top of page


Understanding Scattered Spider: The New Face of Cybercrime
Scattered Spider (UNC3944) is a loosely affiliated but highly skilled cybercrime group first observed around May 2022. Known for their adaptability, they operate under multiple aliases including Octo Tempest, Muddled Libra, and 0ktapus.
At first, they specialized in SIM swapping and credential theft.
Sep 26, 20254 min read


UNC6395: From GitHub to Salesforce, Inside the Supply‑Chain Breach
A compromise of Salesloft’s GitHub kicked off a supply‑chain campaign that used stolen OAuth tokens from Drift to export data at scale from Salesforce.
Sep 11, 20254 min read


APT36 Explained: Transparent Tribe’s Tools, Targets & IOC's
APT36—also known as Transparent Tribe, Mythic Leopard, ProjectM, and Earth Karkaddan—is a Pakistan-based advanced persistent threat (APT) group active since at least 2013.
Sep 6, 20254 min read


Threat Intel the easy way with OpenCTI and Docker
How to deploy the OpenCTI (Open Cyber Threat Intelligence) platform within Docker, enabling you to aggregate and analyze threat intelligence in one place.
Aug 26, 20254 min read


Stay Safe: Understanding the WinRAR Vulnerability (CVE-2025-8088)
This flaw impacts WinRAR versions prior to 7.13 and leverages a directory traversal bug to allow attackers to drop and execute malicious code on a target system without the victim’s knowledge.
Aug 11, 20253 min read


Mastering KQL: The Key to Enhancing Cybersecurity with Microsoft Sentinel
Delve into what KQL is, how it powers Microsoft Sentinel, and how cyber defenders can harness it to strengthen security postures with practical query example.
Jul 23, 20254 min read


Level Up Your Phishing Defense: Tools Every Techie Should Know (and Use!) 🛡️
This article breaks down the tools you can use to fight back against phishing emails, from simple checks to more advanced techniques.
Jun 18, 20254 min read


Infostealer Malware Explained: How It Works, Real-World Examples, and How to Stay Safe
Discover what infostealer malware is, how it operates, real-life examples like RedLine, Vidar, and Raccoon Stealer, and learn effective cybersecurity measures to protect your sensitive data.
May 28, 20254 min read


Security Onion SIEM Setup
Security Onion SIEM setup guide.
Network security monitoring, intrusion detection, and log management
May 13, 20253 min read
bottom of page

