top of page
All Posts


Mastering Web Application Penetration Testing Services
In today’s digital landscape, the security of web applications is paramount. Cyber threats evolve rapidly, and businesses must stay ahead to protect sensitive data and maintain trust. Mastering penetration testing services is a critical step in identifying vulnerabilities before attackers exploit them. This post will guide you through the essentials of web application penetration testing, offering practical insights to strengthen your security posture. Understanding Penetrati

Syafiq S
2 days ago3 min read


🎧 When Smart Devices Listen Back: Redmi Buds Vulnerability Exposes Users to Tracking and Eavesdropping
Wireless earbuds have become everyday essentials. From work calls and online meetings to personal conversations, devices like Xiaomi Redmi Buds are trusted to handle sensitive audio data seamlessly. But recent security research shows that this trust may be misplaced. In early 2026, multiple security researchers disclosed a set of vulnerabilities affecting Redmi Buds and similar Bluetooth earbuds , revealing that attackers could exploit weaknesses in Bluetooth pairing and com

Syafiq S
Jan 223 min read


When Virtual Machine Boundaries Fail: Understanding the Risks
The Rise of Virtualization in IT Virtualization is foundational in modern IT. It hosts hundreds or thousands of services on a single physical platform. VMware’s ESXi hypervisor is one of the most widely used in enterprise, cloud, and hosted environments. Its core promise is strong isolation between virtual machines. This isolation ensures that a compromise inside a VM does not translate into control of the host. However, in early 2026, researchers revealed a highly sophistica

Syafiq S
Jan 123 min read


KimWolf Botnet: Over 2 Million Android & IoT Devices at Risk
Introduction: The Growing Threat of IoT & Android Botnets In today’s hyperconnected world, the proliferation of Android devices, smart TVs, and IoT appliances has created new opportunities for cybercriminals. The KimWolf botnet is the latest example of a large-scale threat exploiting these vulnerabilities. Reported in early 2026, this botnet has infected over 2 million devices globally , leveraging Android smartphones, Android TV boxes, and other IoT systems to expand its re

Syafiq S
Jan 62 min read


Nissan Customer Data Exposed in Red Hat GitLab Breach: A Supply Chain Wake-Up Call
Third-party risks have become a recurring concern in cybersecurity. Organizations often invest heavily in securing their own systems, but vulnerabilities at trusted vendors can directly impact client data. Today, Nissan Motor Co., Ltd. faces such a scenario. In late 2025, Red Hat, a leading provider of enterprise open-source software solutions, discovered unauthorized access to its GitLab infrastructure , which manages development and customer systems for clients including Ni

Syafiq S
Dec 23, 20253 min read


Prince of Persia: Iranian APT Resurfaces with Sophisticated Espionage Malware
Introduction / Background The Iranian advanced persistent threat (APT) group known as Prince of Persia , also tracked as Infy , has re-emerged after several years of perceived dormancy. Active since at least 2004, Prince of Persia is one of Iran’s earliest state-aligned cyber units, focused on long-term intelligence collection rather than financial gain. Although disruption efforts around 2021–2022 suggested dormancy, recent reporting confirms that the group quietly continued

Syafiq S
Dec 22, 20253 min read


AMOS Infostealer: Exploiting AI-driven Social Engineering for macOS Data Theft
In the digital age, malware threats are constantly evolving, leveraging new tactics and technologies to compromise unsuspecting users. One such emerging threat is the AMOS Infostealer , a sophisticated piece of malware that specifically targets macOS devices. Unlike traditional malware that relies on exploiting vulnerabilities, AMOS uses AI-driven social engineering tactics to deceive victims, making it a new breed of cyber threat. This malware campaign highlights a growing

Syafiq S
Dec 11, 20254 min read


DroidLock Malware Campaign: A Ransomware Attack Targeting Android Devices
In the world of mobile cybersecurity, Android devices have long been a target for cybercriminals. However, a new threat has emerged that takes mobile malware to the next level. Enter DroidLock , a highly sophisticated malware strain that combines the tactics of ransomware with the ability to remotely control Android devices . Unlike many traditional threats that only steal data or lock files, DroidLock takes things further by hijacking devices completely, locking users out,

Syafiq S
Dec 11, 20254 min read


GoldFactory’s Banking Trojan Campaign: Targeting Southeast Asia’s Financial Sector
Introduction In December 2025, the cybercrime group known as GoldFactory launched a widespread malware campaign targeting financial institutions across Southeast Asia. The group’s main weapon is a modified version of banking Trojan malware which infected thousands of mobile users in countries like Indonesia, Thailand, and Vietnam. The malware was cleverly disguised as legitimate banking apps, making it difficult for users to identify the threats. This article explores the bac

