CyberwareHub Logo

Decrypt the Hidden Codes of
Cyber Security!

Get dedicated updates related to cybersecurity.

Community Member 1
Community Member 2
Community Member 3
Join a community of 2,000+ cyber readers.

Latest Blogs

All Blogs

DoNot APT Campaign Targets Users with Google Drive Phishing and Custom Malware
Cyber Trends

DoNot APT Campaign Targets Users with Google Drive Phishing and Custom Malware

Donot APT strikes again! Here's how their malware spreads through phishing and Google Drive-hosted payloads.

Aug 11, 2025
Beware of Excel Attachments: Emotet Malware Returns in Phishing Emails
Malware Campaigns

Beware of Excel Attachments: Emotet Malware Returns in Phishing Emails

Explore the new Emotet spreads through phishing emails using Excel macros to silently install malware on victim systems.

Jul 23, 2025
New 2025 Cyber Threats: Ex-Black Basta Group Uses Microsoft Teams in Attacks
Cyber Trends

New 2025 Cyber Threats: Ex-Black Basta Group Uses Microsoft Teams in Attacks

Explore how new Black Basta hackers exploit MS Teams & Python in stealthy new cyberattacks targeting businesses in 2025.

Jun 16, 2025
AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques
Malware Campaigns

AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques

Explore how simple files are exploited to fuel advanced and sophisticated malware attacks in modern cyber threats.

Mar 25, 2025
Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files
Malware Campaigns

Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files

Understand the Coyote Banking Trojan, a growing cyber threat using LNK files to steal sensitive financial data.

Mar 14, 2025
Lumma Stealer Infostealer: TTPs, Indicators, and Detection Strategies
Malware Campaigns

Lumma Stealer Infostealer: TTPs, Indicators, and Detection Strategies

Explore the growing threat of Lumma Stealer, a rapidly evolving infostealer malware. This analysis examines its distribution methods, TTPs, infrastructure, and impact on organizations.

Mar 12, 2025
What is QR Quishing? How to Identify and Avoid QR Code Scams
Phishing Campaigns

What is QR Quishing? How to Identify and Avoid QR Code Scams

Learn how QR Quishing works, its methodologies, how to identify it, and steps to protect yourself from QR code scams.

Feb 28, 2025
January 2025 Cyber Threat Intelligence Report: Emerging Threats and Trends
Cyber Threat Intelligence

January 2025 Cyber Threat Intelligence Report: Emerging Threats and Trends

Explore January 2025’s cyber threat report: Top trends, Vulnerabilities, Malware campaigns, and Phishing fraud insights.

Feb 3, 2025
Detection Engineering: Enhancing Active Directory Security
Active Directory

Detection Engineering: Enhancing Active Directory Security

Optimize your Active Directory security with a comprehensive KQL query to monitor user account activities effectively.

Jan 30, 2025
[CVE-2025-21298]: Windows OLE Remote Code Execution Vulnerability
Threats & Vulnerabilities

[CVE-2025-21298]: Windows OLE Remote Code Execution Vulnerability

Detailed exploit analysis of the latest Windows OLE RCE vulnerability, including infection chain and attack details.

Jan 28, 2025
What is a Zero-Day Attack? How Attackers Use It in Cybersecurity
Windows Attack

What is a Zero-Day Attack? How Attackers Use It in Cybersecurity

Learn about zero-day attacks, common attack scenarios, the attack life cycle, and methodologies used by hackers.

Jan 27, 2025
LokiBot 2025: New Tactics and Technical Insights into Its Evolution
Malware Campaigns

LokiBot 2025: New Tactics and Technical Insights into Its Evolution

Discover the evolving tactics of LokiBot malware in 2025. Get technical insights & stay ahead of cybersecurity threats.

Jan 25, 2025
Who is Black Basta Ransomware? Tactics, Attacks, and Links to Conti and Other Cybercrime Groups
Malware Campaigns

Who is Black Basta Ransomware? Tactics, Attacks, and Links to Conti and Other Cybercrime Groups

Uncover the methods of Black Basta ransomware, including double extortion, its tactics, and ties to Conti threat groups.

Dec 2, 2024
New Remcos RAT Variant Targets Windows Users - How It Can Hijack Your Devices
Malware Campaigns

New Remcos RAT Variant Targets Windows Users - How It Can Hijack Your Devices

Discover how a new Remcos RAT strain can infect Windows devices and let hackers control them.

Nov 22, 2024
Understanding the Role of Encryption in Securing Network Traffic
Network Security

Understanding the Role of Encryption in Securing Network Traffic

Discover how encryption secures network traffic, safeguarding data privacy, integrity, & protection from cyber threats.

Nov 20, 2024
What is AWS? Practical 101 Series: A Beginner’s Guide to Cloud Computing
Cloud Security

What is AWS? Practical 101 Series: A Beginner’s Guide to Cloud Computing

Start your AWS journey with the Practical 101 Series—simple, hands-on guides for cloud computing beginners.

Nov 13, 2024
Rhadamanthys Malware 2024: How This Infostealer Steals Your Data and How to Protect Yourself
Malware Campaigns

Rhadamanthys Malware 2024: How This Infostealer Steals Your Data and How to Protect Yourself

Learn how the Rhadamanthys malware steals your personal and financial data - and what you can do to protect yourself from this dangerous infostealer.

