top of page


The Role of ISO 29147 and 30111 in Enhancing Cybersecurity Strategies for 2026
Two key international standards, ISO 29147 and ISO 30111, provide essential frameworks for managing vulnerability disclosure and handling.
Jahanvi Sachdeva
Nov 114 min read
Â


Codebreakers Chronicles: Ethical Hacking Journey with Aakash Sharma
Hi, I’m Aakash Sharma, and if you’re reading this, chances are you’re curious about hacking, bug bounties, or just figuring out how people like me end up in this field.
Aakash Sharma
Oct 72 min read
Â


ISO/IEC 29147: Why CISOs Must Lead with Visible Vulnerability Disclosure
ISO/IEC 29147 is more than a guideline. It is a framework that helps organisations demonstrate openness and maturity.
Anurag Tripathi
Sep 232 min read
Â


Essential Steps to Launch Your Successful Ethical Hacking Career in 2025
In today's digital landscape, cybersecurity threats are more frequent and sophisticated. Ethical hackers play a crucial role in defending against these threats.
Abhinav Bangia
Sep 195 min read
Â


Alias Emails at Com Olho: Testing With Precision and Trust
Alias Emails are designed to make that balance easier. They give every researcher a dedicated email address for testing. This address is safe, inbound only, and tied directly to your profile.
Anurag Tripathi
Sep 122 min read
Â


Tips to climb the leaderboard at Com Olho without losing your why
When we started building Com Olho’s crowdsourced security platform, we were writing a promise. Talent will be seen.
Anurag Tripathi
Sep 104 min read
Â


From Blueprints to Bug Bounties: My journey from civil engineering to cybersecurity with Dhruv Kumar
I’m Dhruv Kumar a 24-year-old civil engineer.I always had a passion for building , dissecting , and creating—whether it was bridges in...
Dhruv Kumar
Sep 105 min read
Â


Understanding IDOR Vulnerabilities and Their Role in Data Breaches
This issue allows unauthorized access to sensitive data and can have devastating consequences. In this post, we will explore how IDOR vulnerabilities work
Aditya Kumar
Sep 24 min read
Â


How to Master Time Based SQL Injection Techniques for Ethical Hacking
Among the various SQL injection methods, Time Based SQL Injection is particularly powerful.
Jahanvi Sachdeva
Aug 264 min read
Â


The Unseen Mindset: Unraveling the Ethical Hacker's Thought Process
At the heart of an ethical hacker’s approach are three traits: curiosity, critical thinking, and a commitment to ethics. This combination allows them to solve complex problems in a constantly changing cybersecurity landscape.
Abhinav Bangia
Aug 184 min read
Â


How to Begin Your Journey in Ethical Hacking for Mobile Applications
Ethical hacking for mobile applications is a thrilling and evolving area that plays a vital role in safeguarding user data.
Aditya Kumar
Jul 294 min read
Â


Bug Bounty Basics: What Every Aspiring Hacker Should Know
One of the most appealing avenues is the bug bounty program, a system where ethical hackers help organizations spot and resolve vulnerabilities in their software.
Abhinav Bangia
Jul 213 min read
Â


Man-in-the-Middle Attacks Demystified: How They Work and How to Stop Them
Think of a Man-in-the-Middle (MITM) attack as someone slipping into a private conversation you’re having — maybe in a café or a quiet...
Aditya Kumar
Jul 143 min read
Â


Scattered Spider Strikes Aviation: Inside the Triple Airline Cyberattack Spree
In the span of just three weeks, three major airlines—Qantas, WestJet, and Hawaiian Airlines—became victims of sophisticated cyberattacks.
Abhinav Bangia
Jul 33 min read
Â


Codebreakers Chronicles: Ethical Hacking Journey with Alla Krishna Vamsi Reddy
Codebreakers Chronicles: Ethical Hacking Journey with Alla Krishna Vamsi Reddy
Krishna Vamsi
May 284 min read
Â


Hijacking the Cloud: An AWS Takeover and RCE Tale
Hijacking the Cloud: An AWS Takeover and RCE Tale
Aditya Kumar
May 143 min read
Â


What Security Looks Like When You Start with the Researcher, Not the Dashboard
What Security Looks Like When You Start with the Researcher, Not the Dashboard
Anurag Tripathi
May 62 min read
Â


Beyond CVEs: What Real-World Attackers Actually Look For
Beyond CVEs: What Real-World Attackers Actually Look For
Anurag Tripathi
Apr 282 min read
Â


Demystifying Mobile Application Penetration Testing: A Researcher’s Guide
Demystifying Mobile Application Penetration Testing: A Researcher’s Guide
Jahanvi Sachdeva
Apr 233 min read
Â


Cyber Hygiene Checklist: Essential Daily Habits to Protect Your Digital Life
Cyber Hygiene Checklist: Essential Daily Habits to Protect Your Digital Life
Dipti Bhadouriya
Apr 172 min read
Â
bottom of page
-c.png)