CVE-2025–29927: The Shocking Next.jsCVE-2025–29927 was discovered by security researchers Rachid Allam and Yasser Allam and was publicly disclosed on March 21, 2025. This…4d ago4d ago
Email Header Analysis and Forensic Investigation: How to Uncover Hidden Threats in Open WebWe have all received a Phishing Email at least once or twice in our lives. Sometimes, these emails are indistinguishable from the real…5d ago5d ago
How to Build a Home Lab in 5 MinutesDo you know how to build a home lab in just 5 minutes? If not, let me walk you through the process step by step. A home lab consists of…Jan 15Jan 15
HOW to be a SOC analyst in a Year — No (BS) zbyteAs a student learning cybersecurity, I’ve become fascinated by the world of security operations. One area that stands out to me is working…Nov 13, 2024Nov 13, 2024
How to Hack Docker Container: Find Vulnerability, Exploit, and EscapeThe best way to protect something is to hack it firstNov 8, 2024Nov 8, 2024
Detection &Response Rules | D&R | LimaCharlie | zbyteCurious about your attacker’s secrets? Why wait — learn their strategies, uncover their weaknesses, and hack them before they even see it.Nov 7, 20241Nov 7, 20241
The Ultimate Guide to Online Privacy: Data, Tracking, and Protection Strategies“incognito mode” and “private window” are uselessOct 17, 2024Oct 17, 2024
Malware Analysis Part 4: Dynamic Memory AnalysisDynamic memory analysis involves analyzing the contents of a computer’s memory (RAM) to…Sep 17, 2024Sep 17, 2024
How to Use Wireshark to Track Log4j ExploitsIn cybersecurity, every bit and byte can tell a tale. So today, we will check out Log4j, the exploit that shook the world like a storm. We…Jan 20, 2024Jan 20, 2024
Malware Analysis Part 3: Running malware on the systemWe deeply regret any inconvenience caused by our delay in sharing the next part of the analysis. We acknowledge that there were reasons…Jul 11, 2023Jul 11, 2023