• Emerging Threat: APT-29 – The Not So Cozy Bear

    The Dukes, or Cozy Bear, is a heavily financed, deeply dedicated, and efficiently coordinated cyber [...]

  • CVE-2023-38831: WinRAR – Decompression or Arbitrary Code Execution

    By Nischal Khadgi, Swachchhanda Shrawan Poudel, and Anish Bogati - (Security Research Team)Fast FactsWith over [...]

  • Emerging Threat: Akira, Not a CyberPunk Movie – A Very Real Ransomware Threat

    Fast FactsEmerging in March 2023, Akira ransomware has been grabbing daily headlines with its relentless [...]

  • Emerging Threat: Defending Against 8base – Uncovering Their Arsenal and Crafting Responses

    Fast FactsTop 5 most active ransomware groups for the months of June and July 2023. [...]

  • Emerging Threat: Understanding the Menace – Unraveling the Sophistication and Nefarious Nature of LockBit Ransomware

    Fast FactsLockBit is a highly persistent and sophisticated ransomware that operates on the Ransomware-as-a-Service (RaaS) [...]

  • Yet Another Microsoft Office365 zero-day: CVE-2023-36884

    Updated July 18, 2023Fast FactsCVE-2023-36884 is an Office and Windows HTML Remote Code Execution Vulnerability.No [...]

  • Emerging Threat: BianLian Ransomware’s Shapeshift to Encryption-less Extortion

    Executive Summary BianLian ransomware surfaced in June 2022 and has been a persistent threat to [...]

  • MOVEit’s Zero Day: The File Transfer Turmoil

    Executive SummaryMultiple vulnerabilities in MOVEit Transfer tracked as CVE-2023-34362, CVE-2023-35036, and CVE-2023-35708 were found.Mentioned vulnerabilities are [...]

  • Emerging Threat: Vice Society’s Double Extortion Strategy

    Executive Summary Vice Society is a relatively new Russian-speaking hacking group that arose in the [...]

  • Detecting and Responding to Compromises in Azure AD through AAD Connect

    Most organizations have infrastructures that span both on-premise and the cloud. To manage identities across [...]

  • PaperCut Vulnerability CVE-2023-27350: Detecting exploitation attempts

    by Anish Bogati & Rabindra Dev Bhatta, Security Research - Updated May 8th 2023PaperCut is [...]

  • Emerging Threat: RedLine Stealer Malware Outbreak – A Comprehensive Guide to Anatomy, Detection, and Response

    By Swachchhanda Shrawan Poudel & Anish Bogati; Security ResearchRedLine Stealer, the malicious software that was [...]