<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>Insecure.in Blog</title>
    <link>https://www.insecure.in/blog</link>
    <description>Latest posts from Insecure.in Blog.</description>
  <item>
    <title>OWASP Smart Contract Top 10 (2025): Vulnerabilities and Fixes</title>
    <link>https://www.insecure.in/blog/owasp-smart-contract-top-10-2025</link>
    <guid>https://www.insecure.in/blog/owasp-smart-contract-top-10-2025</guid>
    <description>Explore the OWASP Smart Contract Top 10 2025 vulnerabilities, mitigation strategies, and real-world impacts. Secure your Web3 projects against critical risks.</description>
    <pubDate>Sun, 16 Feb 2025 09:23:41 GMT</pubDate>
  </item>
  <item>
    <title>What is BOLA: Broken Object Level Authorization Vulnerability</title>
    <link>https://www.insecure.in/blog/broken-object-level-authorization</link>
    <guid>https://www.insecure.in/blog/broken-object-level-authorization</guid>
    <description>Learn about the broken object level authorization vulnerability, how it can be exploited, real-world examples, and its prevention in cyber security.</description>
    <pubDate>Tue, 19 Nov 2024 18:50:32 GMT</pubDate>
  </item>
  <item>
    <title>What is PMKID Attack on Wi-Fi Networks?</title>
    <link>https://www.insecure.in/blog/pmkid-attack</link>
    <guid>https://www.insecure.in/blog/pmkid-attack</guid>
    <description>This ethical hacking guide explains what a PMKID attack is, how it works, the tools used and how to prevent such attacks on Wi-Fi networks in cyber security.</description>
    <pubDate>Sat, 22 Jun 2024 06:23:06 GMT</pubDate>
  </item>
  <item>
    <title>Credential Stuffing vs Password Spraying</title>
    <link>https://www.insecure.in/blog/credential-stuffing-vs-password-spraying</link>
    <guid>https://www.insecure.in/blog/credential-stuffing-vs-password-spraying</guid>
    <description>This ethical hacking guide explores the differences between credential stuffing and password spraying attacks along with their prevention in cyber security.</description>
    <pubDate>Sun, 19 May 2024 09:55:54 GMT</pubDate>
  </item>
  <item>
    <title>Sidejacking: Attack, Example and Prevention</title>
    <link>https://www.insecure.in/blog/sidejacking</link>
    <guid>https://www.insecure.in/blog/sidejacking</guid>
    <description>This ethical hacking guide explains what sidejacking is, how session sidejacking works, an example of sidejacking attack, and its prevention in cyber security.</description>
    <pubDate>Mon, 22 Apr 2024 13:49:06 GMT</pubDate>
  </item>
  <item>
    <title>HTML Smuggling: Attack, Example and Prevention</title>
    <link>https://www.insecure.in/blog/html-smuggling</link>
    <guid>https://www.insecure.in/blog/html-smuggling</guid>
    <description>This guide explains what HTML Smuggling is, how it works, types of attacks, POC example, detection, prevention and mitigation techniques in cyber security.</description>
    <pubDate>Fri, 29 Mar 2024 05:41:02 GMT</pubDate>
  </item>
  <item>
    <title>Shellbags Analysis in Windows Forensics</title>
    <link>https://www.insecure.in/blog/shellbags-analysis</link>
    <guid>https://www.insecure.in/blog/shellbags-analysis</guid>
    <description>This guide explains what shellbags are, their importance in Windows forensics investigations, and the shellbag analysis process with tools and case studies.</description>
    <pubDate>Fri, 15 Mar 2024 12:17:43 GMT</pubDate>
  </item>
  <item>
    <title>What is Cookie Tossing?</title>
    <link>https://www.insecure.in/blog/cookie-tossing</link>
