Why “sharing everything” became normal and dangerous. In our hyper-connected world, sharing is second nature. We post our meals, moods, selfies, achievements, frustrations and often, […]
The Cost of Convenience
Why “Remember Me” and One-click Logins Aren’t Free In today’s fast-paced digital world, convenience has become second nature. We stay logged in, use one-click sign-ins, […]
The Psychology of Scams
Why Humans, Not Systems, Are the Real Target Scammers today no longer rely on brute-force hacking tools they rely on human psychology. From fake banking […]
The Future of Identity: Digital Twin
Will Your Digital Self Be Worth More Than Your Real Self? The line between our physical and digital selves is disappearing faster than ever. As […]
Bootcamp Cohort 2 Final Report
H4K-IT successfully hosted its second cohort, commencing on April 23rd, 2024, and concluding on July 27th, 2024. Over the course of three months, participants engaged […]
Crowd Strike Blue Screen of Death (BSOD)
Today was a challenging day for the CrowdStrike team due to the widespread outage affecting their clients using the Falcon product. Click the icon below […]
AI in the wrong hands – Chapter 2
AI in the wrong hands Chapter 2 In this chapter we will be looking at how deep fakes are being utilized by cybercriminals for malicious […]
AI in the wrong hands
AI in the wrong hands In recent years, artificial intelligence (AI) has gained significant popularity among the public and has gathered considerable attention from various […]
Port Swigger Challenge’s
I recently began a self learning series with the aid of port swigger’s web challenge, the aim of this is for me to try learn […]
Exploiting Cross-Origin Resource Sharing (CORS)
I recently came across a bug bounty program that taught me how to exploit CORS Vulnerability, it was a great learning curve I had managed […]
