Search blogs...

Search blogs...

Search blogs...

API - Cyberware Hub

Malware Campaigns

What are the Common APIs used in Malware?

Discover how malware uses Windows APIs to blend in with normal operations, evade detection, & perform malicious actions.

31-Jul-2024

API - Cyberware Hub

Malware Campaigns

What are the Common APIs used in Malware?

Discover how malware uses Windows APIs to blend in with normal operations, evade detection, & perform malicious actions.

31-Jul-2024

API - Cyberware Hub

Malware Campaigns

What are the Common APIs used in Malware?

Discover how malware uses Windows APIs to blend in with normal operations, evade detection, & perform malicious actions.

31-Jul-2024

Qakbot - Cyberware Hub

Malware Campaigns

Technical Analysis of Qakbot LNK Files [2024]

Delve into the latest 2024 technical analysis of Qakbot LNK files, uncovering malware tactics and defense strategies.

15-Jul-2024

Qakbot - Cyberware Hub

Malware Campaigns

Technical Analysis of Qakbot LNK Files [2024]

Delve into the latest 2024 technical analysis of Qakbot LNK files, uncovering malware tactics and defense strategies.

15-Jul-2024

Qakbot - Cyberware Hub

Malware Campaigns

Technical Analysis of Qakbot LNK Files [2024]

Delve into the latest 2024 technical analysis of Qakbot LNK files, uncovering malware tactics and defense strategies.

15-Jul-2024

XenoRAT - Cyberwarehub

Malware Campaigns

XenoRAT: Technical Analysis and Functionality Deep Dive [Part 2]

Explore how Xeno-RAT evolves from using LNK files to MS-XLS for distributing malware, adapting to evade AV detection.

08-Jul-2024

XenoRAT - Cyberwarehub

Malware Campaigns

XenoRAT: Technical Analysis and Functionality Deep Dive [Part 2]

Explore how Xeno-RAT evolves from using LNK files to MS-XLS for distributing malware, adapting to evade AV detection.

08-Jul-2024

XenoRAT - Cyberwarehub

Malware Campaigns

XenoRAT: Technical Analysis and Functionality Deep Dive [Part 2]

Explore how Xeno-RAT evolves from using LNK files to MS-XLS for distributing malware, adapting to evade AV detection.

08-Jul-2024

Guloader Malware - Cyberwarehub

Malware Campaigns

Technical Analysis of Guloader Malware Using .JAR Files

Let's explore the technical breakdown of Guloader malware and its infection chain.

17-Jun-2024

Guloader Malware - Cyberwarehub

Malware Campaigns

Technical Analysis of Guloader Malware Using .JAR Files

Let's explore the technical breakdown of Guloader malware and its infection chain.

17-Jun-2024

Guloader Malware - Cyberwarehub

Malware Campaigns

Technical Analysis of Guloader Malware Using .JAR Files

Let's explore the technical breakdown of Guloader malware and its infection chain.

17-Jun-2024

RTF Template Injection Attack - Cyberwarehub

Threats & Vulnerabilities

Technical Analysis of RTF Template Injection Attack

Let's uncover how attackers use Template Injection to embed malicious templates in RTF files, triggering RCE.

14-Jun-2024

RTF Template Injection Attack - Cyberwarehub

Threats & Vulnerabilities

Technical Analysis of RTF Template Injection Attack

Let's uncover how attackers use Template Injection to embed malicious templates in RTF files, triggering RCE.

14-Jun-2024

RTF Template Injection Attack - Cyberwarehub

Threats & Vulnerabilities

Technical Analysis of RTF Template Injection Attack

Let's uncover how attackers use Template Injection to embed malicious templates in RTF files, triggering RCE.

14-Jun-2024

SocGholish Malware

Malware Campaigns

SocGholish Malware: A Technical Exploration

Explore the SocGholish malware family's operations and defenses in this in-depth analysis.

10-Jun-2024

SocGholish Malware

Malware Campaigns

SocGholish Malware: A Technical Exploration

Explore the SocGholish malware family's operations and defenses in this in-depth analysis.

10-Jun-2024

SocGholish Malware

Malware Campaigns

SocGholish Malware: A Technical Exploration

Explore the SocGholish malware family's operations and defenses in this in-depth analysis.

10-Jun-2024

Active Directory

Active Directory

Top 10 Active Directory Attacks and their methodologies

Explore the top 10 AD attacks methods to understand the tactics used by malicious actors to compromise AD environments.

03-Jun-2024

Active Directory

Active Directory

Top 10 Active Directory Attacks and their methodologies

Explore the top 10 AD attacks methods to understand the tactics used by malicious actors to compromise AD environments.

03-Jun-2024

Active Directory

Active Directory

Top 10 Active Directory Attacks and their methodologies

Explore the top 10 AD attacks methods to understand the tactics used by malicious actors to compromise AD environments.

03-Jun-2024

How to analyze Malicious RTF Files?

Malware Campaigns

How to analyze Malicious RTF Files?

Analyzing malicious RTF files by examining their structure, inspecting embedded objects & identifying potential threats.

23-May-2024

How to analyze Malicious RTF Files?

Malware Campaigns

How to analyze Malicious RTF Files?

Analyzing malicious RTF files by examining their structure, inspecting embedded objects & identifying potential threats.

23-May-2024

How to analyze Malicious RTF Files?

Malware Campaigns

How to analyze Malicious RTF Files?

Analyzing malicious RTF files by examining their structure, inspecting embedded objects & identifying potential threats.

23-May-2024

What is RevengeRAT

Malware Campaigns

RevengeRAT: A Deep Dive into its Technical Analysis and Functionality

Explore the depths of RevengeRAT's malware campaign as we unveil its inner workings in our in-depth examination.

20-May-2024

What is RevengeRAT

Malware Campaigns

RevengeRAT: A Deep Dive into its Technical Analysis and Functionality

Explore the depths of RevengeRAT's malware campaign as we unveil its inner workings in our in-depth examination.

20-May-2024

What is RevengeRAT

Malware Campaigns

RevengeRAT: A Deep Dive into its Technical Analysis and Functionality

Explore the depths of RevengeRAT's malware campaign as we unveil its inner workings in our in-depth examination.

20-May-2024

[CVE-2024-3094]: Critical Backdoor Vulnerability

Threats & Vulnerabilities

[CVE-2024-3094]: Critical Backdoor Vulnerability found in XZ Utils which Exposes SSH to Compromise

Highlights the identification of a critical backdoor vulnerability in XZ Utils, presenting a serious security threat.

16-May-2024

[CVE-2024-3094]: Critical Backdoor Vulnerability

Threats & Vulnerabilities

[CVE-2024-3094]: Critical Backdoor Vulnerability found in XZ Utils which Exposes SSH to Compromise

Highlights the identification of a critical backdoor vulnerability in XZ Utils, presenting a serious security threat.

16-May-2024

[CVE-2024-3094]: Critical Backdoor Vulnerability

Threats & Vulnerabilities

[CVE-2024-3094]: Critical Backdoor Vulnerability found in XZ Utils which Exposes SSH to Compromise

Highlights the identification of a critical backdoor vulnerability in XZ Utils, presenting a serious security threat.

16-May-2024