    <guid>https://www.insecure.in/blog/cookie-tossing</guid>
    <description>This guide aims to explain what cookie tossing is, how it works, provide an example demonstrating the attack, and outline preventive measures in cybersecurity.</description>
    <pubDate>Mon, 26 Feb 2024 07:13:41 GMT</pubDate>
  </item>
  <item>
    <title>Magecart Attack: Types, Examples and Prevention</title>
    <link>https://www.insecure.in/blog/magecart-attack</link>
    <guid>https://www.insecure.in/blog/magecart-attack</guid>
    <description>This guide provides an overview of the Magecart attack, including its types, how it works, real-world examples, and prevention methods in cyber security.</description>
    <pubDate>Fri, 16 Feb 2024 09:54:05 GMT</pubDate>
  </item>
  <item>
    <title>Whitelist vs Blacklist Approach in Cyber Security</title>
    <link>https://www.insecure.in/blog/whitelist-vs-blacklist</link>
    <guid>https://www.insecure.in/blog/whitelist-vs-blacklist</guid>
    <description>In this comprehensive comparison of whitelist vs blacklist approaches we will explore the key differences between them on various aspects of cyber security.</description>
    <pubDate>Mon, 05 Feb 2024 08:05:34 GMT</pubDate>
  </item>
  <item>
    <title>POODLE Attack: Exploiting SSL/TLS Protocol Vulnerability</title>
    <link>https://www.insecure.in/blog/poodle-attack</link>
    <guid>https://www.insecure.in/blog/poodle-attack</guid>
    <description>Learn about POODLE attack and its prevention in cyber security. Understand how an attacker exploits the POODLE vulnerability in SSL and TLS protocols.</description>
    <pubDate>Wed, 24 Jan 2024 09:33:36 GMT</pubDate>
  </item>
  <item>
    <title>What is Tiny Banker Trojan (Tinba)?</title>
    <link>https://www.insecure.in/blog/tiny-banker-trojan</link>
    <guid>https://www.insecure.in/blog/tiny-banker-trojan</guid>
    <description>Learn about Tiny Banker Trojan (Tinba): how it spreads, infects systems, and steals banking data. Discover cybersecurity tips for its removal and prevention.</description>
    <pubDate>Thu, 04 Jan 2024 07:35:27 GMT</pubDate>
  </item>
  <item>
    <title>Understanding SAST and DAST with Differences and Tools</title>
    <link>https://www.insecure.in/blog/sast-and-dast</link>
    <guid>https://www.insecure.in/blog/sast-and-dast</guid>
    <description>In this guide, we</description>
    <pubDate>Mon, 25 Dec 2023 06:05:08 GMT</pubDate>
  </item>
  <item>
    <title>SSRF vs CSRF: Difference Between CSRF vs SSRF Attacks</title>
    <link>https://www.insecure.in/blog/ssrf-vs-csrf</link>
    <guid>https://www.insecure.in/blog/ssrf-vs-csrf</guid>
    <description>In this post we will explore the key differences between SSRF vs CSRF, i.e. server-side request forgery and cross-site request forgery attacks in cybersecurity.</description>
    <pubDate>Mon, 11 Dec 2023 13:17:06 GMT</pubDate>
  </item>
  <item>
    <title>Salami Attack: Definition, Types, Examples and Prevention</title>
    <link>https://www.insecure.in/blog/salami-attack</link>
    <guid>https://www.insecure.in/blog/salami-attack</guid>
    <description>Learn about Salami Attacks in cybersecurity with our comprehensive guide. Discover the definition, types, examples, case studies and prevention methods.</description>
    <pubDate>Thu, 07 Dec 2023 11:49:11 GMT</pubDate>
  </item>
  <item>
    <title>Spear Phishing vs Whaling: Key Differences</title>
    <link>https://www.insecure.in/blog/spear-phishing-vs-whaling</link>
    <guid>https://www.insecure.in/blog/spear-phishing-vs-whaling</guid>
