PinnedSecuring Interpreted Code in Cloud EnvironmentsThe Problem: Interpreted Code Execution RisksMar 15Mar 15
Beyond .env Files: Protecting Credentials in MemoryWhen your application loads credentials from a .env file into memory, several security vulnerabilities can arise.Mar 22Mar 22
Secure System Architecture & Threat Modeling: A Banking Application ExampleSecure System Architecture Design & Threat ModelingMar 17Mar 17
Published inFlat Pack TechNullcon 2023: From Attendee to Booth OrganizerIn October 2023, more than 15 IKEA co-workers from the Cyber Security and Engineering Teams participated in the Nullcon 2023. In this blog…Oct 9, 2023Oct 9, 2023
WINJA CTF: SSHHello everyone, here is another day, another quiz by WinjaCTF. This is a CTF machine.Jan 25, 2021Jan 25, 2021
WINJA CTF: Extract Absolute URLHey guys, today I will be giving you an idea of how to extract absolute URLs from the source code of a web page.Dec 21, 2020Dec 21, 2020
Published inInfoSec Write-upsACID: SERVER (Vulnhub CTF Walkthrough)The name of the Virtual machine is “Acid Server” that we are going to solve today. It is a Boot2Root VM. This is a web-based VM.Nov 29, 2020Nov 29, 2020
Published inInfoSec Write-upsTryHackMe — Ninja SkillsToday, I am going to make this write-up of Ninja Skills room of TryHackMe.Nov 18, 2020Nov 18, 2020