Rishika DesaiLeveraging Shodan for Proactive SecurityThis blog aims to empower those researchers with valuable OSINT techniques for ransomware hunting.May 14May 14
Rishika DesaiHacking and Sourcing X Accounts promoting Crypto Scams and NFTs: Techniques ExplainedNon-fungible tokens have taken modern cyberspace into a new realm of revolution. For those who need context, it is an online digital…Feb 17Feb 17
Rishika DesaiHackers Target Bug Bounty Hunters with Blackmail EmailsFor all the bug bounty hunters, please check your spam section, especially if you have generated a research email in…Dec 25, 2023Dec 25, 2023
Rishika DesaiThe Dark Side of AI: GPTs as a New Weapon in the Cybercriminal ArsenalGPTs: A New Weapon in the Cybercriminal ArsenalNov 24, 2023Nov 24, 2023
Rishika DesaiLatest Major Data Breaches and How to Protect YourselfThe year 2023 has seen a steep rise in different cybersecurity attacks and data breaches, and it doesn’t seem to cease any time soon…Nov 17, 2023Nov 17, 2023
Rishika DesaiKey Learnings from Files Present on the C2 Server of an Infamous Infostealer MalwareHello readers, welcome to my 5th blog. This one tries to highlight how I got access to the log files present over a C2 server of an…Jul 19, 2023Jul 19, 2023
Rishika DesaiFrom Novice to Expert: Essential Cyber Threat Intelligence Resources for Every LevelThere are a lot of resources present, but finding the right one is important. Without the right course, the subject just seems to keep…Jul 2, 20231Jul 2, 20231
Rishika DesaiThreats around the new ‘.zip’ TLD introduced by GoogleGoogle recently announced that users could register for the newly launched 8 TLDs from 10 May 2023. These new TLDs are .foo, .zip, .mov…May 18, 2023May 18, 2023
Rishika DesaiCryptocurrency scam method and ways to protect yourself from itCryptocurrencies and blockchain technology have gained popularity in recent years, and with that, scammers and fraudsters have attempted to…May 9, 2023May 9, 2023
Rishika DesaiUsing MITRE D3F3ND for Cyber Threat IntelligenceWhile understanding and implementing Cyber Threat Intelligence, we’ll often come across the term MITRE and MITRE ATT&CK is a widely used…Sep 17, 2022Sep 17, 2022