Skip to content
  • Facebook
  • Twitter

Just another Cyber security blog

  • Home
  • About
  • Contact
  • Guest Posting
  • Privacy Policy
  • Toggle search form

Author: Ashutosh Barot

Ashutosh has found security issues that prevented leak of personal information belonging to 100 million+ people. He specialize in finding vulnerabilities in Web, Mobile applications, IT infrastructure, and consulting organizations on why, how, and when to fix them. He is working with Deloitte since Jun 2017 as a Cyber Security Consultant/Engineer, Acknowledged by organizations like Google, Twitter, US Department of Defense, Symantec, United Nations, Rapid7, Trend Micro, Avira, United Airlines, IBM, Go Airlines, etc. for finding out security flaws in web applications.
How I (ethically) hacked an Airline on its inaugural day

How I (ethically) hacked an Airline on its inaugural day

Uncategorized
How to Remove Cache, Local Data of a specific Website from Google Chrome?

How to Remove Cache, Local Data of a specific Website from Google Chrome?

Uncategorized
How I Received 3 CVEs in Quick Heal Total Security

How I Received 3 CVEs in Quick Heal Total Security

Uncategorized
Protect Your MongoDB – Story of “The Same Database”

Protect Your MongoDB – Story of “The Same Database”

Uncategorized
Crypto-Mining Marketplace NiceHash Fixed a Vulnerability Which Leaked Miners’ Information

Crypto-Mining Marketplace NiceHash Fixed a Vulnerability Which Leaked Miners’ Information

Uncategorized
How to Watch Movies via Flash Drive in Sony Bravia?

How to Watch Movies via Flash Drive in Sony Bravia?

Uncategorized
This Vulnerability in phpMyAdmin Lets An Attacker Perform DROP TABLE With A Single Click!

This Vulnerability in phpMyAdmin Lets An Attacker Perform DROP TABLE With A Single Click!

Uncategorized
[Incident Response]: How To Stay Protected From A Ransomware Attack like Wannacry?

[Incident Response]: How To Stay Protected From A Ransomware Attack like Wannacry?

Uncategorized
Cyber Security: 15 Simple Steps To Protect Your Self Against Cyber Attacks

Cyber Security: 15 Simple Steps To Protect Your Self Against Cyber Attacks

Uncategorized
Online Transactions: Learn Exactly How To Improve Your Digital Security And Privacy

Online Transactions: Learn Exactly How To Improve Your Digital Security And Privacy

Uncategorized

Posts navigation

1 2 Next

Copyright © 2022 | Cyber Word Mirror.

Powered by PressBook Grid Dark theme