Uncategorized

THREAT ADVISORY: Zero-Day Vulnerabilities Detected on WinRAR

Zero-day vulnerabilities represent an imminent threat to cybersecurity, and in this case, two such vulnerabilities, CVE-2023-38831 and CVE-2023-40477,…

Mallox Ransomware Strikes Unsecured MSSQL Servers

Introduction: First observed in the middle of 2021, ‘Mallox’ Ransomware has emerged as a formidable threat in the…

DarkRace Ransomware: A Deep Dive into its Techniques and Impact

As cyber threats continue to evolve, a new ransomware has been discovered bearing unmistakable similarities to another well-known…

Ethical Web Scraping and Crawling: Navigating the Digital World Responsibly

The wealth of data available on the internet and the infinite potential that it has to offer requires…

White Snake Menace: The Growing Threat of Information Stealers in the Cybercrime Landscape

Introduction The rise of malicious software designed to steal sensitive information has become a significant problem in the…

What is Anti-Virus Software? And Do I really need it ?

If you’re still pondering over these questions, here’s the scoop: yes, you definitely need an antivirus, and we…

Expiro: Old Virus Poses a New Challenge

A recent virus infection faced by some users was swiftly detected as being caused by Expiro. We have…

Your Office Document is at Risk – XLL, A New Attack Vector

  Microsoft Office documents are used worldwide by both corporates and home-users alike.  It’s different office versions, whether…

UAC Bypass Using CMSTP

With Ransomware attacks surging dramatically over the past year, and reports pegging it as 25% of the total…

UAC (User Account Control) BYPASS USING CMSTP

AsyncRAT Analysis with ChatGPT

  As cyber threats continue to evolve and become more sophisticated, it’s crucial for security researchers and professionals…

AsyncRAT