Skip to content

TechKranti

CyberSecurity Revolution

Category: Cyber Security Gyaan

(Gyaan is Hindi for knowledge)

This Category enlists articles expounding important concepts in the field of Cyber Security.

Why are there so many OPTIONS requests in my Proxy History: All about pre-flight requests

December 30, 2024 Amey Anekar Bounty Hunting, Cyber Security Gyaan

Understanding the WHY behind technological concepts is extremely important to understanding the concept at a fundamental level. Numerous concepts in the Web Security field often get ignored because of their apparent complexities. One such concept

Continue reading

21-Aug-24: In Security News Today

August 21, 2024 Amey Anekar Cyber Security Gyaan

Microsoft Patches Critical Copilot Studio Vulnerability Exposing Sensitive Data Microsoft patched a critical vulnerability in its Copilot Studio, tracked as CVE-2024-38206, which could allow authenticated attackers to exploit a Server-Side Request Forgery (SSRF) flaw to

Continue reading

Why SMBs Can’t Afford to Ignore Cybersecurity

October 23, 2023 Amey Anekar Cyber Security Gyaan

Do you think Small and medium-sized businesses (SMBs) play a crucial role in the economy of a country? Yes, they do. There is no doubt about that But Why?

In this article we discuss Five Reasons Why SMBs Can’t Afford to Ignore Security.

Continue reading

Browser-in-the-Browser (BitB) Attack

August 22, 2023 Amey Anekar Cyber Security Gyaan

When I look back at my nascent years in Cybersecurity (circa 2008) it was extremely easy to fool users into divulging their credentials on phishing pages. Almost all the users were naive. Back then, I

Continue reading

How SAML Works

August 15, 2023 Amey Anekar Cyber Security Gyaan

Security Assertion Markup Language (SAML) is a set of rules that helps different places, like a website and a login service, share information about who you are and what you’re allowed to do. It’s like

Continue reading

9 Essential Tools In A Startup’s Cyber Security Arsenal

August 8, 2023 Amey Anekar Cyber Security Gyaan

Cyber Security is always an afterthought in the startup world. It does not directly impact any of the metrics you care about the most in the early stage of a startup. It does not directly

Continue reading

Why Startups Should Undergo A Cyber Security Assessment

August 1, 2023 Amey Anekar Cyber Security Gyaan

Should An Early Stage Startup Take Cyber Attacks Seriously? Being a tech startup in the current cyber landscape, you cannot ignore cyber attacks on your online platform. The average financial impact per cyber attack is

Continue reading

This minuscule 4 KB file can allow an attacker to take over your Windows system

July 25, 2023 Amey Anekar Cyber Security Gyaan

The title sounds dramatic, right? Is this clickbait? No, it isn’t. Bear with me while I make my case to justify the title. So, what’s this dangerous minuscule file the title talks about?

Continue reading

24-Jul-23: In Security News Today

July 24, 2023 Amey Anekar Cyber Security Gyaan

Google Messages Implements MLS Protocol for Cross-Platform End-to-End Encryption Google is adding support for Message Layer Security (MLS) to its Messages service for Android, enabling end-to-end encryption with interoperability across different messaging platforms. The protocol,

Continue reading

Understanding SaaS Security Posture Management (SSPM)

July 18, 2023 Amey Anekar Cyber Security Gyaan

Origin of the term Posture Management in context of Cyber Security Security Posture Management solutions gained popularity in the context of Cloud Security, that is, in the form of Cloud Security Posture management (CSPM) solutions.

Continue reading

Posts pagination

1 2 Next Posts»

About Me

Hey There, I am Amey Anekar - Cyber Security Specialist with a passion for solving security problems even when resources are limited. I've been fortunate to develop a knack for gauging an organization's cyber security posture and helping them plan a transition towards becoming more resilient in the face of cyber threats. It's a privilege to be able to contribute to the field and assist organizations in safeguarding their digital assets. Get In Touch    

Search TechKranti

Top Posts & Pages

  • What is "Content-Type: application/x-protobuf": Protobuf Explained For Hackers
  • IDOR through MongoDB Object IDs Prediction
  • How I discovered an SSRF leading to AWS Metadata Leakage

Categories

  • Bounty Hunting
  • Chrome Extension Development
  • Cyber Security Gyaan
  • Cyber Security News & Updates
  • Malware Reports & Analysis
  • Programming
  • Secure Coding
  • Tips & Tricks

Follow Us

  • Facebook
  • Twitter
WordPress Theme: Mercia by ThemeZee.