
Author: Tekno Phreak
-
Think before you Click(Fix): Analyzing the ClickFix social engineering technique
The ClickFix social engineering technique has gained popularity among threat actors, targeting thousands of devices globally. It tricks users into…
-
Think before you Click(Fix): Analyzing the ClickFix social engineering technique
The ClickFix social engineering technique has gained popularity among threat actors, targeting thousands of devices globally. It tricks users into…
-
APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
Pakistan-linked APT36 (Transparent Tribe) launched a new cyber-espionage campaign targeting Indian government and defense entities. Active in August 2025, the…
-
APT36 Malware Campaign Using Desktop Entry Files and Google Drive Payload Delivery
Pakistan-linked APT36 (Transparent Tribe) launched a new cyber-espionage campaign targeting Indian government and defense entities. Active in August 2025, the…
-
APT MuddyWater Targets CFOs with MultiStage Phishing & NetBird Abuse
A sophisticated spear-phishing campaign, likely linked to APT MuddyWater, is targeting CFOs and finance executives across multiple continents. The attackers…
-
A Cereal Offender: Analyzing the CORNFLAKE.V3 Backdoor
This analysis details a campaign involving two threat groups, UNC5518 and UNC5774, deploying the CORNFLAKE.V3 backdoor. UNC5518 compromises legitimate websites…
-
A Cereal Offender: Analyzing the CORNFLAKE.V3 Backdoor
This analysis details a campaign involving two threat groups, UNC5518 and UNC5774, deploying the CORNFLAKE.V3 backdoor. UNC5518 compromises legitimate websites…
-
Cybercriminals Abuse AI Website Creation App For Phishing
Cybercriminals are exploiting an AI-powered website creation platform called Lovable to generate fraudulent websites for credential phishing and malware delivery.…
-
Cybercriminals Abuse AI Website Creation App For Phishing
Cybercriminals are exploiting an AI-powered website creation platform called Lovable to generate fraudulent websites for credential phishing and malware delivery.…
-
CVE202553770 and CVE202553771: Actively Exploited SharePoint Vulnerabilities
Two critical vulnerabilities, CVE-2025-53770 and CVE-2025-53771, are affecting Microsoft SharePoint Servers, enabling attackers to upload malicious files and extract cryptographic…

