Posts

Insights and writeups from our cybersecurity team

From Weakness to CVE: Understanding How Bugs Become Global Vulnerabilities

The path from discovering a software flaw to classifying it under CVE and CWE. ...

Rosemary
1/1/2026
Read Full Post

Bug Bounty Hunting: Web Vulnerability (SQL injection)

SQL Injection (SQLi) is a critical web security vulnerability that allows attackers to manipulate SQL queries and gain unauthorized access to databas...

Rosemary
1/1/2026
Read Full Post

Breaking Down a Real Web Exploitation Case: From Recon to CVE & Remediation

A practical, non-exploitative walkthrough of a web vulnerability — how we find it, map it to OWASP and CVE, and harden systems. ...

Rosemary
1/1/2026
Read Full Post

Uncovering Local File Inclusion Vulnerabilities: A Practical Approach to Path Traversal Hunting

Local File Inclusion (LFI) is one of the most common yet impactful vulnerabilities in modern web applications. It arises when user-supplied input is ...

Rosemary
1/1/2026
Read Full Post

Open-Source Intelligence (OSINT) — Practical Guide for Cyber Reconnaissance

Open-Source Intelligence (OSINT) is the practice of collecting and analyzing publicly available information to gain insights into a target — be it an...

Frigg
1/1/2026
Read Full Post

Cross-Site Scripting (XSS) — Practical Guide

Cross-Site Scripting (XSS) is a client-side code injection vulnerability that allows attackers to run JavaScript in victims’ browsers. Impact ranges ...

Rosemary
1/1/2026
Read Full Post

Cryptography in Capture The Flag (CTF)

Cryptography is the practice of developing and using coded algorithms to protect and obscure transmitted information so that it may only be read by t...

Frigg
1/1/2026
Read Full Post

Digital Forensics for CTFs & Labs

Short, practical, and focused on what you actually do in CTF forensic challenges: acquire, preserve, analyze, and report — with commands and tips you...

Frigg
1/1/2026
Read Full Post

Remote File Inclusion (RFI) — Practical Guide

Remote File Inclusion (RFI) is a severe web vulnerability where an application includes code or content from a *remote* resource (URL) based on user ...

Rosemary
1/1/2026
Read Full Post