SIEM as a Service
Banking Trojan Grandoreiro

How Banking Trojan Grandoreiro is Evolving Tactics To Attack Victims in LATAM 

A new wave of phishing emails is sweeping across Latin America, and once again, Grandoreiro is behind it. This banking trojan is no newcomer; it's been active for years, evolving steadily into a more...
NCSC Warns of MOONSHINE & BADBAZAAR Malware

NCSC Warns of MOONSHINE & BADBAZAAR Malware Attacking Mobile Devices Worldwide

The UK's National Cyber Security Centre (NCSC) and international partners have issued urgent advisories warning about sophisticated spyware targeting specific communities globally.  The malware variants, identified as MOONSHINE and BADBAZAAR, are being deployed in surveillance...

Windows CLFS Zero-Day Vulnerability Actively Exploited by Ransomware Group

A critical zero-day vulnerability in the Windows Common Log File System (CLFS) has been uncovered and is being actively exploited by a ransomware group. The vulnerability Tracked as CVE-2025-29824, this elevation of privilege flaw has...

Hackers Exploiting Windows .RDP Files For Rogue Remote Desktop Connections

In a sophisticated espionage campaign targeting European government and military institutions, hackers believed to be connected with Russian state actors have been utilizing a lesser-known feature of Windows Remote Desktop Protocol (RDP) to infiltrate...
Sakura RAT Published

New Sakura RAT Emerges on GitHub, Successfully Evading AV & EDR Protections

A new Remote Access Trojan (RAT) called Sakura has been published on GitHub. Due to its sophisticated anti-detection capabilities and comprehensive system control features, Sakura is raising significant concerns in the cybersecurity community. The malware,...
Best Password Managers

Top 10 Best Password Managers in 2025

Password managers help to securely store and manage passwords, enhancing security and simplifying access across various platforms. Top password management solutions make password protection easy and effective for online security. These solutions securely store your...
Hackers Leveraging Fast Flux

Hackers Leveraging Fast Flux Technique to Evade Detection & Hide Malicious Servers

CISA warns of threat actors' increasing adoption of the fast flux technique to evade detection and conceal malicious server infrastructures. As cybercriminal operations grow increasingly sophisticated, threat actors adopt advanced techniques like fast flux to mask malicious...
SnowDog RAT

Threat Actors Allegedly Selling SnowDog RAT Malware With Control Panel on Hacker Forums

A new Remote Access Trojan (RAT) dubbed "SnowDog RAT” is malicious software purportedly marketed for $300 per month. It appears to have been specifically developed for corporate espionage and targeted attacks on business environments.  The...
Golang Malware

GoResolver – A New Tool to Analyze Golang Malware & Extract Obfuscated Functions

GoResolver, a ground-breaking open-source tool, was unveiled to address one of the most persistent issues in malware analysis: deobfuscating Golang binaries.  Developed by Volexity, this innovative solution employs control-flow graph similarity techniques to recover obfuscated...
Fileless Malware

How Fileless Malware Works? – Analysis of Real Samples

You might think that catching malware is all about spotting shady files on your system. But what if there’s no file to find and the entire attack happens in the background, without leaving a...
SIEM as a Service

Recent Posts