Welcome to my Cybersecurity Blog!

Bonjour service on Windows11

This module is blocked from loading into the Local Security Authority If you are on Windows 11, you might have seen this pop-up window, wondering what...

Containers – {THM-Advent of Cyber 2025}

Learn about container security. What Are Containers? To understand what a container is, we first need to understand the problem it fixes. Put plainly...

How cookies work in Web Applications

Everyone loves cookies, right? Well, I am talking about different types of cookies, and I hope you gain some knowledge from my post. Let’s dive into...

Web Application Security Best Practices

Web Application Security is an important topic in 2025 because every modern business relies on web applications to manage operations, deliver services...

What is the Credential Manager?

Do you know where Windows stores your passwords and login details that you save when using this operating system? For example, when you access a...

Web Application Penetration Testing

A comprehensive Web Application Testing Guide This blog post provides a thorough guide to web application penetration testing. Whether you are a...

Threat Hunting & Incident Response

    MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a comprehensive framework that provides a structured and...

Digital Signature Using SHA-256 with RSA Encryption.

Digital signatures are crucial in cryptography to ensure secure communication and data integrity. But how exactly do they work? A digital signature...

Cyberchef is a must-have security tool.

If you’re seriously involved in cybersecurity or digital forensics, you’ve likely encountered a variety of appropriate tools designed to...