top of page
Table of Content


Pass-the-Ticket (PtT) Attack: Exploiting Kerberos Authentication
In the vast realm of cybersecurity threats, Pass-the-Ticket (PtT) attacks stand as one of the most dangerous post-exploitation...
Akshay Jain
3 min read
10 views
0 comments


Golden SAML Attack: Hijacking Authentication in the Cloud
With the rapid adoption of cloud-based applications and services, attackers continuously develop sophisticated techniques to bypass...
Akshay Jain
4 min read
8 views
0 comments


HTML Smuggling: The Stealthy Cyber Threat That Bypasses Security Defenses
In the ever-evolving cybersecurity landscape, attackers continuously adapt their techniques to bypass traditional security defenses. One...
Akshay Jain
3 min read
9 views
0 comments


Operation ShadowHammer: The Supply Chain Attack That Compromised Millions of ASUS Devices
In 2019, a sophisticated cyberattack shook the global tech industry when attackers breached the supply chain of one of the world’s...
Akshay Jain
3 min read
5 views
1 comment


PrintNightmare: Unmasking the Windows Print Spooler Vulnerability
In 2021, a critical vulnerability in a core Windows service sent shockwaves through the cybersecurity community. Known as PrintNightmare...
Akshay Jain
3 min read
1 view
0 comments
bottom of page