Editor's Picks
Explore our blog to discover industry insights, and the latest trends.
Editor's Picks
Explore our blog to discover industry insights, and the latest trends.
Editor's Picks
Explore our blog to discover industry insights, and the latest trends.
Search blogs...
Search blogs...
Search blogs...

Malware Campaigns
Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files
Understand the Coyote Banking Trojan, a growing cyber threat using LNK files to steal sensitive financial data.
14 Mar 2025

Malware Campaigns
Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files
Understand the Coyote Banking Trojan, a growing cyber threat using LNK files to steal sensitive financial data.
14 Mar 2025

Malware Campaigns
Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files
Understand the Coyote Banking Trojan, a growing cyber threat using LNK files to steal sensitive financial data.
14 Mar 2025

Malware Campaigns
Lumma Stealer: A Deep Dive into the Growing Malware Family
Explore the expanding threat of this malware family in our deep dive analysis, uncovering their tactics and impact.
12 Mar 2025

Malware Campaigns
Lumma Stealer: A Deep Dive into the Growing Malware Family
Explore the expanding threat of this malware family in our deep dive analysis, uncovering their tactics and impact.
12 Mar 2025

Malware Campaigns
Lumma Stealer: A Deep Dive into the Growing Malware Family
Explore the expanding threat of this malware family in our deep dive analysis, uncovering their tactics and impact.
12 Mar 2025

Cyber Trends
Salt Typhoon: Exposing the Advanced Cyberattack on U.S. Telecom Networks
Learn how Chinese hackers deploy custom malware to target and infiltrate U.S. telecommunication networks.
23 Feb 2025

Cyber Trends
Salt Typhoon: Exposing the Advanced Cyberattack on U.S. Telecom Networks
Learn how Chinese hackers deploy custom malware to target and infiltrate U.S. telecommunication networks.
23 Feb 2025

Cyber Trends
Salt Typhoon: Exposing the Advanced Cyberattack on U.S. Telecom Networks
Learn how Chinese hackers deploy custom malware to target and infiltrate U.S. telecommunication networks.
23 Feb 2025

Cyber Trends
Exploited 7-Zip MotW Bypass Leads to Zero-Day Attacks Against Ukraine
Explore the latest exploit involving a 7-Zip Mark of the Web (MotW) bypass, which is leading to zero-day attacks.
11 Feb 2025

Cyber Trends
Exploited 7-Zip MotW Bypass Leads to Zero-Day Attacks Against Ukraine
Explore the latest exploit involving a 7-Zip Mark of the Web (MotW) bypass, which is leading to zero-day attacks.
11 Feb 2025

Cyber Trends
Exploited 7-Zip MotW Bypass Leads to Zero-Day Attacks Against Ukraine
Explore the latest exploit involving a 7-Zip Mark of the Web (MotW) bypass, which is leading to zero-day attacks.
11 Feb 2025

Cyber Threat Intelligence
January 2025 Cyber Threat Intelligence Report: Emerging Threats and Trends
Explore January 2025’s cyber threat report: Top trends, Vulnerabilities, Malware campaigns, and Phishing fraud insights.
3 Feb 2025

Cyber Threat Intelligence
January 2025 Cyber Threat Intelligence Report: Emerging Threats and Trends
Explore January 2025’s cyber threat report: Top trends, Vulnerabilities, Malware campaigns, and Phishing fraud insights.
3 Feb 2025

Cyber Threat Intelligence
January 2025 Cyber Threat Intelligence Report: Emerging Threats and Trends
Explore January 2025’s cyber threat report: Top trends, Vulnerabilities, Malware campaigns, and Phishing fraud insights.
3 Feb 2025

Active Directory
Detection Engineering: Enhancing Active Directory Security
Optimize your Active Directory security with a comprehensive KQL query to monitor user account activities effectively.
30 Jan 2025

Active Directory
Detection Engineering: Enhancing Active Directory Security
Optimize your Active Directory security with a comprehensive KQL query to monitor user account activities effectively.
30 Jan 2025

Active Directory
Detection Engineering: Enhancing Active Directory Security
Optimize your Active Directory security with a comprehensive KQL query to monitor user account activities effectively.
30 Jan 2025

Malware Campaigns
LokiBot 2025: New Tactics and Technical Insights into Its Evolving Malware
Discover the evolving tactics of LokiBot malware in 2025. Get technical insights & stay ahead of cybersecurity threats.
29 Jan 2025

Malware Campaigns
LokiBot 2025: New Tactics and Technical Insights into Its Evolving Malware
Discover the evolving tactics of LokiBot malware in 2025. Get technical insights & stay ahead of cybersecurity threats.
29 Jan 2025

Malware Campaigns
LokiBot 2025: New Tactics and Technical Insights into Its Evolving Malware
Discover the evolving tactics of LokiBot malware in 2025. Get technical insights & stay ahead of cybersecurity threats.
29 Jan 2025

Cyber Trends
Linux Malware: XorBot Returns with Advanced Tactics
Learn and explore XorBot malware, part of a botnet, infecting machines for various malicious activities.
21 Jan 2025

