My experiments with AI Weaponization: An Emerging Threat to National Security

While working on AI safety research during Christmas leaves, I was experimenting with various AI models’ security measures and ethical guardrails. What started as curiosity quickly turned into a concerning discovery about how these powerful systems could be weaponized. Large Language Models (LLMs) have become increasingly prevalent in our daily lives, with millions of users […]

This Vulnerability in phpMyAdmin Lets An Attacker Perform DROP TABLE With A Single Click!

Most of you are familiar about Cross Site Request Forgery (CSRF) vulnerability, it is one of the most common vulnerabilities; it was listed in OWASP Top 10 – 2013. Previously, I had found and reported CSRF in an Intel website, by exploiting that vulnerability an attacker could remove items from an authenticated user’s shopping cart. […]

What Is a Firewall? Why Do You Need One For Your Personal Computer?

Firewall is software / hardware which blocks/ allows network traffic based on pre defined rules. A firewall is helpful to home users and enterprise users to avoid unwanted network traffic and allow only trusted communications by trusted softwares/apps. Firewall is your first and most important pal when it comes to the security of your information. […]

Protect Your MongoDB – Story of “The Same Database”

It’s normal now to hear stories about data breaches. Some of them involve publicly exposed Databases, S3 buckets etc. The vulnerability falls into ‘Security Misconfiguration’, A6 – OWASP Top 10 (2017). ” Attackers will often attempt to exploit unpatched flaws or access default accounts, unused pages, unprotected files and directories, etc to gain unauthorized access […]

Crypto-Mining Marketplace NiceHash Fixed a Vulnerability Which Leaked Miners’ Information

Privacy matters to most of us! That applies for crypto world too. Bitcoin transactions don’t directly link to a person, but in case of NiceHash, attackers could find a miner’s BTC wallet address using his Email address. This is a story about How I found a random guy’s recent payments from his cryptocurrency mining activity […]

Back To Top