Priyadharshini K B
Malware Maverick | Uncovering threats | Innovator by nature, protector by mission.
Cyber Trends
Priyadharshini K BAug 11, 2025
Malware Campaigns
Beware of Excel Attachments: Emotet Malware Returns in Phishing Emails
Priyadharshini K BJul 23, 2025
Cyber Trends
New 2025 Cyber Threats: Ex-Black Basta Group Uses Microsoft Teams in Attacks
Priyadharshini K BJun 16, 2025
Malware Campaigns
AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques
Priyadharshini K BMar 25, 2025
Malware Campaigns
Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files
Priyadharshini K BMar 14, 2025
Malware Campaigns
Lumma Stealer Infostealer: TTPs, Indicators, and Detection Strategies
Priyadharshini K BMar 12, 2025
Threats & Vulnerabilities
[CVE-2025-21298]: Windows OLE Remote Code Execution Vulnerability
Priyadharshini K BJan 28, 2025
Malware Campaigns
LokiBot 2025: New Tactics and Technical Insights into Its Evolution
Priyadharshini K BJan 25, 2025
Threats & Vulnerabilities
CVE‑2024‑38213: Microsoft Windows SmartScreen Security Feature Bypass Vulnerability Analysis
Priyadharshini K BDec 27, 2024
Malware Campaigns
Who is Black Basta Ransomware? Tactics, Attacks, and Links to Conti and Other Cybercrime Groups
Priyadharshini K BDec 2, 2024
Malware Campaigns
New Remcos RAT Variant Targets Windows Users - How It Can Hijack Your Devices
Priyadharshini K BNov 22, 2024
Malware Campaigns
Rhadamanthys Malware 2024: How This Infostealer Steals Your Data and How to Protect Yourself
Priyadharshini K BSep 16, 2024
Threats & Vulnerabilities
CVE‑2021‑44228: Apache Log4j Remote Code Execution Vulnerability Analysis
Priyadharshini K BSep 4, 2024
Malware Campaigns
DarkGate Malware Explained: How It Infects Your System and How to Stay Safe
Priyadharshini K BAug 30, 2024
Threats & Vulnerabilities
CVE‑2024‑21412: Critical Windows SmartScreen Vulnerability Allowing Malware Execution
Priyadharshini K BAug 23, 2024
Malware Campaigns
Malicious PowerPoint .PPAM Files: New Attack Techniques and How to Stay Safe
Priyadharshini K BAug 19, 2024
Threats & Vulnerabilities
CVE‑2017‑8570: Microsoft Office Remote Code Execution Vulnerability Analysis
Priyadharshini K BAug 12, 2024
Malware Campaigns
Remcos RAT Technical Malware Analysis: Execution Flow, Evasion Techniques & IOCs
Priyadharshini K BAug 7, 2024
Malware Campaigns
Qakbot LNK Files Technical Analysis 2024: Tactics, Indicators & Defense
Priyadharshini K BJul 15, 2024
Malware Campaigns
XenoRAT Technical Analysis & Functionality Deep Dive (Part 2): LNK to MS‑XLS Evolution
Priyadharshini K BJul 8, 2024
Malware Campaigns
XenoRAT Technical Analysis & Functionality Deep Dive (Part 1): LNK Delivery & PowerShell Evasion
Priyadharshini K BJul 3, 2024
Malware Campaigns
Technical Analysis of Guloader Malware Using .JAR Files: Infection Chain & Tactics
Priyadharshini K BJun 17, 2024
Threats & Vulnerabilities
Technical Analysis of RTF Template Injection Attacks
Priyadharshini K BJun 14, 2024
Malware Campaigns
SocGholish Malware: Technical Exploration of Behavior, Delivery & Defenses
Priyadharshini K BJun 10, 2024
Threats & Vulnerabilities
CVE‑2017‑0199: Microsoft Office & WordPad Remote Code Execution Vulnerability Analysis
Priyadharshini K BMay 30, 2024
Threats & Vulnerabilities
CVE‑2017‑11882: Microsoft Office Memory Corruption Vulnerability Analysis
Priyadharshini K BMay 27, 2024
Malware Campaigns
How to Analyze Malicious RTF Files: Structure, Embedded Objects & Threats
Priyadharshini K BMay 23, 2024
Malware Campaigns
RevengeRAT: Technical Analysis and Functionality Deep Dive
Priyadharshini K BMay 20, 2024
Threats & Vulnerabilities
CVE-2024-3094: Critical XZ Utils Backdoor Vulnerability Exposing SSH
Priyadharshini K BMay 16, 2024







![[CVE-2025-21298]: Windows OLE Remote Code Execution Vulnerability](/_next/image?url=https%3A%2F%2Fcdn.sanity.io%2Fimages%2F51r0411t%2Fproduction%2Fac4531cc01acaa6b21b2aa35e3035e74e583a45a-1920x1080.png%3Fw%3D800%26h%3D450&w=3840&q=75)





















