Computer Hacker Gains Access to Florida City’s Water Supply

A computer hacker in the US was able to gain access to the water system of Oldsmar in Florida and successfully increased the amount of sodium hydroxide.
TryHackMe X HackerOne CTF WriteUp (Hacker Of The Hill)

This post explores each of the initial compromise methods for the TryHackMe x HackerOne CTF. Diving into the web security flaws and PHP tricks abused to gain access to the host webserver.
Is it true, do Macs get infected with malware more easily?

Apple claims that its Mac computers are well protected by in-built antivirus features, and there is no need to worry about extra security – how true is this?
File upload tricks and checklist

A compilation of tricks and checks for when a file upload is encountered in an offensive security test.
A guide to implementing gRPC services worldwide

Unravel the simplicity of gRPC with Project Crobat. Learn to streamline development with gRPC and empower your projects. Dive into our blog for insights!
Method Confusion In Go SSTIs Lead To File Read And RCE

Delve into OnSecurity’s research on Go’s server-side template injection vulnerabilities, revealing potential for file reads and RCE exploits. Read more now.
How A Love Letter Changed Computer Security Forever

Delve into the fascinating narrative of how a love letter altered the landscape of computer security perpetually. Uncover this tale of technological evolution.
Understaning Zero-Day Exploit And What Can I Do About It?

Explore the challenge of vulnerabilities exploited before fixes. Learn how to address security gaps and protect against threats in this insightful discussion.
Investigation: Why was LinkedIn targetted by phishing scams?

Explore the methods targeting LinkedIn users through phishing scams and gain insights into the everyday tactics used by cybercriminals to exploit you further.
Cybercriminals Demand $70m Ransom In ‘Colossal’ Attack

Uncover the latest threat looming over government servers. The newfound vulnerability impacts Microsoft systems, leaving government infrastructures at risk.