top of page
Search
Cybersecurity Topics


Why You Can’t Remember Your Own Passwords Anymore?
Ever tried logging into your email without your password manager? When Your Brain Becomes a Browser Tab Remember phone numbers? Of course you don’t, your phone remembers them for you. Remember your friend’s birthday? That’s what Facebook is for. Remember your banking password? That’s safely tucked away in your password manager, right next to the other 147 passwords you definitely don’t know by heart. This isn’t just forgetfulness, it’s digital amnesia. And it’s rewiring how o
Aastha Thakker
4 min read


When Browser Extensions Go Rogue
You install an extension to block ads or take screenshots. It looks clean, does its job, and stays quietly in the toolbar. But behind the scenes, it may copy your session cookies, track your activity, and maybe even watch what you type. Session Cookies Session cookies are tiny tokens that keep you logged in. Steal them, and wow the attacker can act as you . No 2FA. No email alerts. No suspicions. That’s why attackers are pushing fake browser extensions designed to grab these
Aastha Thakker
3 min read


Quantum Computing Without the Confusing Jargon
So, today we’re talking about that buzzword everyone pitches in tech panels, sci-fi shows, and probably even your favorite meme page “ Quantum Computing” . Sounds intense, right? But stick till the end of this read, you will know what the fuss is about, how it’s creeping into real life (yup, even yours), and why nations are racing to get their quantum act together. Breaking Down the Name Let’s break it down. “Quantum” refers to the tiniest possible units of energy or matter
Aastha Thakker
2 min read


Living Many Lives Online Without Losing Yourself
Digital Compartmentalization A 20-year-old guy today maintains five distinct online identities: a cybersecurity-focused blog under a technical pseudonym, a political Twitter account using a different name, a polished LinkedIn profile with professional achievements, a carefully curated Instagram profile, and a private account accessible only to trusted (non-judgmental) friends. This isn’t scattered attention or digital confusion. It’s calculated compartmentalization, a securit
Aastha Thakker
4 min read


Voice Cloning: Behind Your Digital Vocal Twin
Hey there! Today, we will see one of the most interesting use cases of AI: voice cloning. When I asked people what they understood by voice cloning, I received multiple different answers — some were correct, but many were not. Before we begin exploring what voice cloning is, let’s understand why it’s necessary. And being poetically dramatic, I’m sharing a poem which relates to “the voice.” Voice is a blade wrapped in a gentle tone, It builds or breaks what hearts may keep, A
Aastha Thakker
6 min read


Ghibli, What’s the Trend About?
Yep, I fed it to AI, to see my Ghibli version — and yeah, it’s pretty cute. Have you noticed those charming, storybook-like pictures popping up everywhere lately? Friends turning their selfies into something that looks straight out of a beloved animated film? That’s the Ghibli trend taking over our feeds, and it’s easy to see why everyone’s obsessed. Since its release, all of a sudden, the internet is filled with images generated in Ghibli style. Everyone from Sam Altman to D
Aastha Thakker
8 min read


MANETs: How Devices Create Their Own Social Networks
In an era where our homes are getting smarter and our devices are increasingly interconnected; there’s a pressing question we rarely consider: How do we know which IoT devices to trust? Every second, thousands of IoT devices communicate with each other, sharing sensitive data about our homes, health, and daily routines. But how can we be sure these conversations are secure? What are MANETs? For example, you are walking into a room full of people who can instantly create their
Aastha Thakker
5 min read


Satellite Hacking: Space Wars
Hey there! How are you able to read this post? Is it the internet? Of course! But what’s the backbone of this connection? Satellites! Yes, yes! Those shiny things floating in space, making sure we can scroll endlessly, binge-watch shows, and, well… exist online. Today, let’s see something super interesting — something that combines satellites and my cyber-student enthusiasm that just can’t stop thinking about security! So, what exactly is a satellite? Don’t worry, I’m not her
Aastha Thakker
8 min read


Purple Teaming: Turning Frenemies into Allies
Remember Tom and Jerry? Those two were the ultimate frenemies. When they were fighting, they’d wreck the entire house. But the moment they teamed up? Pure magic. Unstoppable. Mind-blowing. Purple Teaming — Cybersecurity’s own Tom and Jerry moment. Forget the old-school image of red and blue teams glaring at each other across a metaphorical battlefield. Purple teaming is like being friends with your enemies. While the Oxford English Dictionary might define purple as simply “bl
Aastha Thakker
5 min read


Neuromorphic Computing Fundamentals
Hey everyone! Today, we are going to learn something super interesting: Neurocomputing! Let’s start by understanding it from the basics. As the terminology suggests, “neuro” refers to brain-related processes, and “morphic” means form or structure. The development of this field began with a very simple question: “Why don’t we build computer chips that work like brain cells?” Inspired by how neurons and synapses in our brains communicate and process information, neuromorphic co
Aastha Thakker
7 min read


