top of page
Table of Content


HTML Smuggling: The Stealthy Cyber Threat That Bypasses Security Defenses
In the ever-evolving cybersecurity landscape, attackers continuously adapt their techniques to bypass traditional security defenses. One...
Akshay Jain
3 min read


Operation ShadowHammer: The Supply Chain Attack That Compromised Millions of ASUS Devices
In 2019, a sophisticated cyberattack shook the global tech industry when attackers breached the supply chain of one of the world’s...
Akshay Jain
3 min read


PrintNightmare: Unmasking the Windows Print Spooler Vulnerability
In 2021, a critical vulnerability in a core Windows service sent shockwaves through the cybersecurity community. Known as PrintNightmare...
Akshay Jain
3 min read


LLMNR Attacks: Exploiting Local Name Resolution for Credential Theft
In the complex landscape of network security, even seemingly benign protocols can become avenues for attack. One such protocol is...
Akshay Jain
3 min read


NotPetya: The Cyberattack That Masqueraded as Ransomware
In June 2017, a destructive cyber campaign swept across the globe, initially disguised as ransomware but ultimately designed to cause...
Akshay Jain
3 min read
bottom of page