top of page
Table of Content


ClickFix Fake CAPTCHA Attacks: How Cybercriminals Exploit User Trust to Deliver Malware
Explore the technical intricacies of ClickFix fake CAPTCHA attacks, a rising social engineering threat. Learn how attackers deceive users into executing malicious code and discover real-world examples and mitigation strategies.
Akshay Jain
4 min read


API Hacking Uncovered: Deep Dive into Broken Function Level Authorization (BFLA) and Broken Object Level Authorization (BOLA)
Discover how Broken Function Level Authorization (BFLA) and Broken Object Level Authorization (BOLA) expose APIs to serious risks.
Akshay Jain
3 min read


Mastering Sigma Rules: A Deep Dive into Writing Detection Rules for Modern SIEMs
Learn how to write Sigma rules for threat detection in modern SIEM platforms.
Akshay Jain
5 min read


SEO Poisoning Attacks: When Google Becomes the Attack Vector
SEO Poisoning Attacks: When Google Becomes the Attack Vector
Akshay Jain
4 min read


Swamp CTF 2025 - Web Walkthrough Part 1
Explore the Swamp CTF Serialies challenge walkthrough using Gobuster for directory enumeration and source code analysis.
Akshay Jain
2 min read
bottom of page