Blog post on Zero-Day Exploit
entry_001.log :: 25.10.2025

The Anatomy of a Zero-Day Exploit

Diving deep into how zero-day vulnerabilities are discovered, weaponized, and what you can do to mitigate...

Read Entry
Blog post on SecDevOps
entry_002.log :: 22.10.2025

SecDevOps: More Than Just a Buzzword

Why integrating security into the development pipeline isn't just a good idea—it's an absolute necessity...

Read Entry
Blog post on PhD Journey
entry_003.log :: 19.10.2025

My PhD Journey: The Future of Digital Forensics

Exploring my current research at NFSU and the challenges in mobile and cloud-based forensic analysis...

Read Entry
Blog post on Social Engineering
entry_004.log :: 15.10.2025

Social Engineering: The Human-Element Hack

Attacking the weakest link. A look into modern phishing, vishing, and pretexting campaigns and how to train for them...

Read Entry
Blog post on Shiksha Shetu
entry_005.log :: 12.10.2025

Building a Scalable School ERP: The Shiksha Shetu Story

From concept to deployment. The architectural challenges and security considerations behind a multi-tenant SaaS platform...

Read Entry
Blog post on AI in VAPT
entry_006.log :: 09.10.2025

The Rise of AI in VAPT

How machine learning models are being used to automate vulnerability discovery, and where they still fall short...

Read Entry
[ < PREV ] 1 2 3 [ NEXT > ]