KongsecHackers Exploiting Markdown’s Functions to Run Malicious CampaignsHello readers! I’m Aditya Shende aka Kongsec, Bounty Hunter, Biker, and Security Researcher from India. In today’s fast-evolving…3 min read·Mar 13, 2024--1--1
KongsecExploiting Exposed Tokens and API Keys: Edition 2023Introduction: Welcome to my 14th article on exploiting exposed tokens and API keys. In this edition, I will discuss how to approach and…3 min read·Jun 24, 2023--1--1
KongsecHow I Discovered and Reported a PII Disclosure VulnerabilityHi everyone,3 min read·May 5, 2023--1--1
KongsecQuantum Key Distribution: The Revolutionary Encryption Technique Enabling Unbreakable Secure…In the digital age, secure communication is essential for individuals and organizations alike. Encryption has been a popular approach to…4 min read·May 5, 2023----
KongsecThe Revolutionary Encryption Technique Enabling Secure Computation on Encrypted DataIn today’s digital world, data privacy and security have become crucial concerns for individuals and organizations alike. Encryption has…3 min read·May 5, 2023----
KongsecEMP as a Weapon in Cybersecurity: A Blessing or a Curse?For many years, cybersecurity experts have debated the use of electromagnetic pulse (EMP) weapons. EMP can be used as a weapon with…4 min read·May 3, 2023----
KongsecIs our VoIP Wire tap safe ???Making phone calls and participating in video conferences from anywhere in the globe is now simple thanks to VoIP (Voice over Internet…3 min read·May 2, 2023----
KongsecGoogle Apps and the Risk of Exposed Data: Breaking Privacy Policy and GDPR ?As one of the largest tech companies in the world, Google has developed and released a wide range of popular apps and services. From Gmail…3 min read·Apr 26, 2023----
KongsecHow poor we are on cloud security : Protecting Your Data in the Age of Cyber ThreatsWith more businesses and organisations moving their data and apps to the cloud, cloud security has become a major worry. With this change…3 min read·Apr 26, 2023----