top of page
All Posts


Trust Hijacked: How Fake OAuth Apps Bypass MFA and Breach Microsoft 365
Overview According to Proofpoint , since early 2025, threat actors have been exploiting Microsoftโs OAuth 2.0 ย authorization framework by...
MUHAMMAD ADIB
Aug 6, 20253 min read
ย
ย
ย


Fortress 2.0: Enhancing Cybersecurity with Modern Defense-in-Depth Strategies
There was a time when many businesses believed that a single security solution was enough to safeguard their entire IT environment. "Our...

AHMAD FUAD KAMARAZAMAN
Aug 6, 20253 min read
ย
ย
ย


Weaponizing Trust: Phishing Campaigns and Malware Delivery via Link Wrapping and Cloudflare Tunnels
Overview From June through July 2025, researchers observed two coordinated campaigns leveraging trusted servicesโnamely Proofpoint,...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Aug 1, 20253 min read
ย
ย
ย


Covert Espionage: State-Backed Actors Deploy HazyBeacon in SEA Campaign
๐ฃ๐ฎ๐น๐ผ ๐๐น๐๐ผ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ๐โ ๐จ๐ป๐ถ๐ ๐ฐ๐ฎ has uncovered a new state-backed cyber espionage campaign dubbed CL-STA-1020, actively...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jul 21, 20252 min read
ย
ย
ย


Crypto Wallets at Risk: Malicious Firefox Add-ons Uncovered
๐ช ๐ช๐ต๐ฎ๐'๐ ๐๐ฎ๐ฝ๐ฝ๐ฒ๐ป๐ถ๐ป๐ด? A recent discovery by Koi Security reveals over 40 malicious Firefox browser extensions that were...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jul 4, 20252 min read
ย
ย
ย


๐ง๐ต๐ฒ ๐ฅ๐ถ๐๐ฒ ๐ผ๐ณ ๐๐-๐๐ฒ๐ป๐ฒ๐ฟ๐ฎ๐๐ฒ๐ฑ ๐ฃ๐ต๐ถ๐๐ต๐ถ๐ป๐ด: ๐ฉ๐ฒ๐ฟ๐ฐ๐ฒ๐นโ๐ ๐๐ฌ ๐ ๐ถ๐๐๐๐ฒ๐ฑ ๐ฏ๐ ๐๐๐ฏ๐ฒ๐ฟ๐ฐ๐ฟ๐ถ๐บ๐ถ๐ป๐ฎ๐น๐ ๐ญ
Cybercriminals have found a new shortcut to scale their phishing campaignsโthis time by ๐ฎ๐ฏ๐๐๐ถ๐ป๐ด ๐ฉ๐ฒ๐ฟ๐ฐ๐ฒ๐นโ๐ ๐๐ฌ, a generative...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jul 2, 20252 min read
ย
ย
ย


GIFTEDCROOK: A New Threat to National Security and Data Privacy ๐ก๏ธ
Cybersecurity researchers have identified a major evolution in ๐๐๐๐ง๐๐๐๐ฅ๐ข๐ข๐, a malware initially designed as a ๐ฃ๐ณ๐ฐ๐ธ๐ด๐ฆ๐ณ...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jun 30, 20252 min read
ย
ย
ย


No Click, No Warning: Paragon Spyware Hijacks Apple Devices in Covert Attack
Introduction In a chilling development for digital freedom, Apple has confirmed that a zero-click vulnerability ย in its Messages app was...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jun 16, 20253 min read
ย
ย
ย


FBI Alert: Scammers Posing as IC3 Employees to Revictimize Fraud Victims
The FBI has issued a stern warning about a sophisticated scam targeting victims of financial fraud. In this scheme, scammers impersonate...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 22, 20252 min read
ย
ย
ย


MITREโs CVE Program: A Turning Point in Global Cybersecurity Funding and Governance
On April 16, 2025 , the U.S. governmentโs funding for MITREโs Common Vulnerabilities and Exposures (CVE) ย program expired, casting a...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 21, 20254 min read
ย
ย
ย


Strengthening Cybersecurity Resilience with Tailored Tabletop Exercises
Understanding Cybersecurity Tabletop Exercises (TTX) Cybersecurity Tabletop Exercises (TTX) are role-playing simulations designed to...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 17, 20252 min read
ย
ย
ย


Crypto Developers Targeted by Malware Disguised as Coding Challenges ๐ปโ ๏ธ
A North Korea-linked hacking group, Slow Pisces , has launched a targeted campaign against cryptocurrency developers, using clever...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 16, 20253 min read
ย
ย
ย


ResolverRAT Targets Healthcare and Pharma: A Growing Cyber Threat
The healthcare and pharmaceutical industries are under siege from a new cyber threat: ResolverRAT . This highly advanced remote access...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 15, 20253 min read
ย
ย
ย


Tycoon2FA Phishing Kit: Evolving Threats to Microsoft 365 Users
The Tycoon2FA ย phishing kit, part of the growing Phishing-as-a-Service (PhaaS) ecosystem, has unveiled new tricks to bypass multi-factor...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 14, 20252 min read
ย
ย
ย


WhatsApp Vulnerability: Malicious Code Execution Through Attachments
A critical security flaw has been identified in WhatsApp Desktop for Windows , one of the worldโs most popular messaging platforms,...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 9, 20252 min read
ย
ย
ย


FortiSwitch Vulnerability: A Wake-Up Call for Network Security
Fortinet, a leading provider of cybersecurity solutions, has issued a critical advisory for its FortiSwitch product line. A newly...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 9, 20252 min read
ย
ย
ย


๐จ ๐ง๐ต๐ฒ ๐ฃ๐น๐ฎ๐๐๐ผ๐ ๐๐ผ๐ฐ๐ธ๐ฒ๐ฟ ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ: ๐ ๐๐ฟ๐ผ๐๐ถ๐ป๐ด ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐ผ ๐ ๐ผ๐ฑ๐ฒ๐ฟ๐ป ๐ฆ๐๐๐๐ฒ๐บ๐
A new ransomware variant, ๐ฃ๐น๐ฎ๐๐๐ผ๐ ๐๐ผ๐ฐ๐ธ๐ฒ๐ฟ, has emerged, targeting ๐ช๐ถ๐ป๐ฑ๐ผ๐๐, ๐ก๐๐ฆ, ๐ฎ๐ป๐ฑ ๐๐ฆ๐ซ๐ถ ๐ผ๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ป๐ด...

Syafiq S
Apr 8, 20252 min read
ย
ย
ย


The Rise of Deepfake and AI in Business Email Compromise (BEC) Scams
๐ Introduction Business Email Compromise (BEC) scams have long been a significant threat to organizations, involving cybercriminals...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Mar 19, 20253 min read
ย
ย
ย


The Evolution of Endpoint Security Technology in the Era of Remote Work and BYOD
The landscape of endpoint security has undergone significant transformations, especially with the rise of remote work and the Bring Your...

Syafiq S
Mar 7, 20253 min read
ย
ย
ย


Unlocking Cybersecurity Strategies for FSI and Banking Sectors
In today's digital age, the importance of cybersecurity cannot be overstated, especially for companies in the financial services...

Syafiq S
Feb 26, 20252 min read
ย
ย
ย
bottom of page
