Hackers Exploiting Markdown’s Functions to Run Malicious CampaignsHello readers! I’m Aditya Shende aka Kongsec, Bounty Hunter, Biker, and Security Researcher from India. In today’s fast-evolving…Mar 131Mar 131
Exploiting Exposed Tokens and API Keys: Edition 2023Introduction: Welcome to my 14th article on exploiting exposed tokens and API keys. In this edition, I will discuss how to approach and…Jun 24, 20231Jun 24, 20231
Quantum Key Distribution: The Revolutionary Encryption Technique Enabling Unbreakable Secure…In the digital age, secure communication is essential for individuals and organizations alike. Encryption has been a popular approach to…May 5, 2023May 5, 2023
The Revolutionary Encryption Technique Enabling Secure Computation on Encrypted DataIn today’s digital world, data privacy and security have become crucial concerns for individuals and organizations alike. Encryption has…May 5, 2023May 5, 2023
EMP as a Weapon in Cybersecurity: A Blessing or a Curse?For many years, cybersecurity experts have debated the use of electromagnetic pulse (EMP) weapons. EMP can be used as a weapon with…May 3, 2023May 3, 2023
Is our VoIP Wire tap safe ???Making phone calls and participating in video conferences from anywhere in the globe is now simple thanks to VoIP (Voice over Internet…May 2, 20232May 2, 20232
Google Apps and the Risk of Exposed Data: Breaking Privacy Policy and GDPR ?As one of the largest tech companies in the world, Google has developed and released a wide range of popular apps and services. From Gmail…Apr 26, 2023Apr 26, 2023