    <description>This ethical hacking guide explores the key differences between spear phishing vs whaling attacks on various aspects of cyber security.</description>
    <pubDate>Thu, 30 Nov 2023 13:14:53 GMT</pubDate>
  </item>
  <item>
    <title>Understanding Second Order SQL Injection with Examples</title>
    <link>https://www.insecure.in/blog/second-order-sql-injection</link>
    <guid>https://www.insecure.in/blog/second-order-sql-injection</guid>
    <description>This ethical hacking guide explains Second Order SQL Injection with an example, the impact of this web vulnerability and its prevention in cyber security.</description>
    <pubDate>Wed, 15 Nov 2023 13:41:37 GMT</pubDate>
  </item>
  <item>
    <title>Cyber Insurance Coverage Checklist for 2024</title>
    <link>https://www.insecure.in/blog/cyber-insurance-coverage-checklist</link>
    <guid>https://www.insecure.in/blog/cyber-insurance-coverage-checklist</guid>
    <description>This cyber insurance coverage checklist will walk you through all the essential elements you need to know about a cybersecurity policy in 2023.</description>
    <pubDate>Sat, 28 Oct 2023 16:59:48 GMT</pubDate>
  </item>
  <item>
    <title>White Teaming in Cyber Security</title>
    <link>https://www.insecure.in/blog/white-teaming-in-cyber-security</link>
    <guid>https://www.insecure.in/blog/white-teaming-in-cyber-security</guid>
    <description>Learn about white teaming in cyber security. Find out the benefits of the white team approach and best practices for implementing it effectively.</description>
    <pubDate>Thu, 26 Oct 2023 14:51:06 GMT</pubDate>
  </item>
  <item>
    <title>Rainbow Table vs Dictionary Attack</title>
    <link>https://www.insecure.in/blog/rainbow-table-vs-dictionary-attack</link>
    <guid>https://www.insecure.in/blog/rainbow-table-vs-dictionary-attack</guid>
    <description>Explore the comparison of Rainbow Table vs Dictionary Attack. Understand the main differences between these two important password cracking techniques.</description>
    <pubDate>Mon, 16 Oct 2023 11:39:11 GMT</pubDate>
  </item>
  <item>
    <title>Clickjack Protection for Customer Visualforce Pages</title>
    <link>https://www.insecure.in/blog/clickjack-protection-for-customer-visualforce-pages</link>
    <guid>https://www.insecure.in/blog/clickjack-protection-for-customer-visualforce-pages</guid>
    <description>Learn how to enable clickjack protection for customer Visualforce pages and secure your Salesforce organization and data from clickjacking attacks.</description>
    <pubDate>Tue, 03 Oct 2023 19:18:17 GMT</pubDate>
  </item>
  <item>
    <title>Essential Cyber Security Tips for Employees | Insecure Lab Blog</title>
    <link>https://www.insecure.in/blog/cyber-security-tips-for-employees</link>
    <guid>https://www.insecure.in/blog/cyber-security-tips-for-employees</guid>
    <description>Empower your workforce with the best cyber security tips for employees. Discover the essential practices to keep your organization safe from cyber threats.</description>
    <pubDate>Thu, 28 Sep 2023 10:05:15 GMT</pubDate>
  </item>
  <item>
    <title>Intrusion Detection and Prevention in AWS | Insecure Lab Blog</title>
    <link>https://www.insecure.in/blog/intrusion-detection-and-prevention-in-aws</link>
    <guid>https://www.insecure.in/blog/intrusion-detection-and-prevention-in-aws</guid>
    <description>Learn about intrusion detection and prevention in AWS. Explore the different IDS and IPS solutions available to secure your environment in the AWS cloud.</description>