Cyber Trends
Linux Malware: XorBot Returns with Advanced Tactics
Learn and explore XorBot malware, part of a botnet, infecting machines for various malicious activities.
21 Jan 2025

Cyber Trends
Linux Malware: XorBot Returns with Advanced Tactics
Learn and explore XorBot malware, part of a botnet, infecting machines for various malicious activities.
21 Jan 2025

Threats & Vulnerabilities
[CVE-2024-38213]: Microsoft Windows SmartScreen Security Feature Bypass Vulnerability
Discover detailed exploit analysis of the latest Windows SmartScreen vulnerability, infection chain, and attack details.
27 Dec 2024

Threats & Vulnerabilities
[CVE-2024-38213]: Microsoft Windows SmartScreen Security Feature Bypass Vulnerability
Discover detailed exploit analysis of the latest Windows SmartScreen vulnerability, infection chain, and attack details.
27 Dec 2024

Threats & Vulnerabilities
[CVE-2024-38213]: Microsoft Windows SmartScreen Security Feature Bypass Vulnerability
Discover detailed exploit analysis of the latest Windows SmartScreen vulnerability, infection chain, and attack details.
27 Dec 2024

Cloud Security
What is AWS? Practical 101 Series: A Beginner’s Guide to Cloud Computing
Start your AWS journey with the Practical 101 Series—simple, hands-on guides for cloud computing beginners.
13 Dec 2024

Cloud Security
What is AWS? Practical 101 Series: A Beginner’s Guide to Cloud Computing
Start your AWS journey with the Practical 101 Series—simple, hands-on guides for cloud computing beginners.
13 Dec 2024

Cloud Security
What is AWS? Practical 101 Series: A Beginner’s Guide to Cloud Computing
Start your AWS journey with the Practical 101 Series—simple, hands-on guides for cloud computing beginners.
13 Dec 2024

Malware Campaigns
New Remcos Variant Exploits ISO Images to Gain Remote Control of Devices
Explore a new Remcos variant that uses an ISO image to create a backdoor for remote control of compromised devices.
22 Nov 2024

Malware Campaigns
New Remcos Variant Exploits ISO Images to Gain Remote Control of Devices
Explore a new Remcos variant that uses an ISO image to create a backdoor for remote control of compromised devices.
22 Nov 2024

Malware Campaigns
New Remcos Variant Exploits ISO Images to Gain Remote Control of Devices
Explore a new Remcos variant that uses an ISO image to create a backdoor for remote control of compromised devices.
22 Nov 2024

Malware Campaigns
Remcos: In-Depth Technical Malware Analysis
Learn about Remcos, a Remote Access Trojan that creates a backdoor, allowing remote control over the compromised device.
7 Aug 2024

Malware Campaigns
Remcos: In-Depth Technical Malware Analysis
Learn about Remcos, a Remote Access Trojan that creates a backdoor, allowing remote control over the compromised device.
7 Aug 2024

Malware Campaigns
Remcos: In-Depth Technical Malware Analysis
Learn about Remcos, a Remote Access Trojan that creates a backdoor, allowing remote control over the compromised device.
7 Aug 2024

Malware Campaigns
What are the Common APIs used in Malware?
Discover how malware uses Windows APIs to blend in with normal operations, evade detection, & perform malicious actions.
31 Jul 2024

Malware Campaigns
What are the Common APIs used in Malware?
Discover how malware uses Windows APIs to blend in with normal operations, evade detection, & perform malicious actions.
31 Jul 2024

Malware Campaigns
What are the Common APIs used in Malware?
Discover how malware uses Windows APIs to blend in with normal operations, evade detection, & perform malicious actions.
31 Jul 2024

Malware Campaigns
Technical Analysis of Qakbot LNK Files [2024]
Delve into the latest 2024 technical analysis of Qakbot LNK files, uncovering malware tactics and defense strategies.
15 Jul 2024

Malware Campaigns
Technical Analysis of Qakbot LNK Files [2024]
Delve into the latest 2024 technical analysis of Qakbot LNK files, uncovering malware tactics and defense strategies.
15 Jul 2024

Malware Campaigns
Technical Analysis of Qakbot LNK Files [2024]
Delve into the latest 2024 technical analysis of Qakbot LNK files, uncovering malware tactics and defense strategies.
15 Jul 2024

Malware Campaigns
XenoRAT: Technical Analysis and Functionality Deep Dive [Part 2]
Explore how Xeno-RAT evolves from using LNK files to MS-XLS for distributing malware, adapting to evade AV detection.
8 Jul 2024

Malware Campaigns
XenoRAT: Technical Analysis and Functionality Deep Dive [Part 2]
Explore how Xeno-RAT evolves from using LNK files to MS-XLS for distributing malware, adapting to evade AV detection.
8 Jul 2024

Malware Campaigns
XenoRAT: Technical Analysis and Functionality Deep Dive [Part 2]
Explore how Xeno-RAT evolves from using LNK files to MS-XLS for distributing malware, adapting to evade AV detection.
8 Jul 2024

