Harsh Bothra (@harshbothra_) 's Twitter Profile
Harsh Bothra

@harshbothra_

Freelance Pentester & Consultant • Cobalt Core Lead & Pentester • Author • Speaker • Blogger • SecurityExplained • Project Bheem • Learn365 • Views are personal

ID: 1113342479044997120

linkhttps://harshbothra.tech calendar_today03-04-2019 07:28:26

5,5K Tweet

42,42K Followers

665 Following

Harsh Bothra (@harshbothra_) 's Twitter Profile Photo

We have launched a new blog series! “Defending from Vulnerabilities” Under this we will be posting one technical blog every week including: - One Attack Scenario - Attacks Breakdown - How developers could have fixed it - General Recommendation This is aimed for educating

Cobalt (@cobalt_io) 's Twitter Profile Photo

Reflective Cross-Site Scripting (XSS) remains one of the most prevalent vulnerabilities exploited by attackers. Stay ahead of potential threats by mastering Reflective XSS Testing today! Read more: hubs.la/Q02Fkb2k0 #Cybersecurity #TechBlog #Cobalt #Pentesting

Reflective Cross-Site Scripting (XSS) remains one of the most prevalent vulnerabilities exploited by attackers. Stay ahead of potential threats by mastering Reflective XSS Testing today! 
Read more: hubs.la/Q02Fkb2k0

#Cybersecurity #TechBlog #Cobalt #Pentesting
Defensium Labs (@defensiumlabs) 's Twitter Profile Photo

⚠️CVE-2024-6387 is a critical vulnerability in OpenSSH versions 8.5p1 to 9.8p1 on glibc-based Linux systems which stems from a race condition in the signal handler, allowing remote attackers to execute arbitrary code as root, leading to complete system compromise.

Defensium Labs (@defensiumlabs) 's Twitter Profile Photo

Cyber Saefty Tip of the Week: Monitor Your Digital Footprints Your digital footprint, composed of your online activities and interactions, plays a crucial role in your professional life. Understanding how to track and control this footprint is essential in today's digital age.

Defensium Labs (@defensiumlabs) 's Twitter Profile Photo

The second blog in the series, "Defending from Vulnerabilities", is live! Give it a read here: blog.defensiumlabs.com/defending-from… #cybersecurity #vulnerabilities #defending #pentesting #security

Harsh Bothra (@harshbothra_) 's Twitter Profile Photo

The second blog in the series, "Defending from Vulnerabilities", is live! This week, we talked about a bypass in the password change functionality that could be dangerous if not mitigated properly. Give it a read here: blog.defensiumlabs.com/defending-from… #cybersecurity #vulnerabilities

Defensium Labs (@defensiumlabs) 's Twitter Profile Photo

Cyber Safety Word of the Week: Air Gap An air gap is a security measure that physically isolates a computer or network from untrusted networks. There are no direct or indirect connections, ensuring that sensitive systems remain completely separated from potential cyber threats.

Defensium Labs (@defensiumlabs) 's Twitter Profile Photo

🔌 Cyber Safety Tip of the Week: Avoid Using Public USB Charging Stations! ⚠️📱 Read the full tip here: blog.defensiumlabs.com/cyber-safety-t… #cybersecurity #cybersafety #juicejacking #awareness

Harsh Bothra (@harshbothra_) 's Twitter Profile Photo

Next up in the #Defending from #vulnerabilities series blog is out on Defensium Labs blog! This week, the discussion is on how the lack of validation of first-level data from applications in second-degree interaction could lead to various attacks. Check out the blog here:

Harsh Bothra (@harshbothra_) 's Twitter Profile Photo

We are running our first AI security Live training program at Defensium Labs ! The course is designed to cover everything about AI pentesting and security! Anyone with a basic understanding of security concepts can join the course. Register yourself at a discounted price at:

Harsh Bothra (@harshbothra_) 's Twitter Profile Photo

Rakshak was the name of my first "Cyber Club", which I built in my first year at college to spread cyber awareness and teach cyber security. I failed to scale it. After spending many years as a professional, being close to the community and knowing the need to spread cyber

Harsh Bothra (@harshbothra_) 's Twitter Profile Photo

If the redirections are improperly handled, they often lead to open redirection attacks. However, if the number of redirection attempts is not implemented, it can cause a redirection loop, leading to an application-level denial of service and resource exhaustion attack. Checkout

Harsh Bothra (@harshbothra_) 's Twitter Profile Photo

If you are looking to get an American Express card, you can use my referral link to unlock some extra benefits: americanexpress.com/en-in/referral…

Jatin (@techyfreakk) 's Twitter Profile Photo

Finally, the day is here! HackerOne Live Hacking Meetup in Udaipur is tomorrow! Live hacking, collabs, networking & more! 🕥 10:30 AM – 5:30 PM 📍 Location: h1.community/events/details… Looking forward to your amazing participation! DM me if you're coming :-)