by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is [...]
By Swachchhanda Shrawan Poudel & Anish Bogati; Security ResearchRedLine Stealer, the malicious software that was [...]
Microsoft has addressed a critical zero-day vulnerability actively exploited in the wild and has released [...]
By Santosh Nepal and Anish Bogati; Security ResearchUpdated on 21st AprilQuick Digest:When a new application [...]
by Nilaa Maharjan and Anish Bogati, Security ResearchA serious vulnerability tagged CVE-2023-23397 has recently been [...]
AgentTesla [S0331] a.k.a Negasteal is a .NET-based Remote Administrator Tool (RAT) first detected in [...]
Attackers are using OneNote files to infiltrate systems by embedding malicious payloads, with OneNote becoming [...]
VMware ESXi hypervisor allows organizations to host multiple virtual systems on a single physical [...]
A year on since the first attack on Ukrainian territory and the unofficial beginning of [...]
Executive Summary:First appeared in June 2022, still active and victimizing high-profile targets.Second Highest number of [...]
By Nilaa Maharjan, Security Research.ContentsKey FindingsWhich Products and Versions are Affected?Making a BOLD statementBoldly going [...]
By Rabindra Dev Bhatta, Security ResearchContentsFast FactsTechnical analysisHunting Hive with LogpointInvestigation and response with LogpointRemediation [...]