CyberwareHub Logo

Editor's Picks

Beware of Excel Attachments: Emotet Malware Returns in Phishing Emails
Malware Campaigns

Beware of Excel Attachments: Emotet Malware Returns in Phishing Emails

Explore the new Emotet spreads through phishing emails using Excel macros to silently install malware on victim systems.

Jul 23, 2025
New 2025 Cyber Threats: Ex-Black Basta Group Uses Microsoft Teams in Attacks
Cyber Trends

New 2025 Cyber Threats: Ex-Black Basta Group Uses Microsoft Teams in Attacks

Explore how new Black Basta hackers exploit MS Teams & Python in stealthy new cyberattacks targeting businesses in 2025.

Jun 16, 2025
AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques
Malware Campaigns

AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques

Explore how simple files are exploited to fuel advanced and sophisticated malware attacks in modern cyber threats.

Mar 25, 2025
Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files
Malware Campaigns

Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files

Understand the Coyote Banking Trojan, a growing cyber threat using LNK files to steal sensitive financial data.

Mar 14, 2025
Lumma Stealer Infostealer: TTPs, Indicators, and Detection Strategies
Malware Campaigns

Lumma Stealer Infostealer: TTPs, Indicators, and Detection Strategies

Explore the growing threat of Lumma Stealer, a rapidly evolving infostealer malware. This analysis examines its distribution methods, TTPs, infrastructure, and impact on organizations.

Mar 12, 2025
Advanced Phishing Attack Conceals JavaScript Using Invisible Unicode Trick
Phishing Campaigns

Advanced Phishing Attack Conceals JavaScript Using Invisible Unicode Trick

Discover how an advanced phishing attack hides malicious JavaScript using invisible Unicode characters to bypass detection and compromise targeted systems.

Feb 25, 2025
January 2025 Cyber Threat Intelligence Report: Emerging Threats and Trends
Cyber Threat Intelligence

January 2025 Cyber Threat Intelligence Report: Emerging Threats and Trends

Explore January 2025’s cyber threat report: Top trends, Vulnerabilities, Malware campaigns, and Phishing fraud insights.

Feb 3, 2025
Detection Engineering: Enhancing Active Directory Security
Active Directory

Detection Engineering: Enhancing Active Directory Security

Optimize your Active Directory security with a comprehensive KQL query to monitor user account activities effectively.

Jan 30, 2025
What Is a Zero-Day Attack? How Hackers Exploit Unpatched Vulnerabilities
Windows Attack

What Is a Zero-Day Attack? How Hackers Exploit Unpatched Vulnerabilities

Explore zero-day attacks in cybersecurity: understand how hackers exploit unknown vulnerabilities, common attack scenarios, the attack life cycle, and effective defense strategies.

Jan 27, 2025
LokiBot 2025: New Tactics and Technical Insights into Its Evolution
Malware Campaigns

LokiBot 2025: New Tactics and Technical Insights into Its Evolution

Discover the evolving tactics of LokiBot malware in 2025. Get technical insights & stay ahead of cybersecurity threats.

Jan 25, 2025
CVE‑2024‑38213: Microsoft Windows SmartScreen Security Feature Bypass Vulnerability Analysis
Threats & Vulnerabilities

CVE‑2024‑38213: Microsoft Windows SmartScreen Security Feature Bypass Vulnerability Analysis

An in-depth technical analysis of CVE‑2024‑38213, a Microsoft Windows SmartScreen security feature bypass vulnerability, including infection chain insights and mitigation guidance.

Dec 27, 2024
Encryption in Network Security: How It Protects Data and Prevents Cyber Threats
Network Security

Encryption in Network Security: How It Protects Data and Prevents Cyber Threats

Learn the essentials of cloud security, including best practices, services, and strategies to protect your data, applications, and cloud infrastructure from cyber threats.

Nov 20, 2024
What Is AWS? Beginner’s Guide to Amazon Web Services and Cloud Computing
Cloud Security

What Is AWS? Beginner’s Guide to Amazon Web Services and Cloud Computing

Start your cloud journey with our Practical 101 Series. Learn what AWS is, its core services, and how beginners can use Amazon Web Services for practical, hands-on cloud computing.

Nov 13, 2024
Qakbot LNK Files Technical Analysis 2024: Tactics, Indicators & Defense
Malware Campaigns

Qakbot LNK Files Technical Analysis 2024: Tactics, Indicators & Defense

Explore the 2024 technical analysis of Qakbot LNK files, including execution techniques, malware behavior, indicators of compromise (IOCs), and defensive detection strategies.

Jul 15, 2024
XenoRAT Technical Analysis & Functionality Deep Dive (Part 2): LNK to MS‑XLS Evolution
Malware Campaigns

XenoRAT Technical Analysis & Functionality Deep Dive (Part 2): LNK to MS‑XLS Evolution

Explore the Part 2 technical analysis of XenoRAT, revealing how it evolved from LNK‑based distribution to MS‑XLS methods and adapted to evade AV detection.

Jul 8, 2024
XenoRAT Technical Analysis & Functionality Deep Dive (Part 1): LNK Delivery & PowerShell Evasion
Malware Campaigns

XenoRAT Technical Analysis & Functionality Deep Dive (Part 1): LNK Delivery & PowerShell Evasion

Explore Part 1 of the XenoRAT technical analysis, detailing how a new campaign uses LNK files to bypass policies and fake PowerShell execution to download malware payloads.

Jul 3, 2024
SocGholish Malware: Technical Exploration of Behavior, Delivery & Defenses
Malware Campaigns

SocGholish Malware: Technical Exploration of Behavior, Delivery & Defenses

Explore an in‑depth technical analysis of the SocGholish malware family, including its delivery methods, behavior patterns, indicators of compromise (IOCs), and defense strategies.

Jun 10, 2024