This Section showcases the works put together by our team internally as well as collaboration with other organisations to xray an array of subjects.
Discover how the August 2025 Nx supply chain attack exposed private code, tokens, and digital trust—and what every developer must learn to protect their work.
Cybercriminals are using CSS in emails to bypass spam filters and steal data. Learn how to stay protected—read more now!
Hackers are using Google Tag Manager to steal credit card data. Stay secure, read more now!
Microsoft recently disclosed details about a security flaw in Apple's Transparency, Consent, and Control (TCC) framework for macOS, codenamed "HM Surf." This flaw, now patched...
Security Advisory : INC RANSOMWARE
Tech Hive Security Advisory Series Volume 1. Issue 6
Tech Hive Security Advisory Series Volume 1. Issue 5
Tech Hive Security Advisory Series Volume 1. Issue 4
Tech Hive Security Advisory Series Volume1. Issue 3
Tech Hive Security Advisory Series Volume 1. Issue 2
Tech Hive Security Advisory Series Volume 1. Issue 1