Articles
Architectural Insights into Preventing Subdomain Takeovers
Subdomain takeovers occur when attackers gain control of a subdomain due to inactive DNS records pointing to decommissioned services. This article explores architectural vulnerabilities and offers prevention strategies for both consumers and cloud service providers to mitigate these risks.
Vulnerabilities in Google Workspace and GCP
The article highlights significant security vulnerabilities in Google Workspace and Google Cloud Platform, particularly around Google Credential Provider for Windows (GCPW), which pose risks for ransomware, data exfiltration, and password recovery attacks, and emphasizes the need for robust cloud …
Installing Parrot OS on Mac (M1/M2/M3) using Parallels
This article provides a detailed walkthrough of the installation steps specific to Parrot OS, including configuring network settings, partitioning, and setting up security features.
Navigating the Nullcon Experience in Goa
I attended Nullcon in Goa and found myself immersed in cutting-edge cybersecurity talks, but some logistical hiccups caught my attention. Dive into my candid take on balancing enlightening content with a smooth event experience.
My CISSP Journey
I finally achieved my CISSP certification. This article describes how I planned and did everything. It wasn’t that big of a task as others make it to be and proper planning and guidance goes a long way.
Cloud Security Roadmap
A cloud security roadmap is a strategic plan that outlines the steps and actions an organization needs to take to secure its cloud environment. It provides a comprehensive view of the organization’s security posture and helps align security efforts with overall business objectives. The roadmap …