    <pubDate>Mon, 18 Sep 2023 11:28:30 GMT</pubDate>
  </item>
  <item>
    <title>How to Use Aircrack-ng in Kali Linux</title>
    <link>https://www.insecure.in/blog/how-to-use-aircrack-ng-in-kali-linux</link>
    <guid>https://www.insecure.in/blog/how-to-use-aircrack-ng-in-kali-linux</guid>
    <description>This ethical hacking guide explains how to use Aircrack-ng in Kali Linux for penetration testing of WiFi networks in cyber security.</description>
    <pubDate>Sat, 02 Sep 2023 06:39:36 GMT</pubDate>
  </item>
  <item>
    <title>Bluesnarfing vs Bluejacking</title>
    <link>https://www.insecure.in/blog/bluesnarfing-vs-bluejacking</link>
    <guid>https://www.insecure.in/blog/bluesnarfing-vs-bluejacking</guid>
    <description>In this comprehensive comparison of Bluesnarfing vs Bluejacking attacks we will explore the key differences between them on various aspects of cyber security.</description>
    <pubDate>Fri, 25 Aug 2023 15:15:19 GMT</pubDate>
  </item>
  <item>
    <title>How do We Protect Ourselves from Attacks like WannaCry?</title>
    <link>https://www.insecure.in/blog/how-do-we-protect-ourselves-from-attacks-like-wannacry</link>
    <guid>https://www.insecure.in/blog/how-do-we-protect-ourselves-from-attacks-like-wannacry</guid>
    <description>This comprehensive guide will explain how do we protect ourselves from attacks like WannaCry. Discover effective strategies to safeguard against ransomware.</description>
    <pubDate>Thu, 24 Aug 2023 19:48:57 GMT</pubDate>
  </item>
  <item>
    <title>How to Tell If Your Bluetooth Is Hacked? | Insecure Lab Blog</title>
    <link>https://www.insecure.in/blog/how-to-tell-if-your-bluetooth-is-hacked</link>
    <guid>https://www.insecure.in/blog/how-to-tell-if-your-bluetooth-is-hacked</guid>
    <description>This guide explains How to tell if your Bluetooth is Hacked? Explore the signs your Bluetooth may be hacked and tips to protect yourself from Bluetooth hacking.</description>
    <pubDate>Thu, 17 Aug 2023 10:29:30 GMT</pubDate>
  </item>
  <item>
    <title>White Hat Hacker vs Black Hat Hacker</title>
    <link>https://www.insecure.in/blog/white-hat-hacker-vs-black-hat-hacker</link>
    <guid>https://www.insecure.in/blog/white-hat-hacker-vs-black-hat-hacker</guid>
    <description>In this detailed comparison of White Hat Hacker vs Black Hat Hacker, we will explore the key differences between them on various aspects of cyber security.</description>
    <pubDate>Sat, 12 Aug 2023 06:27:08 GMT</pubDate>
  </item>
  <item>
    <title>ARP Poisoning vs DNS Poisoning</title>
    <link>https://www.insecure.in/blog/arp-poisoning-vs-dns-poisoning</link>
    <guid>https://www.insecure.in/blog/arp-poisoning-vs-dns-poisoning</guid>
    <description>In this post we will explore the difference between ARP poisoning vs DNS poisoning in cyber security. These are the two major types of network attacks.</description>
    <pubDate>Tue, 08 Aug 2023 14:27:27 GMT</pubDate>
  </item>
  <item>
    <title>XSS vs CSRF: Difference Between CSRF vs XSS Attacks</title>
    <link>https://www.insecure.in/blog/xss-vs-csrf</link>
    <guid>https://www.insecure.in/blog/xss-vs-csrf</guid>
    <description>In this post we will explore the difference between XSS vs CSRF, i.e. Cross Site Scripting and Cross Site Request Forgery attacks in cyber security.</description>
    <pubDate>Mon, 07 Aug 2023 09:58:09 GMT</pubDate>
  </item>
  <item>
    <title>Token Impersonation without Metasploit | Insecure Lab Blog</title>
    <link>https://www.insecure.in/blog/token-impersonation-without-metasploit</link>
