scavenger hunt. A CTF or Capture the Flag is somewhat similar to these but for hacking professionals.

Hacker101 CTF

In a CTF, the question itself is the clue and you go ahead with it to find the treasure or sometimes it is multiple treasures.

Treasure in a CTF is called flags and these flags have points assigned to them. The host…


We all know what web browsers are, without them you would not be reading this. A Web Browser is a medium to surf the internet and visit various websites. The growing malicious intent of Cyber Attacks, the safety of web surfers is really necessary.

Some browsers are more secure than others and can defend the user against various kinds of attacks like Phishing, Intrusive tracking etc.

What are features of a secure browser?

  1. Secure design
  2. Privacy protection
  3. Regular updates
  4. Usability

What makes a browser secure?

  1. Sand boxing — it means running an application in isolation. A sandbox makes sure that even if there is a malicious code running , it will be…

Whenever we hear the word hacker, this is the image that comes into our mind. A person in a hoodie, tapping his keyboard and the screen is all black and green and a lot of things are blinking or moving on the screen. It looks very fascinating but we do not really understand what is going on.

What we see on these screens are actually multiple “terminals”.

“Okay now what is that ?”

A Terminal is simply an interface in which we write simple text commands and the computer executes them.

Linux is one such Operating System (actually a kernel…

rootissh

Rooting the world one day at a time.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store