Malware Campaigns
Technical Analysis of Guloader Malware Using .JAR Files
Let's explore the technical breakdown of Guloader malware and its infection chain.
17 Jun 2024

Malware Campaigns
Technical Analysis of Guloader Malware Using .JAR Files
Let's explore the technical breakdown of Guloader malware and its infection chain.
17 Jun 2024

Malware Campaigns
Technical Analysis of Guloader Malware Using .JAR Files
Let's explore the technical breakdown of Guloader malware and its infection chain.
17 Jun 2024

Threats & Vulnerabilities
Technical Analysis of RTF Template Injection Attack
Let's uncover how attackers use Template Injection to embed malicious templates in RTF files, triggering RCE.
14 Jun 2024

Threats & Vulnerabilities
Technical Analysis of RTF Template Injection Attack
Let's uncover how attackers use Template Injection to embed malicious templates in RTF files, triggering RCE.
14 Jun 2024

Threats & Vulnerabilities
Technical Analysis of RTF Template Injection Attack
Let's uncover how attackers use Template Injection to embed malicious templates in RTF files, triggering RCE.
14 Jun 2024

Malware Campaigns
SocGholish Malware: A Technical Exploration
Explore the SocGholish malware family's operations and defenses in this in-depth analysis.
10 Jun 2024

Malware Campaigns
SocGholish Malware: A Technical Exploration
Explore the SocGholish malware family's operations and defenses in this in-depth analysis.
10 Jun 2024

Malware Campaigns
SocGholish Malware: A Technical Exploration
Explore the SocGholish malware family's operations and defenses in this in-depth analysis.
10 Jun 2024

Active Directory
Top 10 Active Directory Attacks and their methodologies
Explore the top 10 AD attacks methods to understand the tactics used by malicious actors to compromise AD environments.
3 Jun 2024

Active Directory
Top 10 Active Directory Attacks and their methodologies
Explore the top 10 AD attacks methods to understand the tactics used by malicious actors to compromise AD environments.
3 Jun 2024

Active Directory
Top 10 Active Directory Attacks and their methodologies
Explore the top 10 AD attacks methods to understand the tactics used by malicious actors to compromise AD environments.
3 Jun 2024

Malware Campaigns
How to analyze Malicious RTF Files?
Analyzing malicious RTF files by examining their structure, inspecting embedded objects & identifying potential threats.
23 May 2024

Malware Campaigns
How to analyze Malicious RTF Files?
Analyzing malicious RTF files by examining their structure, inspecting embedded objects & identifying potential threats.
23 May 2024

Malware Campaigns
How to analyze Malicious RTF Files?
Analyzing malicious RTF files by examining their structure, inspecting embedded objects & identifying potential threats.
23 May 2024

Malware Campaigns
RevengeRAT: A Deep Dive into its Technical Analysis and Functionality
Explore the depths of RevengeRAT's malware campaign as we unveil its inner workings in our in-depth examination.
20 May 2024

Malware Campaigns
RevengeRAT: A Deep Dive into its Technical Analysis and Functionality
Explore the depths of RevengeRAT's malware campaign as we unveil its inner workings in our in-depth examination.
20 May 2024

Malware Campaigns
RevengeRAT: A Deep Dive into its Technical Analysis and Functionality
Explore the depths of RevengeRAT's malware campaign as we unveil its inner workings in our in-depth examination.
20 May 2024
![[CVE-2024-3094]: Critical Backdoor Vulnerability](https://framerusercontent.com/images/FJiq4rccsQvGN4Fj4CyYtsRD3I4.png)
Threats & Vulnerabilities
[CVE-2024-3094]: Critical Backdoor Vulnerability found in XZ Utils which Exposes SSH to Compromise
Highlights the identification of a critical backdoor vulnerability in XZ Utils, presenting a serious security threat.
16 May 2024
![[CVE-2024-3094]: Critical Backdoor Vulnerability](https://framerusercontent.com/images/FJiq4rccsQvGN4Fj4CyYtsRD3I4.png)
Threats & Vulnerabilities
[CVE-2024-3094]: Critical Backdoor Vulnerability found in XZ Utils which Exposes SSH to Compromise
Highlights the identification of a critical backdoor vulnerability in XZ Utils, presenting a serious security threat.
16 May 2024
![[CVE-2024-3094]: Critical Backdoor Vulnerability](https://framerusercontent.com/images/FJiq4rccsQvGN4Fj4CyYtsRD3I4.png)
Threats & Vulnerabilities
[CVE-2024-3094]: Critical Backdoor Vulnerability found in XZ Utils which Exposes SSH to Compromise
Highlights the identification of a critical backdoor vulnerability in XZ Utils, presenting a serious security threat.
16 May 2024
Blogs
Cybersecurity 101
Tools
Cyber Community
Cyberware Hub © 2024
Blogs
Cybersecurity 101
Tools
Cyber Community
Cyberware Hub © 2024