    <guid>https://www.insecure.in/blog/token-impersonation-without-metasploit</guid>
    <description>Learn how to perform token impersonation without Metasploit. Understand process injection and token manipulation via APIs with practical examples.</description>
    <pubDate>Fri, 04 Aug 2023 05:28:50 GMT</pubDate>
  </item>
  <item>
    <title>Cross Site Scripting vs SQL Injection</title>
    <link>https://www.insecure.in/blog/cross-site-scripting-vs-sql-injection</link>
    <guid>https://www.insecure.in/blog/cross-site-scripting-vs-sql-injection</guid>
    <description>In this post we will explore the difference between Cross Site Scripting vs SQL Injection, i.e. comparison of XSS and SQL Injection attacks in cyber security.</description>
    <pubDate>Sat, 29 Jul 2023 19:56:20 GMT</pubDate>
  </item>
  <item>
    <title>Bobby Tables: The Iconic Tale of SQL Injection</title>
    <link>https://www.insecure.in/blog/bobby-tables</link>
    <guid>https://www.insecure.in/blog/bobby-tables</guid>
    <description>Check out this iconic tale of Bobby Tables from the xkcd webcomic and learn how Robert got the name Little Bobby Tables due to a SQL injection vulnerability.</description>
    <pubDate>Thu, 27 Jul 2023 10:07:14 GMT</pubDate>
  </item>
  <item>
    <title>ChatGPT Hacks: Tips and Tricks for Smart Prompts</title>
    <link>https://www.insecure.in/blog/chatgpt-hacks</link>
    <guid>https://www.insecure.in/blog/chatgpt-hacks</guid>
    <description>This comprehensive guide unveils powerful ChatGPT Hacks. Explore practical tips and tricks for smart prompts to unlock the full potential of AI language model.</description>
    <pubDate>Fri, 21 Jul 2023 14:01:29 GMT</pubDate>
  </item>
  <item>
    <title>Image Steganography with S-Tools</title>
    <link>https://www.insecure.in/blog/image-steganography-with-s-tools</link>
    <guid>https://www.insecure.in/blog/image-steganography-with-s-tools</guid>
    <description>Download S-Tools and learn Image Steganography with S-Tools. This step-by-step guide explains how to hide secret data in an image using steganography tools.</description>
    <pubDate>Wed, 28 Jun 2023 12:03:50 GMT</pubDate>
  </item>
  <item>
    <title>Data Loss Prevention (DLP) Tips | Insecure Lab Blog</title>
    <link>https://www.insecure.in/blog/data-loss-prevention-tips</link>
    <guid>https://www.insecure.in/blog/data-loss-prevention-tips</guid>
    <description>Discover effective data loss prevention (DLP) tips to safeguard your sensitive information. Enhance your data security and prevent unauthorized access.</description>
    <pubDate>Thu, 22 Jun 2023 07:59:48 GMT</pubDate>
  </item>
  <item>
    <title>Understand The Five Phases of Ethical Hacking</title>
    <link>https://www.insecure.in/blog/five-phases-of-ethical-hacking</link>
    <guid>https://www.insecure.in/blog/five-phases-of-ethical-hacking</guid>
    <description>This cyber security guide highlights the five phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and clearing tracks.</description>
    <pubDate>Thu, 15 Jun 2023 14:10:24 GMT</pubDate>
  </item>
  <item>
    <title>How to Trace an Email IP Address | Insecure Lab Blog</title>
    <link>https://www.insecure.in/blog/trace-an-email</link>
    <guid>https://www.insecure.in/blog/trace-an-email</guid>
    <description>Learn how to trace an email IP address step-by-step. Uncover sender details, decode IP addresses, and understand email headers with our comprehensive guide.</description>
    <pubDate>Sat, 10 Jun 2023 06:18:13 GMT</pubDate>
  </item>
  </channel>
</rss>