Syafiq S
Dec 5, 20254 min read


Record-Breaking 29.7 Tbps DDoS Attack: IoT Botnet Exploitation and Mitigation Strategies
Introduction In December 2025, a massive Distributed Denial of Service (DDoS) attack shook global internet infrastructure, achieving an unprecedented peak of 29.7 Tbps. This attack, attributed to the Aisuru botnet, leveraged a vast network of compromised Internet of Things (IoT) devices. The botnet utilized advanced amplification techniques to overwhelm its targets, leaving behind significant disruption. In this article, we will examine the background of the attack, its impa

Syafiq S
Dec 4, 20254 min read


Bloody Wolf Campaign: Java-Based Deliveries of NetSupport RAT, A Growing Threat in Central Asia
Introduction / Background Since at least late 2023, the threat actor known as Bloody Wolf has been active — initially observed targeting organisations in Kazakhstan and Russia using tools such as STRRAT and NetSupport RAT. In mid-2025, researchers from Group-IB (in collaboration with local state enterprise UKUK) uncovered a renewed campaign: spear-phishing attacks against government, financial, and IT sectors, starting in Kyrgyzstan and — by October 2025 — expanding into Uzbe

Syafiq S
Dec 1, 20254 min read


Triofox Trouble: A Deep Dive into the UNC6485 Exploit Adventure
Cybersecurity has taken a front-row seat again with the recent discovery of a dangerous exploit in the Triofox platform. Google's Mandiant Threat Defense has unearthed a flaw giving cyber attackers dangerous levels of access to companies worldwide. Here’s what you need to know about these cunning digital pirates and their schemes. Unpacking the Attack The Triofox vulnerability, labeled CVE-2025-12480, is a gaping security hole that allows attackers to slip past defenses as if

Syafiq S
Nov 14, 20252 min read


CL0P Exploits Oracle E-Business Suite Zero-Day: What You Need to Know
Hey everyone, cybersecurity enthusiasts and tech defenders! A new campaign is making headlines, and this time, Oracle E-Business Suite (EBS) is the main target. The CL0P ransomware group has been exploiting a critical zero-day vulnerability (CVE-2025-61882) in Oracle EBS to steal data and launch extortion attacks against global organizations. What Happened The campaign started in mid-2025, when attackers began using multiple flaws in Oracle EBS to gain access to sensitive bus
MUHAMMAD ADIB
Oct 14, 20252 min read


Sneaky XCSSET Malware Alert: A New Threat to Xcode Developers
Hey there, tech enthusiasts and cybersecurity aficionados! If you’re developing apps on a Mac, there’s an emerging digital threat you...

Syafiq S
Oct 9, 20252 min read


Unmasking the Bitcoin Queen: A Journey from Fraud to Justice
What happens when a cunning fraudulent scheme collides with sophisticated cyber sleuthing? In an unprecedented turn of events, the UK's...

Syafiq S
Oct 9, 20252 min read


The Perfect Cloud Heist: Microsoft Entra ID Actor Token Exploit Explained
On July 14, 2025 a critical Entra ID vulnerability (CVE-2025-55241, CVSS 10.0) was disclosed that allowed cross-tenant impersonation...

Syafiq S
Sep 23, 20253 min read


$130M Real-Time Payment Fraud Attempt via Stolen Vendor Credentials
Overview On August 29, 2025, threat actors gained unauthorized access to Sinqia S.A., the Brazilian subsidiary of Evertec Inc., and...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Sep 4, 20252 min read


Trojanized Go Module Lures Script Kiddies
A malicious Go module named “golang-random-ip-ssh-bruteforce” has been uncovered masquerading as a legitimate SSH brute-force utility....
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Sep 4, 20252 min read


CVE-2025-8088: Hackers Exploit WinRAR Zero-Day to Plant Stealthy Malware
Overview A critical security vulnerability, tracked as CVE-2025-8088 , has been identified in WinRAR versions 7.12 and earlier . The...
MUHAMMAD ADIB
Aug 13, 20253 min read


Erlang/OTP SSH RCE: The Unpatched Flaw Threatening Critical Infrastructure🛡️
Researchers have observed a surge in exploit attempts targeting a critical vulnerability in Erlang/Open Telecom Platform (OTP) SSH,...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Aug 13, 20253 min read
bottom of page
