CyberwareHub Logo
Priyadharshini KB

Priyadharshini KB

Malware Maverick | Uncovering threats | Innovator by nature, protector by mission.

9 Articles by Priyadharshini KB

DoNot APT Campaign Targets Users with Google Drive Phishing and Custom Malware
Cyber Trends

DoNot APT Campaign Targets Users with Google Drive Phishing and Custom Malware

Donot APT strikes again! Here's how their malware spreads through phishing and Google Drive-hosted payloads.

Beware of Excel Attachments: Emotet Malware Returns in Phishing Emails
Malware Campaigns

Beware of Excel Attachments: Emotet Malware Returns in Phishing Emails

Explore the new Emotet spreads through phishing emails using Excel macros to silently install malware on victim systems.

New 2025 Cyber Threats: Ex-Black Basta Group Uses Microsoft Teams in Attacks
Cyber Trends

New 2025 Cyber Threats: Ex-Black Basta Group Uses Microsoft Teams in Attacks

Explore how new Black Basta hackers exploit MS Teams & Python in stealthy new cyberattacks targeting businesses in 2025.

AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques
Malware Campaigns

AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques

Explore how simple files are exploited to fuel advanced and sophisticated malware attacks in modern cyber threats.

Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files
Malware Campaigns

Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files

Understand the Coyote Banking Trojan, a growing cyber threat using LNK files to steal sensitive financial data.

What is QR Quishing? How to Identify and Avoid QR Code Scams
Phishing Campaigns

What is QR Quishing? How to Identify and Avoid QR Code Scams

Learn how QR Quishing works, its methodologies, how to identify it, and steps to protect yourself from QR code scams.

Detection Engineering: Enhancing Active Directory Security
Active Directory

Detection Engineering: Enhancing Active Directory Security

Optimize your Active Directory security with a comprehensive KQL query to monitor user account activities effectively.

[CVE-2025-21298]: Windows OLE Remote Code Execution Vulnerability
Threats & Vulnerabilities

[CVE-2025-21298]: Windows OLE Remote Code Execution Vulnerability

Detailed exploit analysis of the latest Windows OLE RCE vulnerability, including infection chain and attack details.

Understanding the Role of Encryption in Securing Network Traffic
Network Security

Understanding the Role of Encryption in Securing Network Traffic

Discover how encryption secures network traffic, safeguarding data privacy, integrity, & protection from cyber threats.