top of page


How to check if the website is secure with simple steps.
The web has evolved over the years. People are increasingly becoming security conscious these days. The number of people doing their...
Nitin Yadav
Nov 1, 20223 min read
126
0


Some of the Best Search Engines used by Hackers/Security Researchers/Bug Bounty Hunters in 2022
The most exciting part about being a security researcher is when you've got a hunch and you have that moment when you feel like you have...
Nitin Yadav
Oct 25, 20223 min read
277
0


How to get more accurate results with Google
Hey guys! Today is a new article on the blog which I'm really excited about. Our guest today is Sathvika who has shared her knowledge...
Nitin Yadav
Oct 12, 20223 min read
219
0


Microsoft releases new zero-day vulnerability in Microsoft Exchange server
It's a new day — oh so bright — full of new opportunities. Zero-day vulnerability on Microsoft exchange server. The new zero-day...
Nitin Yadav
Oct 4, 20223 min read
219
0


Source code scanner for Finding Critical Vulnerabilities
Source code analysis is one of the most thorough methods available for auditing software. It is also one of the most expensive, but it...
Nitin Yadav
Sep 30, 20222 min read
899
0


Bug Bounty | Detailed definition of Bug Bounty by CyberHacks
If you're looking to have a rewarding job, with the ability to work in an exciting industry. You might want to consider bug bounty...
Nitin Yadav
Sep 23, 20228 min read
488
0
bottom of page