top of page


Codebreaker's Chronicles with Rajan Kumar Barik: A Journey, In His Own Voice
Codebreaker's Chronicles with Rajan Kumar Barik
Rajan Kumar Barik
6 days ago3 min read


Strengthening the Signal: 15% mule accounts send to bin.
Recently, we at Com Olho completed a significant internal audit of our researcher base.
Anurag Tripathi
Dec 8, 20253 min read


The Role of ISO 29147 and 30111 in Enhancing Cybersecurity Strategies for 2026
Two key international standards, ISO 29147 and ISO 30111, provide essential frameworks for managing vulnerability disclosure and handling.
Jahanvi Sachdeva
Nov 11, 20254 min read


Codebreakers Chronicles: Ethical Hacking Journey with Aakash Sharma
Hi, I’m Aakash Sharma, and if you’re reading this, chances are you’re curious about hacking, bug bounties, or just figuring out how people like me end up in this field.
Aakash Sharma
Oct 7, 20252 min read


ISO/IEC 29147: Why CISOs Must Lead with Visible Vulnerability Disclosure
ISO/IEC 29147 is more than a guideline. It is a framework that helps organisations demonstrate openness and maturity.
Anurag Tripathi
Sep 23, 20252 min read


Essential Steps to Launch Your Successful Ethical Hacking Career in 2025
In today's digital landscape, cybersecurity threats are more frequent and sophisticated. Ethical hackers play a crucial role in defending against these threats.
Abhinav Bangia
Sep 19, 20255 min read


Alias Emails at Com Olho: Testing With Precision and Trust
Alias Emails are designed to make that balance easier. They give every researcher a dedicated email address for testing. This address is safe, inbound only, and tied directly to your profile.
Anurag Tripathi
Sep 12, 20252 min read


Tips to climb the leaderboard at Com Olho without losing your why
When we started building Com Olho’s crowdsourced security platform, we were writing a promise. Talent will be seen.
Anurag Tripathi
Sep 10, 20254 min read


From Blueprints to Bug Bounties: My journey from civil engineering to cybersecurity with Dhruv Kumar
I’m Dhruv Kumar a 24-year-old civil engineer.I always had a passion for building , dissecting , and creating—whether it was bridges in...
Dhruv Kumar
Sep 10, 20255 min read


Understanding IDOR Vulnerabilities and Their Role in Data Breaches
This issue allows unauthorized access to sensitive data and can have devastating consequences. In this post, we will explore how IDOR vulnerabilities work
Aditya Kumar
Sep 2, 20254 min read


How to Master Time Based SQL Injection Techniques for Ethical Hacking
Among the various SQL injection methods, Time Based SQL Injection is particularly powerful.
Jahanvi Sachdeva
Aug 26, 20254 min read


The Unseen Mindset: Unraveling the Ethical Hacker's Thought Process
At the heart of an ethical hacker’s approach are three traits: curiosity, critical thinking, and a commitment to ethics. This combination allows them to solve complex problems in a constantly changing cybersecurity landscape.
Abhinav Bangia
Aug 18, 20254 min read


How to Begin Your Journey in Ethical Hacking for Mobile Applications
Ethical hacking for mobile applications is a thrilling and evolving area that plays a vital role in safeguarding user data.
Aditya Kumar
Jul 29, 20254 min read


Bug Bounty Basics: What Every Aspiring Hacker Should Know
One of the most appealing avenues is the bug bounty program, a system where ethical hackers help organizations spot and resolve vulnerabilities in their software.
Abhinav Bangia
Jul 21, 20253 min read


Man-in-the-Middle Attacks Demystified: How They Work and How to Stop Them
Think of a Man-in-the-Middle (MITM) attack as someone slipping into a private conversation you’re having — maybe in a café or a quiet...
Aditya Kumar
Jul 14, 20253 min read


Scattered Spider Strikes Aviation: Inside the Triple Airline Cyberattack Spree
In the span of just three weeks, three major airlines—Qantas, WestJet, and Hawaiian Airlines—became victims of sophisticated cyberattacks.
Abhinav Bangia
Jul 3, 20253 min read


Codebreakers Chronicles: Ethical Hacking Journey with Alla Krishna Vamsi Reddy
Codebreakers Chronicles: Ethical Hacking Journey with Alla Krishna Vamsi Reddy
Krishna Vamsi
May 28, 20254 min read


Hijacking the Cloud: An AWS Takeover and RCE Tale
Hijacking the Cloud: An AWS Takeover and RCE Tale
Aditya Kumar
May 14, 20253 min read


What Security Looks Like When You Start with the Researcher, Not the Dashboard
What Security Looks Like When You Start with the Researcher, Not the Dashboard
Anurag Tripathi
May 6, 20252 min read


Beyond CVEs: What Real-World Attackers Actually Look For
Beyond CVEs: What Real-World Attackers Actually Look For
Anurag Tripathi
Apr 28, 20252 min read
bottom of page
-c.png)