Sep 16, 2024
DarkGate Malware Explained: How It Infects Your System and How to Stay Safe
Malware Campaigns

DarkGate Malware Explained: How It Infects Your System and How to Stay Safe

Learn how DarkGate Malware infects computers, what it can do, and practical steps to protect your system from this dangerous threat.

Aug 30, 2024
Malicious PowerPoint .PPAM Files: New Attack Techniques and How to Stay Safe
Malware Campaigns

Malicious PowerPoint .PPAM Files: New Attack Techniques and How to Stay Safe

Learn how attackers are spreading malicious PowerPoint (.PPAM) files and what you can do to protect your system from this serious threat.

Aug 19, 2024
Remcos RAT Technical Malware Analysis: Execution Flow, Evasion Techniques & IOCs
Malware Campaigns

Remcos RAT Technical Malware Analysis: Execution Flow, Evasion Techniques & IOCs

Explore a deep technical breakdown of Remcos RAT, including execution chain, C2 communication, persistence methods, evasion techniques, and actionable IOCs for SOC analysts and threat hunters.

Aug 7, 2024
Common Windows APIs Used in Malware and Their Functions
Malware Campaigns

Common Windows APIs Used in Malware and Their Functions

A technical overview of Windows APIs commonly abused by malware, detailing their functions and how they support execution, persistence, and evasion techniques.

Jul 31, 2024
Malware Obfuscation Techniques: Methods, Examples, and Detection Strategies
Malware Campaigns

Malware Obfuscation Techniques: Methods, Examples, and Detection Strategies

A technical guide to malware obfuscation techniques, including packing, encryption, polymorphism, and anti-analysis methods, with practical detection strategies.

Jul 29, 2024
What Is Malware Analysis? Types, Methodologies & Tools for Security Analysts
Malware Campaigns

What Is Malware Analysis? Types, Methodologies & Tools for Security Analysts

Learn what malware analysis is, the key types (static, dynamic, hybrid), common methodologies, and essential tools used to dissect and defend against malware threats.

Jul 26, 2024
Qakbot LNK Files Technical Analysis 2024: Tactics, Indicators & Defense
Malware Campaigns

Qakbot LNK Files Technical Analysis 2024: Tactics, Indicators & Defense

Explore the 2024 technical analysis of Qakbot LNK files, including execution techniques, malware behavior, indicators of compromise (IOCs), and defensive detection strategies.

Jul 15, 2024
XenoRAT Technical Analysis & Functionality Deep Dive (Part 2): LNK to MS‑XLS Evolution
Malware Campaigns

XenoRAT Technical Analysis & Functionality Deep Dive (Part 2): LNK to MS‑XLS Evolution

Explore the Part 2 technical analysis of XenoRAT, revealing how it evolved from LNK‑based distribution to MS‑XLS methods and adapted to evade AV detection.

Jul 8, 2024
XenoRAT Technical Analysis & Functionality Deep Dive (Part 1): LNK Delivery & PowerShell Evasion
Malware Campaigns

XenoRAT Technical Analysis & Functionality Deep Dive (Part 1): LNK Delivery & PowerShell Evasion

Explore Part 1 of the XenoRAT technical analysis, detailing how a new campaign uses LNK files to bypass policies and fake PowerShell execution to download malware payloads.

Jul 3, 2024
Technical Analysis of Guloader Malware Using .JAR Files: Infection Chain & Tactics
Malware Campaigns

Technical Analysis of Guloader Malware Using .JAR Files: Infection Chain & Tactics

Explore the technical analysis of Guloader malware using .JAR files, including its infection chain, execution flow, and tactics used to deliver and execute malicious payloads.

Jun 17, 2024
SocGholish Malware: Technical Exploration of Behavior, Delivery & Defenses
Malware Campaigns

SocGholish Malware: Technical Exploration of Behavior, Delivery & Defenses

Explore an in‑depth technical analysis of the SocGholish malware family, including its delivery methods, behavior patterns, indicators of compromise (IOCs), and defense strategies.

Jun 10, 2024
What Is Qakbot? An Evolutionary Case Study of the Banking Trojan
Malware Campaigns

What Is Qakbot? An Evolutionary Case Study of the Banking Trojan

Explore the origins and evolution of Qakbot, a notorious banking trojan, in this comprehensive case study examining its tactics, growth, and impact on cybersecurity.

Jun 5, 2024
How to Analyze Malicious RTF Files: Structure, Embedded Objects & Threats
Malware Campaigns

How to Analyze Malicious RTF Files: Structure, Embedded Objects & Threats

Learn how to analyze malicious RTF files by examining their structure, inspecting embedded objects, and identifying potential security threats for malware defense.

May 23, 2024
RevengeRAT: Technical Analysis and Functionality Deep Dive
Malware Campaigns

RevengeRAT: Technical Analysis and Functionality Deep Dive

Explore the technical analysis of RevengeRAT, examining its malware campaign, execution techniques, and core functionality in this in-depth study.

May 20, 2024
Understanding Sandboxes: Popular Tools for Analyzing Unknown Files
Malware Campaigns

Understanding Sandboxes: Popular Tools for Analyzing Unknown Files

Explore sandbox environments and discover popular tools used to safely analyze and dissect unknown files for malware research and threat analysis.

May 13, 2024
What Is Malware? Types, Characteristics & How to Recognize Them
Malware Campaigns

What Is Malware? Types, Characteristics & How to Recognize Them

Learn what malware is, explore its various types, and discover effective methods for recognizing and defending against these digital threats.

May 9, 2024