top of page



Smart Home Security Research — CVE-2026–0918 Assigned
From having online meetings to getting real CVEs, the CRAC Learning team did it all! We discovered a Denial-of-Service vulnerability in the HTTP service of the TP-Link Tapo C100 v5 IP camera. Sending a POST request with an excessively large Content-Length header causes the main HTTP process to crash, freezing video and audio streams and forcing a restart. TP-Link acknowledged and published a fix; the issue was assigned CVE-2026–0918 and a High score (CVSS v4.0 7.1). Tapo came

Azim Javed
5 days ago2 min read


Smart Security Research Diaries: Attacking the Internet of Things
Before reading this part, go over our previous blog - https://www.crac-learning.com/post/smart-security-research-diaries-defending-the-internet-of-things Then I started the Phase-1 of Smart Home Security Research Program by CRAC Learning with great enthusiasm & aspirations to find real vulnerabilities, not just solving TryHackMe labs. When I found that I'll be attacking the TP-Link Tapo C100 IP Camera, the first thing I did was Threat Modelling. I dived deep into gathering pa

Azim Javed
6 days ago4 min read


Data Leaks: The Cyber Risk Most People Don’t Realize Is Already Affecting Them
When people hear the word cybersecurity , most assume it’s about big companies, hackers in dark rooms, or banks losing crores. The common reaction is simple: “This doesn’t concern me. I’m just a normal person.” That belief is exactly why data leaks are one of the most dangerous cyber risks today . Not because they are complex.Not because they are rare.But because most people don’t even realize they are victims . The Biggest Misunderstanding: “Data Leaks Affect Companies, No

Om Mishra
Feb 94 min read


Smart Security Research Diaries: Defending the Internet of Things.
18th of January, 2026 - The day started with some network troubleshooting and system administration as we forgot to bring our wi-fi router that was earlier acting as a gateway. But yeah, after scratching our heads we were finally able to use one of our laptops as the gateway which really helped us capture all the data frames via Wireshark. Today, our main goal was to get Remote Code Execution on our target. Last time we found a Buffer-Overlfow based Denial-of-Service vulnera

Azim Javed
Jan 253 min read


AI Cyberattacks in India: The New-Age Hackers We’re Not Ready For
AI Cyberattacks in India: The New-Age Hackers We’re Not Ready For

Om Mishra
Dec 15, 202511 min read


Hack-to-Trade: A Concern for executives
In the past, few Hackers gained access to insider information that netted him millions of dollars. UK national Robert B. Westbrook successfully compromised a CFO's outlook account and added an auto-forward rule in mailbox to redirect all the emails to a disposable temporary email address. Hiding traces under multiple layers of VPN channel, transacting through untraceable accounts, bitcoin transactions but still couldn't escape the investigating agencies. Westbrook's scheme ne

CRAC Learning
Dec 7, 20252 min read


Maritime History Rewritten: First Vessels Delivered with Cybersecurity Notations
Cyber-Resilient Ship In an era where ships are as connected as cities, the sea is no longer a sanctuary from cyber threats. Vard which is...

CRAC Learning
Jun 4, 20252 min read


Everest Group - What Happens When Your HR System Becomes Your Weakest Link?
Everest Group , is an old name in cyber extortion and now it is rewriting the rulebook for modern cybercrime. It has come into spotlight...

CRAC Learning
Jun 2, 20252 min read


The Ethics of Hacking Back: Defense or Revenge?
In an age where cyberattacks are becoming more complex and widespread, governments and organizations are constantly faced with the choice...

CRAC Learning
Apr 23, 20252 min read


Decoding the Latest Government Cybersecurity Policies
Technology has become an integral part of our lives and the importance of cybersecurity in today's day and age cannot be overemphasized....
Bhavgun Kaur
Mar 31, 20256 min read


AI's Role in Early Detection of Cyber Threats: The Frontier of Cybersecurity
In today's digital world, cybersecurity is crucial. As cyber threats become increasingly sophisticated, traditional defenses are no...
Asis Kaur
Mar 25, 20255 min read


Securing your Instagram account
Recently there have been multiple scenarios leading Instagram account compromise of users especially, targeting the influencers. With a...

CRAC Learning
Feb 20, 20252 min read


A Deep Dive into Phishing URL Detection
In today's digital age, cyber security is more critical than ever. One of the most prevalent threats is phishing , where attackers...

CRAC Learning
Jan 11, 20254 min read
Internship Experience — Cybersecurity with AI
Let’s hear from our Cybersecurity with AI Research intern — Dinki Gupta about their Summer internship 2024 experience. I’m Dinki Gupta, a...

CRAC Learning
Dec 22, 20243 min read


Content Security Policy (CSP) Bypass
What is Content Security Policy (CSP) Content Security Policy (CSP) is a browser security standard developed by the W3C to help web...

CRAC Learning
Nov 17, 20244 min read


Secure usage of parental control applications
Popular parental control apps for Android, iOS could be exploited risking user data and safety. Parental apps are by nature intrusive to...

CRAC Learning
Mar 18, 20242 min read


Remcos Everywhere: Decoding the Stealthy Cyber Threat
In the ever-evolving landscape of cybersecurity threats, a new player has emerged: Remcos. This previously undocumented malware has been...

CRAC Learning
Mar 13, 20242 min read


MINIBUS Intruders: UNC1549’s Cyber Espionage in the Middle East
A group of hackers, known as UNC1549, has been busy targeting aerospace, aviation, and defense industries in the Middle East. Their focus...
Kritika Gaur
Mar 7, 20242 min read


Digital Spies and Sneaky Invitations: Unmasking the SPIKEDWINE Backdoor
A previously unknown threat actor (we’ll call them SPIKEDWINE) has been targeting European officials who are connected to Indian...

CRAC Learning
Mar 6, 20242 min read


SSH-Snake: Fresh Self-Adapting Worm Poses Network Risks
The Sysdig Threat Research Team (TRT) has uncovered the malicious utilization of a newly developed network mapping tool named SSH-Snake,...

CRAC Learning
Mar 1, 20242 min read
bottom of page





