Satyam SinghHow to Protect Against Deepfake Technology ThreatsIn the age of rapidly advancing technology, the rise of deep fake and voice simulation technology has emerged as a significant concern for…6 min read·Nov 27, 2023----
Satyam SinghIT vs ICSToday’s technology is defined by two terms, information technology (IT) and operational technology (OT). IT is the use of hardware and…4 min read·Sep 22, 2022----
Satyam SinghBiggest threats to ICS/SCADA systemsImagine a scenario where two nations are at war. One nation has the capability to attack the other’s industrial infrastructure, like the…5 min read·Sep 22, 2022----
Satyam SinghExploiting NFS shares to gain root accessRecently, while performing a network-level penetration testing activity for one of the clients, I came across a vulnerability that was used…7 min read·Sep 22, 2022----
Satyam SinghMicrosoft Teams Information DisclosureThis article contains the detail of a flaw in Microsoft Teams' “Delete” message feature. The deleted messages can be seen in the mobile…4 min read·Jan 19, 2022----
Satyam SinghVulnerabilities in Booking Core 1.7Hello everyone and welcome to my first blog on Medium. I have been writing blogs on the information security domain which can be found at…6 min read·Jul 14, 2021----