Akansha BishtJan 93 min readUnderstanding the Impact of P1 Vulnerabilities on Your Organisation: A Comprehensive Guide
Abhinav BangiaNov 12, 20243 min readUnderstanding CVE-2024-6387: A P1 Vulnerability Exposing Systems to Remote Code Execution Risks
Dipti BhadouriyaNov 11, 20242 min readHow to Detect Device Tampering in APK Files and Keep Your App Safe
Dipti BhadouriyaSep 18, 20242 min readAfter the Patch: How Organisations Validate P1 Vulnerability Fixes
Dipti BhadouriyaJul 10, 20243 min readNavigating the Triaged State: A Guide for Bug Bounty Researchers
Anurag TripathiJul 1, 20243 min readMastering IDOR: A Comprehensive Guide to Exploiting Advanced Insecure Direct Object Reference Vulnerabilities
Anurag TripathiMay 14, 20242 min readShielding Your WordPress Site:Understanding and Mitigating XML-RPC Vulnerabilities
Abhinav BangiaSep 22, 20233 min readDeciphering Bug Severity in Bug Bounty Programs: A Deep Dive into Impact Assessment