DEV Community

Deepak Sharma profile picture

Deepak Sharma

Cybersecurity enthusiast & tech writer, uncovering global trends and innovations to inspire a safer, smarter digital world

Location Dehradun, Uttarakhand Joined Joined on  Personal website https://intelligencex.org/
Homograph Attacks: Exploiting Lookalike Domains

Homograph Attacks: Exploiting Lookalike Domains

Comments
2 min read
OAuth Misconfigurations: Breaking Authentication Flows

OAuth Misconfigurations: Breaking Authentication Flows

Comments
2 min read
GraphQL API Security: Hidden Risks in Modern Applications

GraphQL API Security: Hidden Risks in Modern Applications

Comments
2 min read
DNS Tunneling: Smuggling Data Through DNS Queries

DNS Tunneling: Smuggling Data Through DNS Queries

Comments
1 min read
Blind SQL Injection: Extracting Data Without Visibility

Blind SQL Injection: Extracting Data Without Visibility

Comments
2 min read
Cache Poisoning: Manipulating Web Infrastructure at Scale

Cache Poisoning: Manipulating Web Infrastructure at Scale

Comments
2 min read
Cross-Site WebSocket Hijacking Explained

Cross-Site WebSocket Hijacking Explained

Comments
2 min read
Firmware Rootkits: Persistence Below the Operating System

Firmware Rootkits: Persistence Below the Operating System

Comments
1 min read
Data Poisoning: Corrupting Training Data for Malicious Outcomes

Data Poisoning: Corrupting Training Data for Malicious Outcomes

Comments
1 min read
Hypervisor Attacks: Targeting Virtual Machines at the Root

Hypervisor Attacks: Targeting Virtual Machines at the Root

Comments
1 min read
Timing Attacks: Cracking Systems Using Response Delays

Timing Attacks: Cracking Systems Using Response Delays

Comments
1 min read
Kernel Exploitation: Breaking the Core of Operating Systems

Kernel Exploitation: Breaking the Core of Operating Systems

Comments
1 min read
Container Escape Vulnerabilities in Cloud Environments

Container Escape Vulnerabilities in Cloud Environments

Comments
2 min read
Supply Chain Poisoning in Open-Source Ecosystems

Supply Chain Poisoning in Open-Source Ecosystems

Comments
2 min read
Adversarial Machine Learning in Cyber Attacks

Adversarial Machine Learning in Cyber Attacks

Comments
2 min read
Living-off-the-Land Attacks: When Legit Tools Turn Malicious

Living-off-the-Land Attacks: When Legit Tools Turn Malicious

Comments
2 min read
Memory Forensics: Investigating Attacks Without Disk Evidence

