top of page
All Posts


Triofox Trouble: A Deep Dive into the UNC6485 Exploit Adventure
Cybersecurity has taken a front-row seat again with the recent discovery of a dangerous exploit in the Triofox platform. Google's Mandiant Threat Defense has unearthed a flaw giving cyber attackers dangerous levels of access to companies worldwide. Here’s what you need to know about these cunning digital pirates and their schemes. Unpacking the Attack The Triofox vulnerability, labeled CVE-2025-12480, is a gaping security hole that allows attackers to slip past defenses as if
syafiqs4
Nov 142 min read


CL0P Exploits Oracle E-Business Suite Zero-Day: What You Need to Know
Hey everyone, cybersecurity enthusiasts and tech defenders! A new campaign is making headlines, and this time, Oracle E-Business Suite (EBS) is the main target. The CL0P ransomware group has been exploiting a critical zero-day vulnerability (CVE-2025-61882) in Oracle EBS to steal data and launch extortion attacks against global organizations. What Happened The campaign started in mid-2025, when attackers began using multiple flaws in Oracle EBS to gain access to sensitive bus
MUHAMMAD ADIB
Oct 142 min read


Sneaky XCSSET Malware Alert: A New Threat to Xcode Developers
Hey there, tech enthusiasts and cybersecurity aficionados! If you’re developing apps on a Mac, there’s an emerging digital threat you...
syafiqs4
Oct 92 min read


Unmasking the Bitcoin Queen: A Journey from Fraud to Justice
What happens when a cunning fraudulent scheme collides with sophisticated cyber sleuthing? In an unprecedented turn of events, the UK's...
syafiqs4
Oct 92 min read


The Perfect Cloud Heist: Microsoft Entra ID Actor Token Exploit Explained
On July 14, 2025 a critical Entra ID vulnerability (CVE-2025-55241, CVSS 10.0) was disclosed that allowed cross-tenant impersonation...
syafiqs4
Sep 233 min read


$130M Real-Time Payment Fraud Attempt via Stolen Vendor Credentials
Overview On August 29, 2025, threat actors gained unauthorized access to Sinqia S.A., the Brazilian subsidiary of Evertec Inc., and...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Sep 42 min read


Trojanized Go Module Lures Script Kiddies
A malicious Go module named “golang-random-ip-ssh-bruteforce” has been uncovered masquerading as a legitimate SSH brute-force utility....
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Sep 42 min read


CVE-2025-8088: Hackers Exploit WinRAR Zero-Day to Plant Stealthy Malware
Overview A critical security vulnerability, tracked as CVE-2025-8088 , has been identified in WinRAR versions 7.12 and earlier . The...
MUHAMMAD ADIB
Aug 133 min read


Erlang/OTP SSH RCE: The Unpatched Flaw Threatening Critical Infrastructure🛡️
Researchers have observed a surge in exploit attempts targeting a critical vulnerability in Erlang/Open Telecom Platform (OTP) SSH,...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Aug 133 min read


Trust Hijacked: How Fake OAuth Apps Bypass MFA and Breach Microsoft 365
Overview According to Proofpoint , since early 2025, threat actors have been exploiting Microsoft’s OAuth 2.0 authorization framework by...
MUHAMMAD ADIB
Aug 63 min read


Fortress 2.0: Enhancing Cybersecurity with Modern Defense-in-Depth Strategies
There was a time when many businesses believed that a single security solution was enough to safeguard their entire IT environment. "Our...

AHMAD FUAD KAMARAZAMAN
Aug 63 min read


Weaponizing Trust: Phishing Campaigns and Malware Delivery via Link Wrapping and Cloudflare Tunnels
Overview From June through July 2025, researchers observed two coordinated campaigns leveraging trusted services—namely Proofpoint,...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Aug 13 min read


Covert Espionage: State-Backed Actors Deploy HazyBeacon in SEA Campaign
𝗣𝗮𝗹𝗼 𝗔𝗹𝘁𝗼 𝗡𝗲𝘁𝘄𝗼𝗿𝗸𝘀’ 𝗨𝗻𝗶𝘁 𝟰𝟮 has uncovered a new state-backed cyber espionage campaign dubbed CL-STA-1020, actively...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jul 212 min read


Crypto Wallets at Risk: Malicious Firefox Add-ons Uncovered
🟪 𝗪𝗵𝗮𝘁'𝘀 𝗛𝗮𝗽𝗽𝗲𝗻𝗶𝗻𝗴? A recent discovery by Koi Security reveals over 40 malicious Firefox browser extensions that were...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jul 42 min read


𝗧𝗵𝗲 𝗥𝗶𝘀𝗲 𝗼𝗳 𝗔𝗜-𝗚𝗲𝗻𝗲𝗿𝗮𝘁𝗲𝗱 𝗣𝗵𝗶𝘀𝗵𝗶𝗻𝗴: 𝗩𝗲𝗿𝗰𝗲𝗹’𝘀 𝘃𝟬 𝗠𝗶𝘀𝘂𝘀𝗲𝗱 𝗯𝘆 𝗖𝘆𝗯𝗲𝗿𝗰𝗿𝗶𝗺𝗶𝗻𝗮𝗹𝘀 🎭
Cybercriminals have found a new shortcut to scale their phishing campaigns—this time by 𝗮𝗯𝘂𝘀𝗶𝗻𝗴 𝗩𝗲𝗿𝗰𝗲𝗹’𝘀 𝘃𝟬, a generative...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jul 22 min read


GIFTEDCROOK: A New Threat to National Security and Data Privacy 🛡️
Cybersecurity researchers have identified a major evolution in 𝗚𝗜𝗙𝗧𝗘𝗗𝗖𝗥𝗢𝗢𝗞, a malware initially designed as a 𝘣𝘳𝘰𝘸𝘴𝘦𝘳...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jun 302 min read


No Click, No Warning: Paragon Spyware Hijacks Apple Devices in Covert Attack
Introduction In a chilling development for digital freedom, Apple has confirmed that a zero-click vulnerability in its Messages app was...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jun 163 min read


FBI Alert: Scammers Posing as IC3 Employees to Revictimize Fraud Victims
The FBI has issued a stern warning about a sophisticated scam targeting victims of financial fraud. In this scheme, scammers impersonate...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 222 min read


MITRE’s CVE Program: A Turning Point in Global Cybersecurity Funding and Governance
On April 16, 2025 , the U.S. government’s funding for MITRE’s Common Vulnerabilities and Exposures (CVE) program expired, casting a...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 214 min read


Strengthening Cybersecurity Resilience with Tailored Tabletop Exercises
Understanding Cybersecurity Tabletop Exercises (TTX) Cybersecurity Tabletop Exercises (TTX) are role-playing simulations designed to...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 172 min read
bottom of page
