Critical Webmail Exploit: CVE-2025–49113 in Roundcube | TryHackMe Roundcube The article discusses a critical vulnerability, identified as CVE-2025–49113, affecting Roundcube webmail, a widely used open-source email…
Lockbit Ransomware Analysis with ANY.RUN This article gives a fascinating and slightly terrifying look into LockBit 4.0, a notoriously dangerous ransomware that’s been causing…
TCM Practical Network Penetration Tester (PNPT) Study Notes & Guide & Review Introduction to TCM Practical Network Penetration Tester (PNPT)
SOC EXPLAINED | TryHackMe SOC Fundamentals “Every second, your organization’s data is under attack. Who’s watching? The Security Operations Center (SOC), a dedicated team monitoring…
Google Cyber Security or CompTIA Security+? Here’s What Recruiters Are REALLY Looking For This article provides a detailed comparison of three popular beginner-friendly cybersecurity certifications: the Google Cybersecurity…
ChatGPT & Gemini in Ethical Hacking & Cyber Security | TryHackMe BadSuccessor Walkthrough This article discusses a Microsoft Windows Active Directory vulnerability called “Bad Successor.” This vulnerability can allow an attacker…
SQL Injection with SQLmap | TryHackMe SQLmap Basics This article serves as a comprehensive guide to understanding and utilizing SQLmap, a powerful open-source tool designed to automate the…
Certified Red Team Professional (CRTP) Study Notes & Guide Introduction to Certified Red Team Professional (CRTP)
How a Hacker Hacked TU Eindhoven of Technology University Using Just VPN Credentials The hacking of TU Eindhoven of Technology university began with the hacker acquiring VPN credentials for two university accounts, labeled…