Memory Forensics: Investigating Attacks Without Disk Evidence

Comments
1 min read
Secure Coding: Preventing Vulnerabilities Early

Secure Coding: Preventing Vulnerabilities Early

Comments
1 min read
Data Masking: Protecting Sensitive Information

Data Masking: Protecting Sensitive Information

Comments
1 min read
Threat Intelligence: Knowing Your Enemy

Threat Intelligence: Knowing Your Enemy

Comments
1 min read
Zero Trust Model: Trust Nothing, Verify Everything

Zero Trust Model: Trust Nothing, Verify Everything

Comments
1 min read
Session Fixation: Forcing Access Control

Session Fixation: Forcing Access Control

Comments
1 min read
Email Spoofing: Fake Identity Attacks

Email Spoofing: Fake Identity Attacks

Comments
1 min read
Botnets: Networks Controlled by Hackers

Botnets: Networks Controlled by Hackers

Comments
1 min read
Rootkits: Malware That Hides Deep

Rootkits: Malware That Hides Deep

Comments
1 min read
Cold Boot Attacks: Accessing Memory Data

Cold Boot Attacks: Accessing Memory Data

Comments
1 min read
Digital Footprinting: Tracking Your Online Presence

Digital Footprinting: Tracking Your Online Presence

Comments
1 min read
Security Misconfiguration: A Common Weak Spot

Security Misconfiguration: A Common Weak Spot

Comments
1 min read
Attack Surface: What Hackers Really See

Attack Surface: What Hackers Really See

Comments
1 min read
Cyber Kill Chain: How Attacks Actually Work

Cyber Kill Chain: How Attacks Actually Work

Comments
1 min read
Patch Management: The Most Ignored Defense

Patch Management: The Most Ignored Defense

Comments
1 min read
Insider Negligence: Accidental Security Breaches

Insider Negligence: Accidental Security Breaches

Comments
1 min read
Insider Negligence: Accidental Security Breaches

Insider Negligence: Accidental Security Breaches

Comments
1 min read
Data Exfiltration: How Information Gets Stolen

Data Exfiltration: How Information Gets Stolen

Comments
1 min read
Shadow IT: The Risk Companies Ignore

Shadow IT: The Risk Companies Ignore

Comments
1 min read
Session Timeout: Why It Matters for Security

Session Timeout: Why It Matters for Security

Comments
2 min read
Brute Force Attacks: Breaking Passwords Fast

Brute Force Attacks: Breaking Passwords Fast

Comments
1 min read
Man-in-the-Middle Attacks: Silent Data Theft

Man-in-the-Middle Attacks: Silent Data Theft

Comments
1 min read
API Security: The Weak Link in Apps

API Security: The Weak Link in Apps

Comments
1 min read
Token Theft: Stealing Active Sessions

Token Theft: Stealing Active Sessions

Comments
2 min read
Drive-by Downloads: Infection Without Action

Drive-by Downloads: Infection Without Action

Comments
1 min read
Keyloggers: Every Keystroke Counts

Keyloggers: Every Keystroke Counts

Comments
1 min read
Watering Hole Attacks: Hacking Trusted Sites

Watering Hole Attacks: Hacking Trusted Sites

Comments
1 min read
Clickjacking: Tricking You Into Clicking

Clickjacking: Tricking You Into Clicking

Comments
1 min read
Fileless Malware: Attacks Without Files

Fileless Malware: Attacks Without Files

Comments
1 min read
Evil Twin Wi-Fi: Fake Networks, Real Threats

Evil Twin Wi-Fi: Fake Networks, Real Threats

Comments
2 min read
DNS Spoofing: Redirecting You to Danger

DNS Spoofing: Redirecting You to Danger

Comments
1 min read
Malvertising: Ads That Infect Your Device

Malvertising: Ads That Infect Your Device

Comments
1 min read
Deepfake Scams: Trust Is Under Attack

Deepfake Scams: Trust Is Under Attack

Comments
1 min read
Juice Jacking: Charging Ports That Steal Data

Juice Jacking: Charging Ports That Steal Data

Comments
1 min read
Shoulder Surfing: Offline Hacking Still Works

Shoulder Surfing: Offline Hacking Still Works

Comments
1 min read
Metadata: The Data Behind Your Data

Metadata: The Data Behind Your Data

Comments
1 min read
Credential Stuffing: When Old Leaks Hit Back

Credential Stuffing: When Old Leaks Hit Back

Comments
1 min read
Browser Extensions: Hidden Security Risks

Browser Extensions: Hidden Security Risks

Comments
1 min read
SIM Swap Fraud: How Your Number Gets Stolen

SIM Swap Fraud: How Your Number Gets Stolen

Comments
1 min read
Session Hijacking: The Attack You Don’t Notice

Session Hijacking: The Attack You Don’t Notice

Comments
1 min read
Cybersecurity Is Everyone’s Responsibility

Cybersecurity Is Everyone’s Responsibility

Comments
1 min read
Unknown Links Are Always Dangerous

Unknown Links Are Always Dangerous

Comments
1 min read
Digital Identity Theft Is Rising Fast

Digital Identity Theft Is Rising Fast

Comments
1 min read
Every Click Can Be Tracked

Every Click Can Be Tracked

Comments
1 min read
loading...