top of page
All Posts


Unmasking the Bitcoin Queen: A Journey from Fraud to Justice
What happens when a cunning fraudulent scheme collides with sophisticated cyber sleuthing? In an unprecedented turn of events, the UK's...

Syafiq S
Oct 9, 20252 min read
ย
ย
ย


The Perfect Cloud Heist: Microsoft Entra ID Actor Token Exploit Explained
On July 14, 2025 ย a critical Entra ID vulnerability (CVE-2025-55241, CVSS 10.0) was disclosed that allowed cross-tenant impersonation...

Syafiq S
Sep 23, 20253 min read
ย
ย
ย


$130M Real-Time Payment Fraud Attempt via Stolen Vendor Credentials
Overview On August 29, 2025, threat actors gained unauthorized access to Sinqia S.A., the Brazilian subsidiary of Evertec Inc., and...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Sep 4, 20252 min read
ย
ย
ย


Trojanized Go Module Lures Script Kiddies
A malicious Go module named โgolang-random-ip-ssh-bruteforceโ has been uncovered masquerading as a legitimate SSH brute-force utility....
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Sep 4, 20252 min read
ย
ย
ย


CVE-2025-8088: Hackers Exploit WinRAR Zero-Day to Plant Stealthy Malware
Overview A critical security vulnerability, tracked as CVE-2025-8088 , has been identified in WinRAR versions 7.12 and earlier . The...
MUHAMMAD ADIB
Aug 13, 20253 min read
ย
ย
ย


Erlang/OTP SSH RCE: The Unpatched Flaw Threatening Critical Infrastructure๐ก๏ธ
Researchers have observed a surge in exploit attempts targeting a critical vulnerability in Erlang/Open Telecom Platform (OTP) SSH,...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Aug 13, 20253 min read
ย
ย
ย


Trust Hijacked: How Fake OAuth Apps Bypass MFA and Breach Microsoft 365
Overview According to Proofpoint , since early 2025, threat actors have been exploiting Microsoftโs OAuth 2.0 ย authorization framework by...
MUHAMMAD ADIB
Aug 6, 20253 min read
ย
ย
ย


Fortress 2.0: Enhancing Cybersecurity with Modern Defense-in-Depth Strategies
There was a time when many businesses believed that a single security solution was enough to safeguard their entire IT environment. "Our...

AHMAD FUAD KAMARAZAMAN
Aug 6, 20253 min read
ย
ย
ย


Weaponizing Trust: Phishing Campaigns and Malware Delivery via Link Wrapping and Cloudflare Tunnels
Overview From June through July 2025, researchers observed two coordinated campaigns leveraging trusted servicesโnamely Proofpoint,...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Aug 1, 20253 min read
ย
ย
ย


Covert Espionage: State-Backed Actors Deploy HazyBeacon in SEA Campaign
๐ฃ๐ฎ๐น๐ผ ๐๐น๐๐ผ ๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ๐โ ๐จ๐ป๐ถ๐ ๐ฐ๐ฎ has uncovered a new state-backed cyber espionage campaign dubbed CL-STA-1020, actively...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jul 21, 20252 min read
ย
ย
ย


Crypto Wallets at Risk: Malicious Firefox Add-ons Uncovered
๐ช ๐ช๐ต๐ฎ๐'๐ ๐๐ฎ๐ฝ๐ฝ๐ฒ๐ป๐ถ๐ป๐ด? A recent discovery by Koi Security reveals over 40 malicious Firefox browser extensions that were...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jul 4, 20252 min read
ย
ย
ย


๐ง๐ต๐ฒ ๐ฅ๐ถ๐๐ฒ ๐ผ๐ณ ๐๐-๐๐ฒ๐ป๐ฒ๐ฟ๐ฎ๐๐ฒ๐ฑ ๐ฃ๐ต๐ถ๐๐ต๐ถ๐ป๐ด: ๐ฉ๐ฒ๐ฟ๐ฐ๐ฒ๐นโ๐ ๐๐ฌ ๐ ๐ถ๐๐๐๐ฒ๐ฑ ๐ฏ๐ ๐๐๐ฏ๐ฒ๐ฟ๐ฐ๐ฟ๐ถ๐บ๐ถ๐ป๐ฎ๐น๐ ๐ญ
Cybercriminals have found a new shortcut to scale their phishing campaignsโthis time by ๐ฎ๐ฏ๐๐๐ถ๐ป๐ด ๐ฉ๐ฒ๐ฟ๐ฐ๐ฒ๐นโ๐ ๐๐ฌ, a generative...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jul 2, 20252 min read
ย
ย
ย


GIFTEDCROOK: A New Threat to National Security and Data Privacy ๐ก๏ธ
Cybersecurity researchers have identified a major evolution in ๐๐๐๐ง๐๐๐๐ฅ๐ข๐ข๐, a malware initially designed as a ๐ฃ๐ณ๐ฐ๐ธ๐ด๐ฆ๐ณ...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jun 30, 20252 min read
ย
ย
ย


No Click, No Warning: Paragon Spyware Hijacks Apple Devices in Covert Attack
Introduction In a chilling development for digital freedom, Apple has confirmed that a zero-click vulnerability ย in its Messages app was...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Jun 16, 20253 min read
ย
ย
ย


FBI Alert: Scammers Posing as IC3 Employees to Revictimize Fraud Victims
The FBI has issued a stern warning about a sophisticated scam targeting victims of financial fraud. In this scheme, scammers impersonate...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 22, 20252 min read
ย
ย
ย


MITREโs CVE Program: A Turning Point in Global Cybersecurity Funding and Governance
On April 16, 2025 , the U.S. governmentโs funding for MITREโs Common Vulnerabilities and Exposures (CVE) ย program expired, casting a...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 21, 20254 min read
ย
ย
ย


Strengthening Cybersecurity Resilience with Tailored Tabletop Exercises
Understanding Cybersecurity Tabletop Exercises (TTX) Cybersecurity Tabletop Exercises (TTX) are role-playing simulations designed to...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 17, 20252 min read
ย
ย
ย


Crypto Developers Targeted by Malware Disguised as Coding Challenges ๐ปโ ๏ธ
A North Korea-linked hacking group, Slow Pisces , has launched a targeted campaign against cryptocurrency developers, using clever...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 16, 20253 min read
ย
ย
ย


ResolverRAT Targets Healthcare and Pharma: A Growing Cyber Threat
The healthcare and pharmaceutical industries are under siege from a new cyber threat: ResolverRAT . This highly advanced remote access...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 15, 20253 min read
ย
ย
ย


Tycoon2FA Phishing Kit: Evolving Threats to Microsoft 365 Users
The Tycoon2FA ย phishing kit, part of the growing Phishing-as-a-Service (PhaaS) ecosystem, has unveiled new tricks to bypass multi-factor...
SHAH MUHAMMAD ASH-SYAFIQ BIN SHAHRIL
Apr 14, 20252 min read
ย
ย
ย
bottom of page
