26 Aug Blog SSO vs MFA/2FA: Weighing the Costs of Insecure Logins December 25, 2024 By Duyaane IntroductionBetween 2004 and 2024, passwords have consistently been the most frequently exposed type of data in security breaches. This... Continue reading
26 Aug hunting Earned $4,000 – Critical Vulnerability in Bug Bounty Hunting December 25, 2024 By Duyaane 0 comments Subdomain Enumeration Subdomain enumeration is not always my go-to strategy; I typically start with the main application. However, for ... Continue reading