PinnedHarsh KahateFrom Numbers to Impact: Making Sense of CVSS V4.0 Score with Practical ExamplesIn today’s ever-evolving cybersecurity landscape, prioritising vulnerabilities effectively is critical. The Common Vulnerability Scoring…7 min read·Feb 25, 2024--1--1
PinnedHarsh KahateUsing Steganography tools in LinuxBefore going towards the technical part of this article, let us understand what is meant by Steganography.5 min read·Sep 17, 2022--2--2
PinnedHarsh KahateInstalling Docker on Kali LinuxUnderstanding Docker + Installation on Kali Linux2 min read·Aug 28, 2022--1--1
Harsh KahateThe real meaning of OWASP Top 10 Mobile 2024 list from Security and Privacy ViewpointsRecently, the final list of top 10 mobile application vulnerabilities has been released by OWASP. The last one was released in 2016. The…7 min read·Feb 10, 2024----
Harsh KahateA Deep Dive into Zero Trust ArchitectureAny organisation or business becomes successful only if it is trusted by its customers and investors. When it comes to organisations…5 min read·Nov 5, 2023----
Harsh KahatePersonally Identifiable Information (PII) — Why so important and how to protect it?Recently, the Government of India brought the DPDP (Digital Personal Data Protection) act and since then, I have been reading a lot of…4 min read·Sep 16, 2023----
Harsh KahateGuarding Your Virtual Fortress : A step-by-step Guide to Install Wazuh on a Virtual Machine | Part…While I was trying to explore more and more things in the defensive security, I thought of learning in detail about SIEM and Wazuh. The…5 min read·May 27, 2023--1--1
Harsh KahateCool Linux CommandsSome days back when I was bored at work and trying to do some random things on my Linux terminal, I came across a very funny and unusual…4 min read·Mar 5, 2023----
Harsh KahateHack Android Device using LinuxIn this article, we will be hacking an android device using Kali Linux. You need only a Linux based machine, a stable internet connection…4 min read·Nov 2, 2022----