top of page
All Posts


n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
ai generated image Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow automation platform to steal developers' OAuth credentials. One such package, named "n8n-nodes-hfgjf-irtuinvcm-lasdqewriit," mimics a Google Ads integration, and prompts users to link their advertising account in a seemingly legitimate form and then siphon it to servers under the attackers' control. "The attack

MUHSIN
2 days ago3 min read


GoBruteforcer Botnet: How Weak Credentials Are Compromising Crypto Project Databases
The security of crypto projects depends heavily on protecting sensitive data stored in their databases. Yet, many projects overlook a simple but critical vulnerability: weak credentials. The GoBruteforcer botnet exploits this gap, targeting crypto project databases and causing significant damage. This post explores how this botnet operates, why weak credentials remain a problem, and what steps crypto projects can take to defend themselves. GoBruteforcer botnet targeting login

MUHSIN
3 days ago6 min read


DARK SIDE OF BUG BOUNTY
Disclaimer: This article is based solely on my personal observations and experiences within the bug bounty ecosystem, along with publicly available information. It is not intended to target, accuse, or defame any individual, company, or platform. The purpose of this blog is to share perspective, raise awareness, and encourage informed participation in bug bounty hunting. Readers are advised to form their own conclusions. In recent months, I have come to a realization that I f

MUHSIN
4 days ago5 min read
bottom of page