top of page
Search
Attacks


You Said It’s Impossible? Cold Boot, DMA & Hibernation Attacks
So, in my previous blog, a bunch of you got real comfortable questioning whether these attacks actually work in the wild. “Show me proof,” you said. “This is just theoretical,” you claimed. “No one actually does this,” you insisted. This blog answers that, backed by evidence. I’m sharing research papers, proof-of-concept demonstrations, YouTube videos from security researchers, vendor advisories, and documented forensic case studies. You’ll see that Cold Boot, DMA (including
Aastha Thakker
8 min read


Sleep Mode Isn’t Safe: How Attackers Exploit Systems
The Myth: “Sleep Mode = Safe Mode” You close your laptop lid, hear that satisfying click, and walk away thinking your data is secure. After all, the screen’s locked, right? Wrong. That convenient “sleep mode” millions rely on daily isn’t the security blanket we think it is. While your device appears dormant, it’s actually maintaining a treasure of sensitive information in active memory; encryption keys, passwords, cached credentials, and open documents all sitting vulnerable
Aastha Thakker
5 min read


What if Script Kiddies Start Demanding Ransom with AI?
What happens when artificial intelligence puts the power of sophisticated cybercrime into the hands of people who can barely write “Hello World”? Until recently, creating ransomware required years of programming expertise, deep understanding of cryptographic algorithms, and intimate knowledge of operating system vulnerabilities. According to comprehensive reporting from The Hacker News , security researchers have documented the first confirmed case of ransomware developed wit
Aastha Thakker
3 min read


When Browser Extensions Go Rogue
You install an extension to block ads or take screenshots. It looks clean, does its job, and stays quietly in the toolbar. But behind the scenes, it may copy your session cookies, track your activity, and maybe even watch what you type. Session Cookies Session cookies are tiny tokens that keep you logged in. Steal them, and wow the attacker can act as you . No 2FA. No email alerts. No suspicions. That’s why attackers are pushing fake browser extensions designed to grab these
Aastha Thakker
3 min read


From Man-in-the-Middle to Browser-in-the-Middle
What is a Man-in-the-Middle Attack? A Man-in-the-Middle (MITM) attack is a cyberattack where a malicious actor secretly positions themselves between two communicating parties at the network level. MITM Attack Process MITM attacks typically unfold through a systematic three-phase approach: 1. Interception Phase: Attacker establishes themselves as an intermediary in the communication channel using various techniques: ARP Spoofing : Manipulating network address tables to redire
Aastha Thakker
3 min read


Emojis: Your Digital Smile Isn’t Always Friendly
You’re scrolling through Instagram at 2 AM (we’ve all been there), and you see a DM that says “Hey gorgeous! 😍 I’ve got this amazing investment opportunity 🚀💰 Click here for instant riches! 🤑” Your first thought? Probably “scam.” But what if the same message came from your “friend” saying “omg found this cool thing 😊 thought you’d like it! 💕” That little heart emoji? It just made you 3x more likely to click that link. Even our beloved emojis have trust issues. Those tin
Aastha Thakker
6 min read


Satellite Hacking: Space Wars
Hey there! How are you able to read this post? Is it the internet? Of course! But what’s the backbone of this connection? Satellites! Yes, yes! Those shiny things floating in space, making sure we can scroll endlessly, binge-watch shows, and, well… exist online. Today, let’s see something super interesting — something that combines satellites and my cyber-student enthusiasm that just can’t stop thinking about security! So, what exactly is a satellite? Don’t worry, I’m not her
Aastha Thakker
8 min read


The ‘Digital Arrest’ Scam: When Cybercrime Wears a Badge
The cyber threat landscape never stands still. As we work to protect our digital world, attackers increasingly invent new methods to breach our defenses. And while their tactics grow more refined, they still rely on one fundamental weakness: human psychology. We’ve all heard of social engineering, right? At its core, it’s the dark art of psychological manipulation in the digital age. Think of a situation where a “bank representative” calls about suspicious activity on your ac
Aastha Thakker
3 min read


Know the Toxic Duo or They’ll Know you: ToxicPanda and WinOS 4.0 Malware
🎉 Celebrating 1 Year of My Blogging Journey! 🎉 Exactly one year ago today, on the early morning of November 2, 2023, I took a leap of faith and hit “publish” on my first blog post. It was a moment filled with hesitation, self-doubt, and a million questions: “Will it be good enough? Will people even read it?” But sometimes, all you need is a little push from the people around you. To everyone who believed in me, motivated me, and helped spread my words, thank you from the bo
Aastha Thakker
7 min read


The Hidden Dangers in Open-Source AI: Recent Vulnerabilities Demand Attention
Today we will be discussing about something that’s been keeping security researchers up at night: critical vulnerabilities in open-source AI frameworks. Researchers at a company called Protect AI found serious security problems in common AI software that many people use every day. It’s like finding out the locks on your front door aren’t working properly — it’s a big deal and potentially dangerous. Why Should You Care? Imagine you’ve built an AI model (bhai just imagine) to p
Aastha Thakker
4 min read


HR Honeypot: Hackers Flip the Script on Job Market Scams
Cybersecurity has become more than just a buzzword — it’s a critical aspect of business operations. While many associate cybersecurity with protecting social media accounts or personal data, professionals in the field know it’s far more complex. As the demand for cybersecurity experts grows, so does the number of job seekers in this field. Finding a job in this field can be tough, with many fake or unpaid internships out there. But that doesn’t stop eager candidates from send
Aastha Thakker
4 min read


Efficiency to Exploits: Vulnerabilities in Ollama and Vanna AI Automation
Remember how we learned to use our own AI tools on our computers? Well, there can be bumps in the road! (Local AI is deployed locally instead of on any cloud servers) Ollama Cloud security firm Wiz has identified a vulnerability called ‘Probllama’, which is tracked as CVE-2024–37032. This security issue was responsibly disclosed to Ollama’s maintainers and has since been mitigated. Ollama users are encouraged to upgrade their Ollama installation to version 0.1.34 or newer. Or
Aastha Thakker
6 min read


SQL Injection: The Tiny Typo
As we all know that the “data” is fuel for current generation. Data is basically unorganized information and collection of large amounts of data is done under database. Databases hold secrets and so does the risk; which can be either financial, emotional and reputational. SQL is Structured Query Language which is used for storing, manipulating and accessing the data from the database. By understanding SQL queries, you can create, update, delete, or access data in databases su
Aastha Thakker
4 min read


HTML Code: Tags, Tricks & INJECTION
Hey everyone! Today, let’s see an overview of HTML, HTML tags, and HTML injection. It’s like learning the ABCs of the web, but with a cybersecurity twist. Whether you’re an HTML ninja or a newbie, feel free to check this out. So, basically, HTML, or Hypertext Markup Language, is the digital architect of the web world. It’s the backbone that structures your web content, making it look all fancy and organized. Now, many of you might think of it as a “coding” language but let me
Aastha Thakker
5 min read
bottom of page