
Author: Tekno Phreak
-
Technical Analysis of SmokeLoader Version 2025
SmokeLoader, a modular malware loader active since 2011, has resurfaced with new versions in 2025 after Operation Endgame suppressed its…
-
Technical Analysis of SmokeLoader Version 2025
SmokeLoader, a modular malware loader active since 2011, has resurfaced with new versions in 2025 after Operation Endgame suppressed its…
-
Technical Analysis of SmokeLoader Version 2025
SmokeLoader, a modular malware loader active since 2011, has resurfaced with new versions in 2025 after Operation Endgame suppressed its…
-
August Vulnerabilities of Note
In August 2025, eighteen high-impact vulnerabilities were identified for prioritized remediation, down from 22 in July. The month saw a…
-
Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass
A new ransomware called HybridPetya has been discovered, combining features of Petya and NotPetya with advanced UEFI-based system capabilities. It…
-
AIDriven Deepfake Military ID Fraud Campaign
The Kimsuky APT group has launched a sophisticated spear-phishing campaign using AI-generated deepfake military ID cards to target South Korean…
-
AIDriven Deepfake Military ID Fraud Campaign
The Kimsuky APT group has launched a sophisticated spear-phishing campaign using AI-generated deepfake military ID cards to target South Korean…
-
AIDriven Deepfake Military ID Fraud Campaign
The Kimsuky APT group has launched a sophisticated spear-phishing campaign using AI-generated deepfake military ID cards to target South Korean…
-
CrossC2 Expanding Cobalt Strike Beacon to CrossPlatform Attacks
From September to December 2024, incidents involving CrossC2, an extension tool for Cobalt Strike Beacon on Linux, were confirmed. The…
-
China’s Great Firewall suffers its biggest leak ever as 500GB of source code and docs spill online –
Luke James reports: Chinese censorship sprang a major leak on September 11, when researchers confirmed that more than 500GB of…

