BugGyaan
July 21st 2022
BugBase raises US$500,000 in pre-seed funding
100X.VC-backed Cybersecurity marketplace by two college dropouts, BugBase raises US$500,000 in funding led by 2am VC
Featured Blogs
BlackCat Ransomware becomes more lethal
The BlackCat ransomware, also known as ALPHV, is a prevalent threat and a prime example of the growing ransomware-as-a-service (RaaS) gig economy.
Mirror Mirror On the Wall, Which is the safest browser of them all?
A safe browser may hold different definitions in different domains. In general, a safe browser is one that has additional security features to assist ...
PHP Type Juggling
Type juggling, often known as “type coercion,” is a PHP feature. This indicates that PHP will transform variables of various kinds to a single, simila...
Introduction to Burp Suite
Burp, often known as Burp Suite, is a package of web application penetration testing tools developed by Portswigger.
Web Exploitation
Web applications frequently employ databases and rely on third-party web services to supply dynamic content.
NGROK 101
Ngrok is a cross-platform program that uses the Internet to expose local server ports.
What is Hashing?
The technique of transforming a given key into another value is known as hashing. A mathematical algorithm is employed to generate the new value using...
BugBase is now ISO 27001:2013 Compliant
BugBase is excited to announce that our platform is now certified and compliant with ISO 27001 standards
A Deeper Dive into Cryptography and Steganography
Cryptography is the technique of securing information and its communication through the use of algorithms
Everything you need to know about DDoS Attacks
A distributed denial of service (DDoS) attack is a malicious attempt to disrupt the normal traffic of the target’s server
Everything you need to know about Bug Bounties
A bug bounty program is a deal offered by businesses and organizations in which cybersecurity experts can receive recognition and monetary compensatio...
Social Engineering — How Human Flaws are used in hacking?
Social Engineering is an act of manipulating a person to take any action that may or may not be in “target's” best interest.
What’s the OSI Model?
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system.
BlackCat Ransomware becomes more lethal
The BlackCat ransomware, also known as ALPHV, is a prevalent threat and a prime example of the growing ransomware-as-a-service (RaaS) gig economy.
Mirror Mirror On the Wall, Which is the safest browser of them all?
A safe browser may hold different definitions in different domains. In general, a safe browser is one that has additional security features to assist ...
PHP Type Juggling
Type juggling, often known as “type coercion,” is a PHP feature. This indicates that PHP will transform variables of various kinds to a single, simila...
Introduction to Burp Suite
Burp, often known as Burp Suite, is a package of web application penetration testing tools developed by Portswigger.
Web Exploitation
Web applications frequently employ databases and rely on third-party web services to supply dynamic content.
NGROK 101
Ngrok is a cross-platform program that uses the Internet to expose local server ports.
What is Hashing?
The technique of transforming a given key into another value is known as hashing. A mathematical algorithm is employed to generate the new value using...
BugBase is now ISO 27001:2013 Compliant
BugBase is excited to announce that our platform is now certified and compliant with ISO 27001 standards
A Deeper Dive into Cryptography and Steganography
Cryptography is the technique of securing information and its communication through the use of algorithms
Everything you need to know about DDoS Attacks
A distributed denial of service (DDoS) attack is a malicious attempt to disrupt the normal traffic of the target’s server
Everything you need to know about Bug Bounties
A bug bounty program is a deal offered by businesses and organizations in which cybersecurity experts can receive recognition and monetary compensatio...
Social Engineering — How Human Flaws are used in hacking?
Social Engineering is an act of manipulating a person to take any action that may or may not be in “target's” best interest.
What’s the OSI Model?
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system.
BlackCat Ransomware becomes more lethal
The BlackCat ransomware, also known as ALPHV, is a prevalent threat and a prime example of the growing ransomware-as-a-service (RaaS) gig economy.
Mirror Mirror On the Wall, Which is the safest browser of them all?
A safe browser may hold different definitions in different domains. In general, a safe browser is one that has additional security features to assist ...
PHP Type Juggling
Type juggling, often known as “type coercion,” is a PHP feature. This indicates that PHP will transform variables of various kinds to a single, simila...
Introduction to Burp Suite
Burp, often known as Burp Suite, is a package of web application penetration testing tools developed by Portswigger.
Web Exploitation
Web applications frequently employ databases and rely on third-party web services to supply dynamic content.
NGROK 101
Ngrok is a cross-platform program that uses the Internet to expose local server ports.
What is Hashing?
The technique of transforming a given key into another value is known as hashing. A mathematical algorithm is employed to generate the new value using...
BugBase is now ISO 27001:2013 Compliant
BugBase is excited to announce that our platform is now certified and compliant with ISO 27001 standards
A Deeper Dive into Cryptography and Steganography
Cryptography is the technique of securing information and its communication through the use of algorithms
Everything you need to know about DDoS Attacks
A distributed denial of service (DDoS) attack is a malicious attempt to disrupt the normal traffic of the target’s server
Everything you need to know about Bug Bounties
A bug bounty program is a deal offered by businesses and organizations in which cybersecurity experts can receive recognition and monetary compensatio...
Social Engineering — How Human Flaws are used in hacking?
Social Engineering is an act of manipulating a person to take any action that may or may not be in “target's” best interest.
What’s the OSI Model?
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system.

Let's take your security
to the next level

security