Blog | Hidden Investigations - Top Cybersecurity Team from Bangladesh
  • Home
  • Resources
    • Blog
    • Research
    • Community Forum
  • About
    • About Us
    • Achievements
    • Our Team
  • HI CTF Labs
  • Projects
    • Sub Intel
    • JSpider
    • BugBay
  • Contact
  • Join Us
Shai-Hulud v2 “Second Coming”: Inside the npm Supply Chain Worm by Hidden Investigations

Shai-Hulud v2 “Second Coming”: Inside the npm Supply Chain Worm

Sakibul Ali Khan December 3, 2025
Research
Django CVE-2025-64459: Critical SQL Injection in the ORM Explained | Hidden Investigations

Django CVE-2025-64459: Critical SQL Injection in the ORM Explained

Sakibul Ali Khan November 20, 2025
Research
File Upload Bypass: Understanding and Mitigating Risks in Web Applications

File Upload Bypass: Understanding and Mitigating Risks in Web Applications

Sakibul Ali Khan August 31, 2025
Web Application Security
How to Find Hidden Messages in JPEGs: A Beginner’s Guide to CTF Steganography Challenges from KUET’s Cyber Security Seminar

How to Find Hidden Messages in JPEGs: A Beginner’s Guide to CTF Steganography Challenges from KUET’s Cyber Security Seminar

Sakibul Ali Khan August 22, 2025
Digital Forensic
Unearthing Secrets in Memory — A Full Write-Up of “Now You See Me” (Shakti CTF 2025)

Unearthing Secrets in Memory — A Full Write-Up of “Now You See Me” (Shakti CTF 2025)

Sakibul Ali Khan August 2, 2025
Reverse Engineering
Docker Zero to Hero For Hackers: A Practical Guide for Cybersecurity Enthusiasts

Docker Zero to Hero For Hackers: A Practical Guide for Cybersecurity Enthusiasts

Sakibul Ali Khan July 26, 2025
Cloud Security
Blog | Hidden Investigations - Top Cybersecurity Team from Bangladesh

    © 2022-2025 Hidden Investigations — Tailored by security researchers.