Blogs
Find the latest blog’ posts:
- by Deeba AhmedThe Oyster backdoor (also known as Broomstick) is targeting the financial world, using malicious search ads for PuTTY, Teams, and Google Meet.
- by Owais SultanScale software teams fast with development team augmentation. Learn when it works best, key models, common mistakes, and how to choose the right partner.
- by Deeba AhmedA new malware called PyStoreRAT is being through fake OSINT tools on GitHub targeting IT and OSINT pros. Read Morphisec's report detailing how it uses AI and evades security.
- by Owais SultanDisclosure: This article was submitted by PDFAid for publication.
- by Deeba AhmedVS Code developers beware: ReversingLabs found 19 malicious extensions hiding trojans inside a popular dependency, disguising the final malware payload as a standard PNG image file.
- by Deeba AhmedZimperium zLabs reveals DroidLock, a new Android malware acting like ransomware that can hijack Android devices, steal credentials via phishing, and stream your screen via VNC.
- by CyberNewswireRoad Town, British Virgin Islands, 11th December 2025, CyberNewsWire
- by WaqasPhishing campaign: Scammers sent over 40,000 spoofed SharePoint, DocuSign and e-sign emails to companies, hiding malicious links behind trusted redirect services.
- by CyberNewswireCary, North Carolina, USA, 11th December 2025, CyberNewsWire
- by Owais SultanEvery business today has to deal with private information – whether it is about customers, employees, or financial…
Guest Blogs
Post your insights, hacking experiences, and comments here:
