Articles

  • 1 week ago | medium.com | Akash Sharma

    Session tokens, CSRF nonces, JWT IDs — these little alphanumeric strings are the keys to your target’s kingdom. As an experienced penetration tester, one of my favorite tools to audit their strength is Burp Suite’s Sequencer. In this article, I’ll share a professional, step-by-step guide to capturing, analyzing, and exploiting weak tokens, plus advanced use cases and remediation advice. Every time a user logs in, your application hands them a token that identifies their session.

  • 1 week ago | thehansindia.com | Akash Sharma

    In today’s fast-paced and digital world, technology is no longer a support tool, it’s at the core of modern education. Among the most transformative innovations is cloud computing, a technology that enables access to data and applications over the internet instead of relying on local servers or personal computers. From virtual classrooms to collaborative research, cloud computing is revolutionizing higher education, especially for students. What is Cloud Computing?

  • 3 weeks ago | mytravaly.com | Akash Sharma

    Leh Ladakh, a remote yet mesmerizing region nestled in the northern part of India, is one of the most fascinating travel destinations in the world. Located in the union territory of Ladakh, this high-altitude desert offers travelers an unforgettable blend of rugged natural beauty, ancient Buddhist culture, and adventurous experiences. Whether you're a nature enthusiast, a spiritual seeker, or an adventure lover, Leh Ladakh welcomes everyone with open arms and an unmatched landscape.

  • 1 month ago | arxiv.org | Akash Sharma

  • 1 month ago | medium.com | Akash Sharma

    Artificial Intelligence isn’t just a buzzword anymore — it’s a game-changer shaping how we interact with technology every single day.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →