Security Research & Analysis

Technical documentation focused on real-world security incidents, vulnerability research, and offensive security techniques.

Research by Sohan Kanna | Security Researcher

Latest Updates

View Archives
The Axios npm Compromise: How the Internet's Most Popular HTTP Client Became a Trojan Horse
Research
2026-03-31#security

The Axios npm Compromise: How the Internet's Most Popular HTTP Client Became a Trojan Horse

A hijacked maintainer account. A phantom dependency. A self-erasing Remote Access Trojan. If you ran `npm install` on March 31, 2026, your infrastructure might already be compromised

Read Article →
Your Secure Messenger is Spying on You (And You Can't Turn It Off)
Research
2026-03-31#security

Your Secure Messenger is Spying on You (And You Can't Turn It Off)

No malware. No clicking on sketchy links. All a hacker needs is your phone number to track your sleep schedule, app usage, and physical location.

Read Article →
The End of an Era: Microsoft Kills WDS Hands-Free Deployment for Windows 11 & Server 2025 Following Critical RCE
Research
2026-03-17#CVE

The End of an Era: Microsoft Kills WDS Hands-Free Deployment for Windows 11 & Server 2025 Following Critical RCE

CVE-2026-0386 marks the end of WDS hands-free imaging. Why Microsoft is forcing a shift to Zero Trust to prevent supply-chain attacks.

Read Article →
The Quantum Heist: Defeating "Store Now, Decrypt Later" with Merkle Tree Certificates
Research
2026-03-03#cryptography

The Quantum Heist: Defeating "Store Now, Decrypt Later" with Merkle Tree Certificates

State-sponsored hackers are hoarding encrypted data today to break it tomorrow. Here is how Google’s new Merkle Tree Certificates will stop them.

Read Article →
How Attackers Use WebDAV to Deliver Malware Without Browser Warnings
Research
2026-03-01#threat-intel

How Attackers Use WebDAV to Deliver Malware Without Browser Warnings

Why malware no longer needs your web browser to breach your network-and how attackers are weaponizing legacy WebDAV protocols.

Read Article →
Silent Privilege Escalation: How Public Google API Keys Now Expose Gemini Data
Research
2026-02-27#threat-intel

Silent Privilege Escalation: How Public Google API Keys Now Expose Gemini Data

For over a decade, Google told developers it was safe to put API keys in public code. Then, AI changed the rules.

Read Article →