DragonForce Ransomware: Unveiling Its Tactics and Impact

ESET Wiper: Iranian APT Group Toufan’s
Politically Motivated Attack on Israeli Firms

Phantom Code:
Unleashing Memory Bombing to Bypass Security Mechanisms

Dissecting Agent Tesla: Unveiling Threat Vectors and Defense Mechanisms

Revealing the Abyss Ransomware

Investigating Token Impersonation and
Mitigating Token Theft Risks

BiBi Wiper:
A Malware Analysis Amidst the
Israel-Hamas-ISIS Conflict

Unmasking RedLine Stealer

Macro Code in Word, Safe or Not?

Stremio 4.4
Application Directory DLL Planting

The Kerberoasting Attack

picoCTF
‘unpackme-upx’ Reverse Engineering

Unquoted Service Path Vulnerability
MiniTool ShadowMaker v12.7

Exploiting XXE to retrieve files

How I earned 200$ in Bug Bounty


Buffer Overflow Explained


SAM and SYSTEM Registry Keys


Cronos — HackTheBox WriteUp


Steganography — Hiding data in an image