Priyanshu Sahay
1001 posts
Priyanshu Sahay is a cybersecurity expert with a passion for protecting individuals and organizations from the cyber threats. Avid learner and stays up-to-date with the latest trends and technologies in cybersecurity. 10 years of experience in the field, including being listed on bug bounty platforms and receiving rewards from various companies like Microsoft, IBM, Slaesforce, Splunk and more for identifying and reporting vulnerabilities.
RecoverPy : To Find And Recover Deleted Or Overwritten Files From Terminal
To find and recover deleted or overwritten files from your terminal. Installation Dependencies Mandatory: To list and search…
October 22, 2024
Key Worries Surrounding the Growing Impact of Technology in Our Lives
Nearly every element of life has changed due to technology’s explosive growth, raising worries and bringing about many…
October 18, 2024
Vulnerability in Jetpack – Affects 27 Million WordPress Sites
WordPress plugin Jetpack has a major vulnerability that could allow attackers to take over websites. During an internal…
October 15, 2024
Understanding Quishing: The Rise of QR Code Scams in Cybersecurity
In a world where technology is advancing rapidly, the methods used by cybercriminals to exploit individuals and organizations…
October 4, 2024
secator – The Security Pentester Swiss Knife
secator is a task and workflow runner used for security pentester assessments. It supports dozens of well-known security…
September 25, 2024
Puter – The Internet OS! Free, Open-Source, and Self-Hostable
Puter is an advanced, open-source internet operating system designed to be feature-rich, exceptionally fast, and highly extensible. Puter…
September 3, 2024
Wireshark 4.4 Released With New I/O Graphs, Flow Graph / VoIP Calls, TCP Stream
This is the first release of the Wireshark 4.4 version. The world’s most popular open source network protocol…
August 30, 2024
New TOR Browser 13.5.1 Unveils Major Improvements
The Tor Project has released a significant update to Tor Browser. While the update, Tor Browser 13.5.1 includes…
July 10, 2024
Millions of Twilio Authy Users Potentially Exposed in Data Breach.
A Twilio data breach of two-factor authentication app Authy has potentially exposed millions of phone numbers. The breach…
July 5, 2024
How I Hacked Zoom? The Session Takeover Exploit Chain Analysis
This article explores a recently discovered exploit chain that allows attackers to take over Zoom sessions. The exploit…
June 20, 2024