Get along with the curve.
Cyber Attacks
In 2025, cyber threats have evolved into stealthy software-based attacks by nation-states and criminal groups. This blog decodes the MITRE ATT&CK Framework—an open-source playbook that helps defenders map out attacker behavior and detect Advanced Persistent Threats (APTs). Written from a student’s perspective, it explains how ATT&CK is more than theory—it’s a real-world blueprint for cyber defense.
Weekly Unfoldings
Stay informed with our weekly roundup of top 10 key happenings in tech, cyber and geopolitics. Discover the most significant developments, trends and breakthroughs shaping the industry, all in one concise update. The card image tiles are designed for easy recognition of the category to which the news belongs.
Missed something follow weekly.
CVE
🔍 Dive into a deep technical breakdown of CVE-2025-1137 a high-severity command injection flaw in IBM Storage Scale. This blog explores reverse engineering insights, real-world exploitation, PoCs, and detection strategies tailored for red teamers and defenders.
In 2025, programming languages have become both cyber weapons and digital shields. This blog explores how modern coders sit at the frontline of cybersecurity—where Python scripts, C++ exploits, and AI tools shape the future of digital conflict. From real-world attack vectors to defensive coding practices, discover how your code can either break or protect the system. Whether you're a student or a seasoned dev, this is your call to code responsibly in a cyber-connected world.
In today’s world of increasing cyber threats, writing secure code is more important than ever. This blog explains why developers must prioritize security from the start, highlights common mistakes, and provides practical coding practices to avoid them. Whether you're a beginner or an experienced developer, you'll learn how to write safer, more resilient software.
Tech
You begin with the first challenge "Exploiting Access", where your journey starts by reverse-engineering an APIC Ele. Through careful analysis, you discover crucial and hidden information that serve as the kay to exploiting the Mt system's weakne. With these insights, you successtaly breach the first machine (M1). gaining access to it. As you transion to the second challenge "Mastering Control, phase involves leveraging the foothold on Mt. extracting critical dala, and exploiting the relationship between Att and M2 to gain Having gained access to Mt, your thjective now is to move deeper by enumerating your findings which will allow you to sing to the second machine. This full control over the second machine. In summary, this CTF event challenges you to exploit vulnerabilities from an APK to compromiss the first machine and then use that access to navigate your way to the second, ultimately gaining control over both machines.