Shadows of LSASS Dumping: Evasion Techniques and the Ongoing Struggle of EDR Solutions to Defend a…EDR vs. LSASS: Exploring stealth dumping techniques attackers use to bypass defenses and extract credentials undetected.Apr 30Apr 30
Massive Power Outage in Spain & Portugal — A Wake-Up Call for ICS/OT SecurityOn Monday, April 28, 2025, the entire Iberian Peninsula — covering nearly all of Spain, Portugal, and parts of France — experienced a…Apr 30Apr 30
Beware the Voice You Trust: The Rise of AI Voice Note Impersonation Scams in KuwaitHow AI-driven voice cloning is fueling a new wave of cyber scams in Kuwait — and what you can do to stay protected.Apr 28Apr 28
Sarab — Cyber Deception in Action:Preventing Critical Infrastructure Attacks in MENA with Cyber Deception Based on the Iran Gas Station Hack Case StudyApr 25Apr 25
Unveiling the Intricacies of AsyncRATComprehensive Analysis of AsyncRAT Used by Blind Eagle: TTPs, Evasion Techniques, Persistence Mechanisms, and MITRE ATT&CK MappingApr 25Apr 25
PEB Walk: Avoid API calls inspection in IAT by analyst and bypass static detection of AV/EDRBypassing EDR Static Analysis: PEB Walk, API Obfuscation, and Multi-Stage Malware Injection TechniquesApr 24Apr 24
Incident response report — REMCOS RatAnalysis of Remcos 4.9.2 Pro RAT: Fileless Execution, Process Injection, Clipboard Logging, and Persistence MechanismsApr 23Apr 23
Reverse Engineering report on Firefox trojanAnalysis of Multi-Stage Windows Trojan: Firefox DLL Hijacking, Keylogging, and Stealth TechniquesApr 23Apr 23
Ease Post Exploitation: Getting elevated reverse shell using DLL Hijacking and Mock DirectoriesBypassing Windows UAC with DLL Hijacking and Mock Directories for Privilege Escalation and Post ExploitationApr 23Apr 23
Arsenal 2.0: Bypass EDR’s/XDR’s and make malware analysis harder(Direct Syscalls, Sandbox Bypass, API Hashing, AES Encryption)Apr 22Apr 22