Priyanshu Sahay
856 posts
Priyanshu Sahay is a cybersecurity expert with a passion for protecting individuals and organizations from the cyber threats. Avid learner and stays up-to-date with the latest trends and technologies in cybersecurity. 10 years of experience in the field, including being listed on bug bounty platforms and receiving rewards from various companies like Microsoft, IBM, Slaesforce, Splunk and more for identifying and reporting vulnerabilities.
LIMA – Linux Virtual Machine With Automatic Port Forwarding
Linux virtual machines, typically on macOS, for running containerd Lima launches Linux virtual machines with automatic file sharing…
February 15, 2022
Apple Fixes Zero Day Vulnerability for iOS and macOS Monterey – Update now
Apple Fixes Zero Day Vulnerability for iOS and macOS – Update now Apple said, CVE-2022-22620, a single vulnerability…
February 11, 2022
Cisco Fixes Small Business RV Series Routers Vulnerabilities
Cisco Fixes Small Business (SMB) RV Series Routers Vulnerabilities Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340,…
February 5, 2022
YARP- Yet Another Reverse Proxy By Microsoft
YARP: Yet Another Reverse Proxy YARP (which stands for “Yet Another Reverse Proxy”) is a project to create…
February 2, 2022
Download Apple iOS 15.2.1 Fixes Homekit Security Vulnerabilities
Apple iOS 15.2 is the latest version of iPhone and iPad operating system. Get the latest software updates…
January 14, 2022
Microsoft And Adobe First Security Patch For 2022
Adobe released five patches for January 2022 that addressed 41 CVEs in Acrobat and Reader as well as…
January 12, 2022
Google Rolled Out New Chrome Version Bug Fixes
Google Rolled Out New Chrome Version Fixes Bugs As part of its first round of updates to Chrome…
January 6, 2022
Wireshark 3.6.1 Version Released
Wireshark is the world’s most popular network penetration testing software. It is used for troubleshooting, analysis, development and…
January 4, 2022
How to Find a Hidden App in Android
Phone trackers are used for many purposes, including surveillance, monitoring children or employees, phone theft recovery, phone cloning,…
January 3, 2022
7 Tips To Get Your First Data Scientist Job
In the late 2000s, data science surged to prominence and has since soared within the IT industry. Notably,…
December 22, 2021