Estimated reading time: 9 minutes
Operation Silent Rotor: Targeted Campaign Compromises Unmanned Aviation Sector Ahead of Moscow Summit Table of Content Introduction Key Targets Industries Affected Geographical focus Infection Chain Initial Findings Looking into the Decoy Documents Technical Analysis Stage 1 – Analysis of...Information Technology, Network Security & Cybersecurity Updates
Estimated reading time: 11 minutes
Operation DualScript – A Multi-Stage PowerShell Malware Campaign Targeting Cryptocurrency and Financial Activity Introduction During our investigation, we identified a multi-stage malware infection leveraging Scheduled Task persistence, VBScript launchers, and PowerShell-based execution. The attack operates through two parallel chains:...
Estimated reading time: 6 minutes
Homoglyph Attacks: How Lookalike Characters Are Exploited for Cyber Deception Table of Contents: Introduction What is a Homoglyph Attack? Practical Homoglyph Confusable Practical Homoglyph Confusable Table Why Homoglyph Attacks Are Effective Common Homoglyph Use Cases and Attack Vectors Real-World...
Estimated reading time: 8 minutes
Weaponizing Legitimate Low-Level Tools: How Ransomware Evades Antivirus Protections Table of Contents Introduction The “Dual-Use Dilemma”: Why Attackers Prefer Legitimate Tools Why Antivirus Neutralization Matters Historical Evolution of Antivirus Neutralization The Ransomware Kill Chain Stages of Abusing Legitimate Low-Level...
Estimated reading time: 10 minutes
Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency Contents Introduction Target Phishing Email Infection Analysis Stage-1: JavaScript Loader Stage-2: Browser Stealer Infrastructure and Attribution CVE Assessment Conclusion Seqrite Coverage IOCs MITRE ATT&CK Introduction Seqrite Labs...
Estimated reading time: 11 minutes
Contents Introduction Key Targets Industries Affected Geographical focus Geopolitical Context Infection Chain Timeline of Activity Initial Findings Looking into the Decoy Documents Technical Analysis Stage 1 – Malicious Archive Delivery Stage 2 – Malicious Shortcut Execution Stage 3 –...
Estimated reading time: 3 minutes
From Encryption to Real-World Attack Prevention In today’s hyper-connected digital environment, secure communication is not just about encrypting data—it is about preventing attackers from abusing exposed services. Secure communication protocols protect data in transit, but misconfigurations and weak access...