<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://ayushjha-dev.github.io/Obsqura/</id><title>Obsqura</title><subtitle>Explore our cybersecurity blog for tutorials, tips, and industry insights. From ethical hacking techniques to network security guides, learn practical skills to protect systems and stay ahead of cyber threats. Perfect for learners, enthusiasts, and professionals alike.</subtitle> <updated>2026-04-06T05:29:51+05:30</updated> <author> <name>Ayush Kumar Jha</name> <uri>https://ayushjha-dev.github.io/Obsqura/</uri> </author><link rel="self" type="application/atom+xml" href="https://ayushjha-dev.github.io/Obsqura/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://ayushjha-dev.github.io/Obsqura/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 Ayush Kumar Jha </rights> <icon>/Obsqura/assets/img/favicons/favicon.ico</icon> <logo>/Obsqura/assets/img/favicons/favicon-96x96.png</logo> <entry><title></title><link href="https://ayushjha-dev.github.io/Obsqura/posts/2026-03-24-cross-site-scripting-xss-injection-attacks-in-the-browser/" rel="alternate" type="text/html" title="" /><published>2026-04-06T05:29:51+05:30</published> <updated>2026-04-06T05:29:51+05:30</updated> <id>https://ayushjha-dev.github.io/Obsqura/posts/2026-03-24-cross-site-scripting-xss-injection-attacks-in-the-browser/</id> <content type="text/html" src="https://ayushjha-dev.github.io/Obsqura/posts/2026-03-24-cross-site-scripting-xss-injection-attacks-in-the-browser/" /> <author> <name>Ayush Kumar Jha</name> </author> <summary>Introduction Imagine your web browser, the window to your digital world, suddenly becoming a stage for a hostile takeover. This isn’t a scene from a cyberpunk thriller; it’s the very real threat of Cross-Site Scripting (XSS), an injection attack that continues to plague the web. Despite decades of awareness, XSS remains a top contender in the OWASP Top 10 A03:2021. Why? Because attackers are c...</summary> </entry> <entry><title>MDR: Supercharging Your Security Operations with 24/7 Threat-Hunting Expertise</title><link href="https://ayushjha-dev.github.io/Obsqura/posts/managed-detection-and-response-outsourcing-your-soc/" rel="alternate" type="text/html" title="MDR: Supercharging Your Security Operations with 24/7 Threat-Hunting Expertise" /><published>2026-04-06T05:28:52+05:30</published> <updated>2026-04-06T05:28:52+05:30</updated> <id>https://ayushjha-dev.github.io/Obsqura/posts/managed-detection-and-response-outsourcing-your-soc/</id> <content type="text/html" src="https://ayushjha-dev.github.io/Obsqura/posts/managed-detection-and-response-outsourcing-your-soc/" /> <author> <name>ayushjha</name> </author> <category term="Tutorials" /> <category term="Industry Insights" /> <summary>Discover how Managed Detection and Response (MDR) services offer 24/7 proactive threat hunting, deep investigation, and rapid incident response, transforming your cybersecurity posture by outsourcing your SOC.</summary> </entry> <entry><title>Shadows of the State: Unmasking Cyber Warfare's APTs &amp; The Attribution Enigma</title><link href="https://ayushjha-dev.github.io/Obsqura/posts/cyber-warfare-state-sponsored-attacks-and-attribution/" rel="alternate" type="text/html" title="Shadows of the State: Unmasking Cyber Warfare&amp;apos;s APTs &amp;amp; The Attribution Enigma" /><published>2026-04-05T05:26:04+05:30</published> <updated>2026-04-05T05:26:04+05:30</updated> <id>https://ayushjha-dev.github.io/Obsqura/posts/cyber-warfare-state-sponsored-attacks-and-attribution/</id> <content type="text/html" src="https://ayushjha-dev.github.io/Obsqura/posts/cyber-warfare-state-sponsored-attacks-and-attribution/" /> <author> <name>ayushjha</name> </author> <category term="Tutorials" /> <category term="Industry Insights" /> <summary>Explore the dark world of state-sponsored cyber warfare, delving into advanced persistent threat (APT) groups, sophisticated toolkits, and the formidable challenges of attributing these elusive attacks.</summary> </entry> <entry><title>Application Whitelisting: The Ultimate Defender Against Modern Malware &amp; Supply Chain Attacks</title><link href="https://ayushjha-dev.github.io/Obsqura/posts/application-whitelisting-controlling-what-runs-on-your-endpoints/" rel="alternate" type="text/html" title="Application Whitelisting: The Ultimate Defender Against Modern Malware &amp;amp; Supply Chain Attacks" /><published>2026-04-04T05:28:06+05:30</published> <updated>2026-04-04T05:28:06+05:30</updated> <id>https://ayushjha-dev.github.io/Obsqura/posts/application-whitelisting-controlling-what-runs-on-your-endpoints/</id> <content type="text/html" src="https://ayushjha-dev.github.io/Obsqura/posts/application-whitelisting-controlling-what-runs-on-your-endpoints/" /> <author> <name>ayushjha</name> </author> <category term="Tutorials" /> <category term="Industry Insights" /> <summary>Unlock the power of application whitelisting to control endpoint execution, defeat sophisticated malware, and fortify your cybersecurity defenses against zero-day threats. Learn how to implement allowlisting effectively.</summary> </entry> <entry><title>Beyond the Bug Bounty: Elevating Code Security with CERT, OWASP, and a Proactive Posture</title><link href="https://ayushjha-dev.github.io/Obsqura/posts/secure-coding-standards-cert-owasp-and-beyond/" rel="alternate" type="text/html" title="Beyond the Bug Bounty: Elevating Code Security with CERT, OWASP, and a Proactive Posture" /><published>2026-04-03T05:28:47+05:30</published> <updated>2026-04-03T05:28:47+05:30</updated> <id>https://ayushjha-dev.github.io/Obsqura/posts/secure-coding-standards-cert-owasp-and-beyond/</id> <content type="text/html" src="https://ayushjha-dev.github.io/Obsqura/posts/secure-coding-standards-cert-owasp-and-beyond/" /> <author> <name>ayushjha</name> </author> <category term="Tutorials" /> <category term="Industry Insights" /> <summary>Dive deep into secure coding standards like CERT and OWASP to prevent vulnerabilities at the source. Learn why proactive security is crucial in modern software development.</summary> </entry> </feed>
