Rishika DesaiLeveraging Shodan for Proactive SecurityThis blog aims to empower those researchers with valuable OSINT techniques for ransomware hunting.5 min read·4 days ago----
Rishika DesaiHacking and Sourcing X Accounts promoting Crypto Scams and NFTs: Techniques ExplainedNon-fungible tokens have taken modern cyberspace into a new realm of revolution. For those who need context, it is an online digital…3 min read·Feb 17, 2024----
Rishika DesaiHackers Target Bug Bounty Hunters with Blackmail EmailsFor all the bug bounty hunters, please check your spam section, especially if you have generated a research email in…4 min read·Dec 25, 2023----
Rishika DesaiThe Dark Side of AI: GPTs as a New Weapon in the Cybercriminal ArsenalGPTs: A New Weapon in the Cybercriminal Arsenal5 min read·Nov 24, 2023----
Rishika DesaiLatest Major Data Breaches and How to Protect YourselfThe year 2023 has seen a steep rise in different cybersecurity attacks and data breaches, and it doesn’t seem to cease any time soon…5 min read·Nov 17, 2023----
Rishika DesaiKey Learnings from Files Present on the C2 Server of an Infamous Infostealer MalwareHello readers, welcome to my 5th blog. This one tries to highlight how I got access to the log files present over a C2 server of an…4 min read·Jul 19, 2023----
Rishika DesaiFrom Novice to Expert: Essential Cyber Threat Intelligence Resources for Every LevelThere are a lot of resources present, but finding the right one is important. Without the right course, the subject just seems to keep…4 min read·Jul 2, 2023--1--1
Rishika DesaiThreats around the new ‘.zip’ TLD introduced by GoogleGoogle recently announced that users could register for the newly launched 8 TLDs from 10 May 2023. These new TLDs are .foo, .zip, .mov…3 min read·May 18, 2023----
Rishika DesaiCryptocurrency scam method and ways to protect yourself from itCryptocurrencies and blockchain technology have gained popularity in recent years, and with that, scammers and fraudsters have attempted to…3 min read·May 9, 2023----
Rishika DesaiUsing MITRE D3F3ND for Cyber Threat IntelligenceWhile understanding and implementing Cyber Threat Intelligence, we’ll often come across the term MITRE and MITRE ATT&CK is a widely used…3 min read·Sep 17, 2022----