9 Articles by Priyadharshini KB

DoNot APT Campaign Targets Users with Google Drive Phishing and Custom Malware
Donot APT strikes again! Here's how their malware spreads through phishing and Google Drive-hosted payloads.

Beware of Excel Attachments: Emotet Malware Returns in Phishing Emails
Explore the new Emotet spreads through phishing emails using Excel macros to silently install malware on victim systems.

New 2025 Cyber Threats: Ex-Black Basta Group Uses Microsoft Teams in Attacks
Explore how new Black Basta hackers exploit MS Teams & Python in stealthy new cyberattacks targeting businesses in 2025.

AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack Techniques
Explore how simple files are exploited to fuel advanced and sophisticated malware attacks in modern cyber threats.

Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK Files
Understand the Coyote Banking Trojan, a growing cyber threat using LNK files to steal sensitive financial data.

What is QR Quishing? How to Identify and Avoid QR Code Scams
Learn how QR Quishing works, its methodologies, how to identify it, and steps to protect yourself from QR code scams.

Detection Engineering: Enhancing Active Directory Security
Optimize your Active Directory security with a comprehensive KQL query to monitor user account activities effectively.
![[CVE-2025-21298]: Windows OLE Remote Code Execution Vulnerability](/_next/image?url=https%3A%2F%2Fcdn.sanity.io%2Fimages%2F51r0411t%2Fproduction%2Fac4531cc01acaa6b21b2aa35e3035e74e583a45a-1920x1080.png%3Frect%3D7%2C0%2C1906%2C1080%26w%3D600%26h%3D340&w=3840&q=75)
[CVE-2025-21298]: Windows OLE Remote Code Execution Vulnerability
Detailed exploit analysis of the latest Windows OLE RCE vulnerability, including infection chain and attack details.

Understanding the Role of Encryption in Securing Network Traffic
Discover how encryption secures network traffic, safeguarding data privacy, integrity, & protection from cyber threats.
