• From Exploit to Ransomware: Detecting CVE-2025-29824

    The Microsoft Security blog highlights the active exploitation of CVE-2025-24983, a zero-day vulnerability in the [...]

  • Windows Shell Link Vulnerability ZDI-CAN-25373: Detecting Hidden Commands

    One of the latest vulnerabilities disclosed by TrendMicro, ZDI-CAN-25373, exposes a flaw in Windows shortcut [...]

  • Exploring Strela Stealer: Initial Payload Analysis and Insights

    In cybersecurity research, it's easy to get caught up in the pursuit of uncovering new [...]

  • Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation

    With the surge of cyberattacks, sharing threat intelligence in the form of insights, trends, and [...]

  • Inside DarkGate: Exploring the infection chain and capabilities

    As the threat landscape continually evolves, some positive developments, such as authorities tracking down Maldevs, [...]

  • Decoding the Threat: HTML Smuggling Detection Essentials

    Modern web applications perform most of their processing and rendering on the client side, enhancing [...]

  • Emerging Threat: Defending Against 8base – Uncovering Their Arsenal and Crafting Responses

    Fast FactsTop 5 most active ransomware groups for the months of June and July 2023. [...]

  • MOVEit’s Zero Day: The File Transfer Turmoil

    Executive SummaryMultiple vulnerabilities in MOVEit Transfer tracked as CVE-2023-34362, CVE-2023-35036, and CVE-2023-35708 were found.Mentioned vulnerabilities are [...]

  • Emerging Threat: AgentTesla – A Review and Detection Strategies

    AgentTesla [S0331] a.k.a Negasteal is a .NET-based Remote Administrator Tool (RAT) first detected in [...]