Priyadharshini K B
Malware Maverick | Uncovering threats | Innovator by nature, protector by mission.
Cyber Trends
Aug 11, 2025
Malware Campaigns
Beware of Excel Attachments: Emotet Malware Returns in Phishing Emails
Jul 23, 2025
Cyber Trends
New 2025 Cyber Threats: Ex-Black Basta Group Uses Microsoft Teams in Attacks
Jun 16, 2025
Malware Campaigns
AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques
Mar 25, 2025
Malware Campaigns
Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files
Mar 14, 2025
Malware Campaigns
Lumma Stealer Infostealer: TTPs, Indicators, and Detection Strategies
Mar 12, 2025
Threats & Vulnerabilities
[CVE-2025-21298]: Windows OLE Remote Code Execution Vulnerability
Jan 28, 2025
Malware Campaigns
LokiBot 2025: New Tactics and Technical Insights into Its Evolution
Jan 25, 2025
Threats & Vulnerabilities
CVE‑2024‑38213: Microsoft Windows SmartScreen Security Feature Bypass Vulnerability Analysis
Dec 27, 2024
Malware Campaigns
Who is Black Basta Ransomware? Tactics, Attacks, and Links to Conti and Other Cybercrime Groups
Dec 2, 2024
Malware Campaigns
New Remcos RAT Variant Targets Windows Users - How It Can Hijack Your Devices
Nov 22, 2024
Malware Campaigns
Rhadamanthys Malware 2024: How This Infostealer Steals Your Data and How to Protect Yourself
Sep 16, 2024
Threats & Vulnerabilities
CVE‑2021‑44228: Apache Log4j Remote Code Execution Vulnerability Analysis
Sep 4, 2024
Malware Campaigns
DarkGate Malware Explained: How It Infects Your System and How to Stay Safe
Aug 30, 2024
Threats & Vulnerabilities
CVE‑2024‑21412: Critical Windows SmartScreen Vulnerability Allowing Malware Execution
Aug 23, 2024
Malware Campaigns
Malicious PowerPoint .PPAM Files: New Attack Techniques and How to Stay Safe
Aug 19, 2024
Threats & Vulnerabilities
CVE‑2017‑8570: Microsoft Office Remote Code Execution Vulnerability Analysis
Aug 12, 2024
Malware Campaigns
Remcos RAT Technical Malware Analysis: Execution Flow, Evasion Techniques & IOCs
Aug 7, 2024
Malware Campaigns
Qakbot LNK Files Technical Analysis 2024: Tactics, Indicators & Defense
Jul 15, 2024
Malware Campaigns
XenoRAT Technical Analysis & Functionality Deep Dive (Part 2): LNK to MS‑XLS Evolution
Jul 8, 2024
Malware Campaigns
XenoRAT Technical Analysis & Functionality Deep Dive (Part 1): LNK Delivery & PowerShell Evasion
Jul 3, 2024
Malware Campaigns
Technical Analysis of Guloader Malware Using .JAR Files: Infection Chain & Tactics
Jun 17, 2024
Threats & Vulnerabilities
Technical Analysis of RTF Template Injection Attacks
Jun 14, 2024
Malware Campaigns
SocGholish Malware: Technical Exploration of Behavior, Delivery & Defenses
Jun 10, 2024
Threats & Vulnerabilities
CVE‑2017‑0199: Microsoft Office & WordPad Remote Code Execution Vulnerability Analysis
May 30, 2024
Threats & Vulnerabilities
CVE‑2017‑11882: Microsoft Office Memory Corruption Vulnerability Analysis
May 27, 2024
Malware Campaigns
How to Analyze Malicious RTF Files: Structure, Embedded Objects & Threats
May 23, 2024
Malware Campaigns
RevengeRAT: Technical Analysis and Functionality Deep Dive
May 20, 2024
Threats & Vulnerabilities
CVE-2024-3094: Critical XZ Utils Backdoor Vulnerability Exposing SSH
May 16, 2024







![[CVE-2025-21298]: Windows OLE Remote Code Execution Vulnerability](/_next/image?url=https%3A%2F%2Fcdn.sanity.io%2Fimages%2F51r0411t%2Fproduction%2Fac4531cc01acaa6b21b2aa35e3035e74e583a45a-1920x1080.png%3Fw%3D800%26h%3D450&w=3840&q=75)





