Secure by Default: Adding Security in every stage.
You’ve survived holiday shopping, and endless deadlines, and somehow managed to order way too much food. It’s the end of the month (and year, too, this time), and you’re back to the usual routine, checking your bank balance, ordering dinner, and video calling your loved ones, wondering how it’s already December and how you’re still way behind on everything. Let’s face it: Behind all these seemingly simple actions lies a complex web of software development and cybersecurity —
Aastha Thakker
4 min read


Dark Art of Deepfakes
Hey there! We’ve all encountered fake people, but today, the spotlight is on something even more deceptive: deepfakes. In one of my earlier blogs, I touched on this briefly, but today let’s see more into it. The term “ deepfake ” combines “ deep learning ” and “ fake ,” describing AI systems that produce highly realistic but completely artificial audio and video. You know how your brain learns to recognize patterns? Like how you can tell it’s your mom calling just by the way
Aastha Thakker
5 min read


HR Honeypot: Hackers Flip the Script on Job Market Scams
Cybersecurity has become more than just a buzzword — it’s a critical aspect of business operations. While many associate cybersecurity with protecting social media accounts or personal data, professionals in the field know it’s far more complex. As the demand for cybersecurity experts grows, so does the number of job seekers in this field. Finding a job in this field can be tough, with many fake or unpaid internships out there. But that doesn’t stop eager candidates from send
Aastha Thakker
4 min read


Zero Trust: Never trust, always verify!
Zero Trust? It sounds like a reality check — trust no one but yourself. While that may seem motivating, we often end up trusting those we shouldn’t. Isn’t it true? In cybersecurity, this principle translates into a rule of not trusting anyone and continuously verifying users before granting access. Zero Trust Architecture is a modern approach that challenges the traditional “trust but verify” model. Operating on the principle of “never trust, always verify,” it assumes no us
Aastha Thakker
5 min read


Decoding QR Codes: Simple Scans, Big Impact
Nowadays, we use Google Pay, Apple Pay, or Phone Pay as if they’re going to cover our bills for us, lol. But when it comes to making payments, we still need to scan the QR code provided by the recipient. Let’s understand the base of QR code today. Barcode Invention Norman Joseph Woodland and Bernard Silver invented the barcode and got it patented in the US in 1952. It was inspired by Morse code, using thin and thick bars. It took over 20 years for the invention to become popu
Aastha Thakker
5 min read


Fabric: Level up your CLI
Hey everyone! After learning ollama you must be very happy, but wait a sec! Today we are going to learn about fabric. This is a super cool tool, similar to having your own personal AI assistant, but way more customizable and at your fingertips. Get the “whoa, why didn’t I know this existed?” feeling while dealing with Fabric. What’s the use case of fabric? Like why do we even need such kind of thing? Okay, tell me how many times have you used ChatGPT or Gemini today? And how
Aastha Thakker
3 min read


Web Scraping: Pythonic Techniques with Beautiful Soup
Hey everyone! If you’re reading this, you’re likely quite serious about gaining knowledge about cybersecurity field and overall new updates. Let’s say you’re researching specific topics on different websites and want to document your findings. Instead of manually copy pasting the things and scrolling to long and long websites, what if you can automate your search to extract relevant data for you? This is where web scrapping comes in as a savior. Now, you can automate however
Aastha Thakker
4 min read


NTFY: Your Pocket CLI Concierge
Command line is something we all have used and are still using for various tasks and jobs. But have you ever waited for the command to, like, just end?? I was updating my Kali yesterday and I had to wait for 24 minutes just to see if it was done. It’s too boring or distracting to wait for this to complete. Have you ever thought about command line push notifications? It is possible! It will notify on your smartphone that the command is successful or failed. This notification t
Aastha Thakker
2 min read


Canary Codes for Curious Minds
Hey everyone! Today, let’s learn about canary tokens. It would be short and sweet, as many of us are enjoying our exam season. But it is still super interesting! I have made sure you won’t miss out on our fun Thursday reads! Canary tokens are digital tripwires. Tripwires are nothing but a trigger which gets activated when something unexpected happens. For example, hiding a secret code in a document or system. If someone tries to decode it or access it without permission, it a
Aastha Thakker
2 min read


Active Directory: From Chaos To control
Hey everyone! Today we are about to learn an interesting and amazing topic. It might sound complex or it might not, but I will make sure to keep it simple and fun, packed with cool stuff and knowledge. Before knowing what is active directory, answer this question, what is directory?? What is Directory? Directory basically means a hierarchical arrangement of different kind of entities. Entities can be anything like document, books, access controls, address book or dictionary.
Aastha Thakker
5 min read
bottom of page