New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites

New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites A new “widespread timing-based vulnerability class” that uses a double-click sequence to enable clickjacking attacks and account takeovers on practically all popular websites has been revealed by threat hunters. DoubleClickjacking is the codename given by security researcher Paulos Yibelo to the technique.“Instead of relying on a …

READ MORE

TRY HACK ME : PHISING EMAILS IN ACTION

TRY HACK ME : PHISING EMAILS IN ACTION Task 1: Introduction Now that we covered the basics concerning emails in Phishing Emails 1, let’s dive right into actual phishing email samples.  Each email sample showcased in this room will demonstrate different tactics used to make the phishing emails look legitimate. The more convincing the phishing email appears, …

READ MORE

TRY Hackme  : Passive reconnaissance

TRY Hackme : Passive reconnaissance Task 1 Introduction Welcome to the first room of the Network Security Module. This module covers: Passive Reconnaissance Active Reconnaissance Nmap Live Host Discovery Nmap Basic Port Scans Nmap Advanced Port Scans Nmap Post Port Scans Protocols and Servers Protocols and Servers 2 Network Security Challenge In this room, after …

READ MORE

DPDP Act 2023 V/S DPDP Act 2025

Digital Personal Data Protection It appears that you want to know how the DPDP (Data Protection and Digital Privacy) rules and regulations of 2023 and 2025 differ from one another. Here’s an explanation if you’re talking about the Digital Personal Data Protection (DPDP) Act, 2023 in India or a comparable data protection framework: Digital Personal …

READ MORE

Legal Consequences Under DPDP Act 2025

DPDP: Digital Personal Data Protection Rules Title and Start Date: The regulations are known as the “Digital Personal Data Protection Rules, 2025.” Rules 3–15, 21, and 22 will take effect later, however the majority will take effect immediately following publication. Definitions: Unless otherwise indicated, terms used in the rules have the same definitions as those …

READ MORE

Digital Personal Data Protection Rules, 2025

Digital Personal Data Protection Rules, 2025 The regulations mandate that organisations manage personal data in an ethical manner and highlight data privacy as a basic right. Getting consent before collecting data, making sure data is used only for specified reasons, and safeguarding it with robustsecurity measures are all important aspects. Additionally, people have the ability …

READ MORE

PUBLIC Wi-Fi

Introduction Public Wi-Fi networks are ubiquitous and offer undeniable convenience, allowing users to browse the internet, check emails, and stay connected without the need for their data plans. However, their open nature makes them vulnerable to various cyber threats, including data breaches and hacking attempts. This guide will explore the risks associated with public Wi-Fi …

READ MORE

OS Forensics Tool

 A Comprehensive Tool for Digital Investigations Introduction In the modern era, digital devices have become an integral part of daily life, storing vast amounts of data and facilitating communication across the globe. As a result, digital evidence is increasingly relevant in criminal investigations, cybersecurity incidents, and corporate misconduct cases. Forensic experts are often tasked with …

READ MORE

Cyber Security Course in Rohini

Cybersecurity refers to the practice of protecting computer systems, networks and data from digital attacks, damage, or unauthorized access. As reliance on technology grows, the importance of safeguarding sensitive information-ranging from personal data to critical infrastructure-has become paramount. Cybersecurity encompasses a variety of measures and technologies designed to prevent cyber threats, which can include malware, …

READ MORE