SVG not supported
SVG not supported

Priyadharshini Balaji

Malware Maverick | Uncovering threats | Innovator by nature, protector by mission.

Priyadharshini Balaji

Malware Maverick | Uncovering threats | Innovator by nature, protector by mission.

Priyadharshini Balaji

Malware Maverick | Uncovering threats | Innovator by nature, protector by mission.

AsyncRAT - Cyberware Hub

Malware Campaigns

AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques

Explore how simple files are exploited to fuel advanced and sophisticated malware attacks in modern cyber threats.

24 Mar 2025

AsyncRAT - Cyberware Hub

Malware Campaigns

AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques

Explore how simple files are exploited to fuel advanced and sophisticated malware attacks in modern cyber threats.

24 Mar 2025

AsyncRAT - Cyberware Hub

Malware Campaigns

AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques

Explore how simple files are exploited to fuel advanced and sophisticated malware attacks in modern cyber threats.

24 Mar 2025

Coyote Banking Trojan - Cyberware Hub

Malware Campaigns

Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files

Understand the Coyote Banking Trojan, a growing cyber threat using LNK files to steal sensitive financial data.

14 Mar 2025

Coyote Banking Trojan - Cyberware Hub

Malware Campaigns

Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files

Understand the Coyote Banking Trojan, a growing cyber threat using LNK files to steal sensitive financial data.

14 Mar 2025

Coyote Banking Trojan - Cyberware Hub

Malware Campaigns

Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files

Understand the Coyote Banking Trojan, a growing cyber threat using LNK files to steal sensitive financial data.

14 Mar 2025

Lumma Stealer - Cyberware Hub

Malware Campaigns

Lumma Stealer: A Deep Dive into the Growing Malware Family

Explore the expanding threat of this malware family in our deep dive analysis, uncovering their tactics and impact.

12 Mar 2025

Lumma Stealer - Cyberware Hub

Malware Campaigns

Lumma Stealer: A Deep Dive into the Growing Malware Family

Explore the expanding threat of this malware family in our deep dive analysis, uncovering their tactics and impact.

12 Mar 2025

Lumma Stealer - Cyberware Hub

Malware Campaigns

Lumma Stealer: A Deep Dive into the Growing Malware Family

Explore the expanding threat of this malware family in our deep dive analysis, uncovering their tactics and impact.

12 Mar 2025

QR Quishing - Cyberware Hub

Phishing Campaigns

What is QR Quishing? How to Identify and Avoid QR Code Scams

Learn how QR Quishing works, its methodologies, how to identify it, and steps to protect yourself from QR code scams.

28 Feb 2025

QR Quishing - Cyberware Hub

Phishing Campaigns

What is QR Quishing? How to Identify and Avoid QR Code Scams

Learn how QR Quishing works, its methodologies, how to identify it, and steps to protect yourself from QR code scams.

28 Feb 2025

QR Quishing - Cyberware Hub

Phishing Campaigns

What is QR Quishing? How to Identify and Avoid QR Code Scams

Learn how QR Quishing works, its methodologies, how to identify it, and steps to protect yourself from QR code scams.

28 Feb 2025

Detection Engineering - Cyberware Hub

Active Directory

Detection Engineering: Enhancing Active Directory Security

Optimize your Active Directory security with a comprehensive KQL query to monitor user account activities effectively.

30 Jan 2025

Detection Engineering - Cyberware Hub

Active Directory

Detection Engineering: Enhancing Active Directory Security

Optimize your Active Directory security with a comprehensive KQL query to monitor user account activities effectively.

30 Jan 2025

Detection Engineering - Cyberware Hub

Active Directory

Detection Engineering: Enhancing Active Directory Security

Optimize your Active Directory security with a comprehensive KQL query to monitor user account activities effectively.

30 Jan 2025

LokiBot - Cyberware Hub

Malware Campaigns

LokiBot 2025: New Tactics and Technical Insights into Its Evolving Malware

Discover the evolving tactics of LokiBot malware in 2025. Get technical insights & stay ahead of cybersecurity threats.

29 Jan 2025

LokiBot - Cyberware Hub

Malware Campaigns

LokiBot 2025: New Tactics and Technical Insights into Its Evolving Malware

Discover the evolving tactics of LokiBot malware in 2025. Get technical insights & stay ahead of cybersecurity threats.

29 Jan 2025

LokiBot - Cyberware Hub

Malware Campaigns

LokiBot 2025: New Tactics and Technical Insights into Its Evolving Malware

Discover the evolving tactics of LokiBot malware in 2025. Get technical insights & stay ahead of cybersecurity threats.

29 Jan 2025

Rhadamanthys - Cyberware Hub

Malware Campaigns

Rhadamanthys Malware Analysis: Detailed Breakdown of the Latest Stealer Campaign

Explore Rhadamanthys, a sophisticated malware targeting sensitive data, such as credentials and financial info.

16 Sept 2024

Rhadamanthys - Cyberware Hub

Malware Campaigns

Rhadamanthys Malware Analysis: Detailed Breakdown of the Latest Stealer Campaign

Explore Rhadamanthys, a sophisticated malware targeting sensitive data, such as credentials and financial info.

16 Sept 2024

Rhadamanthys - Cyberware Hub

Malware Campaigns

Rhadamanthys Malware Analysis: Detailed Breakdown of the Latest Stealer Campaign

Explore Rhadamanthys, a sophisticated malware targeting sensitive data, such as credentials and financial info.

16 Sept 2024

Darkgate - Cyberware Hub

Malware Campaigns

Exploring DarkGate Malware: How it Infects Systems and its Full Capabilities

Discover how DarkGate Malware infects systems, its advanced capabilities, and the tactics it uses to evade detection.

30 Aug 2024

Darkgate - Cyberware Hub

Malware Campaigns

Exploring DarkGate Malware: How it Infects Systems and its Full Capabilities

Discover how DarkGate Malware infects systems, its advanced capabilities, and the tactics it uses to evade detection.

30 Aug 2024

Darkgate - Cyberware Hub

Malware Campaigns

Exploring DarkGate Malware: How it Infects Systems and its Full Capabilities

Discover how DarkGate Malware infects systems, its advanced capabilities, and the tactics it uses to evade detection.

30 Aug 2024