New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites A new “widespread timing-based vulnerability class” that uses a double-click sequence to enable clickjacking attacks and account takeovers on practically all popular websites has been revealed by threat hunters. DoubleClickjacking is the codename given by security researcher Paulos Yibelo to the technique.“Instead of relying on a …

READ MORE

TRY HACK ME : PHISING EMAILS IN ACTION

TRY HACK ME : PHISING EMAILS IN ACTION Task 1: Introduction Now that we covered the basics concerning emails in Phishing Emails 1, let’s dive right into actual phishing email samples.  Each email sample showcased in this room will demonstrate different tactics used to make the phishing emails look legitimate. The more convincing the phishing email appears, …

READ MORE

TRY Hackme  : Passive reconnaissance

TRY Hackme : Passive reconnaissance Task 1 Introduction Welcome to the first room of the Network Security Module. This module covers: Passive Reconnaissance Active Reconnaissance Nmap Live Host Discovery Nmap Basic Port Scans Nmap Advanced Port Scans Nmap Post Port Scans Protocols and Servers Protocols and Servers 2 Network Security Challenge In this room, after …

READ MORE

DPDP Act 2023 V/S DPDP Act 2025

Digital Personal Data Protection It appears that you want to know how the DPDP (Data Protection and Digital Privacy) rules and regulations of 2023 and 2025 differ from one another. Here’s an explanation if you’re talking about the Digital Personal Data Protection (DPDP) Act, 2023 in India or a comparable data protection framework: Digital Personal …

READ MORE

Legal Consequences Under DPDP Act 2025

DPDP: Digital Personal Data Protection Rules Title and Start Date: The regulations are known as the “Digital Personal Data Protection Rules, 2025.” Rules 3–15, 21, and 22 will take effect later, however the majority will take effect immediately following publication. Definitions: Unless otherwise indicated, terms used in the rules have the same definitions as those …

READ MORE

SQL Map Tool

Introduction to SQLmap A popular open-source penetration testing tool called SQLmap makes it easier to find and take advantage of SQL injection flaws in web applications. Since its creation in 2006, it has grown to become one of the most well-known instruments for web security. An attack known as SQL injection (SQLi) gives a hacker …

READ MORE

Cyber Security Course in Rohini

Cybersecurity refers to the practice of protecting computer systems, networks and data from digital attacks, damage, or unauthorized access. As reliance on technology grows, the importance of safeguarding sensitive information-ranging from personal data to critical infrastructure-has become paramount. Cybersecurity encompasses a variety of measures and technologies designed to prevent cyber threats, which can include malware, …

READ MORE

The Rise of AI in Cybersecurity: Benefits, Applications, and Challenges

The Rise of AI in Cybersecurity: Benefits, Applications, and Challenges Artificial intelligence (AI) has emerged as a powerful cybersecurity tool, revolutionizing how organizations detect, prevent, and respond to cyber threats. This blog explores the benefits of AI in cybersecurity, how AI can be effectively utilized to protect our cyber world, and the challenges of integrating …

READ MORE